Feeds

Take pot luck with the USB Greenhouse

Business security measures using SSL

Calling all budding - literally, perhaps - horticulturalists. Now you can see just how green your fingers are with the USB Greenhouse. For once the computer connection isn't simply an alternative to batteries - it can be used to monitor your plant's progress too.

USB Greenhouse
The USB Greenhouse: weed free

The egg-shaped herbarium comes with a pack of Marigold seeds and a sample of "artificial soil". It provides artificial sunlight too, in the form of a purple-hued "growth light" - handy for chlorophyll absorption.

USB Greenhouse
The USB Greenhouse: sprout's progress

Not too keen on marigolds? Then drop in any kind of flower, vegetable, herb, smoking weed, pot plants - whatever takes your fancy.

The bundled Windows-only software will help you keep track of the greenery's growth and prompt you to water your flora on a regular basis - though careful where you sprinkle, OK? H2O and electronics don't mix well.

Inspired to attempt a feat of horticultural extravagance of Titchmarshian proportions? Hong Kong-based Brando will sell you the USB Greenhouse for a mere $43 (£21/€31).

Secure remote control for conventional and virtual desktops

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.