Network+files

Showing results 1 to 20 of 103

Audio Music Plan Player HD

Audio Music Plan Player HD - (Web Browser, FTP download, Bluetooth share, video/audio record, cloud storage)It is a powerful player...

1 day ago By Linloole

EMC gets 'Mavericks' with Isilon file system

The next version of OneFS, code named Mavericks, drastically cuts access times as well as adding data protection and recovery features to complement the Isilon storage OS

May 22, 2012

Audio Mix Player HD Lite

Audio Music Mix Player HD Lite is an excellent player for iPhone, iPad & iPod Touch which can mix audios playing with many audio properties'...

3 days ago By Linloole

Apple warns of Mac attack risk via image files

Apple today warned that opening or viewing image files could lead to remote code execution attacks against Mac OS X users.In an update that contains fixes for a total of 19 documented vulnerabilities, Apple said malicious hackers could rig PNG (Portable Network Graphics) and other images to take complete control of unpatched Mac systems.

August 5, 2009 by

Splunk: Tearing down IT walls and opening data to non-IT staffers

If you work in IT, there's probably nothing scarier than the thought of giving some mid-level manager access to the network logs and files. At the same time, who hasn't wanted to tell that same mid-level manager to "Look it up yourself" when he comes trotting down to the basement to get you to drop your world for his request?

July 20, 2009 by

D-Link DNS-343

For sharing media files and other documents on a home network, the DNS-343 would be fine. For business use, the awkward permissions system makes management more difficult than it needs to be.

June 29, 2009 by

Datto launches Box 2 Box P2P NAS device

Datto is hoping its new twist on network attached storage (NAS) can stand out amid an increasingly crowded field of competitors. The Box 2 Box device, due in March, is designed to create a peer-to-peer network with other Box 2 Box drives, letting you sync files between the two, even if they're not using the same home network.

January 23, 2009 by

Don't F:\ with our networks

A good friend of mine from a university in north-west England got an email through from their network administrators at the end of last week, basically saying,"...every time you plug in your flash drive, we see it offloading a whole load of malicious files to the computer you're working on, and therefore impacting our network...

December 15, 2008 by

T-Mobile 3G news heats up with HTC Dream and Samsung T919 rumors

The rumors that T-Mobile may launch a Google Android device in September seem more and more plausible now with the details that Engadget found in the latest FCC documents (PDF files). This FCC approval is for the rumored HTC Dream device. The operating system is not mentioned in the FCC documents so it is possible this device could be a Windows Mobile device too. Either way, it looks like this may be T-Mobile USA's first high end device that supports their 1700 MHz 3G network. The FCC documents reveal it has WiFi, Bluetooth, and T-Mobile 3G support.

August 18, 2008 by

IT Dojo: Control users' temporary Internet files and browser history

In this IT Dojo video, Bill Detwiler shows you a simple monitoring solution that uses Windows Server 2003 Group Policy.Before watching the video, you should realize this tip isn't right for every situation. This method uses Windows XP and Internet Explorer's local browsing history. To view the history files, you must physically visit each machine, remotely access the machine, or copy the files to a network location with a script. Furthermore, a sophisticated end-user could easily navigate to and delete the browser history. This monitoring technique is best suited when monitoring a small number of users, or better yet, a single, problem user.

July 7, 2008 by

10 top Vista tweaks, part 2

As I noted in the first installment of this series, some of my favorite productivity-enhancing techniques don’t involve custom code or registry edits. Instead, they involve learning how the basic building blocks of Windows work, and then rearranging those components to cut steps out of the tasks you perform most often. In today’s installment of this two-part series, I share some of my favorite tweaks for getting maximum mileage out of Windows Search. I also explain the inner workings of volume shadow copies and how you can make better use of these automatic backups with System Restore and the Previous Versions feature. I show how to get quick access to your local and network data files by combining shortcuts in a single, easy-to-reach location, and I explain why hybrid sleep should be the default on every desktop PC.

June 17, 2008 by

IT Dojo: Disable USB storage under OS X or Windows

Hollywood would have IT pros believe that the biggest threat to network security comes from international super hackers or high school kids trying to download games like global thermonuclear war. In reality, we face a more mundane threat--our end users, particularly those wielding USB storage devices.These pocket-sized devices can store a large amount of data. But even if your users aren't planning to cart off sensitive company files, USB storage devices (external hard drives, camera, memory stick, MP3 players, etc.) can be a headache in other ways. Employees may use your networks to download music to their USB-based MP3 players. New USB flash drives, such as SanDisk's U3 smart drives, can even run software directly from the device--a perfect tool for the end-user who wants to run unauthorized software on your network.If your concerned about USB storage devices on your network and don’t feel a written policy alone will protect your data, disabling the devices is your next step.In this IT Dojo video, Bill Detwiler, TechRepublic's Head Technology Editor, shows you how to disable USB storage devices on both Apple OS X and Windows. The United States National Security Agency (NSA) described the process in a March 2008 document from the agency's Information Assurance Directorate.Once you've watched this IT Dojo video, you can read the original TechRepublic article, download PDF version of this tip, and learn more about mitigating the risks poses by USB storage devices from our IT Dojo blog.

April 28, 2008 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories