Page7of11
Authentication.
Accessing corporate networks or restricted Internet sites requires support for secure authentication protocols. These include dial-upauthentication using Windows NT® Challenge/Response and optionally SecureID card support, authentication when accessing a secure Web site with Secure Sockets Layer (SSL) technology, fingerprint authentication,picture-basedpasswords,andsignatureauthenticationforcertainapplications.PocketPC2002supportsboth4-digitandstrongalphanumericpower-onpasswords.Eachtimeanincorrectpasswordisattempted,atimedelaythatincreasesexponentiallyisenforced.TheFileExplorerapplicationhasnewsupportforaccessingsharedWindows- basedfileservers.Userauthenticationisrequiredforaccessingtheseservers.
Networkingsecurity
To encrypt data for protection from unauthorized access, a device must support industry-standard40-bitor 128-bitencryption or be able to use a corporate standard encryption technique that can plug into the industry-standardCryptoAPI. Data is also encrypted when using the Internet to connect to a corporate server using a virtual private networkingprotocol(e.g.,PPTPorIPSec).PocketPC2002nowincludessupportforthePoint-to-PointTunnelingVPNProtocol.AdditionalVPNprotocolsupportisavailablefromthirdparties.
The static shared-keyWired Equivalent Privacy (WEP) algorithm has now been documented by researchers at the UniversityofCaliforniatobeeasilydefeated.Asaresult,thismeansalternativeapproachesarenecessaryforsecurely connectingover802.11bwirelessLANsusingPocketPCs.Thesetwosecurealternativesareavailabletoday:
VPN:
In the first approach, the 802.11b access points can be directly connected to the Internet. Virtual Private Networking softwareonthePocketPCcanthenbeusedtoauthenticatetheuserandprovideastronglyencryptedconnectiontoan organization’snetwork.
LEAP:
Thesecondapproachisdonewiththe802.11baccesspointsconnectingdirectlytoanorganization’sinternalnetwork. CiscooffersanauthenticationschemebasedontheExtensibleAuthenticationProtocol(EAP)calledEAP-CiscoWirelessorLEAP.Thisusesthe802.1xdraftstandardasafoundationandaddsmodificationsnecessaryforwirelessLANs.
Virusscanning. Anti-virusproductsarenowavailablefromanumberofcompanies.ThelatestPocketPC2002versioncontainsananti- virusAPIdesignedbyfeedbackfromsoftwarecompaniescreatingvirus-scanningproducts.Thisisintendedtosimplifytheirprocessforfindingnewpotentialvirusesbyeasilydetectingnewfilescomingontothedevicethroughdifferent mechanisms(e.g.,attachedtoe-mail,cutandpastefromanetworkfileserver,etc.)TheseproductsareintendedtopreventknownvirusesfrombeingpassedintothecorporatenetworkviaaWindowsPoweredmobiledevice.
Applications
Pocket Excel and Pocket Word are integrated into the operating system. This allows viewing documents and making changes while away from the PC. Other applications are amongst others Media-and Video players (for MP3 and MPEG4)
Through the open nature of the Pocket PC Operating System, many third-partyapplications,e.g. car-navigationor databasesystemsrunonPocketLOOX.WithPocketOutlook,apowerfulorganizerisalsoembedded.Notonlydoesit keeptrackofappointments,withseveralreminderfunctions,italsomanagescontactsandtasks.
The GSM/GPRS module gets its phonebook out of the Pocket Outlook Contacts. No need to enter phone numbers separately.