• Network

    Secure Remote Access with SSL VPNs

    What to look for when choosing an SSL VPN appliance for small business customersSecure sockets layer (SSL) virtual private network (VPN) software has been around for a long time, but it is only relatively recently that is has been delivered on dedicated hardware appliances that specialise in hosting remote access, with many of those devices aimed squarely at the SMB market.
    read more
  • Network

    Dealing with spam in Exchange 2007

    Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay.
    read more
Network

How to spoof a MAC address (and why)

MAC spoofing is one of those odd tricks: it’s not very useful most of the time (and it can be extremely awkward in a well-managed environment) but sometimes it’s the only technique that will solve the problem.

   
NetworkClient

Macs in a Windows world

Helping your Apple users become full-time network citizens – without doing a lot of extra work

 

We IT professionals are seeing more and more Apple Mac computers on our comfortably Windows-based networks. In the past, it’s been easy to ignore them – after all, in many cases they belonged to just one or two users, none of whom tended to be an influential manager or executive. But today it’s just as likely to be the boss with a new Mac.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

None of your customers are complaining about viruses, their network being slow or strange things happening on their new PDAs and laptops; is it time to take the afternoon off? Maybe, but before you do, make sure things will look as good next week by making sure you know what you’re defending against. Microsoft has a set of resources at http://technet.microsoft.com/en-us/security/cc514043.aspx covering the current threat landscape and showing ways to help protect your clients and their customers, including analyses of data collected from millions of users, strategies, mitigations and countermeasures. read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS