158 Results for:wifi
- Sort by:
Stratodesk NoTouch replaces the OS on any x86 thin client or PC, now works on Raspberry Pi
23 Oct 2017Stratodesk NoTouch is a Thin Client OS that will run on any x86 device from other thin client vendors. They've recently added Raspberry Pi support, which makes NoTouch unique in the industry. Read More
Windows 10 security tools to have handy
13 Jun 2017Cyberthreats lurk around every corner, so it's always a good time to fortify Windows 10 defenses. These top security tools can help make that happen. Read More
Demystifying wardriving: An overview
04 May 2011With companies like Google being criticized for wardriving, this tip aims at decoding the concept and the associated legal implications. Read More
iOS 13 is out – Here’s what the enterprise needs to know
19 Sep 2019What does Apple need to do put the final polish on User Enrollment? Where will it be useful? What do the new iPhones mean? All this, and other notes. Read More
St Pancras International WLAN upgrade promises gigabit speeds
16 Jun 2014Upgrade at St Pancras International and other stations served by High Speed 1 rail service will see increases in capacity and speed Read More
Add Custom Drivers to WinRE
19 Jul 2017If your Windows runtime needs drivers added, you'll also want to add Custom Drivers to WinRE so your recovery environment works, too. Read More
Dell XPS 13 (2020) review: The best Windows 10 laptop
13 May 2020The Dell XPS 13 is more expensive than other Windows 10 laptops, but is it worth it? Its impeccable design, stunning display and impressive spec sheet suggest yes, at least on paper. Read More
Help secure the top UK entry point for cyberfraud
17 Jun 2020“NHS” is the UK’s most trusted brand. Until recently it was one of the least protected/secure. There have been significant improvements but, as a result of Covid, impersonating the NHS now comes ... Read More
KRACK WPA2 flaw might be more hype than risk
17 Oct 2017Researchers discover a WPA2 vulnerability and brand it KRACK, but some experts say the early reports overstate the risk of the flaw and downplay the difficulty of an exploit. Read More