Topics
Content Types
About 62 results
-
Fact sheet: Apple Touch ID
Erik Eckel lists the facts surrounding Apple Touch ID.
-
Protect data easily with FileVault 2 disk encryption
Erik Eckel describes the ease of enabling disk encryption within OS X.
-
Download TechRepublic's Server Update and Patch Management Policy
Consultants can better prepare clients for required server patch and upgrade maintenance operations by using this TechRepublic policy.
-
Fortinet firewalls, a potent UTM option for consultants
Fortinet ranked at the top of Gartner's leaders/visionaries quadrant in a recent Magic Quadrant report. Learn more reasons why Fortinet firewalls are worth a look.
-
Use wizards to make quick work of client Small Business Server issues
If you think Microsoft's integrated wizards in Small Business Server are merely dumb-downed macros, you might be overlooking how much they can do.
-
Deployment documentation best practices for consultants
Don't deploy a new firewall, VPN, server, SAN, wireless network, or other systems without properly documenting the installation.
-
Set account password policies in Mac OS X Lion Server
Erik Eckel shows you the steps for setting password polices in Lion Server through both Workgroup Manager and the Server App.
-
Sorting out account permissions in Snow Leopard Server
Erik Eckel explains some of the basic rules for configuring account permissions on a Snow Leopard Server network.
-
Set sound password policies in Mac OS X Server
Erik Eckel tells you how to use Mac OS X Server's Workgroup Manager and the Server Admin console to make sure you are setting strong password polices.
-
Three common IT consultant security blunders
IT consultants cannot afford to make a mistake when it comes to security. Erik Eckel offers a refresher on basic security fundamentals.
-
Manage client server OS patching with these best practices
Follow these best practices to ensure the server OS patch process runs smoothly and doesn't introduce new issues and possibly sour the client relationship.
-
Five tips for removing viruses and spyware from client machines
IT consultants must regularly remove stubborn, regenerative, and corrupting spyware and viruses from client machines. These pointers will help you return systems to stable operatio...
-
Troubleshooting Mac network issues
Consultant Erik Eckel offers guidance on how to approach Mac networking issues along with some specific troubleshooting tips to try first.
-
Improve malware removal routines with the help of this checklist
Eliminating malware requires a systematic process with no missed steps. This checklist will make it easier to do an effective, thorough job.
-
Why clients require standalone antispyware licenses
Erik Eckel believes that consultants have a responsibility to educate their clients about why it's important to license, install, and maintain active antispyware programs on their ...
-
Fix slow workstations with this tune-up checklist
Optimizing a slow-performing system requires a number of diagnostic and repair steps, often with interruptions along the way. This basic checklist will help you cover all the bases...
-
Host lunch and learns to bolster client relationships
Erik Eckel explains why offering to lead lunch and learn presentations for your best IT consulting clients is a win-win proposition.
-
Leverage checklists to improve efficiency and client satisfaction
Checklists can help IT consultants bring order to the chaotic and hectic environment in which they frequently operate. Here are tips on implementing checklists.
-
Review: Wiresoft Firegate 100 Series firewall
Small businesses that require a unified threat management solution will find serious capacity packed inside the Firegate 100 Series firewall.
-
Review: AVG Anti-Virus Professional 9.0
AVG Anti-Virus Professional 9.0 builds upon AVG's already proven antivirus, antispyware and antirootkit technology.