• Business Continuity

    Staying up while you recover: Double-Take Cloud provides easy server protection

    Building a backup and disaster recovery service can be time consuming and costly. You need access to a data centre where you can site racks, servers, storage and have sufficient bandwidth to support the service. Alternatively, you could just take advantage of the cloud and leave your cloud supplier to take care of all that.
    read more
  • Security

    Danger, USB!

    USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
    read more
Fluff

Dirtection Inc: episode 1

There are 322 types of keyboard fluff. This is the story of one of them.

If it hadn’t been for the piece of fluff, the whole business with the horseflies, the vicar and the postmistress might have turned out very differently. It was a particularly interesting piece of fluff, as it happens, which is why I stole it. Well, I’m not sure ‘steal’ is quite the right word, really. More a case of borrowing. I would have given it back if asked. But, as is so often the case with fluff, nobody asked.
   
NetworkNetwork Resources

How to migrate a firewall

How to  migrate a firewall the ITX how to guide

   
Fluff

The Case of the Headless Corpses, Part 2

In which a crime is solved – and then unsolved again thanks to a piece of mouse fluff.

   
SecurityClient

Get better security with Vista by implementing best practices for using User Account Control - UAC

Operating your PC when you’re logged in with an Administrator account is an inherently insecure thing to do. If you’re a user with highly-elevated privileges across multiple machines or an entire Active Directory domain, running your everyday processing with these privileges can be dangerous to the point of negligence.

   
Server

Set up event subscriptions in Windows 2008

Set up an event subscription between two Windows Server 2008 systems

   
SecurityNetworkBusiness Continuity

Backup goes online and offsite

Remote backup services can offer the speed of disk, the security of tape, and the simplicity of a consumer service. But how do you ensure that remote backup services comply with your clients’ data policies and integrate with their existing IT set-ups?

   
Network

Exchange 2007 safe list aggregation

You can give Exchange 2007 a little spam-fighting help by enlisting all the copies of Outlook on your client’s network.

   
SecurityClient

Offering Consultancy on Email Compliance Issues

If you ask your customers what they know about legislation involving data, the chances are you’ll be horrified by the answers.

   
Business Continuity

Lessons in Space and Time

Sponsored Feature - Filing cabinets cost money  
When financial climates take a turn for the worse, businesses look for ways to reduce overheads, maximise resources, and increase profitability.
   
Network

Optimising wireless access for the small business - tips for site surveying and analysis

Most people share the same idea of Office Hell. A plain, bland and featureless big room, with open desks that give no privacy or peace. At best, a maze of little cubicles with walls no higher than five feet eight, no door and no ceilings.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

advisor Got a client who wants to make their own Blu-ray discs and needs to know which office PCs they can check them on? (or is honest enough to say they want to watch movies on a plane?) Check what discs they can watch and whether advanced features will work with this Cyberlink utility.
http://www.cyberlink.com/english/support/blu-ray_support/diagnosis.jsp read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS