ii

Review: Samsung Galaxy Note II

Review: Samsung Galaxy Note II

Stylus-toting smartphone gets an upgrade.
Jan 22 2013 11:43AM
IBM CTO: PC dead, glad we flogged Lenovo

IBM CTO: PC dead, glad we flogged Lenovo

Microsoft disagrees.
Aug 12 2011 7:05AM
Review: Samsung Galaxy SII

Review: Samsung Galaxy SII

Nothing short of remarkable.
Aug 5 2011 12:46PM
Review: Samsung Galaxy S II

Review: Samsung Galaxy S II

Zips along at a blitzkrieg pace.
Jun 17 2011 11:37AM
Storm II, cheap Curves coming to Blackberry

Storm II, cheap Curves coming to Blackberry

Research in Motion is working on a new version of the Blackberry Bold that combines a touch screen with a QWERTY keyboard, a low-cost version of the Curve and a successor to the Storm featuring a tactile touch screen, according to sources.
May 7 2009 3:38AM
Cyber Storm II underway from DHS

Cyber Storm II underway from DHS

To strengthen the nation's cybersecurity preparedness, the federal Department of Homeland Security (DHS) this week is holding its second Cyber Storm event, a five-day exercise for government agencies and businesses.
Mar 12 2008 10:00AM
Cyber Storm II offers proactive IT security

Cyber Storm II offers proactive IT security

Telstra has been working closely with government and the IT industry to ensure it is ready and resilient to possible cyber attacks as part of its involvement in the international simulated Cyber Storm II exercise being held 11-14 March, 2008.
Mar 7 2008 12:53PM
SanDisk boosts Ultra II memory cards

SanDisk boosts Ultra II memory cards

SanDisk unveiled a 4GB SDHC card and an 8GB Memory Stick Pro Duo card for its SanDisk Ultra II line at the IFA show in Berlin last week.
Sep 4 2007 7:32AM
Review: SecureDoc

Review: SecureDoc

SecureDoc is a competent full disk encryptor that uses the AES algorithm and SHA-2 hashing. It works with a token to which the user can save the key file, rather than saving it on the computer. This adds significant extra security – if the user does not store the USB token in their laptop case. The product also supports basic password security and quite a wide range of third-party pre-boot authentication products.
Nov 20 2005 12:00AM
Mobile encryption, part II (2005)

Mobile encryption, part II (2005)

If it’s tough to protect your network within the corporate environment, it’s even harder when your staff want to use their laptops outside. Peter Stephenson looks at products that claim to keep them secure
Oct 3 2005 12:00AM
Review: Disk Protect

Review: Disk Protect

Disk Protect from Becrypt is a competent hard disk encryption that looks very good on paper.
Oct 3 2005 12:00AM
Review: DiskCrypt

Review: DiskCrypt

DiskCrypt from Digisafe is unique among these products. Rather than being a software product that you use to encrypt your hard disk, DiskCrypt is a hard disk that comes pre-encrypted.
Oct 3 2005 12:00AM
Review: Encryption Plus Hard Disk

Review: Encryption Plus Hard Disk

This had the most promise of all the products tested. It is easy to install, has lots of nice administrative options and is robust and well-certified.
Oct 3 2005 12:00AM
Review: OfficeLock

Review: OfficeLock

This is not a disk encryptor like most of the products on test, because it encrypts individual document files transparently. Indeed, it was designed and intended completely for enterprise use, and requires an external copy of Microsoft SQLServer in order to install.
Oct 3 2005 12:00AM
EverQuest II set for 8 November release

EverQuest II set for 8 November release

Game industry giant Sony Computer Entertainment has confirmed 8 November as the ship date for the highly anticipated sequel to its monster online PC hit EverQuest.
Oct 26 2004 12:00AM
Austrian bank boosts security to meet Basel II Accord

Austrian bank boosts security to meet Basel II Accord

BAWAG-PSK, the fourth-largest bank in Austria, has conducted a major network upgrade in a bid to boost IT security in the face of "unprecedented threats" and to meet the regulatory requirements of the forthcoming Basel II Accord.
Sep 28 2004 9:28AM
Anti-spam, part II (2004)

Anti-spam, part II (2004)

It is possible that the amount of spam is decreasing but anti-spam technology is far from being obsolete. Jon Tullett provides you with essential reviews
Jul 1 2004 12:00AM
Consultancy unveils Basel II compliance framework

Consultancy unveils Basel II compliance framework

A blueprint to help financial institutions help comply with Basel II regulations by 2006 has been drawn up by a security consultancy.
Jan 16 2004 4:08PM
Lessons of the Honeypot II: Expect the Unexpected

Lessons of the Honeypot II: Expect the Unexpected

Observation and monitoring of computer intruders have long been performed in a haphazard fashion, if at all.
Jan 15 2004 2:31PM

Log In

Username / Email:
Password:
  |  Forgot your password?