• Security

    All-Access Pass

    Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
    read more
  • Telecoms

    Skype and SIP

    Many businesses are now using VOIP SIP connections to deliver IP telephony to user desktops or IP phones. However, until recently the popular low-cost Skype VOIP service hasn’t been compatible with SIP telephony, ?without using third-party tools like those from 3CX.
    read more
ClientClient Resources

Lock down shared PCs with Windows SteadyState

When you’re responsible for the smooth running of computers in a small office, one problem you’ll quickly encounter is that of people making changes that cause problems.

   
Network

Optimising wireless access for the small business - tips for site surveying and analysis

Most people share the same idea of Office Hell. A plain, bland and featureless big room, with open desks that give no privacy or peace. At best, a maze of little cubicles with walls no higher than five feet eight, no door and no ceilings.

   
Business ContinuityThe Business

How to write an IT service-level agreement

A service-level agreement manages expectations and improves communication when you’re starting your relationship with a customer as well as when things go wrong.

 

 
   
TelecomsThe Business

Bringing VoIP in house

For business, IP telephony and voice over IP is starting to displace conventional phone services. According to industry analysts Forrester, as many as 47% of businesses in Europe and the US have either deployed, or are rolling out, an IP-based phone system.
   
Server

Getting a SAN certificate for Exchange 2007

Exchange 2007 uses SAN certificates, which allow you to mix several different server names in a single certificate. Generating a certificate can be a problem, as the PowerShell command needed to generate the certificate signing request can be long, and unwieldy – and it’s easy enough to make a mistake when typing in part of a long command.

   
Security

Security back at the top of the exec agenda

Security back at the top of the exec agenda
In the wake of the recent Sony Playstation hack, Amazon EC2 outage and Epsilon data theft, information security is once again back in the news – for all the wrong reasons.

   
ServerThe Business

GFI tools for management

Keep track of customer servers and workstations with this remote monitoring and management software.

   
ServerBusiness Continuity

Virtualising SBS in the SME: choosing a hypervisor and planning a virtual infrastructure

Virtualisation is a powerful tool. You can use it to consolidate multiple applications on a single piece of hardware, or use several different operating systems at the same time. Often seen solely as the province of the enterprise data centre or the development lab, virtualisation is rapidly becoming a powerful tool for the SME as well, providing new routes to disaster recovery, and helping future-proof legacy applications.

   
The Business

How to get paid on time

Get your payment terms straight from the start and follow up on invoices professionally to deal with problem payers

   
ServerClientThe Business

Windows 7 upgrade tools

Windows 7 is proving as popular as Microsoft could have hoped and you can expect to have customers ask you to upgrade them. What tools are on offer to help you to help them?

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

If you're supporting en users who need to transfer files by FTP occasionally, explaining how to use FTP every time can get frustrating. Map an FTP site as a custom network location and they can do it through the familiar Explorer window. If you only have a couple of machines you can choose Tools >Map Network Drive… in Explorer and click the link 'Connect to a Web site that you can use to store your documents and pictures' to open a wizard that creates a network location. Select 'Choose a custom network location', type in the FTP address and fill in the user name and password. You can also create mapped drives and network places on the Environment tab of the user's Active Directory object - but if you have a lot of users to set up, put it in the logon script for the user profile under Active Directory Users and Computers.
If you're running into problems with Group Policy Objects, check this handy summary of the rules at http://support.microsoft.com/kb/555991/en-us. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS