Stories by Keir Thomas

Cloud computing used to hack wireless passwords

German security researcher Thomas Roth has found an innovative use for cloud computing: cracking wireless networks that rely on pre-shared key passphrases, such as those found in homes and smaller businesses.

Written by Keir Thomas11 Jan. 11 12:49

How useful are tablets for business?

Last week's CES brought forward a huge number of tablets. It doesn't take a genius to realize we're entering the era of tablet computing. Either that or there will soon be a lot of red-faced manufacturers. (Don't laugh; it happens regularly in the world of IT.)

Written by Keir Thomas11 Jan. 11 07:50

Text message of 'death' threatens smartphone security

Security researchers have shown that carefully crafted text messages sent to cell phones via short message service (SMS) can cause them to shutdown without the knowledge of the owner.

Written by Keir Thomas08 Jan. 11 05:49

Motorola Atrix hints at a virtualized, cloud future

Motorola announced the Atrix smartphone at the Consumer Electronics Show, and while many have been concentrating on its 4G connectivity and clever desktop dock that lets it run a cut-down Linux desktop on a full-sized monitor, nearly everybody has missed something very important.

Written by Keir Thomas08 Jan. 11 08:07

Overclock your smartphone, if you dare

WARNING: Overclocking is not for the faint of heart. Do not attempt to hack your phone unless you understand and accept the risks of turning it into a useless "brick."

Written by Keir Thomas05 Jan. 11 12:56

LG to launch first dual-core phone

Nvidia's much-hyped Tegra 2 CPU has finally found a home in a smartphone courtesy of LG's new Optimus 2X, which will be launched in Korea next month. As such, the Optimus 2X takes the honor of being the first dual-core phone to get to market.

Written by Keir Thomas21 Dec. 10 10:12

Amazon EC2 ramps up cloud offerings with Oracle apps

Amazon has brought a fleet of major PeopleSoft and JD Edward applications to its Elastic Cloud Compute (EC2) service, following a promise in September to do so. The new services are certified by Oracle.

Written by Keir Thomas21 Dec. 10 06:58

Forget the CR-48: Google is best at the cutting edge

The results are in, and the overwhelming verdict when it comes to Google's Chrome OS is: "Why?" I lost track of the number of reviewers who pointed out that anybody can recreate the Chrome OS experience by simply maximizing a Chrome browser window.

Written by Keir Thomas15 Dec. 10 12:31

Wikileaks attacks prove the Cloud is reliable

It's a strange world. When Amazon Web Services booted Wikileaks off its servers last week, many people (including me) said it raised significant questions about the rush into cloud services.

Written by Keir Thomas16 Dec. 10 07:51

Is jailbreaking a device becoming acceptable?

A little mentioned fact about the new Google CR-48 notebook is that it's designed to be jailbroken. This was announced by Sundar Pichai, during Google Chrome's recent preview presentation. There's a switch on the inside of the battery compartment that slips the unit into developer mode.

Written by Keir Thomas14 Dec. 10 09:37

Solid state drives no better than others, survey says

Solid state drives (SSD) appear to be as <unreliable as traditional hard disks. In fact, they're marginally less reliable: Taken as an average across models, 2.05 percent of SSDs got returned as non-functioning, compared to 1.94 percent of hard disks.

Written by Keir Thomas14 Dec. 10 06:11

Apple's switch to Sandy Bridge: Impact for gamers?

Rumors suggest that Intel's forthcoming Sandy Bridge integrated CPU/graphics platform will find its way into the lower-end range of the next generation of MacBooks. Bearing in mind Apple's cozy relationship with Intel and its habit of adopting each new generation of Intel's processors, this would make a lot of sense.

Written by Keir Thomas11 Dec. 10 09:28
[]