Network+files

Showing results 1 to 20 of 104

DocKIT for SharePoint

DocKIT for SharePoint is a powerful application for migrating documents, NTFS permissions, data and their associated metadata properties...

April 22, 2015 By Vyapin Software Systems

JVM - Unlimited Compilations

The classic JVM programming language for iPad, iPhone and iPod touch. Programming language is a perfect tool for studying, complex...

April 12, 2015 By Dmitry Kovba

Apple warns of Mac attack risk via image files

Apple today warned that opening or viewing image files could lead to remote code execution attacks against Mac OS X users.In an update that contains fixes for a total of 19 documented vulnerabilities, Apple said malicious hackers could rig PNG (Portable Network Graphics) and other images to take complete control of unpatched Mac systems.

August 5, 2009 by

Splunk: Tearing down IT walls and opening data to non-IT staffers

If you work in IT, there's probably nothing scarier than the thought of giving some mid-level manager access to the network logs and files. At the same time, who hasn't wanted to tell that same mid-level manager to "Look it up yourself" when he comes trotting down to the basement to get you to drop your world for his request?

July 20, 2009 by

D-Link DNS-343

For sharing media files and other documents on a home network, the DNS-343 would be fine. For business use, the awkward permissions system makes management more difficult than it needs to be.

June 29, 2009 by

Datto launches Box 2 Box P2P NAS device

Datto is hoping its new twist on network attached storage (NAS) can stand out amid an increasingly crowded field of competitors. The Box 2 Box device, due in March, is designed to create a peer-to-peer network with other Box 2 Box drives, letting you sync files between the two, even if they're not using the same home network.

January 23, 2009 by

Don't F:\ with our networks

A good friend of mine from a university in north-west England got an email through from their network administrators at the end of last week, basically saying,"...every time you plug in your flash drive, we see it offloading a whole load of malicious files to the computer you're working on, and therefore impacting our network...

December 15, 2008 by

T-Mobile 3G news heats up with HTC Dream and Samsung T919 rumors

The rumors that T-Mobile may launch a Google Android device in September seem more and more plausible now with the details that Engadget found in the latest FCC documents (PDF files). This FCC approval is for the rumored HTC Dream device. The operating system is not mentioned in the FCC documents so it is possible this device could be a Windows Mobile device too. Either way, it looks like this may be T-Mobile USA's first high end device that supports their 1700 MHz 3G network. The FCC documents reveal it has WiFi, Bluetooth, and T-Mobile 3G support.

August 18, 2008 by

IT Dojo: Control users' temporary Internet files and browser history

In this IT Dojo video, Bill Detwiler shows you a simple monitoring solution that uses Windows Server 2003 Group Policy.Before watching the video, you should realize this tip isn't right for every situation. This method uses Windows XP and Internet Explorer's local browsing history. To view the history files, you must physically visit each machine, remotely access the machine, or copy the files to a network location with a script. Furthermore, a sophisticated end-user could easily navigate to and delete the browser history. This monitoring technique is best suited when monitoring a small number of users, or better yet, a single, problem user.

July 7, 2008 by

10 top Vista tweaks, part 2

As I noted in the first installment of this series, some of my favorite productivity-enhancing techniques don’t involve custom code or registry edits. Instead, they involve learning how the basic building blocks of Windows work, and then rearranging those components to cut steps out of the tasks you perform most often. In today’s installment of this two-part series, I share some of my favorite tweaks for getting maximum mileage out of Windows Search. I also explain the inner workings of volume shadow copies and how you can make better use of these automatic backups with System Restore and the Previous Versions feature. I show how to get quick access to your local and network data files by combining shortcuts in a single, easy-to-reach location, and I explain why hybrid sleep should be the default on every desktop PC.

June 17, 2008 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories