• Security

    Danger, USB!

    USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
    read more
  • The Business

    Social networking for your business

    Once considered a fad for teenagers, social media tools have become accepted components of any business’s marketing strategy. Dell is on Facebook; SAP is on LinkedIn; IBM has a large presence on the animated virtual world Second Life. Should you be there, too?
    read more
Fluff

The Case of the Headless Corpses, Part 1

Three dead bodies, a locked room and a piece of mouse fluff – all in a day’s work for Dirtection Inc.

   
TelecomsThe Business

Unplugging the PBX to sell a VoIP installation or hosted VoIP

Unless your clients have just returned from a stint on Mars, there is every chance they will already have used VoIP, though they may not call it that. VoIP, or Internet telephony, has been one of the undoubted technology success stories of the last few years. Skype alone claims 200 million users, many of whom work in small and mid-sized businesses.

   
ServerSecurityClient

Application Whitelists

Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?

   
Business Continuity

Sponsored feature - Would the last person out please lock the door

Security is only as strong as its weakest link.
With office space at a premium and ever increasing regulatory demands on retaining information, businesses have had to become more ‘inventive’ when finding somewhere to store their paper filing and archives.
   
ServerTelecoms

Configuring and Using the 3CX Skype gateway

Save money by connecting an IP PABX to Skype for low cost international calls from IP desk phones, not just PCs.

   
Server

Using SharePoint for document management for the small office

Project management, version control, group calendars, no more duplicates… SharePoint offers the small business a lot more than fancy file sharing and often it’s free. Julian Jordan from London based  IT support consultancy Network Fish shows them how to get the most from it.

   
SecurityClient

Get better security with Vista by implementing best practices for using User Account Control - UAC

Operating your PC when you’re logged in with an Administrator account is an inherently insecure thing to do. If you’re a user with highly-elevated privileges across multiple machines or an entire Active Directory domain, running your everyday processing with these privileges can be dangerous to the point of negligence.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

VisioAutoExt is a library for using Visio 2007 from C#, but even if you don’t want to write your own Visio add-ins it’s a good reference for understanding how you can automate common Visio tasks; get it at http://www.codeplex.com/visioautoext. If you prefer to use VB, http://support.microsoft.com/kb/309603 explains how to use OLE automation in Visio and Boxes and Arrows has an excellent guide to how to use Excel lists as the source for generating Visio diagrams at http://www.boxesandarrows.com/view/automating_diagrams_with_visio. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS