Today I posted the last part of my four part article “Security in a Mobile World”.Â Â This article part, as well as the prior 3 parts, can be found at Mobility Today.
Security on the PocketPC platform is a great deal different than your laptop. Security issues considered minor on the Laptop platform like Physical Access, Application/Data Access, and Theft/Loss Mitigation are more substantial on the PocketPC platform, because the PocketPC is infinitely easier to steal than a laptop. And larger issues on the Laptop like Firewalls, AntiVirus, and AntiSpyware become less predominant because the PocketPC platform offers less of a potential target for hackers. Because there is currently more interest in cracking Windows PC data and applications, the PocketPC platform is relatively safe, but that will change soon enough.
If you would like to read the entire 4th part of this article, click here.
Today I posted the third part of my four part article “Security in a Mobile World”.Â Â This article part, the prior 2 parts, and the remainingÂ part will continue to be published at Mobility Today.
It is a well known fact that most every Laptop user could stand to improve their privacy (and overall security) when utilizing their PC for everyday use. This installment is geared towards getting you started on the right path towards accomplishing this goal.
If you would like to read the entire 3rd part of this article, click here.
Today I posted the second part of my four part article “Security in a Mobile World”.Â Â This article part, the prior part, and the remaining 2 parts will continue to be published at Mobility Today.
Public wireless hotspots are, by definition, meant to be public, and so it goes that private hotspots are meant to be private, regardless as to whether or not the hotspot is encrypted to keep unauthorized users out. This is the same as recognizing the difference between a grocery store and a residential home. A grocery store is open to the public, and you can walk through the door and browse among the aisles to your hearts content. Likewise, it is generally understood that it is completely unacceptable for someone to just walk into another personâ€™s home unannounced. It needs to be understood and accepted that a private Wi-Fi LAN is essentially an extension of someoneâ€™s personal property.
If you would like to read the entire 2nd part of this article, click here.
Today I posted the first part of my four part article “Security in a Mobile World”.Â Â This article part, and the following 3 parts will continue to be published at Mobility Today.
Security is a multilevel concept, in both the mindset and itâ€™s practical application. The mindset refers to keeping the concepts of security at the front of your mind while you go through your daily activities. The practical application is Security itself. For now, I will only attempt to touch on the important levels (under the heading of Practical Application) that Mobile Users need to consider in todayâ€™s environments. Later I will touch on the mindset aspect of Security.
If you would like to read the entire 1st part of this article, click here.
I.) There are two ways to configure your Network connection.
1.) The first (due to it being a "default" setting for most network adapters) and best way to configure your network connection is to enable a process called DHCP (for "Dynamic Host Configuration Protocol"), also referred to as a "Dynamic IP Assignment", because the DHCP server can change assignments on an "as needed" basis.
2.) The second way it to manually specify your settings, also referred to as a "Static IP Assignment", because the system will forever keep your manual assignment until you tell it otherwise.
Today I published my first Product Review, about a piece of software that assists users in finding and connecting to WiFi Hotspots on Mobility Today.
After installing this program, most users will realize just how powerful their wirelessly equipped iPAQs are; well above the standard established by Microsoft’s “Zero Configuration Networking”, the iPAQ will become a portable WiFi Scanner and hotspot detector (Hotspotter). Additionally, the program makes a great troubleshooting utility for WiFi related problems. By my calculations, Microsoft’s ZC Networking only sees about 4 out of 10 WLANs (or 40% of the actual networks available) in a test area here in my hometown. After having loaded PocketWinC, I was able to see all 10 WLANs. This was confirmed by double-checking with another Laptops with scanner software loaded.
To see the full product review, click here.