TITLE

Portable firewall circumvention

AUTHOR(S)
Bradner, Scott
PUB. DATE
July 1999
SOURCE
Network World;07/26/99, Vol. 16 Issue 30, p30
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Comments on business executives' reliance on firewalls to protect corporate and private secrets from Internet intruders. Limitations of firewalls to protect information in the laptop; Other ways to protect corporate secrets in the Internet; Need for executives to refrain from carrying corporate secrets in a laptop.
ACCESSION #
2726136

 

Related Articles

  • Notebook theft is skyrocketing: Here's how to prevent it. King, Carla; Bielski, Vince // PCWorld;Jun98, Vol. 16 Issue 6, p161 

    Offers advice for preventing your notebook computer from being stolen. Amount of money that each stolen notebook costs a company, according to a 1998 survey by the San Francisco, California-based Computer Security Institute; Where most notebooks are taken from; The best way to protect your...

  • Powerful Ultra-books for Professionals.  // Dataquest;11/30/2012, Vol. 30 Issue 22, p52 

    The article offers a guide in buying ultra-books for professionals in India which include security features, solid state drives (SSD) and display size.

  • Laptop theft soars; prevention includes lock-downs, RFID.  // Security: Solutions for Enterprise Security Leaders;Feb2000, Vol. 37 Issue 2, p55 

    Reports on the actions taken by computer and security systems manufacturers to address the problem in laptop computer theft in the United States. Linking of laptop computer into a card access control system; Tracking system in case they are stolen; Locking down of laptops.

  • Grand theft laptop. Sheremata, Davis // Alberta Report / Newsmagazine;07/06/98, Vol. 25 Issue 29, p24 

    Discusses the theft of laptop computers in Edmonton. Computers stolen from office buildings; Difficulty investigating these crimes; How to store computers; Security devices.

  • Laptop security threats. Green, Carolyn // CMA Management;Jul/Aug2002, Vol. 76 Issue 5, p46 

    Focuses on the implementation of laptop security in Toronto. Factors for the implementation of laptop security; Tips for car travel security; Installation of alarm systems and motion detectors.

  • ASK JAMES. Hunt, James // Micro Mart;10/21/2013, Issue 1283, p126 

    The article presents a question and answer about a laptop computer that fails to boot and the security measures that can be taken before sending it to the retailer for repair.

  • TIED DOWN. Kooser, Amanda C. // Entrepreneur;Jan2001, Vol. 29 Issue 1, p26 

    Unveils the products for securing a laptop in an airport. Estimated number of notebooks that were stolen in 1999; Real cost of losing a laptop to burglary; Future laptop security from Intel Corporation's Protected Access Architecture.

  • Celtics Shoot and Score With New Malware Point Guard. Bartholomew, Doug // Baseline;Jan2008, Issue 80, p42 

    The article reports on the malware and spyware viruses that are infecting the laptops of the players of Boston Celtics and causing cascading problems across the network. As a result the Celtics choses to go with Mi5 networks' Webgate security appliance. Webgate stops spyware from getting into...

  • Wireless system secures laptops, other portables.  // Automatic I.D. News;Dec95, Vol. 11 Issue 13, p12 

    Reports on RF Technologies Inc.'s development of a wireless security system to protect laptop computers and other portable devices.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics