• The Business

    Understanding Licensing

    Software licensing is increasingly complex, but with clients facing fines for under-licensing, you have a duty – and an opportunity - to help
    read more
  • The Business

    Partner Focus: Peter-Hortensius-Lenovo

    The computer maker Lenovo has 9% of the worldwide PC market, and in 2009 it ranked as the world’s fast-est-growing PC company. In the three months to December 31st, Lenovo grew sales by 42%, against an industry av-erage of 17%. We asked Lenovo what that means for small business resellers.
    read more
SecurityBusiness Continuity

Specifying and supporting disk encryption

Encryption is at the top of the business agenda following a spate of embarrassing data breaches. How can you design and implement encryption systems to suit your customers’ needs without making life harder all round?

   
NetworkClient

Mac printing in a Windows world

When a Mac turns up at a previously Windows customer, one of the things you’ll need to help them do is get it to print to the existing network printers rather than buying a new printer just for the Mac.

   
Fluff

Dirtection Inc: episode 5

In which our hero worries about elephants, spiders, fairy cakes and the tomatoes of wrath...

   
Server

SQL Server: diagnosing and fixing performance issues

Many SMEs have applications that run on SQL Server. In the more recent versions, SQL Server 2005 and 2008 is largely self tuning so it may well run for months unattended. However, performance issues can still raise their ugly head.

   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   
ServerBusiness Continuity

Recovering from mail server disasters

If your best client were to lose their mail server and the emails on it, how crippling would that be? Most businesses both large and small depend on email. If a company relies on email, you need to have the tools and techniques ready to solve their problems for the day disaster strikes.

   
SecurityClient

Get better security with Vista by implementing best practices for using User Account Control - UAC

Operating your PC when you’re logged in with an Administrator account is an inherently insecure thing to do. If you’re a user with highly-elevated privileges across multiple machines or an entire Active Directory domain, running your everyday processing with these privileges can be dangerous to the point of negligence.

   
Security

Controlling anti-social networking – a guide to blocking employees access to Facebook, MySpace and more.

Right now, your customers’ employees are looking at Facebook and surfing MySpace. If that doesn’t worry their employers, it should.

Social networking has only gained popularity in the last three or four years, but it is generating the same concerns that instant messaging did at the start of the decade.

   
ServerNetwork

Virtualizing Small Business Server with Hyper-V Server 2008 R2

The challenge and reward of running SBS 2008 on Microsoft’s free Hyper-V Server platform.

   
ClientClient Resources

Limitations of VDI

Before deploying VDI, it is important to understand the limitations of the technology.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

leave When you add a new user and their email address doesn't show up in the Global Address List, work through the tips and suggestions in the ever-useful Exchangepedia Blog: http://exchangepedia.com/blog/2005/11/new-user-does-not-show-up-in-gal.html
Bulk-add new users with the script here (http://www.exchangepedia.com/blog/2006/11/exchange-server-2007-bulk-creation-of.html) or give existing users mail access (http://exchangepedia.com/blog/2006/12/bulk-mailbox-enabling-users-exchange-shell.html - this also has details for adding multiple meeting rooms as resources). And when an employee gets replaced, the steps at http://exchangepedia.com/blog/2006/03/how-to-reconnect-mailbox-to-another.html make it easy to connect the previous user's mailbox to the new user account so that mail for that job role keeps going to the right place. Reject spam with a custom message Just in case the message you're rejecting comes from a real person, you can have Exchange send a less cryptic message that the default error; it will make your customers look more professional. This blog post http://mostlyexchange.blogspot.com/2006/12/exchange-2003-sp2-imf-tuning.html
explains how - but make sure to keep the 550 error code at the beginning.
read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS