MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
March 16, 2004
Robert P. Lipschutz
Web Content Filtering: Don't Go There These seven tools can help businesses stop their employees from visiting inappropriate sites. mark for My Articles similar articles
T.H.E. Journal
November 2000
Secure Your School's Computers Fortres 101 version 4.1 is a security solution for PCs that are at risk for tampering. This latest version includes an option to block all hard disk browsing, and also offers one-click online software updates... mark for My Articles similar articles
T.H.E. Journal
February 2001
Focus on Administrative Tools With students registering for classes, various departments submitting budget reports, and the need for secure, quick ways to establish student computer labs, maintaining order in administrative offices can be a challenge. We preview some of the new software titles that aid in administrative organization... mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
PC Magazine
March 2, 2004
Davis D. Janowski
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. mark for My Articles similar articles
PC Magazine
December 22, 2004
Pike & Ragaza
Make the Most of Your New PC You're the proud owner of a new computer. Now what? Whether you're a novice or an old hand, we have 41 tips and tricks to help you make the most of your computing experience. mark for My Articles similar articles
Financial Advisor
March 2012
Joel P. Bruckenstein
Secure Your Content SafeSync for Business provides a way to securely share and access your firm's data online. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
PC World
May 2001
Stan Miastkowski
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... mark for My Articles similar articles
T.H.E. Journal
August 2004
Ozkan & Gunay
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. mark for My Articles similar articles
T.H.E. Journal
August 2004
Clean Slate v3.0 The Fortres Grand Corp. application protects individual computers from any changes to their standard configuration. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
PC World
March 1, 2000
Matt Lake
Windows 2000: Tips for New Arrivals What is it with Windows 2000? At first glance, it looks like Windows 98 or 95--same old Start menu, Recycle Bin, and Task bar. But as you spend more time with it, little differences in looks and functions crop up. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
PC Magazine
June 13, 2011
Eric Griffith
How To Hide Your Data Want to keep your private files under wraps without making it obvious they're important? Rather than encryption, try hiding them, so prying eyes don't even know they exist. mark for My Articles similar articles
T.H.E. Journal
February 2005
Product Watch - NetOp Desktop Firewall NetOp Desktop Firewall enables network administrators to centrally assign administrative application privileges to users based on their job responsibilities. mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles
T.H.E. Journal
December 2002
Judith B. Rajala
Web Site Filtering Web site filtering is the selection of Internet or Web site content deemed acceptable for viewing and/or prohibiting the viewing of objectionable Web content. Advice and practicable strategies for filtering in schools mark for My Articles similar articles
RootPrompt.org
April 10, 2000
Lance Spitzner
Auditing Your Firewall How to Audit Your Firewall Setup. mark for My Articles similar articles
Linux Journal
March 2000
Jeff Regan
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. mark for My Articles similar articles
PC Magazine
April 18, 2007
Russell Morgan
Essential Security: Firewalls Businesses, like homes, must be locked up tight to keep out crooks. mark for My Articles similar articles
Job Journal
July 23, 2006
Career Snapshot: Network Administrators As business becomes more dependent upon technology, companies are increasingly looking for workers knowledgeable about the function and administration of system networks. mark for My Articles similar articles