Recent articles by Steve Gold

Taking a Realistic Approach to Remote Authentication

Taking a Realistic Approach to Remote Authentication

Just under a decade ago, I was asked to write a white paper on the future of telecommunications and networking for a major telecom company who shall remain nameless.
Steve Gold Jan 16 2004 9:53AM Security
PINs, Signatures and Countering Fraud

PINs, Signatures and Countering Fraud

Trotting through the shiny new airport terminal in Brussels recently, I was surprised to be asked to verify my credit card purchases in the duty-free shop with a PIN instead of a signature.
Steve Gold Jan 15 2004 2:25PM Security
Battle for the Cards: Signatures versus PINs

Battle for the Cards: Signatures versus PINs

Regular readers of SC's Opinionwire will recall me wibbling on about how credit and debit card issuers are moving steadily towards PIN-based authorization of transactions.
Steve Gold Jan 15 2004 1:16PM Security
On your marks: Get set for the next IT hurdle

On your marks: Get set for the next IT hurdle

Memories of Y2K may have faded, but, says Steve Gold, another challenge could be just around the corner.
Steve Gold Jan 13 2004 1:03PM Security
Review: Datafort

Review: Datafort

Ever since the first days of the PC two decades ago, storage systems have crashed, resulting in the potential for lost data or, if you're lucky, a large bill for the recovery of your data. Major companies, of course, have turned to a variety of backup mechanisms, including tape-based systems, to ensure their data is backed up reliably, but, apart from backing up to CD-ROM, small to medium-sized businesses have been limited in terms of cost-effective backup.

Steve Gold Jan 9 2004 12:00AM Security
Review: CyberAngel

Review: CyberAngel

CyberAngel is actually one of several competing packages on the market in the U.S. and Canada that allows a central monitoring station to detect when an unauthorized access to a PC or notebook has taken place, and alerts the owner accordingly.

Steve Gold Oct 1 2003 12:00AM Security
Review: SafeGuard PDA

Review: SafeGuard PDA

PDAs are so portable as to make them susceptible to loss or theft - in a business environment the net result of this can range from inconvenience and embarrassment, right on up to serious problems with the regulatory authorities. Which is where SafeGuard PDA enters the frame. Like similar offerings from F-Secure and Pointsec, the software is designed to make a Pocket PC-based PDA as secure as electronically possible.

Steve Gold Oct 1 2003 12:00AM Security
Review: Wayport

Review: Wayport

Wayport has been something of a pioneer for road warriors, offering telephone-enabled cubicles - known as Laptop Lanes - at major airports across the U.S.

Steve Gold Oct 1 2003 12:00AM Security
Review: The Cloud

Review: The Cloud

The Cloud, a division of Inspired Broadcast Networks, is something of a low profile public Wi-Fi network, preferring to stay in the background as a wholesale wireless network operator.
When the service was launched earlier this year, the company offered access through two options, pay-as-you-use sessions from a variety of outlets, or through third parties, such as BT OpenZone, whose users can now roam seamlessly onto The Cloud's network.

Steve Gold Oct 1 2003 12:00AM Security
Review: Swisscom Eurospot

Review: Swisscom Eurospot

Known as Megabeam until late last year, Swisscom Eurospot is able to offer service at more than 1,100 venues.

Steve Gold Oct 1 2003 12:00AM Security
Review: Net2Roam Service - GRIC

Review: Net2Roam Service - GRIC

Like iPass, GRIC is one of the world's two major internet roaming facilitators, with services aimed at both business and consumer users.

Steve Gold Oct 1 2003 12:00AM Security
Review: iPassConnect 3.0

Review: iPassConnect 3.0

Like the GRIC service reviewed elsewhere, iPass acts an intermediary/facilitator for internet service roaming. Unlike GRIC, which primarily serves consumers, iPass is more tailored for the enterprise.

Steve Gold Oct 1 2003 12:00AM Security
Review: BT OpenZone

Review: BT OpenZone

Since our last look at this product in June 2002, BT has completed roaming arrangements with several other networks and now has quite a healthy coverage of most major cities in the U.K.

Steve Gold Oct 1 2003 12:00AM Security
Review: Boingo Wireless

Review: Boingo Wireless

Boingo uses a similar network aggregation model seen on ISP networks from the likes of iPass and GRIC. But it goes further with its business model, collecting and distributing usage revenues amongst the various network operators whose Wi-Fi hotspots it uses.

Steve Gold Oct 1 2003 12:00AM Security
Review: TridiaVNC Pro

Review: TridiaVNC Pro

 

Whilst RealVNC is freeware and a very basic remote access package with minimal security, TridiaVNC Pro shows what can be done with open source software.

Steve Gold Oct 1 2003 12:00AM Security
Review: Timbuktu Pro

Review: Timbuktu Pro

Timbuktu Pro, which is available in both Mac and Windows, is clearly aimed at Mac users. The PC version, while functionally similar to the Mac edition, appears to be something of an afterthought, since functionality is limited.

Steve Gold Oct 1 2003 12:00AM Security
Review: RemotelyAnywhere

Review: RemotelyAnywhere

RemotelyAnywhere is a relatively late arrival to the remote access software landscape. Despite this, the package is arguably the most complex currently available on the market, offering the IT professional full access to a remote machine's facilities, even allowing a full reboot on the fly.

Steve Gold Oct 1 2003 12:00AM Security
Review: RealVNC

Review: RealVNC

Originally developed as a freeware project within AT&T, VNC - short for virtual network computing - now has several freeware variants.

Steve Gold Oct 1 2003 12:00AM Security
Review: Proxy

Review: Proxy

Proxy is less of a remote access package and more of a remote support application, but going significantly beyond the feature set of other products.

Steve Gold Oct 1 2003 12:00AM Security
Review: GoToMyPC

Review: GoToMyPC

GoToMyPC takes a radically different approach to remote access. Instead of requiring users to dial into the host PC, the host PC maintains a passive out bound only link with GoToMyPC's servers.

Steve Gold Oct 1 2003 12:00AM Security

Log In

  |  Forgot your password?