Remove Hardware Remove Linux Remove Wireless
article thumbnail

The Wireless Attack Toolkit

CTOvision

By BryanHalfpap Wireless security is all about implementation. How much and what you leak depends on your wireless driver, operating system, and the networks that you’ve connected to in the past. Potentially any of your past network connections that weren’t encrypted are targets if they are beaconed for by your hardware.

Wireless 242
article thumbnail

Geek of the Week: UW’s Vikram Iyer uses small insects to tackle big wireless computing problems

GeekWire

His research focuses on wireless technologies including the development of bio-inspired and bio-integrative wireless sensors. “When we start talking about really small robots though, about the size of a penny, wireless vision becomes pretty challenging due to power size and weight requirements. . UW Photo / Mark Stone).

Wireless 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Wireless security is not only a huge subject, but it’s also extremely important. Remember: Wireless signals are not contained to copper or fiber like a wired network — these signals leave your office and your building and travel a good distance. It was patched quickly but this raised wireless security questions about WPA2.

article thumbnail

The Linux Migration: Initial Progress Report

Scott Lowe

As a result, I’ve stepped up my work on a Linux migration, and I’m happy to report that I’ve made some progress. Linux Distribution. I’ve looked at a fair number of Linux distributions. I also went back and looked again at Ubuntu derivatives like Linux Mint. Here’s a quick update on where things stand so far.

Linux 60
article thumbnail

Computing at the edge of space: HPE and Microsoft conduct International Space Station experiments

GeekWire

If your cell phone went out 17 times a day, for anywhere from 1 second to 20 minutes, you’d get a new wireless provider. HPE’s Spaceborne Computer-2 uses off-the-shelf servers and components encased in hardware designed for harsh environments. The International Space Station as seen from a departing Soyuz spacecraft.

Microsoft 145
article thumbnail

Cloud, Mobile, Social and Cyber: 2015 Predictions That Will Rock The World (AGAIN!)

Cloud Musings

Customers will act on market shifts that makes the purchase and resale of hardware and software no longer viable opting instead for the integration of cloud-based services. Linux Containers take center stage - Linux Containers of all forms, will mature and become interoperability building blocks of the cloud computing world.

Social 169
article thumbnail

The Linux Migration: April 2017 Progress Report

Scott Lowe

In December 2016, I kicked off a migration to Linux (from OS X) as my primary laptop OS. Let me start by saying that I am actively using a Linux-powered laptop as my primary laptop right now, and I have been doing so since early February. Linux Distribution. I’m using Enpass on my OS X, Linux, and iOS devices.

Linux 60