Security

Do-it-yourself security protects home, office

Is that summer downpour flooding your basement? Did Rover get into the garbage again? Is your 50-inch flat-panel TV still in place? Find out from anywhere by using your PC to create an affordable home surveillance system that you can access over the ...

Security: Thumb sucking, slurping, snarfing...

Remember when thumb sucking was considered an innocent activity, except that if you did it as a young child you might need braces as a teen? Today you'd need a lot more than a mouthful of metal to protect from thumb sucking.

SMB - Building trust in downloads no simple feat

The Truste group's goal of creating an online ecosystem through which software makers are held accountable for the functions of their programs and end users are given the power to keep unwanted applications off their devices won't be achieved easily,...

Is organized crime moving into cybersphere?

As if FBI special agent Tim O'Brien and his cybercrime fighting comrades don't already have their hands full with bot herders, virus writers and other loosely-aligned crooks, now people are wondering when more traditional organized crime will grab a ...

Thunderbird update adds tools, gimmicks

When it comes to choosing an e-mail client... well, there really aren't that many popular options. Corporate e-mail users tend to have their client dictated to them by IT, which usually means Microsoft Outlook or Lotus Notes. For personal use, many p...

The color of information security

If information security were a colour, it most definitely would be gray. Like life in general, information security is rarely black and white. As an information security consultant, most questions asked of me and my colleagues are answered in the sam...

Rootkits: The next big enterprise threat?

Late at night, a system administrator performed a routine check of a crashed server, one of 48 systems comprising a major online infrastructure that generated about US$4 million per month in revenue. He was a bit surprised that the system had gone do...

How to mitigate zero-day threats like Windows ANI

The Windows animation bug (ANI) caused widespread concern because exploits against it became widely available before Microsoft could release a patch. But like other zero-day threats before it, there are measures companies can take to at least try to ...

Open source swarms around NAC

A pair of Harvard University IT staffers last week released a free virtual appliance that supports their open source network access control platform -- just one of many free NAC tools springing up to address security-hungry customers.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?