High Tech - News, Reviews and Tests
Filters
- Your selection
- Review
- Security
- Remove all
- Your selection:
- Type Review
- tag Security
- Remove all
-
-
Intel vPro In 2012, Small Business Advantage, And Anti-Theft Tech.Sep 20, 2012 - in Reviews
One year ago, we took a look at three generations of Intel's vPro, charting how its features evolved. Now, we have a new version to explore. Additionally, we're putting Anti-Theft technology to the test, along with the new Small Business Advantage suite.
-
In Pictures: Getting Connected To Next-Gen Home SecurityDec 11, 2011 - in Picture Story
If you think CCTV is still the pinnacle of home security, check out this Tom’s Hardware writer putting his home under Vivint’s knife (literally). How much peace of mind and home automation can over $4000 of Z-Wave and IP-based gear get you?
-
Qubes OS: An Operating System Designed For SecurityAug 29, 2011 - in Reviews
What would an operating system look like it if were redesigned with security in mind? Joanna Rutkowska thinks she has the answer with the development of Qubes OS. We sit down for an interview with Joanna to discuss the way Qubes OS augments security.
-
Wi-Fi Security: Cracking WPA With CPUs, GPUs, And The CloudAug 14, 2011 - in Reviews
Is your network safe? Almost all of us prefer the convenience of Wi-Fi over the hassle of a wired connection. But what does that mean for security? Our tests tell the whole story. We go from password cracking on the desktop to hacking in the cloud.
-
Charlie Miller On Hacked Batteries, Cloud Security, And The iPadAug 1, 2011 - in Reviews
Accuvant Labs' Charlie Miller talks to Tom's Hardware about the Defender's Dilemma, the security of data in the cloud, looking for vulnerabilities in notebook batteries, and the ramifications of using Apple's iPad in an enterprise environment.
-
Harden Up: Can We Break Your Password With Our GPUs?Jun 19, 2011 - in Reviews
Do you think your passwords are keeping your data nice and safe? Do you have archived files you don't want anyone to see? Let's see how fast we can crack your lock using our graphics cards. If anything, this is a wake-up call to lock down your valuables!
-
Protect Your Data! TrueCrypt 7.0a's Performance, AnalyzedMay 4, 2011 - in Reviews
Version 7.0a of TrueCrypt offers many new features, including hardware-accelerated AES encryption via processors that support the technology. We discuss the new features and look at the performance impact of running an encrypted system partition.
-
Do Virus Scanners Slow Down Your System?Nov 30, 2010 - in Reviews
Does the presence of a virus scanner guarantee reduced performance, or does it have a negligible impact? We test 10 different products to see if you’re unknowingly suffering with security software.
-
Hacking The iPhone, iPod, And iPad With A Web PageAug 17, 2010 - in Reviews
Regular Tom's Hardware readers know Charlie Miller as the first person to hack Apple's iPhone and a repeat winner of CanSecWest's Pwn2Own contest. This time around, we talk to Charlie about jailbreaking and what it means to smartphone security in general.
-
Exclusive Interview: Hacking The iPhone Through SMSAug 7, 2009 - in Reviews
Earlier this year we interviewed Charlie Miller, security expert and winner of the 2009 Pwn2Own competition. Charlie presented at BlackHat 2009 in Las Vegas, and we had the chance to chat with him once again--this time about an iPhone vulnerability.
-
Exclusive Interview: Going Three Levels Beyond Kernel RootkitsJul 16, 2009 - in Reviews
Today we have the pleasure of chatting with Joanna Rutkowska, one of the top computing security innovators in the world. She is the founder and CEO of Invisible Things Lab (ITL), a boutique computer security consulting and research firm.
-
Microsoft BPOS: Managing The CloudJul 8, 2009 - in Reviews
Managing Microsoft’s Business Productivity Online Suite is easier than you might think, in part because all of the heavy lifting is performed at Microsoft’s data centers, not by in-house IT. We’ll walk you through the key points managers need to tackle.
-
A Complete History Of Mainframe ComputingJun 26, 2009 - in Picture Story
Believe it or not, there was once a time when computers took up entire rooms. As you sit there, appreciating your svelte desktop, check out our complete history of mainframe computing for a look back at some of the most iconic builds from decades past.
-
Microsoft’s BPOS: Cloud Computing’s Silver Lining?Jun 1, 2009 - in Reviews
Can Microsoft’s Business Productivity Online Suite (BPOS) reignite our hope-strewn love affair with cloud computing? With familiar, cost-effective applications that run on a range of Web browsers, BPOS just might be the Cupid’s arrow that does the trick.
-
Desktop Linux For The Windows Power UserMay 21, 2009 - in Reviews
Are you a die-hard Windows user, sworn to shun all things Apple, yet (secretly) intimidated by the pocket-protector stereotype of Linux? Fear not! We got our hands on Ubuntu 9.04 and walk you through getting it running in this step-by-step guide.
-
Burned, Dropped, Drowned: HDD Recovery In PicturesMay 11, 2009 - in Picture Story
Ever wonder why anyone would pay to have their hard drive repaired? We were recently given the chance to follow a victim of last year's Iowa flooding through the recovery process, witnessing a completely ruined disk transformed into a functional drive.
-
Exclusive Interview: Google Chrome's Chromium Core ExploredApr 17, 2009 - in Reviews
What makes Chromium, the core of Google Chrome, the most secure Web browser on the Net? We chat with two former Google employees who helped to develop the sandbox model of Chromium.
-
Security Threat Analysis: Interview With Dino A. Dai ZoviApr 6, 2009 - in Reviews
We sat down with Dino A. Dai Zovi, a security researcher focused on offensive security and former member of the Sandia National Laboratories' Information Design Assurance Red Team (the guys who test the security of national agencies). Check it out.
-
Behind Pwn2Own: Exclusive Interview With Charlie MillerMar 25, 2009 - in Reviews
You’ve probably seen the headlines: “Pwn2Own 2008: MacBook Air hacked in 2 minutes” or “Pwn2Own 2009: Safari/MacBook falls in seconds.” But there’s a story behind every headline and who better to get it from than Charlie Miller, the man behind the buzz.
-
Intel’s 24-Core, 14-Drive Modular Server ReviewedJan 30, 2009 - in Reviews
Intel's MFSYS25 modular server promises small- and medium-sized businesses high reliability, resource optimization, and multi-core computing power. How well does the server live up to this promise? Check out our review.
-
Protect Your Data With EncryptionJan 19, 2009 - in Reviews
Security is becoming more and more important for many users, and one of the most solid solutions is an OpenSource solution called TrueCrypt, which allows you to encrypt your entire system on the fly. We looked at this option's performance impact.
-
The State Of The Personal ComputerNov 25, 2008 - in Reviews
Where were we in 2008 and where are we heading in 2009? In his State of the Personal Computer address, Alan Dang shares his insights as a user of three different platforms: Mac, Windows, and Linux.
-
Kanguru's Secure USB Memory StickAug 21, 2008 - in Reviews
USB drives can be critical when it comes to data security for companies. The Defender from Kanguru only saves data in encrypted form, and enables the remote deletion of content over the Internet in case of theft.
-
High-Security Flash StorageApr 4, 2008 - in Reviews
It's not the fastest, sleekest or smallest USB drive, but Corsair's Survivor offers 32 GB of capacity, security features and a waterproof design.
-
Secure Remote Data Access for Home UsersApr 3, 2008 - in Reviews
Go out and about... while your data stays at home. We show you how to safely access your data over the Internet using a Virtual Private Network (VPN).