13 Results for



Making DDoS prevention a priority

In the Web world, distributed denial-of-service attacks can take out entire sites rather quickly. Mitigating the risk should be top of mind when building network architecture.

By February 9, 2012


How AT&T made Steve Jobs look bad...again

Could tethering mobile devices with laptops have saved Steve Jobs WWDC keynote from being overtaken by Wi-Fi users?

By June 8, 2010


The 802.11n land grab

The 802.11n wireless networking protocol has finally become a standard. It's good news for consumers but shows how slow standards bodies move.

By December 1, 2009


Denial-of-service got Twitter. Is your network next?

Can distributed denial-of-service attacks take down your network? The answer is yes, unless you plan for the worst.

By August 6, 2009


Tech giants deny helping Iran eavesdrop

A Nokia-Siemens joint venture denies allegations it provided Internet wiretapping gear to Iran, leaving many to wonder who's aiding the Internet snoops? Or are their Net restrictions entirely homemade?

By June 22, 2009


Safeguarding your wireless network

Consumers and companies both need to pay attention to wireless security. These three tips can help make computing safer at your home and office.

By June 19, 2009


Turning hackers into helpers

What do you do when your software is being used for nefarious purposes? Figure out a way to make someone else's life better.

By April 23, 2009


IP networks will feel traffic pain in 2009

Mobile networks will be tested during the inauguration, but every network will feel the strain in 2009. Providers need to better manage their bandwidth, resolving potential problems quickly.

By January 19, 2009


How safe is instant messaging? A security and privacy survey

News.com reviews the major instant messaging services and evaluates which do the best job of protecting their users' security and privacy.

By June 9, 2008


NSA eavesdropping: How it might work

Attorney General Gonzales plays it mum, but others offer insights into the agency's surveillance options.

By February 7, 2006