Identity-based privacy-protected access control is said to overcome weaknesses in IP address filtering as a method of blocking denial of service attacks.rn
The technology for hiding messages can be used by insiders using legitimate traffic. A computer scientist offers tips to IT managers on how to detect miscreants leaking company informationrn
Kevin Hayes, technical editor for one part of the Bluetooth 3.0 spec, describes how packets are translated between the Bluetooth and 802.11 stacks. Find out how soon smart phone makers will implement this
The new President's policies on expanding rural broadband availability and net neutrality could have a major impact on Canadian equipment makers doing business in the U.S.
The Internet Architecture Board, an Internet standards oversight body, has been collecting assumptions about the Internet. The following is a list of myths they've compiled throughout the IP's 30-year history