We recently updated our
Terms and Conditions for TechRepublic Premium.
By clicking continue, you agree to these updated terms.
Invalid email/username and password combination supplied.
An email has been sent to you with instructions on how to reset your password.
Welcome to TechRepublic!
All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).
Those some like consumer products where you use the devices. It doesn’t sound like something a hardcore programmer/information security would use except to test out the exploits they created on their programmer centric systems.
Yep, I agree. I thought the same. I figure there were ancillary tasks and maybe ways to use these devices that I wasn’t thinking of… The top use case that I can think of for any of these devices is as a secondary research device during investigations, pen test, etc.