![]() |
2007-07-26
, 15:54
|
|
Posts: 531 |
Thanked: 79 times |
Joined on Oct 2006
@ This side of insane, that side of genius
|
#2
|
![]() |
2007-07-26
, 15:58
|
Posts: 269 |
Thanked: 4 times |
Joined on Feb 2007
@ Finland
|
#3
|
![]() |
2007-07-26
, 16:27
|
|
Posts: 729 |
Thanked: 19 times |
Joined on Mar 2007
|
#4
|
![]() |
2007-07-26
, 16:37
|
Posts: 269 |
Thanked: 4 times |
Joined on Feb 2007
@ Finland
|
#5
|
![]() |
2007-07-26
, 17:04
|
|
Posts: 729 |
Thanked: 19 times |
Joined on Mar 2007
|
#6
|
because someone - like me :-) - might just be using his/her lovely n800 for business usage. I have learnt - the hard way- to become security conscious.
![]() |
2007-07-26
, 17:15
|
Posts: 269 |
Thanked: 4 times |
Joined on Feb 2007
@ Finland
|
#7
|
Well, if you work for a company with a real information assurance policy, then they wouldn't allow you to use the N800 for any "business purposes" whatsoever.
But the key is to recognize the device can be vulnerable and harden your network perimeter.
![]() |
2007-07-26
, 17:36
|
|
Posts: 729 |
Thanked: 19 times |
Joined on Mar 2007
|
#8
|
http://www.mobile-review.com/fullnew...ng.shtml#14968
Last edited by Seb Per; 2007-07-26 at 15:46.