Month: September 2005
A lot of companies with higher security requirements are concerned about the possibility of users copying confidential data on to their USB memory sticks and taking it off site. Luckily.
Here are some general guidelines to monitor Exchange Server 2003. Since each environment is different, you should consider these guidelines as a good starting point, monitor your Exchange Server 2003,.
In earlier versions of Windows, TCP/IP was a separate optional component that could be removed or added like any other protocol. In Windows XP/2003, TCP/IP is a core component of.
According to an online survey of 1,200 corporate end users in the US, Germany and Japan, most corporate users are rather complacent about the risk of viruses, phishing, spam and.
MacScan (currently in beta) is the world's first remote administration software detection title for the Macintosh. Using advanced detection methods MacScan can detect, isolate and remove the program which could.
Have you looked at the new iPod from Apple? With 2GB (500 songs) models for $199 and 4GB (1,000 songs) models for $249, the new iPod nano is pencil-thin. Check.
Apple Computer Inc. chief executive Steve Jobs introduced a long-anticipated music-playing cell phone on Wednesday and surprised the faithful with a new pencil-thin iPod. The phone, called the ROKR and.
