MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
September 20, 2006
Russell Morgan
Business Travel Tips Make the most of your time on the road without sacrificing security. We show you how to protect your privacy. mark for My Articles similar articles
InternetNews
November 18, 2009
Wi-Fi Breaches Found in iPhone, Android Devices Mobile security firm successfully hacks several smartphones in warning to industry. mark for My Articles similar articles
Popular Mechanics
September 2008
Joel Johnson
As TSA Clears Laptops in Bags, Your Guide to Free Airport Wi-Fi The Transportation Security Administration will begin letting you leave your computer in your bag, as long as it's "checkpoint friendly." Here are three in-depth strategies for grabbing free wireless Internet before your flight. mark for My Articles similar articles
Wired
January 2004
Getting In Sync Why limit your home office to one room? With Wi-Fi, it can easily occupy the entire house. But it's a completely different matter to keep the data on all of your gadgets in sync. Here are some networking tools and synchronization tips. mark for My Articles similar articles
Home Toys
August 2003
Peter Davis
Try WiFi A look at what you need for wireless network in your home or office, the shortcomings, and the benefits. mark for My Articles similar articles
BusinessWeek
January 19, 2004
Roger O. Crockett
For Now, Wi-Fi Is A Hacker's Delight Keeping wireless networks secure has become one of the technology industry's biggest problems. The players who make wireless equipment are racing to limit the potential for damage. mark for My Articles similar articles
Entrepreneur
August 2007
Amanda C. Kooser
Safe Trip Encrypt, secure, and back-up! Prevention is the key when it comes to the security of your small business data and hardware while traveling. mark for My Articles similar articles
PC Magazine
February 1, 2008
Eric Griffith
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. mark for My Articles similar articles
CIO
November 15, 2000
Sarah D. Scalet
Remote Control If government departments that deal with national secrets have trouble tracking mobile devices, is there hope for your company? mark for My Articles similar articles
Home Toys
August 2002
Bob Hetherington
Compaq iPAQ CP-2W Connection Point and Wireless Network The CP-2W Connection point allows you to build a home network consisting of up to 4 ethernet and multiple 802.11 wireless computers all connected to a common internet port. Set-up was a snap. mark for My Articles similar articles
Fast Company
David Lumb
Google Reveals A Pay-Per-GB Wireless Service Google has just confirmed its wireless service, called Project Fi. mark for My Articles similar articles
Entrepreneur
November 2003
Mark Henricks
Oh, the Places You'll Go! With the latest and greatest in mobile toys, you'll be ahead of the other girls and boys. And wherever you are, you will succeed. mark for My Articles similar articles
CIO
April 1, 2001
John Edwards
LANs Without Lines Fresh standards give wireless LANs new life... mark for My Articles similar articles
Fast Company
March 2000
Chris O'Malley
Get Your Work to Go How is the future of work like ordering take-out Chinese? For work to go, put your files online, leave your laptop behind, and wherever you land, dial in for your order. It's ready when you are. (But you'll have to work again in an hour.) mark for My Articles similar articles
PC World
December 7, 2007
Becky Waring
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
Bank Technology News
August 2006
Michael Sisk
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever. mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles