Depending on whom you ask, paying for antivirus software is either a good investment or a total ripoff. In reality, neither viewpoint is accurate. You can find plenty of good reasons to choose a paid antivirus product, and plenty of good reasons to ...
This end-of-year article is a looking forward one -- looking forward to a year in which the Internet will be under a multi-pronged attack that threatens to change it irrevocably in ways that may destroy much of the Internet's potential.
It's been All WikiLeaks, All the Time here in Cringeville lately. And why not? As I noted last time out, this is the biggest thing to hit the WebberNets since Tim Berners Lee dreamed it up 20 years ago. We're still unraveling the implications and pro...
Sydney supporters of WikiLeaks this afternoon rallied at Town Hall Square to demand the Australian government condemn Julian Assange's arrest.
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on s...
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unl...
Facebook has been in the media spotlight this year over privacy concerns, thanks in part cases such as the horrific murder of Sydney teenager Nona Belomesoff.
Google's patching of vulnerabilities in its open source Chrome Web browser last week wasn't so much notable in itself; Microsoft, to be sure, is forever issuing patches for the many bugs that afflict its products.
The Apple iOS, which runs on its iPhone, iPod Touch, and iPad, has a flaw in how it reads PDF documents that makes it easier to hack. This flaw is exploited by JailbreakMe, a one-click site that makes it easy for anyone without any real tech skills t...
Spies are everywhere these days, from the 10 Russians nabbed in the United States to Angelina Jolie
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a first look at this year's badge.
So this guy at AirTight Networks says Wi-Fi Protected Access 2 has a "hard shell on the outside, but a soft underbelly inside"due to an overlooked vulnerability, and an attacker can decrypt traffic that's been encrypted with WPA2. Is this total panic...
Businesses are eyeing a transition to Microsoft Windows 7, and with a wealth of security features that are part of it, it's worth figuring out the good and bad about each of them, says Gartner analyst Neil MacDonald, who notes in some cases, third-pa...
While apologies from BP to the world regarding its environmental disaster and even from a U.S. Congressman to BP have stolen headlines of late, the tech industry has not been without its fair share of apologies during the first half of 2010 either.
In May, Web security consultant George Deglin discovered a cross-site scripting (XSS) exploit that involved Facebook's controversial Instant Personalization feature. The exploit ran on Yelp, one of the three sites that Facebook had selected to test I...
Most Popular Reviews
- 1 Evapolar USB air conditioner review
- 2 LED Lenser P7R Professional Torch review
- 3 Aftershokz Wireless Trekz Titanium Bone Conduction Bluetooth Headphones review
- 4 Review: Periscope users rejoice with Feiyu’s G4 Plus 3-Axis Gimbal for Smartphone video
- 5 2016 Ford Mustang EcoBoost review
Join the Good Gear Guide newsletter!
Latest News Articles
- Largest DDoS attack ever delivered by botnet of hijacked IoT devices
- Hackers have a treasure trove of data with the Yahoo breach
- FBI faces lawsuit because it's stayed mum on iPhone 5c hack
- The FBI could have saved money with this iPhone 5c hack
- Thousands of Seagate NAS boxes host cryptocurrency mining malware
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTTechnical Support Engineer | Cloud | Automation techsNSW
- CCSecurity Cleared IT Professionals - Expression of InterestSA
- CCSenior Business Analyst -Change and SAP ProcurementNSW
- CCSenior Infrastrcture Project ManagerACT
- FTBusiness Development Manager | ICT intelligent systems integrationVIC
- FTIT Pre-Sales EngineerSA
- FTOutbound TelesalesVIC
- FTTest Manager (HP Quality Centre / ARIBA)NSW
- FTSenior Project Manager | TelecommunicationVIC
- FTCustomer Solutions Engineer | Voice | Data | TelcoNSW
- CCJava / J2ee ProgrammersACT
- CCTechnical Architect/DesignerACT
- CCSolution ArchitectQLD
- FTEMC Storage ConsultantWA
- CCBusiness Analyst - Telecom ProjectNSW
- CCSenior Project ManagerACT
- FTDesktop/Application SupportVIC
- CCBusiness Analyst with change management experienceACT
- CCData Analyst | Data Feeds | Catalogue and MapNSW
- CCDesktop Infrastructure SpecialistACT
- CCBusiness ArchitectNSW
- CCBusiness AnalystQLD
- FTTest SpecialistSA
- CCService Desk analystSA
- FTPositive Vetted ICT positions - Defence intelligence and information securityACT