What Should Lifehacker Look Into At Cisco Live!?

For the next three days, I’m in Melbourne for Cisco’s annual Cisco Live! conference. What issues should I dig into while I’m here?

Mobile Data Still Dwarfed By Fixed Lines

Mobile broadband is hugely convenient, and wireless solutions are often proposed as an alternative to expensive rollouts of fibre-based networks such as the National Broadband Network (NBN). But that doesn’t mean it dominates: a new analysis suggests 97 per cent of all data traffic worldwide still comes from fixed access networks.

Can A Mobile Phone Hack A Plane?

There’s a speculative report from the Sunday Express that theorises that Malaysian Airlines Flight MH370 might have been hijacked, potentially, by terrorists who might have used a mobile phone to access airline systems that could have been interconnected with the inflight entertainment system. That’s a lot of weasel words isn’t it?

How Politics Is Depriving Us Of A Decent NBN

As Stephen Conroy interrogated the incoming NBN Co chief Ziggy Switkowski in last week’s Senate hearing into the network’s rollout, it became increasingly clear that politics is getting in the way of good policy.

How Well Do DIY Wi-Fi Boosters Work?

We’ve seen a number of DIY wi-fi extenders designed to boost signal range, but many people remain doubtful of their quality. Macworld decided to test a bunch of myths about Wi-Fi speed, including just how well one of these DIY antennas really works.

What iOS 7 Did To Internet Traffic

When iOS 7 was released last week, iDevice owners rushed to upgrade. You can see the impact that had on Internet traffic in the chart above from Blue Coat.

How To Spy On A Modern Communications Network

How does surveillance of a telephone network work in the modern era when phones aren’t tied to a single location, and what are the legal issues surrounding Telstra’s apparent opening up some of its networks to the FBI? Swinburne University’s Philip Branch explains.

Did An iOS Bug Cause A DDOS-Style Attack?

If you experience poor network performance, it can sometimes be difficult to tell whether that’s the result of a conscious distributed denial-of-service (DDOS) attack or just poor software design somewhere in the stack. A recent incident at YouTube highlights how the latter can cause major problems, even when the software involved isn’t under your direct control.

Top 10 Features In Windows Server 2012 You Should Already Be Using

Much of the emphasis at TechEd North America 2013 this week has been on the new features coming in Windows Server 2012 R2. However, with the original Windows Server 2012 just nine months in the market, many businesses still aren’t taking advantage of features that are already available. Here are 10 that are worth using in your Windows network deployment.

How To Protect Your Network In A BYOD World

If your business is pursuing a bring-your-own-device (BYOD) strategy, effective network management and security becomes critical. How can you ensure resources are accessible to staff who need them but not vulnerable to attack? The answer could lie in an often-maligned technology: network access control (NAC).