Carriers, Legislators Tackle Privacy Policies
- Achieving secure unwired bliss. Schwartau, Winn // Network World;10/20/2003, Vol. 20 Issue 42, p65
Discloses how the author was able to communicate securely via the Internet from DefCon, the 2003 annual hacker convention in Las Vegas, Nevada. Author's goal to be able to hit the Internet from anywhere, anytime, for free; Conversion of the author's Sprint PCS cellular telephone into a wireless...
- Wireless security is a crucial issue. Lundquist, Eric // PC Week;02/28/2000, Vol. 17 Issue 9, p110
Discusses the need for building a secure, Internet-based infrastructure for wireless communication applications. Requirement of constant care, funding and rapid prototyping and deployment; Lessons learned by the industry from the denial of service (DoS) hacker attacks in February 2000; Need for...
- What's goin' on? Keckler, D.A. // Mobile Radio Technology;Mar1998, Vol. 16 Issue 3, p18
Offers advice on the deployment of alarms and monitors at telecommunications sites. Security; Access control; System performance; Needs and risk assessment.
- Security. // Communications News;Jan1995, Vol. 32 Issue 1, p65
Features communication network security products. Includes CallWatch from Switchview; SecureComm for Windows and Secure Link for cc:Mail Mobile from Cylink; 800 Alpha Security from Cable & Wireless.
- Cable operators must work to contain ingress, egress. Dziatkiewicz, Mark // America's Network;2/1/96, Vol. 100 Issue 3, p10
Reports that cable companies require uninterrupted return transmission paths to provide secure and reliable telecommunications services. Threat posed by short-wave transmissions which contribute to unwanted signals into the cable plant called ingress; Regulation of radio frequencies by the...
- Latest security products. // Communications News;Dec97, Vol. 34 Issue 12, p61
Introduces telecommunication-related security products and equipment. Includes encryption software from Security Dynamics Technologies Inc.; nFast line of cryptographic hardware accelerators from nCipher Ltd.; SiteMinder 2.0 from Netegrity Inc.
- Networks at Risk: Assessing Vulnerabilities. Coffield, Dana // Interactive Week;9/24/2001, Vol. 8 Issue 37, p11
Reports the vast vulnerability of the United States telecommunication networks against terrorist attacks. Destruction of electronic networks demands greater security and prevention; Possible assaults on media related networks and internet-based services; Diverse platforms and infrastructure of...
- Security. // Communications News;May96, Vol. 33 Issue 5, p59
Announces the availability of two telecommunications security products in the market as of May 1996. Highly secured route for data between local area networks (LANs) and Internet from Norman Data Defense Systems' Norman Firewall; Entrut encryption and digital signature software from Nortel.
- Statement regarding Miracast and security. // Telecom Standards;Apr2014, Vol. 24 Issue 4, p14
The article presents the statement issued by the organization Wi-Fi Alliance regarding the security protections and non-compliance passphrase imposition of telecommunications firm Miracast in the U.S.