ii

Review: Samsung Galaxy Note II

Review: Samsung Galaxy Note II

Stylus-toting smartphone gets an upgrade.
Chris Jager Jan 22 2013 11:43AM Hardware
IBM CTO: PC dead, glad we flogged Lenovo

IBM CTO: PC dead, glad we flogged Lenovo

Microsoft disagrees.
Liam Tung Aug 12 2011 7:05AM Hardware
Review: Samsung Galaxy SII

Review: Samsung Galaxy SII

Nothing short of remarkable.
Jonathan Bray , Nic Healey Aug 5 2011 12:46PM Hardware
Review: Samsung Galaxy S II

Review: Samsung Galaxy S II

Zips along at a blitzkrieg pace.
Chris Jager Jun 17 2011 11:37AM Hardware
Storm II, cheap Curves coming to Blackberry

Storm II, cheap Curves coming to Blackberry

Research in Motion is working on a new version of the Blackberry Bold that combines a touch screen with a QWERTY keyboard, a low-cost version of the Curve and a successor to the Storm featuring a tactile touch screen, according to sources.
Brett Winterford May 7 2009 3:38AM Hardware
Cyber Storm II underway from DHS

Cyber Storm II underway from DHS

To strengthen the nation's cybersecurity preparedness, the federal Department of Homeland Security (DHS) this week is holding its second Cyber Storm event, a five-day exercise for government agencies and businesses.
Sue Marquette Mar 12 2008 10:00AM Security
Cyber Storm II offers proactive IT security

Cyber Storm II offers proactive IT security

Telstra has been working closely with government and the IT industry to ensure it is ready and resilient to possible cyber attacks as part of its involvement in the international simulated Cyber Storm II exercise being held 11-14 March, 2008.
a Staff Writer Mar 7 2008 12:53PM Security
SanDisk boosts Ultra II memory cards

SanDisk boosts Ultra II memory cards

SanDisk unveiled a 4GB SDHC card and an 8GB Memory Stick Pro Duo card for its SanDisk Ultra II line at the IFA show in Berlin last week.
Staff Writers Sep 4 2007 7:32AM Hardware
Review: SecureDoc

Review: SecureDoc

SecureDoc is a competent full disk encryptor that uses the AES algorithm and SHA-2 hashing. It works with a token to which the user can save the key file, rather than saving it on the computer. This adds significant extra security – if the user does not store the USB token in their laptop case. The product also supports basic password security and quite a wide range of third-party pre-boot authentication products.
Peter Stephenson,CeRNS, Nov 20 2005 12:00AM Security
Review: Disk Protect

Review: Disk Protect

Disk Protect from Becrypt is a competent hard disk encryption that looks very good on paper.
Peter Stephenson,CeRNS, Oct 3 2005 12:00AM Security
Review: DiskCrypt

Review: DiskCrypt

DiskCrypt from Digisafe is unique among these products. Rather than being a software product that you use to encrypt your hard disk, DiskCrypt is a hard disk that comes pre-encrypted.
Peter Stephenson,CeRNS, Oct 3 2005 12:00AM Security
Review: Encryption Plus Hard Disk

Review: Encryption Plus Hard Disk

This had the most promise of all the products tested. It is easy to install, has lots of nice administrative options and is robust and well-certified.
Peter Stephenson,CeRNS, Oct 3 2005 12:00AM Security
Review: OfficeLock

Review: OfficeLock

This is not a disk encryptor like most of the products on test, because it encrypts individual document files transparently. Indeed, it was designed and intended completely for enterprise use, and requires an external copy of Microsoft SQLServer in order to install.
Peter Stephenson,CeRNS, Oct 3 2005 12:00AM Security
EverQuest II set for 8 November release

EverQuest II set for 8 November release

Game industry giant Sony Computer Entertainment has confirmed 8 November as the ship date for the highly anticipated sequel to its monster online PC hit EverQuest.
Damien Virulhapen Oct 26 2004 12:00AM Software
Austrian bank boosts security to meet Basel II Accord

Austrian bank boosts security to meet Basel II Accord

BAWAG-PSK, the fourth-largest bank in Austria, has conducted a major network upgrade in a bid to boost IT security in the face of "unprecedented threats" and to meet the regulatory requirements of the forthcoming Basel II Accord.
Robert Jaques Sep 28 2004 9:28AM Security
Consultancy unveils Basel II compliance framework

Consultancy unveils Basel II compliance framework

A blueprint to help financial institutions help comply with Basel II regulations by 2006 has been drawn up by a security consultancy.
Rene Millman Jan 16 2004 4:08PM Security
Lessons of the Honeypot II: Expect the Unexpected

Lessons of the Honeypot II: Expect the Unexpected

Observation and monitoring of computer intruders have long been performed in a haphazard fashion, if at all.
Anton Chuvakin Jan 15 2004 2:31PM Security

Log In

  |  Forgot your password?