Booq Anaconda for iPhone!

Having reviewed the Anaconda 5 with my Booq Python XL review last August, I can personally attest to the high quality materials used in this premium case.   Only because I will not be needing the extra room in the Anaconda 5 added for iPhone support, I will continue using it for my Treo 700wx.  But for those of you with iPhone’s in your future, I thought you would be interested in the following:

SIERRA MADRE, CALIF.  June 28, 2007 — BOOQ, a fast-growing, premium brand of performance-driven laptop carrying cases for creative professionals on the move, announces Anaconda 5, a rugged accessory case perfectly fitted for the iPhone.

Anaconda 5 is crafted from the toughest ballistic nylon, the softest neoprene, and is lined with a scratch-resistant material developed to protect your iPhone against scratches and excessive wear. Designed to attach to your belt or a BOOQ laptop bag or backpack, Anaconda 5 has a convenient Velcro and is available for $44.95. It is also bundled with BOOQ bags, backpacks, and laptop sleeves for exceptional value.

With the addition of the Anaconda 5 iPhone case, BOOQ brings another premium product of the highest performance to the next generation of creative professionals. Customers who have come to expect fresh and innovative design solutions love the exceptional level of quality and functionality of BOOQ’s products. The privately held company is based in Sierra Madre, California.

The Anaconda 5 is in stock and ready to ship. 

Product link: http://booqbags.com/s.nl/it.A/id.108/.f

What would it take to make a Dream PDA?

I’ve been giving this some thought lately, and I’ve come-up with the following specifications:

Chipset: Intel PXA 624MHz or better
System Memory: 64Meg or better
Flash ROM: 128Meg or better
GPS: SiRF Star3 or better
Screen: 3.5″ or bigger
Resolution: VGA 480×640 or better
Wireless: 802.11G WiFi or better
BlueTooth 2.0 or better
Memory Form Factor: SD
Security: BioMetric Finger-print scanner
OS: WM5.
Camera: 1.3 megapixel or better
Cellphone: optional

Currently, the Loox n560 comes closest, lacking only the Biometric Fingerprint scanner and the Camera.  The IMATE JasJar is a close second, but lacks the faster processor speed, the GPS, and the Wireless G (and WPA), but does include the camera and Cellphone.

Another HSI (High Speed Internet) Router setup

Today I got to work on a new brand of Router currently being distributed to Verizon High Speed Internet (HSI) customers: the ActionTec modem & DSL Router GT704-WG (presumably for “Wireless-G”).

It had a nice browser interface, but a very limited implementation of WPA, in that it only allowed alpha and numeric characters for key-entry.  This goes against the industry standard, which is to allow additional characters (specifically special characters) to be used in key generation.  If the intention is to secure the connection between the client and the access point, then why reduce the effectiveness of that security by limiting the character-set the key is based on?  Sigh…

Security in a Mobile World part-4 Posted

Today I posted the last part of my four part article “Security in a Mobile World”.   This article part, as well as the prior 3 parts, can be found at Mobility Today.

Security on the PocketPC platform is a great deal different than your laptop. Security issues considered minor on the Laptop platform like Physical Access, Application/Data Access, and Theft/Loss Mitigation are more substantial on the PocketPC platform, because the PocketPC is infinitely easier to steal than a laptop. And larger issues on the Laptop like Firewalls, AntiVirus, and AntiSpyware become less predominant because the PocketPC platform offers less of a potential target for hackers. Because there is currently more interest in cracking Windows PC data and applications, the PocketPC platform is relatively safe, but that will change soon enough.

If you would like to read the entire 4th part of this article, click here.

Security in a Mobile World part-3 Posted

Today I posted the third part of my four part article “Security in a Mobile World”.   This article part, the prior 2 parts, and the remaining  part will continue to be published at Mobility Today.

It is a well known fact that most every Laptop user could stand to improve their privacy (and overall security) when utilizing their PC for everyday use. This installment is geared towards getting you started on the right path towards accomplishing this goal.

If you would like to read the entire 3rd part of this article, click here.

Security in a Mobile World part-2 Posted

Today I posted the second part of my four part article “Security in a Mobile World”.   This article part, the prior part, and the remaining 2 parts will continue to be published at Mobility Today.

Public wireless hotspots are, by definition, meant to be public, and so it goes that private hotspots are meant to be private, regardless as to whether or not the hotspot is encrypted to keep unauthorized users out. This is the same as recognizing the difference between a grocery store and a residential home. A grocery store is open to the public, and you can walk through the door and browse among the aisles to your hearts content. Likewise, it is generally understood that it is completely unacceptable for someone to just walk into another person’s home unannounced. It needs to be understood and accepted that a private Wi-Fi LAN is essentially an extension of someone’s personal property.

If you would like to read the entire 2nd part of this article, click here.

Security in a Mobile World part-1 Posted

Today I posted the first part of my four part article “Security in a Mobile World”.   This article part, and the following 3 parts will continue to be published at Mobility Today.

Security is a multilevel concept, in both the mindset and it’s practical application. The mindset refers to keeping the concepts of security at the front of your mind while you go through your daily activities. The practical application is Security itself. For now, I will only attempt to touch on the important levels (under the heading of Practical Application) that Mobile Users need to consider in today’s environments. Later I will touch on the mindset aspect of Security.

If you would like to read the entire 1st part of this article, click here.

"Wi-Fi Companion" as a Troubleshooting Utility

"Wi-Fi Companion" will assist those who would assist you, as well as your fellow users in helping you isolate the cause of most Wireless WiFi problems.

Once you have it installed, please unplug your iPAQ’s battery for 30seconds, then replace it. This will cause a core-reset of the wireless adapter, and force a Soft Reset on the iPAQ itself. No data is lost on a Soft-Reset.

Once you have turned on your iPAQ and have re-enabled your wireless adapter, and are within "Wi-Fi Companion", please go to the Router Tower icon in the lower right-hand corner and create a profile for your home Router connection. Check the OK button and return to the main view. When your iPAQ has "associated" with the Router/AP (a period wherein the two units are negotiating your iPAQ’s IP Address assignment), you will see a lightning-bolt connecting the two units.

After this, assuming your profile is correct, you should see your iPAQ obtain a valid IP Address (which is defined as something other than an IP Address of 169.254.n.n). Please press and hold on the PDA icon in the upper left-hand corner and pick IP Addresses, and please report back to us what the various settings are:

IP Address:
Subnet Mask:
Gateway:
DNS Server:
WINS Server:
DHCP Server:
Domain Name:
Lease Obtained:
Lease Expires:
MAC Address:
Device Name:

Additionally, on the main "Wi-Fi Companion" screen, please advise of the following settings:

1.) Do you see the name of the Wireless LAN you wish to connect to? If not, click on the Router tower icon to go to the "Wi-Fi Finder" screen and build a profile specific to the Router/AP you wish to connect to. Click OK to return to the main screen.
2.) When the iPAQ is associated with the Router/AP, is there a key & lock icon on the upper half of the lightning bolt going towards the PDA icon?
3.) What is the signal strength (100%? 60%?).
4.) Does this signal strength get better the closer you get to the Router?
5.) What is the channel assignment shown to the lower right of the Tower icon (in a black circle).
6.) Go back to the "Wi-Fi Finder" screen. What is the mode that "Wi-Fi Companion" is detecting (shown on the upper-right corner of the profile)?
7.) Do you have WEP enabled on the Router? If you do, please Disable it for now.
8.) Do you have MAC Address Filtering enabled? If you do, please Disable it for now.

Anatomy of the DHCP assignment process

I.) There are two ways to configure your Network connection.

1.) The first (due to it being a "default" setting for most network adapters) and best way to configure your network connection is to enable a process called DHCP (for "Dynamic Host Configuration Protocol"), also referred to as a "Dynamic IP Assignment", because the DHCP server can change assignments on an "as needed" basis.

2.) The second way it to manually specify your settings, also referred to as a "Static IP Assignment", because the system will forever keep your manual assignment until you tell it otherwise.

Continue reading

Product Review of Cirond’s "PocketWinC" WiFi utility.

Today I published my first Product Review, about a piece of software that assists users in finding and connecting to WiFi Hotspots on Mobility Today.

After installing this program, most users will realize just how powerful their wirelessly equipped iPAQs are; well above the standard established by Microsoft’s “Zero Configuration Networking”, the iPAQ will become a portable WiFi Scanner and hotspot detector (Hotspotter). Additionally, the program makes a great troubleshooting utility for WiFi related problems. By my calculations, Microsoft’s ZC Networking only sees about 4 out of 10 WLANs (or 40% of the actual networks available) in a test area here in my hometown. After having loaded PocketWinC, I was able to see all 10 WLANs. This was confirmed by double-checking with another Laptops with scanner software loaded.

To see the full product review, click here.