• Security

    Danger, USB!

    USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
    read more
  • Network

    Should you move customers to 802.11n?

    802.11n has been ratified. And best of all, the release contains no incompatibility with the draft versions. Many laptops and other network devices have implemented 802.11n draft for the past couple of years. So should you upgrade any remaining 802.11g or 802.11b devices in customer networks?
    read more
Fluff

Dirtection Inc: episode 2

fluff-headerThe secret history of fluff - now it’s war...
People often ask me if it’s boring. The job, I mean – cleaning other people’s computers. “Boring?” I say,
“Is white-water rafting boring? Is tightrope walking over Niagara Falls boring? Is swimming naked with man-eating sharks boring?” If they are being honest, they generally say “No,” or “Probably not”. At which point I snap my fingers, affect a smirk of superiority and say, “Pah! Dull as dishwater compared to cleaning computers!”
   
The BusinessThe Business Resources

Leasing Tax Breaks

The main reason companies lease high-value equipment is to spread the cost and to preserve capital. But there are also tax advantages to leasing equipment.

   
ServerNetworkThe Business

Planning an Upgrade with MAP Toolkit 4.0

Keeping up with technology changes is a challenge for both consultants and their customers. Server virtualization is now fully integrated into Microsoft’s platform, with the advent of Hyper-V in Server 2008.
   
TelecomsThe Business

Unplugging the PBX to sell a VoIP installation or hosted VoIP

Unless your clients have just returned from a stint on Mars, there is every chance they will already have used VoIP, though they may not call it that. VoIP, or Internet telephony, has been one of the undoubted technology success stories of the last few years. Skype alone claims 200 million users, many of whom work in small and mid-sized businesses.

   
NetworkClientThe Business

Saving power, saving money with a green energy audit: cut printer costs and create power plans

Cold mornings and the clocks going back are going to put up heating and lighting bills for businesses as winter draws in, but increasingly IT is putting up the electricity bill too. Power prices have increased significantly this year and it’s not yet clear whether they have peaked. Offer customers a power audit that covers printing, servers, desktop PCs, storage and peripherals or include it when you’re planning a new deployment to sweeten the deal — and try it out in your own office to find out how much you can save by managing IT power.

 
   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   
Security

Dealing with a Data Breach

It’s the call no-one wants to get: your client has experienced a data breach, and is worried that customer data may have leaked from the business. It is your job to fix the problem as best you can, and give the client peace of mind. There are four key steps in incident management.
   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

If you're supporting en users who need to transfer files by FTP occasionally, explaining how to use FTP every time can get frustrating. Map an FTP site as a custom network location and they can do it through the familiar Explorer window. If you only have a couple of machines you can choose Tools >Map Network Drive… in Explorer and click the link 'Connect to a Web site that you can use to store your documents and pictures' to open a wizard that creates a network location. Select 'Choose a custom network location', type in the FTP address and fill in the user name and password. You can also create mapped drives and network places on the Environment tab of the user's Active Directory object - but if you have a lot of users to set up, put it in the logon script for the user profile under Active Directory Users and Computers.
If you're running into problems with Group Policy Objects, check this handy summary of the rules at http://support.microsoft.com/kb/555991/en-us. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS