<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Roll</title> <atom:link href="https://www.iphere.com/tag/roll/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Vendors Roll Out Mobile Security, Vulnerability and Forensics Tools</title><link>https://www.iphere.com/vendors-roll-out-mobile-security-vulnerability-and-forensics-tools</link> <comments>https://www.iphere.com/vendors-roll-out-mobile-security-vulnerability-and-forensics-tools#comments</comments> <pubDate>Tue, 07 Aug 2012 08:16:26 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Forensics]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Roll]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Tools]]></category> <category><![CDATA[Vendors]]></category> <category><![CDATA[Vulnerability]]></category> <guid
isPermaLink="false">http://www.iphere.com/vendors-roll-out-mobile-security-vulnerability-and-forensics-tools</guid> <description><![CDATA[Mobile device management (MDM) is top of mind for many nowadays, so it&#8217;s not surprise that mobile security was a focus at Black Hat. Learn more about MDM products announced during the show, as well as new vulnerability management and forensics tools. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/vendors-roll-out-mobile-security-vulnerability-and-forensics-tools/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Eucalyptus, NetSocket Roll Out Cloud Management Tools</title><link>https://www.iphere.com/eucalyptus-netsocket-roll-out-cloud-management-tools</link> <comments>https://www.iphere.com/eucalyptus-netsocket-roll-out-cloud-management-tools#comments</comments> <pubDate>Wed, 27 Jun 2012 20:14:34 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Eucalyptus]]></category> <category><![CDATA[Management]]></category> <category><![CDATA[NetSocket]]></category> <category><![CDATA[Roll]]></category> <category><![CDATA[Tools]]></category> <guid
isPermaLink="false">http://www.iphere.com/eucalyptus-netsocket-roll-out-cloud-management-tools</guid> <description><![CDATA[New features in Eucalyptus 3.1, available today, enable faster deployment of on-premise clouds and more; NetSocket&#8217;s Cloud Experience Manager provides visibility into network issues. Learn more about both products. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/eucalyptus-netsocket-roll-out-cloud-management-tools/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Roll Your Own Interference Signatures With AirMagnet</title><link>https://www.iphere.com/roll-your-own-interference-signatures-with-airmagnet</link> <comments>https://www.iphere.com/roll-your-own-interference-signatures-with-airmagnet#comments</comments> <pubDate>Fri, 16 Dec 2011 20:14:35 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[AirMagnet]]></category> <category><![CDATA[Interference]]></category> <category><![CDATA[Roll]]></category> <category><![CDATA[Signatures]]></category> <guid
isPermaLink="false">http://www.iphere.com/roll-your-own-interference-signatures-with-airmagnet</guid> <description><![CDATA[As anyone who has an understanding of Wi-Fi will tell you, interference is the one threat to the WLAN that you can&#8217;t really do much to prevent from a configuration standpoint. When interference does show up, accurate classification and remediation can be the key to client success or frustration. Fluke Networks has just freshened up [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/roll-your-own-interference-signatures-with-airmagnet/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>