• Server

    Document management with Microsoft Search Server

    Storage is cheap and it’s easy to create documents, so most companies have tens or hundreds of thousands of documents on the computers in their companies. So how do your customers find a document on a particular topic? The worrying answer is probably that they can’t...
    read more
  • Network

    Should you move customers to 802.11n?

    802.11n has been ratified. And best of all, the release contains no incompatibility with the draft versions. Many laptops and other network devices have implemented 802.11n draft for the past couple of years. So should you upgrade any remaining 802.11g or 802.11b devices in customer networks?
    read more
SecurityClient

Get better security with Vista by implementing best practices for using User Account Control - UAC

Operating your PC when you’re logged in with an Administrator account is an inherently insecure thing to do. If you’re a user with highly-elevated privileges across multiple machines or an entire Active Directory domain, running your everyday processing with these privileges can be dangerous to the point of negligence.

   
ServerNetworkClient

Managing networks with System Center Essentials 2007

Microsoft’s System Center tools manage everything from updates to virtualisation. Now there’s a version that will help you manage an entire SME from one screen.

   
ServerSecurityTelecoms

Stopping Spam for Exchange Users

Spam doesn’t have to be a way of life; add to the built-in spam tools in Exchange Server with services that can almost banish spam from the inbox.

   
Server

Set up event subscriptions in Windows 2008

Set up an event subscription between two Windows Server 2008 systems

   
Business Continuity

Backing up Exchange

Like any other database, Exchange needs a little TLC if you want to recover from any downtime.

   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   
Server

Building clusters with Windows Server 2008

Microsoft has upgraded the Cluster Service in enhanced-capability editions of Windows Server 2008 and the whole process of creating and managing clusters has been made much simpler.

   
ServerThe Business

GFI tools for management

Keep track of customer servers and workstations with this remote monitoring and management software.

   
SecurityNetwork

Configuring routers correctly

Your client needs a router to connect them to the Internet – but unless it is configured correctly, it could represent a significant security loophole.

   
SecurityNetworkBusiness Continuity

Backup goes online and offsite

Remote backup services can offer the speed of disk, the security of tape, and the simplicity of a consumer service. But how do you ensure that remote backup services comply with your clients’ data policies and integrate with their existing IT set-ups?

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

Need to fit more memory, a new hard drive or a replacement optical drive to a Mac? Even if you're experienced with Macs it can be tricky to deal with the range of cases and connectors used in different models, and if you only deal with a handful of Macs across all your clients it’s hard to stay up to date. This site has installation videos going back to the G4 PowerBook and G3 blue&white desktop Mac.
http://eshop.macsales.com/tech_center/installation_2.cfm read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS