MAC spoofing is one of those odd tricks: it’s not very useful most of the time (and it can be extremely awkward in a well-managed environment) but sometimes it’s the only technique that will solve the problem.
Helping your Apple users become full-time network citizens – without doing a lot of extra work
We IT professionals are seeing more and more Apple Mac computers on our comfortably Windows-based networks. In the past, it’s been easy to ignore them – after all, in many cases they belonged to just one or two users, none of whom tended to be an influential manager or executive. But today it’s just as likely to be the boss with a new Mac.
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010
RECENT COMMENTS
I just followed the instructions provided in this blog and found it quite helpful. Well, I managed t...
I came across your article and firstly want to thank you for an informative piece of writing. I am i...
To echo the other comments here this is an excellent article and much easier than anything I have se...
Nice tutorial but its better to show each and every thing with screen shots
I recomend Sharepoint doc*ment management software http://www.enovapoint.com/jungledoc/sharepoint-do...