• Security

    All-Access Pass

    Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
    read more
  • Security

    Application Whitelists

    Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?
    read more
Server

Set up Exchange anti-spam features

Move anti-spam settings from one server to another with the Exchange 2007 Anti Spam Migration tool, from Microsoft www.microsoft.com/do.. Run it on the SBS 2003 system to create a PowerShell script that you can run on your Exchange 2007 server to import the appropriate settings.

   
ServerNetworkBusiness Continuity

Types of Storage

There are three types of storage you can provide to your customers: Direct Attached Storage (DAS), Network Attached Storage (NAS) and Storage Area Networking (SAN). What you choose will affect the cost, the solution and the levels of support and services you can offer.

   
ServerNetwork

Hosting Remote Applications over the Internet with Terminal Services

Giving small business users the applications they want, available everywhere? It’s actually easier than you think. With the release of Windows Server 2008, the venerable Terminal Services gains a host of new capabilities.

 

   
Security

Setting up a VPN between two sites

Setting up a VPN between two sites for a small business to create a single network; although the interface will be different for every router, the functions are roughly the same.

   
The Business

HP Partner Focus, Garry Veale | Video Interview

If you don’t think of HP for storage, think again: nearly half of all the disk drives manufactured worldwide are sold by HP. 

   
ServerTelecoms

Managing Mobile Devices: Anywhere, Anytime

Remote support is one of those bugbears that is never going to go away. At least with PCs and laptops you know where you are, and remote desktop tools make it easy to log in and take control of a user’s PC. You can grab logs, check files, and see just what your users see.

   
Fluff

The Case of the Headless Corpses, Part 1

Three dead bodies, a locked room and a piece of mouse fluff – all in a day’s work for Dirtection Inc.

   
Network

Configuring the anti-spam tools in Exchange 2007

Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay. Configure the anti-spam tools in Exchange 2007 with our step-by-step guide.

   
ServerNetworkBusiness Continuity

Raid 6 Storage

If two drives fail in a RAID 5 array, you lose data. RAID 6 promises more protection and better performance.

   
The Business

Partner Focus: Aamir Paul, Dell

Aamir Paul, director, Advanced Systems Group SMB, EMEA, at Dell

Small businesses depend more than ever on technology, but also face a growing challenge when it comes to managing their IT assets.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

None of your customers are complaining about viruses, their network being slow or strange things happening on their new PDAs and laptops; is it time to take the afternoon off? Maybe, but before you do, make sure things will look as good next week by making sure you know what you’re defending against. Microsoft has a set of resources at http://technet.microsoft.com/en-us/security/cc514043.aspx covering the current threat landscape and showing ways to help protect your clients and their customers, including analyses of data collected from millions of users, strategies, mitigations and countermeasures. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS