Skip to main content

Technology

Doom 3: A Helluva Tech Demo

posted onAugust 10, 2004
by hitbsecnews

Doom 3 is a well-crafted, accessible testament to the power and promise of technology to create a new medium that puts players directly at the center of an experience -- a medium in which, unlike books and movies, there ain't nothing vicarious about it.

FCC Says Net Phone Lines Can Be Tapped

posted onAugust 5, 2004
by hitbsecnews

L33tdawg: Thanks to kewl for the heads-up on this story.

Internet phone systems, seen as the wave of the future in telecommunications, must be set up in such a way that conversations can be monitored by police and intelligence agencies, the U.S. Federal Communications Commission (news - web sites) said in a tentative ruling on Wednesday.

Software promises painless VoIP set-up

posted onAugust 3, 2004
by hitbsecnews

As cable and phone companies jostle to sell voice, video and data bundles over broadband connections, tools are needed to get those services running as quickly as possible.

E-voting critic calls on hackers to expose flaws

posted onJuly 30, 2004
by hitbsecnews

LAS VEGAS--Electronic voting systems have major security problems and hackers should make it their mission to find the flaws, an e-voting critic told security researchers on Thursday. Speaking at the Black Hat Security Briefings here, Rebecca Mercuri, a fellow at a Harvard-affiliated research center and a noted e-voting critic, called the current voting process a statistical game of shells, one that e-voting machine makers are playing for profits."The data is not being collected in any meaningful way," she said.

'Thin client' computing pushed as Windows alternative

posted onJuly 28, 2004
by hitbsecnews

The idea is straightforward: Instead of giving employees computers packed with features they rarely use, companies could save tons of cash by distributing simple machines tied to powerful central servers.

Computing vendors have had marginal success over the years with variations of this "thin client" concept. Now IBM Corp. is betting that with some tweaks, the technology can become a big hit, challenging the traditional approach pushed by Microsoft Corp.

Security at your fingertips

posted onJuly 27, 2004
by hitbsecnews

Employees in at least one Defense Department office no longer have to remember passwords or personal identification numbers.

DOD's Office of the Assistant Secretary of Defense for Networks and Information Integration is about one year into a pilot program that lets about 1,300 users sign on to their computers and access applications with a fingerprint authentication system.

ATM keypads get a security boost

posted onJuly 21, 2004
by hitbsecnews

Behold the modern automated teller machine, a tiny mechanical fortress in a world of soft targets. But even with all those video cameras, audit trails, and steel reinforced cash vaults, wily thieves armed with social engineering techniques and street technology are still making bank. Now the financial industry is working to close one more chink in the ATM's armor: the humble PIN pad.

In-flight cellphone network passes test

posted onJuly 19, 2004
by hitbsecnews

Passengers could soon make cellphone calls during a flight using onboard transceivers currently being flight tested. But concerns remain over possible interference with aircraft electronics.

American Airlines demonstrated the new in-flight phone system, installed in one of its aircraft, during a short flight on Thursday. The aircraft took off from Dallas-Fort Worth International Airport and circled at 25,000 feet for the demonstration.

Project Planning Guide: Stuffing Voices Into Packets

posted onJuly 14, 2004
by hitbsecnews

Your business may not be using Internet standards to make calls, but it will—eventually. So far, however, the cost to switch to voice-over-Internet Protocol systems from conventional phone setups often outweighs the savings. Some companies, however, are finding that wide-scale adoption of IP telephony can reap a significant payback.

Biometric Myths: Six Of The Best

posted onJuly 14, 2004
by hitbsecnews

It is probably the hottest sector in the security field today. Yet the biometrics industry, which produces human-based identification systems, is weighed down with claims and counterclaims, fallacies and myths. While some of the myths are no doubt based on an element of historical or scientific truth, some are now so out of date or inaccurate that they are almost laughable.