In these times of economic uncertainty, it is vital for your customers to understand how their business is performing. Are they losing customers? If so which ones, and are they gaining others? What do the new customers buy?
TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.
Databases store the most valuable information for the businesses you work with and they’re the trickiest systems to back up; some of the largest technology companies in the world have got database backup badly wrong. Losing that data can have serious consequences for the business, to say nothing of the embarrassment quotient for you. Here we explain the essentials of backing up and introduce some specialist tools.
Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay. Configure the anti-spam tools in Exchange 2007 with our step-by-step guide.
802.11n has been ratified. And best of all, the release contains no incompatibility with the draft versions. Many laptops and other network devices have implemented 802.11n draft for the past couple of years. So should you upgrade any remaining 802.11g or 802.11b devices in customer networks?
The iPhone continues to increase in popularity and it’s been more suitable for business since the launch of the 3GS, which added hardware encryption. However, configuring and deploying devices remains an issue. Apple’s iPhone management tools are primitive at best, and awkward for any business trying to manage a fleet of devices.
This is one of the easiest systems to add redundancy to. Active Directory contains all the information about your customer’s users and machines. If this fails, and you have no backup, they have a problem.
In which a bit of fluff yields up its terrible secret!
Ethel works in Admin. I generally see her at 11 o’clock in the morning and half-past three in the afternoon. We meet by the drinks machine in the foyer of Building C. The machine dispenses a tasteless brown liquid
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010