Feeds
80%
Canon PowerShot S100 compact camera

Canon PowerShot S100 GPS compact camera

The pocket professional

  • alert
  • submit to reddit

Business security measures using SSL

Sample Shots

Canon PowerShot S100 compact camera

Aperture priority f2
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Aperture priority f5
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Auto mode
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Auto mode
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Handheld
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Long exposure - Night
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Long exposure - Day
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Program mode
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Program mode
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Shutter priority
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Shutter priority - ISO 640
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Shutter priority - ISO 80
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Shutter priority - ISO 800
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Click for a full-resolution crop

Secure remote control for conventional and virtual desktops

Next page: Night vision

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.