738 Results for

protocols

Article

Nginx upgrade funded by fans of Google's SPDY Web protocol

Nginx will move to the latest version of Google's Web-speedup software with funding from CloudFlare, MaxCDN, and WordPress developer Automattic.

By December 20, 2013

Article

Court: Homeland Security must disclose cellular shutdown protocols

The US government's SOP 303 codifies the shutdown and restoration process "for use by commercial and private wireless networks during national crises."

By November 15, 2013

Article

How to force the use of SMB1 and other protocols in Mavericks

If you are experiencing troubles with SMB connections in OS X Mavericks, you can try forcing the use of the prior SMB protocol.

By November 1, 2013

Article

iDevices affirms HomeKit-compatible mystery product coming this fall

iDevices is unveiling a brand new HomeKit-compatible product soon. Will it be another thermometer or something entirely new?

By September 10, 2014

Article

Does iOS 8 make sense as a smart home platform?

Apple's new iOS is built to control the connected home. How does it stack up against other would-be smart home platforms?

By September 9, 2014

Article

How those nude photos were leaked (and why you should care)

What does the hack mean for your own cloud security? Here are all of your nude selfie-related questions answered.

By September 2, 2014

Article

Major Xbox One update rolls out to preview members

The latest update offers a revamped Party app, a new Friends section, and other surprises. But you need to be a member of the Xbox Live preview program to grab it.

By August 15, 2014

Article

Lavabit founder's DarkMail needs help to cross finish line

Embattled email guru Ladar Levison updates the DefCon crowd on encrypted email project DarkMail and asks for help from the hacker faithful to get what may be his final email project done.

By August 10, 2014

Article

Hacker swipes $83,000 from Bitcoin mining pools

Bitcoin exchanges and trading posts have been hacking targets over the past year, but now one hacker has taken on ISPs to loot cryptocurrency from mining pools.

By August 8, 2014

Article

To stop security breaches, kill the username and password

You don't have to be an online security expert to know that usernames and passwords are not cutting it. It's time to completely re-think how we manage our online identities.

By August 7, 2014