Stories by Sandra Rossi

Microsoft plans security roadmap for enterprise

The next step in Microsoft's Trustworthy Computing initiative is the release of a security roadmap in 2004 for customers deploying and integrating a broad range of products across their organisations, the company's chief security strategist Scott Cha...

ISPs get draft code of conduct

After 18 months of deliberation the Australian Internet Industry Association (IIA) has released a draft code of conduct for Internet service providers (ISPs) assisting law enforcement in the investigation of cybercrime.

Key loggers, ISPs may breach Act

Private sector organisations are conducting their own cybercrime investigations with little regard for legal sanctions including the Telecommunications (Interception) Act, it was revealed in a parliamentary hearing into cybercrime.

RFID set to take off in Australia

The use of radio frequency identification (RFID) technology will be widespread in Australia by late 2004 with more than 15 local companies implementing pilots, according to IBM's worldwide director of e-business to smart machines (eb2SM), Dr Cheryl S...

Toughening IT types for soft skills

What do free falling and jumping through hoops have to do with IT? Ask IT managers – they do it all the time. Do they want to polish those skills with an expert? It's unlikely, but an expert in other IT-essential skills - ducking and weaving - Guy Ne...

Banks, police form secret task force

A tight-fisted approach to IT security spending by Australian companies is making the battle against the escalating problem of computer crime even tougher. This comes despite significant new initiatives such as a special NSW Police task force that ha...

BugBear mauls financial institutions

BugBear, the first virus to target financial institutions specifically, had Australian banks on high alert this week after it was launched against 1200 banks worldwide in an attempt to steal corporate passwords.

Spam plans may fail on legal front

Antispam legislation expected to be introduced in Australia next year will do little to assist IT managers in coping with a burgeoning problem that threatens legal liability for companies who fail to protect users from unsuitable content.

Fingerprint access gets a trial run

Fingerprint access systems are currently being trialled at a number of Australian sites including the Department of Foreign Affairs and Trade (DFAT), Ernst & Young and TAFE.

On the trail of a telco hacker

Poor old Stephen Dendtler - aka the Optus hacker - who is being held up as an example of the government's tough new computer crime laws.

ACCC joins global spam war

Australia's consumer watchdog and other global agencies have appealed to Internet service providers (ISP) to block spam.

AusCert survey shows computer crime rising

There is very little good news in the 2003 Australian Computer Crime and Security Survey released today, which shows a rise in attacks and that the impact on business is more costly and damaging.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?