By now, most companies are employing disk encryption. Linux has for a long time supported disk encryption, and using it is imperative for mobile devices in case of loss or theft. Upon occasion, replacing the decryption key is a necessity, … Continue reading


Here are the frequency allocations in all of their glory, available from here. It’s interesting that the U.S. government auctions off spectrum for mobile carriers, who then pass this cost back on to the very people who “own” it. But … Continue reading


One question that often arises is, look at this e-mail I received…have I been hacked? The answer is not quite as straightforward as one might think. The protocol that defines Internet e-mail was written a long, long, time ago, and … Continue reading