Similar Articles |
|
PC Magazine March 16, 2004 Robert P. Lipschutz |
Web Content Filtering: Don't Go There These seven tools can help businesses stop their employees from visiting inappropriate sites. |
T.H.E. Journal November 2000 |
Secure Your School's Computers Fortres 101 version 4.1 is a security solution for PCs that are at risk for tampering. This latest version includes an option to block all hard disk browsing, and also offers one-click online software updates... |
T.H.E. Journal February 2001 |
Focus on Administrative Tools With students registering for classes, various departments submitting budget reports, and the need for secure, quick ways to establish student computer labs, maintaining order in administrative offices can be a challenge. We preview some of the new software titles that aid in administrative organization... |
PC Magazine June 22, 2004 Robert P. Lipschutz |
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. |
PC Magazine March 2, 2004 Davis D. Janowski |
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. |
PC Magazine December 22, 2004 Pike & Ragaza |
Make the Most of Your New PC You're the proud owner of a new computer. Now what? Whether you're a novice or an old hand, we have 41 tips and tricks to help you make the most of your computing experience. |
Financial Advisor March 2012 Joel P. Bruckenstein |
Secure Your Content SafeSync for Business provides a way to securely share and access your firm's data online. |
PC World April 2004 Scott Spanbauer |
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. |
PC World May 2001 Stan Miastkowski |
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... |
T.H.E. Journal August 2004 Ozkan & Gunay |
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. |
T.H.E. Journal August 2004 |
Clean Slate v3.0 The Fortres Grand Corp. application protects individual computers from any changes to their standard configuration. |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
PC World March 1, 2000 Matt Lake |
Windows 2000: Tips for New Arrivals What is it with Windows 2000? At first glance, it looks like Windows 98 or 95--same old Start menu, Recycle Bin, and Task bar. But as you spend more time with it, little differences in looks and functions crop up. |
Information Today February 2001 Marshall Breeding |
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... |
PC Magazine June 13, 2011 Eric Griffith |
How To Hide Your Data Want to keep your private files under wraps without making it obvious they're important? Rather than encryption, try hiding them, so prying eyes don't even know they exist. |
T.H.E. Journal February 2005 |
Product Watch - NetOp Desktop Firewall NetOp Desktop Firewall enables network administrators to centrally assign administrative application privileges to users based on their job responsibilities. |
PC World July 9, 2002 Lincoln Spector |
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. |
T.H.E. Journal December 2002 Judith B. Rajala |
Web Site Filtering Web site filtering is the selection of Internet or Web site content deemed acceptable for viewing and/or prohibiting the viewing of objectionable Web content. Advice and practicable strategies for filtering in schools |
RootPrompt.org April 10, 2000 Lance Spitzner |
Auditing Your Firewall How to Audit Your Firewall Setup. |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
PC Magazine April 18, 2007 Russell Morgan |
Essential Security: Firewalls Businesses, like homes, must be locked up tight to keep out crooks. |
Job Journal July 23, 2006 |
Career Snapshot: Network Administrators As business becomes more dependent upon technology, companies are increasingly looking for workers knowledgeable about the function and administration of system networks. |