Fluff

The Case of the Headless Corpses, Part 2

In which a crime is solved – and then unsolved again thanks to a piece of mouse fluff.

   
Network

Configuring the anti-spam tools in Exchange 2007

Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay. Configure the anti-spam tools in Exchange 2007 with our step-by-step guide.

   
NetworkClientTelecoms

Managing Skype in business

Skype means free or cheap calls but it’s based on peer-to-peer file sharing principles. How can you tame consumer VoIP tools for use in a business network?

   
Security

Encrypting backup tapes

Backup should be keeping your customer’s data secure as well as safe. Forget to encrypt data written to tapes and they run the risk of having to explain it to the auditor when a courier loses them.

   
ClientClient Resources

The architecture of VDI

The architecture for VDI is really very simple and the basics do not differ between the various VDI vendors. 

   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   
Security

Setting up a VPN between two sites

Setting up a VPN between two sites for a small business to create a single network; although the interface will be different for every router, the functions are roughly the same.

   
Security

Dealing with a Data Breach

It’s the call no-one wants to get: your client has experienced a data breach, and is worried that customer data may have leaked from the business. It is your job to fix the problem as best you can, and give the client peace of mind. There are four key steps in incident management.
   
Client

Remote Support

The phone rings; “My email isn’t working.” Now you have to decide: do you drive across town to give in-person support, or try to find a solution from where you are sitting? Personal visits for every support request are impractical, but telephone support can be frustrating and, at worst, a waste of time when a visit proves necessary after all.

 
   
The Business

HP Partner Focus, Garry Veale | Video Interview

If you don’t think of HP for storage, think again: nearly half of all the disk drives manufactured worldwide are sold by HP. 

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

Need to script file uploads to a SharePoint site? DavCopy is a command-line tool with a rich set of options including whether files get overwritten, whether they trigger the New file notification in SharePoint and what user credentials to upload them with. http://www.bluedoglimited.com/Downloads/default.aspx read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS