Broadband

How to carjack a top Google exec, according to Google

The National Legal and Policy Center (NLPC) in the US has turned the tables on Google by using the company's controversial Street View technology along with Google Earth to compile and make public a detailed dossier on a "top Google executive".

Exxon Mobil's brand 'hijacked' by impersonator on Twitter

It seems innocuous enough at first. A user claiming to represent Exxon Mobil on micro-blogging site Twitter highlighted this post from August 2, "Did You Know? We supported local NGOS (non-governmental organizations) in Angola and Indonesia to develo...

Consumer group urges Mac users to ditch Safari

Mac users should scrap Apple's Safari and replace it with a browser that offers anti-phishing protection, such as Mozilla's Firefox or Opera Software's Opera, Consumer Reports said Monday as it unveiled its annual Internet security survey.

US police show Web 2.0 savvy in kidnapping case

The Boston Police Department has demonstrated its Web 2.0 savvy by using blogging software and online video to highlight the case of alleged kidnap victim Reigh Rockefeller. While the department's blog has only basic features and does not permit disc...

Firewall vendors scramble to fix DNS problem

Nearly a month after a critical flaw in the Internet's Domain Name System was first reported, vendors of some of the most widely used firewall software are scrambling to fix a problem that can essentially undo part of the patches that address this bu...

Olympic chief: 'no deal' on China Net censorship

International Olympic Committee President Jacques Rogge Saturday said there was "no deal" with Beijing Olympic officials to permit censorship of the Internet during the games, and lashed out at criticism of the IOC and its handling of the matter.

FCC rules against Comcast P-to-P throttling

The US Federal Communications Commission has ordered Comcast to stop interfering with peer-to-peer traffic on its broadband network, with officials there saying the cable provider was "invasive" in its network traffic management.

China hits back at US senator's spying claims

China's Foreign Ministry brushed off but did not specifically deny accusations that Chinese authorities are forcing foreign hotel chains operating here to install Internet eavesdropping devices ahead of the Olympics.

A photo that can steal your Facebook account

At the Black Hat computer security conference in Las Vegas next week, researchers will demonstrate software they've developed that could steal online credentials from users of popular Web sites such as Facebook, eBay and Google.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare broadband and save

Powered by

Need Help? Call 1300 123 935

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?