Last time, we discussed the Personal Phone Gateway from CuPhone. Although PPG is a "premiere" product for CuPhone, the company has a candidate for what may be a cool product of the year. The other product is a USB-to-RJ-11 phone converter. It's optimized for working with Skype, and here's the story.
They put 4Gb USB sticks (properly marked and in manufacturers' packaging) all over the parking lot. Employees picked up the sticks and some went straight to their computers and inserted them to see if they worked. Unknown to the employees, the USB had a boot program that installed a piece of software.
With the Browser Appliance VM just under 220M bytes and the VMware Player under 20M bytes, this could be an interesting opportunity to use a USB thumb drive to create an ultra-private browsing environment.
The articles about proliferating USB data storage devices in a variety of shapes prompted a fair amount of e-mail, including a pointer from one reader who gave me the URL for a sampler of, ah, sushi-shaped USB disks. It is not entirely clear why anyone would want a sushi-shaped USB disk, but at least it is unlikely to be a serious threat to security.
In recent articles, I’ve looked at how USB flash drives with biometric authentication and access controls can be helpful in a range of applications. But what if you are not keen on having anyone use these portable devices without authorization? How can you control USB ports on today’s computers?
In recent articles, I’ve looked at how USB flash drives with biometric authentication and access controls can be helpful in a range of applications. But what if you are not keen on having anyone use these portable devices without authorization? How can you control USB ports on today’s computers?
What would happen if one of your coworkers lost a USB flash drive containing extremely sensitive customer information? Would it cause panic because of the potential for data exposure and massive fines and costs for restitution? Or would you relax knowing that the data is encrypted, the flash drive is password-protected, and you have the ability to terminate the drive if it's ever used again? If it's the former case, read on to see how to move from "panicked" to "relaxed."
Unauthorized use of USB hardware to gain access to information in laptops and servers is a growing concern. With that in mind, security vendors McAfee and Sygate this week are expected to unveil their own approaches to blocking USB hardware access to com
As the number of Linux kernel contributors continues to grow, core developers are finding themselves mostly managing and checking, not coding, said Greg Kroah-Hartman, maintainer of USB and PCI support in Linux and co-author of Linux Device Drivers, in a talk at the Linux Symposium in Ottawa Thursday.
An iPhone developer working with beta code for iPhone 3.0 has stumbled upon the feature that lets a notebook PC link to an iPhone via USB or Bluetooth and then access the Internet.
From running hamsters and a gyrating Elvis to desktop missile launchers, is there anything more fun that a truly geeky gadget? Here's my picks for the most amusing USB devices.
From running hamsters and a gyrating Elvis to desktop missile launchers, is there anything more fun that a truly geeky gadget? Here's my picks for the most amusing USB devices.
Flash memory stick makers are showing off USB (Universal Serial Bus) drives at Computex that have been certified to work with Windows Vista's ReadyBoot and ReadyBoost functions, which improve boot-up times and the software start-up speeds in PCs.
Flash memory stick makers are showing off USB (Universal Serial Bus) drives at Computex that have been certified to work with Windows Vista's ReadyBoot and ReadyBoost functions, which improve boot-up times and the software start-up speeds in PCs.
A class of application portability is emerging that aims to solve a lot of common problems in the corporate network and, not surprisingly, will create yet another level of concern about corporate network security. This capability is enabled by software that is installed on a portable storage device, such as a USB flash drive or an SD memory card, which acts like a "regular" application when running on any computer.
SanDisk and Verbatim have joined Kingston in warning owners of some USB flash drives they should update their devices to protect against a security flaw that allows hackers access to their data.
Fortinet’s FortiGate-60 is a dual WAN router that features four ports of 10/100Base-T for local connections, two WAN ports and even a DMZ port, plus USB ports for USB modem backups.
Enjoy your USB drives, as my son enjoys the one I bought him to back up his notebook at college. Just don't think you're going to use them to backup several computers, because it won't happen, I promise. USB drives have their uses, but "company backup system" should never be on that list.
Now in your network environment just consider what one of your users with an empty iPod, access to a USB port and bad intentions could get away with . . . chills you to the marrow, doesn't it? And when you think of it, the whole idea of any I/O devices on PCs being available when they aren't actually needed is pretty dumb. So what's a sysadmin to do?
My wife's Windows 2000 Professional-based computer crashed a few weeks ago. She'd been spending the weekend upgrading and adding software, patching and maintaining the operating system, and adding a peripheral or two (new R/W DVD player that required a new add-in USB 2.0 card).
A new round of antivirus testing found some products fail to detect malware that tries to infect a computer via a different attack vector, such as through a local network fileshare or a USB drive.
Microsoft plans to commercialize technology developed at its India lab that lets several computer mice be used with a PC simultaneously. The technology, developed last year by Microsoft Research Lab India in Bangalore, lets several mice be connected to a PC's USB port, helping to make up for the shortage of computers at schools in India and other emerging economies.