• Client

    Support in the cloud

    Skip the traffic and use cloud services to proactively support clients without leaving your office.
    read more
  • The Business

    Partner Focus: Peter-Hortensius-Lenovo

    The computer maker Lenovo has 9% of the worldwide PC market, and in 2009 it ranked as the world’s fast-est-growing PC company. In the three months to December 31st, Lenovo grew sales by 42%, against an industry av-erage of 17%. We asked Lenovo what that means for small business resellers.
    read more
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   
Fluff

Dirtection Inc: episode 1

There are 322 types of keyboard fluff. This is the story of one of them.

If it hadn’t been for the piece of fluff, the whole business with the horseflies, the vicar and the postmistress might have turned out very differently. It was a particularly interesting piece of fluff, as it happens, which is why I stole it. Well, I’m not sure ‘steal’ is quite the right word, really. More a case of borrowing. I would have given it back if asked. But, as is so often the case with fluff, nobody asked.
   
Network

Network monitoring is good for business

What you need to keep customer networks running; free network management tools perform basic tasks on smaller networks but pay-for tools give you more data and customisation options.

   
SecurityClient

Offering Consultancy on Email Compliance Issues

If you ask your customers what they know about legislation involving data, the chances are you’ll be horrified by the answers.

   
Fluff

Dirtection Inc: episode 8

When boffins go bad. As one gruesome mystery ends, another begins.

   
ServerSecurityClient

Application Whitelists

Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?

   
Server

Small Business Server 2008

By the end of this year, the SBS 2008 portfolio will finally officially be out, and it will change some of the decisions that you have to make on your customers’ behalf.

   
ServerNetworkBusiness Continuity

Storage: Buy, Build or Restore?

Over the last 20 years we have seen the cost of hardware and software plummet. For the most part, smaller companies can now run the same computing solutions as large companies.

   
Server

Getting a SAN certificate for Exchange 2007

Exchange 2007 uses SAN certificates, which allow you to mix several different server names in a single certificate. Generating a certificate can be a problem, as the PowerShell command needed to generate the certificate signing request can be long, and unwieldy – and it’s easy enough to make a mistake when typing in part of a long command.

   
Server

SQL Server: diagnosing and fixing performance issues

Many SMEs have applications that run on SQL Server. In the more recent versions, SQL Server 2005 and 2008 is largely self tuning so it may well run for months unattended. However, performance issues can still raise their ugly head.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

If you're supporting en users who need to transfer files by FTP occasionally, explaining how to use FTP every time can get frustrating. Map an FTP site as a custom network location and they can do it through the familiar Explorer window. If you only have a couple of machines you can choose Tools >Map Network Drive… in Explorer and click the link 'Connect to a Web site that you can use to store your documents and pictures' to open a wizard that creates a network location. Select 'Choose a custom network location', type in the FTP address and fill in the user name and password. You can also create mapped drives and network places on the Environment tab of the user's Active Directory object - but if you have a lot of users to set up, put it in the logon script for the user profile under Active Directory Users and Computers.
If you're running into problems with Group Policy Objects, check this handy summary of the rules at http://support.microsoft.com/kb/555991/en-us. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS