Storage is cheap and it’s easy to create documents, so most companies have tens or hundreds of thousands of documents on the computers in their companies. So how do your customers find a document on a particular topic? The worrying answer is probably that they can’t...
In which a crime is solved – and then unsolved again thanks to a piece of mouse fluff.
Endpoint security is about ensuring that PCs and laptops are secure at all times – so what better way to do it than by ensuring that everything running on them is completely trusted?
Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
Server failure used to mean widespread panic and a scramble to find backup tapes and a spare server to restore onto. Inevitably this meant business interruption, user frustration and even data loss. Recovering from a backup can take hours; even planned maintenance can take the server down during business hours leaving users unable to work. Today there is no excuse for this situation.
TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010