Chris Soghoian made an interesting point in his recent cnet article entitled iPhone rules pose Net neutrality, antitrust concerns. My key point of interest here is the following: Apple’s, and […]
I have a new pgp key. Feel free to sign it at your pgp.net keyserver of choice. $ gpg –fingerprint FE264BAA pub 16384R/FE264BAA 2008-01-17 Key fingerprint = 9A05 99DB 838D […]
I was asked for help with someones iphone recently. It is amazing how many guides are out there and nearly all of them have a very specific instructions of what […]
Another perennial topic that seems to come up whenever I am speaking to someone who is a consumer of technology. If they are one of the people that I actually […]
I have no sympathy for the consumers of Solid Oak as discussed, if that is the right word, in the well circulated Chloe Albanesius article dramatically entitled “Update: Symantec Screwup […]
This is a presentation that I gave earlier this week at the ITCi Conference in San Diego, California. It was requested that I speak about security and compliance metrics, and […]
So tomorrow, the iPhone goes back just under the two-week-trial wire and I will be in a dead zone of no phone limbo until my Nokia n95 arrives when I’m […]
I am out of patience with the iPhone. It’s fired. no MMS. Instead, you get directed to this joke. no GPS no tethering without hacking it no applications until at […]
This is no simple task as there is a lot of sales material that will promise anything, but from the presentation of the architecture and real-world benchmarking, a clear image may present itself.Two of the large commercial research firms authored materials were also gathered to assist in this mater, though one of them was shockingly inaccurate, unfamiliar with the history and utility of the tools in practice, and offered some very poor advice in its conclusions. Unfortunately this is all too common in my experience with commercial research, so the wise buyer of capital investment level hardware and software would be best served to spend the time evaluating each architecture, dependancies, and challenges if they are able.That being said, I will begin my presentation: A SIM implementation has the ability to solve a variety of problems at once due to its evolution from a log management platform.
So my DWL-G550 arrived today.”D-Link DWL-G550 High-Powered Wireless-G PCI Adapter” (D-Link Systems, Inc.)I threw it into the system and it powered up and loaded the correct Atheros drivers…. (Personal meaning you’re not running a authentication service like RADIUS, EAP or LEAP (which is just another kind of LEAP by Cisco), or 802.1x, but using PSK [Pre-shared Key] or a certificate.Second, now that you have your /etc/wpa_supplicant.conf configuration figured out from reading the instructions or from that link I mentioned.