Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

WIRELESS CONNECTION

Topic Zone

Latest News

Latest Features

  • Bluewolf co-founder: IT should be approached from the outside in

    The promise of software-as-a-service (SaaS) is that it is simple, quick, efficient and commoditised, but in reality SaaS can be just as complex to install and manage as major on-premise implementations.

  • Six home networking technologies to watch out for

    Most of the tablets, TVs, ultrabooks and smartphones on display at International CES this week ultimately are bound for someone's home, where they'll have to talk to each other. Six major home networking technologies to make that happen will be on display at the show, some of them making significant strides to keep up with the demand for instant information and fun.

  • 28 pieces of sensible computing advice everyone should read

    Technology never stops moving foward. Hardware gets faster, and operating systems gain new features and (we hope) finesse. This is natural computing law.

  • 10 ways to get the most from your Wi-Fi-only tablet

    Much to the chagrin (and much against the ill wishes) of wireless carriers such as AT&T, Verizon, Sprint, and T-Mobile, people are buying Wi-Fi-only tablets. In fact, some studies have shown that in 2011 up to 90 percent of all tablets sold in the United States relied on Wi-Fi, rather than on 3G or 4G LTE.

  • Hands on with the Sony PlayStation Vita

    Sony's new portable PlayStation Vita game system offers unique and new features for a mobile game console that will take some getting used to. But once you get acquainted with the PlayStation Vita unique hardware and play games optimised for the console the game play is awesome.

  • Six new and rising hacker threats

    Hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or a stalker who dogs your every step online. Or maybe it's an emerging technology like in-car Wi-Fi that suddenly creates a whole new attack vector.

  • Best free WiFi security tools

    WiFi security has come a long way from the days when consumers used wireless routers with inadequate or no encryption, and overlooked the need to change default passwords for gateway access.

  • Wi-Fi hot spots expose private information

    Tips for ensuring that employees don't reveal private data when they log into public Wi-Fi networks at hotels, coffee shops and Internet cafes.

  • A simple guide to wireless network security

    Tips for ensuring that employees don't reveal private data when they log into public Wi-Fi networks at hotels, coffee shops and Internet cafes.

  • A guide to ARP spoofing and WPA2

    AirTight Networks says it's found a weak point in Wi-Fi Protected Access 2 (WPA2), the mainstay of enterprise Wi-Fi security. But has it? Security expert Matthew Gast says the attack seems to be a familiar ARP spoofing exploit that works as well on wired as wireless LANS. If so, it can easily be contained.





Featured White Papers

When corporate network safety starts at employees' homes

A step-by-step guide to protecting your network against home wireless hackers and educating employees on the safe use of wireless home networks.
Download whitepaper

Client Firewalls: Are they useful?

With the increase in computer and internet use, the task of securing a network has changed over the years. In today?s world client firewalls are becoming a common part of endpoint security. In this paper I will define what a client firewall is and how it differs from a gateway firewall, why it is used, and how client firewalls work.
Download whitepaper

Using Windows Vista on a Corporate Mobile Network

We will start of by walking through the process of configuring a wireless connection on a Windows Vista system manually. This will allow us to view the different features and options available during setup.We will then discuss how to implement configuration changes automatically through Active Directory by using 802.11 group policy settings or script files.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map