• Security

    All-Access Pass

    Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
    read more
  • The Business

    Partner Focus: Robert Epstein, Microsoft

    A good working relationship with Microsoft is often the lifeblood of any IT consultancy or reseller business. Microsoft still sells the vast majority of its products through the channel, but recent moves into cloud-based services have led some firms to worry that Microsoft might bypass them, and sell directly to SMEs.
    read more
Telecoms

Bridging PBX to VoIP using a hardware gateway or VoIP enabled router

The simplest way to bridge between VoIP and conventional telephony systems is by installing a hardware gateway, or a VoIP-enabled router.
   
Network

Dealing with spam in Exchange 2007

Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay.

   
Network

Managing and migrating firewalls

Firewalls can provide you with a host of information about what’s going on inside and outside your customer’s network. But that information isn’t necessarily easy to manage and analyse.

   
Client

GPO for IE8

If you’re using Active Directory and Group Policies to administer computers on customer networks, suggest they adopt Internet Explorer 8 to get more than 100 new Group Policies that you can use to maintain a stable configuration.

   
ServerSecurityBusiness Continuity

Backing up: save the data, save the day

All hardware fails – and backup is seen as boring and unreliable. That combination is the perfect opportunity for you to provide a service that provides business continuity and ongoing revenue. But how do you design the right backup system?

   
ServerNetwork

Mining Logs with Splunk

There’s a lot of information floating around in a network, information that’s being written into log files every minute of every day. Those log files that contain everything you need to know about how the systems you’re managing are running, and how they’re responding to the demands of their users.

   
Fluff

Dirtection Inc: episode 8

When boffins go bad. As one gruesome mystery ends, another begins.

   
SecurityNetwork

Secure Remote Access with SSL VPNs

What to look for when choosing an SSL VPN appliance for small business customers
Secure sockets layer (SSL) virtual private network (VPN) software has been around for a long time, but it is only relatively recently that is has been delivered on dedicated hardware appliances that specialise in hosting remote access, with many of those devices aimed squarely at the SMB market.

   
The Business

Partner Focus: D-Link

IT Expert spoke to Andrew Mulholland, marketing manager at D-LINK, the networking equipment vendor, and asked this channel-focused company how it is winning business from the big names, and how it is boosting its channel programmes.

   
Security

All-Access Pass

Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

2008 Download the Windows Server 2008 Administrative templates from http://www.microsoft.com/downloads/details.aspx?familyid=927fc7e3-853c-410a-acb5-9062c76142fa&displaylang=en&tm to get Group Policy setting information for the items under Administrative Templates.
In Windows Server 2008 and Windows Vista Administrative template files can be either ADMX (language-neutral) files, stored by default in the %Systemroot%\PolicyDefinitions folder or ADML (language-specific) files stored in a language-specific folder within that. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS