Network+files

Showing results 1 to 20 of 105

June 21, 2015 By DataRecoup Recovery Services

Data Recovery for Windows

Data Recovery Software is read-only and non-destructive utility to salvage lost, deleted files and folders from hard disk drive partitions...

June 14, 2015 By Lepide Software

LepideAuditor for File Server

LepideAuditor for File Server helps you keep your network file servers and NetApp filers safe and secure by monitoring activities performed...

August 5, 2009 by

Apple warns of Mac attack risk via image files

Apple today warned that opening or viewing image files could lead to remote code execution attacks against Mac OS X users.In an update that contains fixes for a total of 19 documented vulnerabilities, Apple said malicious hackers could rig PNG (Portable Network Graphics) and other images to take complete control of unpatched Mac systems.

July 20, 2009 by

Splunk: Tearing down IT walls and opening data to non-IT staffers

If you work in IT, there's probably nothing scarier than the thought of giving some mid-level manager access to the network logs and files. At the same time, who hasn't wanted to tell that same mid-level manager to "Look it up yourself" when he comes trotting down to the basement to get you to drop your world for his request?

June 29, 2009 by

D-Link DNS-343

For sharing media files and other documents on a home network, the DNS-343 would be fine. For business use, the awkward permissions system makes management more difficult than it needs to be.

January 23, 2009 by

Datto launches Box 2 Box P2P NAS device

Datto is hoping its new twist on network attached storage (NAS) can stand out amid an increasingly crowded field of competitors. The Box 2 Box device, due in March, is designed to create a peer-to-peer network with other Box 2 Box drives, letting you sync files between the two, even if they're not using the same home network.

December 15, 2008 by

Don't F:\ with our networks

A good friend of mine from a university in north-west England got an email through from their network administrators at the end of last week, basically saying,"...every time you plug in your flash drive, we see it offloading a whole load of malicious files to the computer you're working on, and therefore impacting our network...

August 18, 2008 by

T-Mobile 3G news heats up with HTC Dream and Samsung T919 rumors

The rumors that T-Mobile may launch a Google Android device in September seem more and more plausible now with the details that Engadget found in the latest FCC documents (PDF files). This FCC approval is for the rumored HTC Dream device. The operating system is not mentioned in the FCC documents so it is possible this device could be a Windows Mobile device too. Either way, it looks like this may be T-Mobile USA's first high end device that supports their 1700 MHz 3G network. The FCC documents reveal it has WiFi, Bluetooth, and T-Mobile 3G support.

July 7, 2008 by

IT Dojo: Control users' temporary Internet files and browser history

In this IT Dojo video, Bill Detwiler shows you a simple monitoring solution that uses Windows Server 2003 Group Policy.Before watching the video, you should realize this tip isn't right for every situation. This method uses Windows XP and Internet Explorer's local browsing history. To view the history files, you must physically visit each machine, remotely access the machine, or copy the files to a network location with a script. Furthermore, a sophisticated end-user could easily navigate to and delete the browser history. This monitoring technique is best suited when monitoring a small number of users, or better yet, a single, problem user.

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All

Most Popular