Tags: iiRemove, marvellRemove

Review: Samsung Galaxy Note II  
By Chris Jager | Jan 22, 2013 | Comment Now 
Stylus-toting smartphone gets an upgrade.
IBM CTO: PC dead, glad we flogged Lenovo 
By Liam Tung | Aug 12, 2011 | Comment Now 
Microsoft disagrees.
Review: Samsung Galaxy SII 
By Jonathan Bray, Nic Healey | Aug 5, 2011 | Comment Now 
Nothing short of remarkable.
Review: Samsung Galaxy S II 
By Chris Jager | Jun 17, 2011 | Comment Now 
Zips along at a blitzkrieg pace.
Storm II, cheap Curves coming to Blackberry 
By Brett Winterford | May 7, 2009 | Comment Now 
Research in Motion is working on a new version of the Blackberry Bold that combines a touch screen with a QWERTY keyboard, a low-cost version of the Curve and a successor to ...
HP settles with CSIRO over Wi-Fi suit 
By Brett Winterford | Apr 2, 2009 | Comment Now 
The CSIRO has one less target in its ongoing litigation battle with the big guns of the ICT industry over its claims to patents on Wi-Fi technology.
Cyber Storm II underway from DHS 
By Sue Marquette | Mar 12, 2008 | Comment Now 
To strengthen the nation's cybersecurity preparedness, the federal Department of Homeland Security (DHS) this week is holding its second Cyber Storm event, a five-day exercise ...
Cyber Storm II offers proactive IT security  
Mar 7, 2008 | Comment Now 
Telstra has been working closely with government and the IT industry to ensure it is ready and resilient to possible cyber attacks as part of its involvement in the internationa...
SanDisk boosts Ultra II memory cards 
Sep 4, 2007 | Comment Now 
SanDisk unveiled a 4GB SDHC card and an 8GB Memory Stick Pro Duo card for its SanDisk Ultra II line at the IFA show in Berlin last week.
By Peter Stephenson,CeRNS, | Nov 20, 2005 | Comment Now 
SecureDoc is a competent full disk encryptor that uses the AES algorithm and SHA-2 hashing. It works with a token to which the user can save the key file, rather than saving it ...
Mobile encryption, part II (2005) 
By Peter Stephenson,CeRNS, | Oct 3, 2005 | Comment Now 
If it’s tough to protect your network within the corporate environment, it’s even harder when your staff want to use their laptops outside. Peter Stephenson looks at products ...
Disk Protect  
By Peter Stephenson,CeRNS, | Oct 3, 2005 | Comment Now 
Disk Protect from Becrypt is a competent hard disk encryption that looks very good on paper.
By Peter Stephenson,CeRNS, | Oct 3, 2005 | Comment Now 
DiskCrypt from Digisafe is unique among these products. Rather than being a software product that you use to encrypt your hard disk, DiskCrypt is a hard disk that comes ...
Encryption Plus Hard Disk  
By Peter Stephenson,CeRNS, | Oct 3, 2005 | Comment Now 
This had the most promise of all the products tested. It is easy to install, has lots of nice administrative options and is robust and well-certified.
By Peter Stephenson,CeRNS, | Oct 3, 2005 | Comment Now 
This is not a disk encryptor like most of the products on test, because it encrypts individual document files transparently. Indeed, it was designed and intended completely for ...
EverQuest II set for 8 November release 
By Damien Virulhapen | Oct 26, 2004 | Comment Now 
Game industry giant Sony Computer Entertainment has confirmed 8 November as the ship date for the highly anticipated sequel to its monster online PC hit EverQuest.
Austrian bank boosts security to meet Basel II Accord  
By Robert Jaques | Sep 28, 2004 | Comment Now 
BAWAG-PSK, the fourth-largest bank in Austria, has conducted a major network upgrade in a bid to boost IT security in the face of "unprecedented threats" and to meet the ...
Anti-spam, part II (2004) 
Jul 1, 2004 | Comment Now 
It is possible that the amount of spam is decreasing but anti-spam technology is far from being obsolete. Jon Tullett provides you with essential reviews
Consultancy unveils Basel II compliance framework 
By Rene Millman | Jan 16, 2004 | Comment Now 
A blueprint to help financial institutions help comply with Basel II regulations by 2006 has been drawn up by a security consultancy.
Lessons of the Honeypot II: Expect the Unexpected 
By Anton Chuvakin | Jan 15, 2004 | Comment Now 
Observation and monitoring of computer intruders have long been performed in a haphazard fashion, if at all.
Sign up to receive iTnews email bulletins
Latest Comments
New Windows 10 users, are you upgrading from...

   |   View results
Windows 8
Windows 7
Windows XP
Another operating system
Windows Vista