Search

Results 1-20 of 1461 for Jack M. Germain.

Is Now the Time to Move to Linux?

Your next operating system move could be to one of the half-dozen most popular free Linux desktop versions instead of to Microsoft Windows Vista. With these versions, you would not have to perform a risky software upgrade, nor would you have to settle for a watered-down Vista option if your new comp...

PRODUCT REVIEW

Nine Great GPS Gadgets for Holiday Giving

Whether for business or family fun, everybody takes road trips. When traveling to unfamiliar turf, nothing can make the trip more enjoyable than not getting lost. Traditional Global Positioning Software has come a long way. A modern GPS device is something no traveler should leave home -- or office ...

PRODUCT REVIEW

Ubuntu Linux Is an Ideal Windows Replacement

Can you use a reliable, free operating system that can run on new or older computers? How about an operating system that comes packed with hundreds of software programs? Do you want to try out a fully functional OS that runs in a live CD session and can coexist with Windows or Mac operating systems ...

Grisoft Upgrades AVG Linux Security Products

Grisoft recently released several new versions of its AVG antivirus software for GNU/Linux and FreeBSD open source platforms. The improvements include new heuristics and scanners for nonreproductive code, Larry Bridwell, vice president of global security strategies at Grisoft, told LinnuxInsider. "T...

PRODUCT REVIEW

Best High-Tech Stocking Stuffers of 2006

Holiday gift buying has never been more exciting. Portability has gone wild this year, and a stunning array of innovative audio and video devices have appeared that let us carry our music, movies and television programs anywhere. After reviewing dozens of the hottest products, we settled on seven of...

‘Tis the Season for Portable Multimedia Laptops

Gone are the days when laptop computers were well-traveled -- but temporary -- replacements for a more powerful desktop computer. Currently, buyers are hard-pressed to narrow their purchasing options to just a few choices. Powerful alternatives abound, making this time of year one of the best for up...

PRODUCT REVIEW

Nokia E62 Smartphone: Ideal PDA-Plus-Cell Replacement

Tired of lugging around both an out-of-date cell phone and a wireless-impaired PDA? Haven't found a smartphone that is classy enough to do both jobs? Check out the Nokia E62, which is available exclusively in the U.S. from Cingular Wireless. The Nokia E62's e-mail, Web-surfing and document-reading f...

Check Point Releases Mobile Security Software

Check Point has announced the availability of SecureClient Mobile, software that provides VPN security for Windows-based handheld devices. SecureClient Mobile offers uninterrupted connectivity and security between cellular and WiFi networks, even when the mobile link is temporarily lost by roaming b...

New Spy Sweeper Includes Sophos AntiVirus Component

Webroot Software has announced the availability of Spy Sweeper with AntiVirus, a new product developed in partnership with software vendor Sophos. Webroot produces anti-spyware products for consumers, enterprises and small-to-medium businesses. "We are taking Spy Sweeper to the next level by offerin...

Scalix Releases Code for E-Mail, Calendaring Software

Scalix, a software company providing Linux-based e-mail, calendaring and messaging clients, is now offering a series of open source components based upon its products. The company announced this week an open source project through which it is releasing the source code to several of its flagship offe...

Lenovo Equips ThinkPad Notebooks With Disk Encryption

Lenovo announced this week that it is arming its ThinkPad notebooks with the ability to fully encrypt the hard drive to bolster security and reduce the risk of data theft. Lenovo's latest technology move links fingerprint identity to the active directory. The fingerprint swipe recognizes 30 data poi...

McAfee Launches New Security Strategy as Microsoft Loosens Grip

Several computer security companies are bolstering their efforts to remain viable players with enterprise computer users and consumers alike, as Microsoft loosens control over security access in its next-generation operating system, Vista. Computer security firm McAfee announced on Monday a security...

The False Promise of Browser Security

Internet users are under attack -- and what's more, there's no bulletproof defense against hackers on the horizon. Despite hype to the contrary from marketing departments at Microsoft, Apple and Mozilla, Web browsers themselves -- not just the operating systems that run them -- are to blame for many...

The Skinny on High-Def Formats

Autumn is here. That means the start of the holiday shopping season, the traditional time for electronics makers to introduce their new product lines. This buying season, consumers interested in one of the new high-definition DVD players being introduced over the next two months risk buying a player...

PGP Ships New Encryption Tools

Enterprise data security firm PGP on Wednesday began shipping its new NetShare product, as well as major upgrades to its encryption and e-mail security line of policy enforcement and key data management software. PGP NetShare manages and shares encrypted network-based files. It allows enterprises to...

INDUSTRY REPORT

Online Privacy Regulations Forcing Better Handling of Data

New electronic privacy laws are forcing businesses to rethink how they handle their digital data. The retail industry is now regulated by new privacy laws aimed at reducing the growth of identity theft and consumer fraud. Congress passed The Fair and Accurate Credit Transactions Act, known as FACTA,...

INDUSTRY REPORT

Threat From Mobile Device Viruses a Sleeping Giant

Communication security experts do not all agree that cell phone and mobile device viruses pose imminent threats to U.S. consumers. Whether virus attacks become a problem in six months or five years might depend on how cell phone carriers react now to the threat potential. A Gartner report by securit...

INDUSTRY REPORT

Adoption of Alternate E-Mail Security Technologies Pushed

The adoption earlier this month of a new e-mail security technology by e-commerce merchant Amazon.com, Internet service provider RoadRunner and Internet security firm IronPort Systems signals what industry watchers say might be the start of a trend that will harden e-mail from phishing and spamming ...

INDUSTRY REPORT

Combating ID Theft on the Internet

Identity theft from phishing and pharming attacks is one of the biggest problems computer users face. It can take ID theft victims four or five years to repair the damage, according to financial consultants. "The most prevalent ID theft threat is the phishing attack, and it is getting worse. Attacks...

INDUSTRY REPORT

E-Learning Capturing Market Attention

Widespread use of computer networks and the adoption of voice over Internet protocol (VoIP) phone service are fueling the rapid growth of electronic learning beyond the classroom. The e-learning technology is improving the way for students to earn degrees and enhancing the way employers in-service t...

What is your experience with cryptocurrency so far?
Loading ... Loading ...

LinuxInsider Channels