Archive

Your First User Interface Application in Android

by May 2, 2011

In this article learn how you can get going onto the smartphone apps development by building your first Android application.

Read More [shareaholic app="share_buttons" id="15671367"]

Prevent Data Theft from USB Ports

by May 2, 2011

The convenience of attaching a storage device to a USB port can be mis-used in an organization to steal data. We talk of various ways to control USB ports on systems.

Read More [shareaholic app="share_buttons" id="15671367"]

Encrypting Data on Hard Disks

by May 2, 2011

You may not always be able to prevent your hard disk from theft or getting accessed by a third person but you can surely encrypt it to prevent important information from getting stolen

Read More [shareaholic app="share_buttons" id="15671367"]

Is Your Smartphone Secure?

by May 2, 2011

You use your smartphone for corporate communications, accessing organization’s business apps and even for banking, but did you ever wonder how safe your phone’s data is from bots or when it gets lost? Read on…

Read More [shareaholic app="share_buttons" id="15671367"]

Business Logic Attacks: What Every Web Developer Needs to Know

by May 2, 2011

Hackers are finding newer ways of attacking web apps, with the latest being to attack the business logic. Here’s what developers and security specialists need to know to take counter-measures

Read More [shareaholic app="share_buttons" id="15671367"]

Beef Up Your Website’s Security

by May 2, 2011

Learn about the most common attacks that are being subjected to web 2.0 enabled websites today and the measures to combat them

Read More [shareaholic app="share_buttons" id="15671367"]

Combating Email Threats

by May 2, 2011

Are you sure your anti-virus solution is enough to secure your system your email threats? Check whether your email system is vulnerable to email viruses, worms and other threats. Here we discuss various email threats and ways to fight them

Read More [shareaholic app="share_buttons" id="15671367"]

Just How Secure is Your Organization?

by May 2, 2011

Even after deploying the latest security solutions, most CIOs find it difficult to determine the exact health of security in their organization. Here, we provide an easy to follow approach that helps you arrive at a security score

Read More [shareaholic app="share_buttons" id="15671367"]

Preventing Information Theft

by May 2, 2011

What if an employee unknowingly tweets about a project you wanted to keep confidential? What if somebody puts up a negative blog post that impacts your organization’s credibility? We delve into different ways information can be leaked out of your organization and how to prevent it from happening using a combination of security products and policies

Read More [shareaholic app="share_buttons" id="15671367"]

5 Free Office Suites

by May 2, 2011

Whether you’re on Linux, Windows, or Mac, you can try these Open Source and free Office suites. Here we highlight their key pros and cons

Read More [shareaholic app="share_buttons" id="15671367"]

The Best Laid 3G Plans!

by May 2, 2011

With information on 3G service plans scattered across websites, brochures, customer care numbers and outlets of service providers, we made an effort to consolidate all in one place. Right here!

Read More [shareaholic app="share_buttons" id="15671367"]

Reliance

by May 2, 2011

Dissecting the service provider which had, for a while, captured the imagination of the 2G user. Now it gets its hands dirty in a whole new game–3G

Read More [shareaholic app="share_buttons" id="15671367"]

Airtel

by May 2, 2011

As most operators try to beat each other with a slew of 3G plans, we look at what the oldest private telecom operator has to offer

Read More [shareaholic app="share_buttons" id="15671367"]

MTNL

by May 2, 2011

One of the earliest entrants into the 3G services category, let us review where does MTNL stand against the potent competition from private players…

Read More [shareaholic app="share_buttons" id="15671367"]

BSNL

by May 2, 2011

With nominal data usage plans and services such as video calling at offer, BSNL is a 3G contender to consider

Read More [shareaholic app="share_buttons" id="15671367"]

Vodafone

by May 2, 2011

The 3G Super ZooZoo of Vodafone is fast becoming a rage with the viewers. Read on to find out what Vodafone has to offer besides an aggresive marketing campaign…

Read More [shareaholic app="share_buttons" id="15671367"]

3G Speed Tests: What to Expect?

by May 2, 2011

We panned geographies, mobile platforms and time frames across the day to check the end-user experience of 3G service from various providers

Read More [shareaholic app="share_buttons" id="15671367"]

PCQuest 3G User Satisfaction Survey

by May 2, 2011

We surveyed IT heads and other manager level working professionals across different organizations to determine their satisfaction level with 3G, and found that users mostly rate 3G performance, cost, and service provider support as average

Read More [shareaholic app="share_buttons" id="15671367"]

3G for Enterprises

by May 2, 2011

Detailing strategies by one of the biggest service provider in the country as they cater a consumer technology to businesses

Read More [shareaholic app="share_buttons" id="15671367"]

Advanced Usage of 3G

by May 2, 2011

With 3G becoming available now on all telecom operators, you can envisage the applications around which you can use 3G, ranging from using your 3G enabled phone as surveillance device to having a web server running on your Android phone. But this all is possible if the 3G provider is not blocking the ports for doing that.

Read More [shareaholic app="share_buttons" id="15671367"]