Access Control

  • Biometrics in the Small Business Environment: Part 2

    The word "biometrics" conjures up images of cyborgs, science-fiction movies, and futuristic realities that only exist in the realm of Hollywood. However, this technology is real, fully functional, and quite possibly coming to an office near you...
    By Finn Orfano February 4, 2011 

  • Biometrics in the Small Business Environment: Part 1

    The word "biometrics" conjures up images of cyborgs, science-fiction movies, and futuristic realities that only exist in the realm of Hollywood. However, this technology is real, fully functional, and quite possibly coming to an office near you...
    By Finn Orfano February 4, 2011 

  • WinPatrol 2009 Review - Part 1

    We all know that anti-virus, anti-spyware or anti-malware is not enough to prevent infection and critical changes on our system. In this review, I’ll write about WinPatrol, a malware monitor program that will not put your system into its knees and...
    By Donna Buenaventura February 4, 2011 


  • NTRconnect Review - Remote Access Software Review

    NTRconnect makes it easy to remotely access and control your home or office computer. This review will examine the pros and cons of a less well-known remote access software: NTRconnect.
    By Bill Bunter February 4, 2011 

  • How To Enforce a Read-Only Policy on USB Drives

    The increased storage capacity of USB drives means that it is now easier than ever for employees to walk away with a large amount of sensitive company data. This article explains how you can prevent employees writing to USB drives in order to protect...
    By Bill Bunter February 4, 2011 

  • Managing Your Motorola Wireless Modem Password

    The ability to obtain the Internet from anywhere in the world is one of the reasons that Wi-Fi is so popular. There are several different devices that support wireless connections and one is that of a wireless modem. In this article, learn how to manage...
    By Regina Woodard January 31, 2011 


  • Understanding Passwords for Microsoft Outlook

    One password is usually enough, but many organizations combat security breaches by issuing their users with a password for their computers and another for email.
    By Christian Cawley January 17, 2011 

  • Secure Remote Access Software and Hardware for Small Businesses

    Once considered a privilege, working from home is now a mainstream trend. The United States Government is passing legislation requiring agencies to adopt policies for it, corporations are jumping aboard and small businesses can't be left behind. Find...
    By Finn Orfano January 10, 2011 

  • Thin Clients in the Small Business Environment: Part 1

    The use of thin clients (for server-based computing) is the way of the future: the not-so-distant future. As technology in this field gets better, costs will slowly fall, making it easier for small businesses to adopt the server-based computing...
    By Finn Orfano January 4, 2011 

  • Software for Secure Remote Access Without Using a VPN

    Creating and maintaining a VPN can be both costly and complex. This article explains how you can empower your employees with secure remote access, without a VPN.
    By Bill Bunter December 27, 2010 
showing 31-40 of 84    < Previous  |  page: 2 3 4 5 6 ...  |  Next >