In which a crime is solved – and then unsolved again thanks to a piece of mouse fluff.
USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
If you’re using Active Directory and Group Policies to administer computers on customer networks, suggest they adopt Internet Explorer 8 to get more than 100 new Group Policies that you can use to maintain a stable configuration.
The computer maker Lenovo has 9% of the worldwide PC market, and in 2009 it ranked as the world’s fast-est-growing PC company. In the three months to December 31st, Lenovo grew sales by 42%, against an industry av-erage of 17%. We asked Lenovo what that means for small business resellers.
Storage is cheap and it’s easy to create documents, so most companies have tens or hundreds of thousands of documents on the computers in their companies. So how do your customers find a document on a particular topic? The worrying answer is probably that they can’t...
Like any other database, Exchange needs a little TLC if you want to recover from any downtime.
MAC spoofing is one of those odd tricks: it’s not very useful most of the time (and it can be extremely awkward in a well-managed environment) but sometimes it’s the only technique that will solve the problem.
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010