Some of the most popular searches at TechRepublic continue to be those looking for our checklists and quick-tip downloads. I've gathered some of the most popular resources in the download directory focused on common administrative and support tasks.
If you have suggestions for new or updated checklists for specific tasks, put them in the comments area of this post.
Boring as it may be, but cleaning is an essential part of any regular system maintenance schedule. You can stretch equipment life, reduce repairs and service calls, and keep users happier by periodically running through the steps on this list.
When TechRepublic member jdclyde landed a job as the first in-house tech for a company that has always outsourced its IT needs, he had no documentation or institutional knowledge to fall back on. Here's the list that's helping him pull everything together.
Whether you're helping a client tackle a move or relocating to a new building, you'll need to implement a system to help you get organized and avoid potential disasters. This checklist, based on suggestions submitted by TechRepublic members, covers questions, issues, and advice related to office relocations.
IT consultant Erik Eckel has put together this checklist to help you select the laptop components that will meet staff needs throughout the system's lifecycle. Once you've selected the best option for each component (there are 12 in this list, ranging from display and OS to integrated mobile broadband, battery, and optical drive), you can generate a spec sheet for quick reference at purchase time.
Everyone from small businesses to enterprise organizations must battle the associated spyware risks that include key trackers, Web page redirectors, persistent pop-up advertisements, inoperable network connections, unwanted tracking applications, and other nefarious programs that slow and even render systems and programs nonoperational. While not every infected system can be saved, following the steps in this TechRepublic checklist can go a long way toward eliminating common infections and repairing the collateral damage.
Solid planning and design can help reduce the potential for security breaches. Here are some security design missteps to watch out for.
Greg Shultz introduces a variety of creative ways to put that drive to good use.
Using a security procedures checklist is your first step toward securing a resource — a means of aiding your memory before you apply your critical thinking skills and imagination to the task of improving security for each item. Chad Perrin shares his list of far-too-common security failures on Web sites and Web servers.
Selena has been at TechRepublic since 2002. She is currently a Senior Editor with a background in technical writing, editing, and research. She edits Data Center, Linux and Open Source, Apple in the Enterprise, The Enterprise Cloud, Web Designer, and IT Security blogs.