• Security

    Application Whitelists

    Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?
    read more
  • The Business

    Social networking for your business

    Once considered a fad for teenagers, social media tools have become accepted components of any business’s marketing strategy. Dell is on Facebook; SAP is on LinkedIn; IBM has a large presence on the animated virtual world Second Life. Should you be there, too?
    read more

Set up event subscriptions in Windows 2008

Set up an event subscription between two Windows Server 2008 systems


Security in the Virtual world

Many organisations need help expanding their data security policies to embrace virtual IT environments


Stopping Spam for Exchange Users

Spam doesn’t have to be a way of life; add to the built-in spam tools in Exchange Server with services that can almost banish spam from the inbox.


Getting to grips with VDI

Virtual Desktop Infrastructure (VDI) is being promoted as the solution to all that ails the desktop. The truth is somewhat different.

The Business

Microsoft Support Lifecycle

Microsoft Support Lifecycle
When a new service pack is released, Microsoft will provide either 24 months of support for the previous service pack (for Windows) or 12 months for all other products. Keep an eye on what will need updating when, to stay in support.

ServerSecurityBusiness Continuity

Backing up: save the data, save the day

All hardware fails – and backup is seen as boring and unreliable. That combination is the perfect opportunity for you to provide a service that provides business continuity and ongoing revenue. But how do you design the right backup system?


Smartphone data plans for push email and web browsing

Getting a smartphone connected for push email and Web browsing is as easy as signing up for a data plan with an operator and waiting for the network to provision the service. Finding the right data plan for the business can be harder – but it can be more profitable too.

Configuring routers correctly

Your client needs a router to connect them to the Internet – but unless it is configured correctly, it could represent a significant security loophole.


Dirtection Inc: episode 4

In which a bit of fluff leads to a deadly encounter...


Skype and SIP

Many businesses are now using VOIP SIP connections to deliver IP telephony to user desktops or IP phones. However, until recently the popular low-cost Skype VOIP service hasn’t been compatible with SIP telephony, ?without using third-party tools like those from 3CX.



Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010



If Autoruns, Processor Explorer, FileMon, RegMon and the other SysInternals tools aren't already in your arsenal, then you need to take a look at the instructions for these invaluable free utilities on the Sysinternals site. If you already know, love and tote them around on a USB stick, memorise http://live.sysinternals.com instead; this hosts the full set of tools as EXEs files, complete with help files, so you can run them from any machine you need to work on without needing to install them or even unpack a ZIP file. read more


Unified communications


The #1 Bestseller for Only 77p