• E-Discovery: The Top 5 Things You Need to Know

    Any company can be at risk for being sued in a civil case and with today’s advanced use of computers and networks, rounding up relevant evidence to support the case will likely be necessary. The process of finding, preserving and presenting electronically...
    By  Ryan Tetzlaff May 6, 2010 

  • Free SPAM Filtering Using Regular Expressions – Part Two

    In Part 1, we discussed the need for building a regular expression to help us filter spam. I showed how to install and build a regular expression using Regulazy. In this article, we’ll cover testing the regular expression as well as how to add a...
    By Ryan Tetzlaff May 6, 2010 

  • Free OTFE versus TrueCrypt

    You are looking for a free encryption solution. The two choices that you've narrowed it down to are Free OTFE and TrueCrypt. Read on for a comparison to help you decide which one to use.
    By PatrickDickey May 5, 2010 

  • Free OTFE Review

    Can Free OTFE take on the big guys in encryption software? Read on to find out.
    By PatrickDickey May 5, 2010 

  • Green Computing via Cloud Computing

    Green Computing and Cloud Computing are each some of the cutting edge IT topics today. But how can they work together? This article examines how Cloud Computing can help your company in its goal for Green IT. And a Green IT initiative may be a reason...
    By Lee Clemmer May 5, 2010 

  • SoftActivity TS Monitor Review

    Remote Desktop services and Terminal Services provide administrators with the means to serve more users with less hardware. Remote Desktop sessions pose specific problems for monitoring, logging, and recording user activity. SoftActivity TS Monitor may...
    By Lee Clemmer May 5, 2010 

  • The Top 5 Security Settings That Should Be Audited

    Having a security policy and knowing how you want your systems secured are important, but to ensure this plan is in place, security settings should be audited. Here we focus on Windows system security settings but several of these items are relevant on...
    By Lee Clemmer May 5, 2010 

  • How to Block Ports to Restrict Online Access

    There may be something online you want to restrict access to. What do you do to block access to Internet applications and other things online? You can block ports to block access, and this article explains the details of how to block ports.
    By Lee Clemmer May 5, 2010 

showing 31-38 of 38    < Previous  |  page: 1 2 3 4  |  Next >