PocketInformant use to be just a PocketPC app. Back in “the day” I bought my share of Pocket PC apps. Hearing about PocketInformant getting released for the iPhone takes me back to the days when we talked sleds/sleeves, iPaqs, Compact Flash, the Jornada, or even when Casio played the PDA game.
Not sure I need PocketInformant, but here some video coverage at MacWorld.
I’m dong some maintenance, theme editing and even adding a forum this weekend(1/30-31/10). Bare with me while I get things better than normal.
I am also growing unhappy with the local Mobile User Group I have been attending. A few members and I have been tossing around the idea of a starting a new group. If you’re in Denver and would like to be apart post up in the comment section and I’ll make sure to get you the meeting information.
I saw this great tip on Lifehacker via a link from a Facebook friend. My Apple Airport does not have this setting but I thought I would pass it along to your guys that do. Hope it helps.
WEP Wi-Fi security has been known as an easy-to-crack security protocol for a while now, which is why it was superseded by the more secure Wi-Fi Protected Access (WPA) standard. But now a PhD candidate studying encryption has found an exploit in the WPA standard that would allow a hacker to “send bogus data to an unsuspecting WiFi client,” completely compromising your Wi-Fi security and opening your network to all sorts of hacking. Lucky for you, it’s not terribly difficult to protect yourself against the new exploit.
The key: Just log into your router, switch off Temporal Key Integrity Protocol (TKIP) as an encryption mode, and use Advanced Encryption System (AES) only. TKIP is the only protocol that the hack applies to, so switching to AES-only will ensure that your Wi-Fi network is safe again. It’s quick and easy, so do yourself a favor and make the adjustment now so you don’t run into any problems in the future.