ServerServer Resources

Using vCenter Converter in standalone mode

Taking physical machines and making them virtual is a complex task. That’s why you’ll need tools like VMware’s vCenter Converter to handle the conversion.

   
ServerNetwork

Document management with Microsoft Search Server

Storage is cheap and it’s easy to create documents, so most companies have tens or hundreds of thousands of documents on the computers in their companies. So how do your customers find a document on a particular topic? The worrying answer is probably that they can’t...

   
Fluff

The Case of the Headless Corpses, Part 2

In which a crime is solved – and then unsolved again thanks to a piece of mouse fluff.

   
The Business

Contract Disputes

EDS-Sky dispute is a warning to all.

   
ServerSecurityClient

Application Whitelists

Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?

   
ClientTelecoms

Video Conferencing on a Budget

Video conferencing technology has never been so cheap or so effective: what can it do for your small business customers?

 

   
Security

All-Access Pass

Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.

   
ServerNetworkBusiness Continuity

Failover, not fall over - how to keep running when the hardware fails

Failure is not an option in business and redundancy is the solution. You can offer customers systems that keep running when the hardware fails.

Server failure used to mean widespread panic and a scramble to find backup tapes and a spare server to restore onto. Inevitably this meant business interruption, user frustration and even data loss. Recovering from a backup can take hours; even planned maintenance can take the server down during business hours leaving users unable to work. Today there is no excuse for this situation.

   
Security

Setting up false volumes in TrueCrypt

TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.

   
Network

Managing and migrating firewalls

Firewalls can provide you with a host of information about what’s going on inside and outside your customer’s network. But that information isn’t necessarily easy to manage and analyse.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

  businesses Governance, risk and compliance aren't just for big business, and they're not just a burden of red tape. The better the governance, risk and compliance policies of a company, the better it does at business. This guidance from the IT Policy Compliance Group is specifically written for small business; take a look to see what you should be recommending strategically. http://www.itpolicycompliance.com/guidance/smb_special_interests/ read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS