Network World

Weblogs

Search / DocFinder:
Advanced search
Research Centers
Vendor Solutions
Site Resources
Special Issues

Signature SeriesEnterprise All-Stars
Enterprise All-Stars NEW

You in action
You in action

New Data Center The New Data Center: Wireless & Mobility
Wireless & Mobility NEW

The New Data Center: Server Virtualization
Server Virtualization

Welcome | Gearblog archives     Search   RSS feed  

NOTE:
Gearblog has morphed into Gibbsblog. All new postings, same great Gibbs. Come on over!

Stealthy surfing and messaging


By Gearhead, NetworkWorld.com, 05/26/05

We just got a really cool personal privacy tool set for Windows 2000 and XP users: Stealth Surfer II. Complete with support for secure, anonymous surfing and e-mail this is a clever and reasonably simple solution for portable privacy.

Built on a USB drive system with some fancy security electronics, the gizmo looks like a vanilla USB storage device. Once you plug the Stealth Surfer II in (it is USB 2.0 compatible) and navigate to it you'll find only and application. Execute that app and it brings up a login screen.

With the right password (surprisingly short at no more than 8 characters) the drive is magically transformed so that you can now see the files and folders on it. These consist of a set of utilities for secure browsing, password and on-line account management, and e-mail.

Pre-installed on the drive are:


Getting the tools running is easy and if you already use any of them you can copy your data onto the USB drive. Once you're logged in all browser and e-mail service requests are handled by the applications on the Stealth Surfer. Logging off from the Stealth Surfer services simply requires double clicking on an icon in the Windows system tray.

So far in our testing we have found the device to be fast and reliable and, with pricing starting at $100 for a 128MB Stealth Surfer, excellent value.

Back to Gearblog

Comments

Newsletters
Sign up for one of NWW's Application newsletters.

Web Applications
Network Optimization
Network Systems Management
Network/Systems Management News Alert
View all newsletters

Email Address:

Vendor Solutions

White Papers

More...


Research Centers: Applications | Application Development | Applications-Standards | Applications Vendor Solutions | Collaboration | CRM / ERP | Databases | Directories | Grid Computing | Java | Messaging | .Net | RFID | SOAP | Web Services | XML | Convergence & VoIP | Convergence Regulatory | Convergence Services | Convergence Standards | Convergence VoIP Vendor Solutions | Video | IP PBX | SIP | VoIP | VoIP Services | E-Business | DNS | RFID | Supply Chain | Web security LANs & Routers | Acceleration | Gigabit Ethernet | Lans-Standards | Routers | Wireless LANs | Network Management | Application Management | Desktop Management | Management Test Patch Management | Operating Systems | Linux | NetWare | Unix | Windows Outsourcing | Managed Services | Offshoring Security | Firewalls - VPN - Intrusion | Identity management | Patch Management | Microsoft Security | Privacy | Security Standards | Spam & Phishing | Viruses & worms | Web Security | Wireless Security | Servers & Desktop | Backup-Recovery | DataCenter | Desktops | Desktop Management | Grid | Servers | Server Blades | Servers Desktops | Utility Computing | Small & Medium Business | Broadband | Telework | Handhelds & PDAs | Home Networking | Security | Storage | Compliance | Infiniband | Network-Attached Storage | SANs | Storage Management | Storage Virtualization | Virtualization | Vendor News | Bankruptcy | Earnings | Lawsuits | Layoffs | Standards | Start Ups | Vendor Markets | Education | Financial | Healthcare | HIPAA | Manufacturing | Retail | Wide Area Network | Broadband | Carriers | Frame Relay | Metro Ethernet | MPLS | Service providers | Wireless services | Wireless & Mobile | Wireless LANs | PDAs & handhelds | Wireless Security | Wireless Services | Wireless Standards | Wireless Switches | All Company Profiles