Security

Setting up false volumes in TrueCrypt

TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.

   
ClientBusiness Continuity

Recovering and protecting data on Mac and Linux desktops

Make sure all of your clients’ computers have a backup plan, whatever operating system they run.

   
Fluff

Dirtection Inc: episode 7

In which the Secret Service gets to grips with bonkers boffins and hallucinogenic horseflies.

   
ClientTelecoms

Setting up Google Gmail Mobile in Google Apps

With Google Apps businesses can combine the Gmail service with their own domain names. Here’s how to get it up and running and provide mobile email without a mail server.
   
ServerBusiness Continuity

Turn DPM and Windows Storage Server into an appliance

Combine windows storage server and add windows system center data protection manager and you can get a backup and dr appliance you can build – or a service you can sell.

   
Network

Dealing with spam in Exchange 2007

Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay.

   
ServerNetworkBusiness Continuity

Rebuilding a NAS appliance RAID array

Disks fail, and RAID arrays need rebuilding. Be prepared for the worst – and keep your clients’ data safe.

   
ServerNetwork

Hosting Remote Applications over the Internet with Terminal Services

Giving small business users the applications they want, available everywhere? It’s actually easier than you think. With the release of Windows Server 2008, the venerable Terminal Services gains a host of new capabilities.

 

   
The Business

Automated sales tools

Marketing collateral, sales tools, and automated reports can save a lot of time in preparing quotations. But will they alienate your customers or win you business?

   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

Need to script file uploads to a SharePoint site? DavCopy is a command-line tool with a rich set of options including whether files get overwritten, whether they trigger the New file notification in SharePoint and what user credentials to upload them with. http://www.bluedoglimited.com/Downloads/default.aspx read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS