Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
When a Mac turns up at a previously Windows customer, one of the things you’ll need to help them do is get it to print to the existing network printers rather than buying a new printer just for the Mac.
The iPhone continues to increase in popularity and it’s been more suitable for business since the launch of the 3GS, which added hardware encryption. However, configuring and deploying devices remains an issue. Apple’s iPhone management tools are primitive at best, and awkward for any business trying to manage a fleet of devices.
MAC spoofing is one of those odd tricks: it’s not very useful most of the time (and it can be extremely awkward in a well-managed environment) but sometimes it’s the only technique that will solve the problem.
There are three types of storage you can provide to your customers: Direct Attached Storage (DAS), Network Attached Storage (NAS) and Storage Area Networking (SAN). What you choose will affect the cost, the solution and the levels of support and services you can offer.
USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010