Network

How to spoof a MAC address (and why)

MAC spoofing is one of those odd tricks: it’s not very useful most of the time (and it can be extremely awkward in a well-managed environment) but sometimes it’s the only technique that will solve the problem.

   
NetworkClient

Macs in a Windows world

Helping your Apple users become full-time network citizens – without doing a lot of extra work

 

We IT professionals are seeing more and more Apple Mac computers on our comfortably Windows-based networks. In the past, it’s been easy to ignore them – after all, in many cases they belonged to just one or two users, none of whom tended to be an influential manager or executive. But today it’s just as likely to be the boss with a new Mac.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

  businesses Governance, risk and compliance aren't just for big business, and they're not just a burden of red tape. The better the governance, risk and compliance policies of a company, the better it does at business. This guidance from the IT Policy Compliance Group is specifically written for small business; take a look to see what you should be recommending strategically. http://www.itpolicycompliance.com/guidance/smb_special_interests/ read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS