Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of trevormaingotccna

trevormaingotccna

Send trevormaingotccna an email

Latest from trevormaingotccna

  • Talking Shop: IT pros need policies to back use of administrative powers on the network
    Software

    Talking Shop: IT pros need policies to back use of administrative powers on the network

    Company policies on network usage and privacy are essential to the ability to wield administrative powers

    trevormaingotccna
    Published:  November 21, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:23 AM PDT Read More See more Software
  • Take a peek inside this administrator’s virtual toolbox
    Networking

    Take a peek inside this administrator’s virtual toolbox

    It's always great to find a new utility or application that makes your job easier. One admin has decided to open up his toolbox and show off his favorite tools. See his collection and then provide us with your list of favorites.

    trevormaingotccna
    Published:  April 17, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:24 AM PDT Read More See more Networking
  • Get IT Done: Recovering from a licensing dilemma
    Tech & Work

    Get IT Done: Recovering from a licensing dilemma

    How a company used the Track-It inventory product to assess software licensing in use.

    trevormaingotccna
    Published:  March 8, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:14 AM PDT Read More See more Tech & Work
  • Lock IT Down: Snort can expose what’s missed in security logs
    Security

    Lock IT Down: Snort can expose what’s missed in security logs

    Heres the process that one IT department went through to implement a Snort IDS.

    trevormaingotccna
    Published:  January 31, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:10 AM PDT Read More See more Security
  • TechRepublic Tutorial: Relaying spam gets this company blacklisted
    Security

    TechRepublic Tutorial: Relaying spam gets this company blacklisted

    Describes the painful process one TechRepublic member went through when he found out his Exchange 5.5 server was being used as a relay for spam

    trevormaingotccna
    Published:  January 10, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:34 AM PDT Read More See more Security

TechRepublic Premium

  • TechRepublic Premium

    End user data backup policy

    PURPOSE This policy from TechRepublic Premium provides guidelines for reliable and secure backups of end user data. It outlines the responsibilities of IT departments and employees to identify tasks and action items for each group. The policy can be customized to fit the needs of your organization. From the policy: IT STAFF RESPONSIBILITIES IT staff ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 5:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic communication policy

    This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 3:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Change order form

    PURPOSE Change is inevitable in any technological sector; it brings new features, functions and opportunities and helps businesses prosper through evolution. However, change can be detrimental to company operations if not executed properly through advanced notification of and approval by involved personnel. This change order form is designed to help you plan, implement and track ...

    Published:  March 15, 2023, 12:00 PM EDT Modified:  March 16, 2023, 11:00 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic data disposal policy

    PURPOSE The purpose of this policy is to provide guidelines for the appropriate disposal of information and the destruction of electronic media, which is defined as any storage device used to hold company information including, but not limited to, hard disks, magnetic tapes, compact discs, audio or videotapes, and removable storage devices such as USB ...

    Published:  March 15, 2023, 12:00 PM EDT Modified:  March 16, 2023, 1:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice