ServerTelecoms

Managing Mobile Devices: Anywhere, Anytime

Remote support is one of those bugbears that is never going to go away. At least with PCs and laptops you know where you are, and remote desktop tools make it easy to log in and take control of a user’s PC. You can grab logs, check files, and see just what your users see.

   
ServerNetworkThe Business

Planning an Upgrade with MAP Toolkit 4.0

Keeping up with technology changes is a challenge for both consultants and their customers. Server virtualization is now fully integrated into Microsoft’s platform, with the advent of Hyper-V in Server 2008.
   
Network

Configuring the anti-spam tools in Exchange 2007

Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay. Configure the anti-spam tools in Exchange 2007 with our step-by-step guide.

   
ServerBusiness Continuity

Install Virtual Server 2005 R2 with our 16 step tutorial

Virtual Server 2005 R2 SP1 is a good introduction to the world of virtualisation. It’s a free download, and it’ll run on most current hardware — and will support a wide range of legacy and current guest operating systems.

 
   
Server

Handling virtual and physical servers together

Microsoft’s own tools don’t support clustering between physical and virtual machines. This means that customers can end up with spare servers that they don’t believe they need.

   
ServerTelecoms

Upgrading Small Business Server 2003 to Exchange 2007

For clients who have outgrown SBS 2003, or who just can’t wait any longer for Exchange 2007, migrate them to a new server that’s 64-bit. Microsoft has made a lot of changes with Exchange 2007. The biggest is a switch to only supporting a 64-bit version.

   
SecurityBusiness Continuity

Specifying and supporting disk encryption

Encryption is at the top of the business agenda following a spate of embarrassing data breaches. How can you design and implement encryption systems to suit your customers’ needs without making life harder all round?

   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   
Network

Should you move customers to 802.11n?

802.11n has been ratified. And best of all, the release contains no incompatibility with the draft versions. Many laptops and other network devices have implemented 802.11n draft for the past couple of years. So should you upgrade any remaining 802.11g or 802.11b devices in customer networks?

   
ClientThe Business

Buying Laptops for Small Business

The lowest price isn’t always the best value; paying a little extra for a notebook that’s designed for business could be a better deal.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

None of your customers are complaining about viruses, their network being slow or strange things happening on their new PDAs and laptops; is it time to take the afternoon off? Maybe, but before you do, make sure things will look as good next week by making sure you know what you’re defending against. Microsoft has a set of resources at http://technet.microsoft.com/en-us/security/cc514043.aspx covering the current threat landscape and showing ways to help protect your clients and their customers, including analyses of data collected from millions of users, strategies, mitigations and countermeasures. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS