Security

All-Access Pass

Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.

   
ServerClient

Congifuring SCE to manage a small business setup


1. Run the SCE configuration tools to discover the servers, PCs and network devices on your client’s network, then build them into management groups.

   
NetworkClient

Mac printing in a Windows world

When a Mac turns up at a previously Windows customer, one of the things you’ll need to help them do is get it to print to the existing network printers rather than buying a new printer just for the Mac.

   
ServerNetworkThe Business

Planning an Upgrade with MAP Toolkit 4.0

Keeping up with technology changes is a challenge for both consultants and their customers. Server virtualization is now fully integrated into Microsoft’s platform, with the advent of Hyper-V in Server 2008.
   
Telecoms

Managing iPhones more easily

The iPhone continues to increase in popularity and it’s been more suitable for business since the launch of the 3GS, which added hardware encryption. However, configuring and deploying devices remains an issue. Apple’s iPhone management tools are primitive at best, and awkward for any business trying to manage a fleet of devices.

   
Client

Is it time for Vista? Solutions for upgrade problems and advice for deployment and maintenance

Operating systems are constantly being updated. Sometimes it’s to deal with security issues, sometimes to improve performance and sometimes to add new, must have, features.

   
Network

How to spoof a MAC address (and why)

MAC spoofing is one of those odd tricks: it’s not very useful most of the time (and it can be extremely awkward in a well-managed environment) but sometimes it’s the only technique that will solve the problem.

   
ServerNetworkBusiness Continuity

Types of Storage

There are three types of storage you can provide to your customers: Direct Attached Storage (DAS), Network Attached Storage (NAS) and Storage Area Networking (SAN). What you choose will affect the cost, the solution and the levels of support and services you can offer.

   
Telecoms

Managing iPhone with Apple’s Tools

Keeping IOS under Control in a Business Network

   
Security

Danger, USB!

USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

It's easy to duplicate and transfer VMs, and hard to track how many you have and what you’re using them for at different client sites. If that spreadsheet is getting difficult to work with, try this free new tool; a cut-down version of V-Commander it's currently only for VMware Virtual Center, it will get support for Hyper-V this year and Citrix Xen next year.http://www.embotics.com/solutions/v-scout read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS