I was looking for a Nagios application to install on my iPhone for tests purpose and I was surprised to find more hits than expected. It’s true that Nagios is one of the best (if not THE best) open-source monitoring solutions. There is a huge community of developers and contributors
Tag: iPhone
iOS4 from a Security Point of View
The brand new firmware for the iPhone announced by Apple a few weeks ago is publicly available since yesterday. Called “iOS4” (special dedicace for cisco.com), it includes more than 100 new features like multitasking, folders, etc. I won’t review them here, there are multiple complete reviews already available online. Google
What About Confidentiality of Data in Repair Centers?
Bad day today… My iPhone died! Yesterday it was 100% functional and today refused to boot or charge!? No reaction event after a hard-reset and a few hours of charging… This irritates me at the highest level. Well! No alternative, I went to my local dealer and explained the problem.
iPhone Tethering Howto
In the long list of new features brought by the new iPhone firmware 3.0 comes “tethering” in my personal top-ten! What’s this? Tethering means a way to connect to the Internet from a device (usually a laptop computer using a mobile device as modem/router. More info are available on Wikipedia.
RSA Software Token for iPhone
Since the 6th of June, a great application is available (for free) in the AppStore. RSA released an iPhone version of its software token! I already spoke about strong authentication on this blog. To resume, strong authentication is achieved by mixing at least two different types of authentication methods from
iPhone + iTunes + VirtualBox
As posted a few days ago, I configured my new corporate laptop. But iTunes was still missing (to sync my iPhone). I’m using iTunes to sync some Outlook content (contacts and agenda) and security podcasts (ok, and some MP3s too &59#;-). Unfortunately, VirtualBox is known to be very sensitive regarding
iPhone – Linux VPN
The iPhone 3G firmware is really open to the world via 3G or Wi-Fi. Compared to Wi-Fi, mobile networks are quite secure. Warning, I never said that they are bullet-proof, but tapping a mobile network requires much more resources than Wi-Fi! Wireless network are widely available, which make them a
iPod Auto-Erase Feature
The new firmware 2.1 is available for the iPod and introduced a new feature: You can configure your device to automatically erase all its data after ten unsuccessful password attempts! No idea if the same feature will be present in the iPhone version (which should be available today). Nice feature