Broadband

Web proxy firm working with FBI to trace Palin e-mail hacker

The Webmaster of a proxy service called Ctunnel.com, which may have been used by a hacker to illegally access the e-mail account of Republican vice presidential candidate Sarah Palin, is working with law enforcement authorities to track down the pers...

Hacker posts QuickTime zero-day attack code

A hacker has released attack code that exploits an unpatched vulnerability in Apple's QuickTime, just a week after the company updated the media player to plug nine other serious vulnerabilities, a security researcher said Wednesday.

Hackers claim to break into Palin's Yahoo Mail account

A group of hackers that hit the Church of Scientology's site earlier this year have apparently cracked the Yahoo Mail account belonging to Sarah Palin, the Republican nominee for US vice president, according to documents and screenshots posted on the...

Microsoft posts 21 more versions of IE8

Microsoft yesterday released 21 additional versions of its Internet Explorer 8 (IE8) Beta 2, including editions in Czech, Italian, Norwegian, Russian, Spanish and other languages.

Mozilla admits 'giant error' with Firefox EULA move

Bending to criticism from Linux users angry that it added a license agreement to Firefox, open-source developer Mozilla has admitted making a mistake and said it will strip the legalese from the browser's next update.

Porn nightmare at 37,000 feet?

Bloomberg reported last week that American Airlines flight attendants are urging their employer to block passengers from using inflight Internet access to view pornography and other inappropriate Web content.

CodeWeavers offers 'Chrome' browsers for Mac, Linux

Although Google has yet to come up with Mac or Linux editions of its new Chrome browser, CodeWeavers, a company best known for its CrossOver software, has assembled imitations for those operating systems using Google's own source code.

Keyloggers beaten by new crypto utility

A German company has come up with a program it claims can protect against the biggest weak spot of most encryption systems - keyloggers that record passphrases as they are entered.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare broadband and save

Powered by

Need Help? Call 1300 123 935

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?