• Security

    All-Access Pass

    Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
    read more
  • Telecoms

    Skype and SIP

    Many businesses are now using VOIP SIP connections to deliver IP telephony to user desktops or IP phones. However, until recently the popular low-cost Skype VOIP service hasn’t been compatible with SIP telephony, ?without using third-party tools like those from 3CX.
    read more
Business Continuity

Database Backup

Databases store the most valuable information for the businesses you work with and they’re the trickiest systems to back up; some of the largest technology companies in the world have got database backup badly wrong. Losing that data can have serious consequences for the business, to say nothing of the embarrassment quotient for you. Here we explain the essentials of backing up and introduce some specialist tools.

   
Network

Should you move customers to 802.11n?

802.11n has been ratified. And best of all, the release contains no incompatibility with the draft versions. Many laptops and other network devices have implemented 802.11n draft for the past couple of years. So should you upgrade any remaining 802.11g or 802.11b devices in customer networks?

   
SecurityNetwork

Configuring routers correctly

Your client needs a router to connect them to the Internet – but unless it is configured correctly, it could represent a significant security loophole.

   
Security

Dealing with a Data Breach

It’s the call no-one wants to get: your client has experienced a data breach, and is worried that customer data may have leaked from the business. It is your job to fix the problem as best you can, and give the client peace of mind. There are four key steps in incident management.
   
SecurityNetworkBusiness Continuity

Backup goes online and offsite

Remote backup services can offer the speed of disk, the security of tape, and the simplicity of a consumer service. But how do you ensure that remote backup services comply with your clients’ data policies and integrate with their existing IT set-ups?

   
Server

Set up event subscriptions in Windows 2008

Set up an event subscription between two Windows Server 2008 systems

   
SecurityNetworkClient

Protecting Networks

Security is changing: smart clients and remote working mean that the security perimeter is getting closer to the server. How will you protect your clients’ networks tomorrow?

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

There are plenty of technical discussion sites on the Web, but if you're looking for a community where you have a chance to meet other experts and network in person, check out the list of UK technical user groups at http://www.ukusergroups.co.uk/. The new Active Directory User Group (http://adug.co.uk/) is kicking off with a meeting at Microsoft's London office in October, the Windows Server Team (http://winserverteam.org.uk/Default.aspx) is planning meetings in January and Vista Squad
(http://vistasquad.co.uk/), the Microsoft Messaging and Mobility Group (http://www.mmmug.co.uk) and Windows Management User Group (http://wmug.co.uk) are running regular meetings too. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS