• Security

    PDF Security: obfuscated code, hackers and other threats

    Hackers are finding increasingly inventive ways of exploiting holes in Acrobat. The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.
    read more
  • Security

    Encrypting backup tapes

    Backup should be keeping your customer’s data secure as well as safe. Forget to encrypt data written to tapes and they run the risk of having to explain it to the auditor when a courier loses them.
    read more
SecurityTelecoms

Supporting mobile email on multiple handsets

Everyone wants mobile email - but not every mobile phone is suitable for business email. Use these tips and tools to secure Exchange servers and make them work with more than Windows Mobile handsets.

   
ServerSecurityBusiness Continuity

Backing up: save the data, save the day

All hardware fails – and backup is seen as boring and unreliable. That combination is the perfect opportunity for you to provide a service that provides business continuity and ongoing revenue. But how do you design the right backup system?

   
SecurityNetworkBusiness Continuity

Backup goes online and offsite

Remote backup services can offer the speed of disk, the security of tape, and the simplicity of a consumer service. But how do you ensure that remote backup services comply with your clients’ data policies and integrate with their existing IT set-ups?

   
SecurityBusiness Continuity

Specifying and supporting disk encryption

Encryption is at the top of the business agenda following a spate of embarrassing data breaches. How can you design and implement encryption systems to suit your customers’ needs without making life harder all round?

   
Security

Setting up false volumes in TrueCrypt

TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.

   
Security

Encrypting backup tapes

Backup should be keeping your customer’s data secure as well as safe. Forget to encrypt data written to tapes and they run the risk of having to explain it to the auditor when a courier loses them.

   
Security

Installing Utimaco SafeGuard Easy

Protect a range of different versions of Windows with whole disk encryption with Utimaco SafeGuard Easy.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

tools If you're trying to solve connectivity problems at a customer site, you can ask a colleague back at your office to use ping and traceroute to see how the network appears to the outside world; or you can use the tools at http://www.heise-online.co.uk/networks/nettools/ to do it yourself. There are tools for looking up Mac addresses and calculating subnet masks too. If you need a more detailed trace, http://w3dt.net/tools/pathping has a pathping tool.
read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

Key resources

Login to view Key Resources

RECENT COMMENTS