• Google Yourself To Identify Security Holes 15 March 2005 Tony Bradley

    Google is very good at what it does. It automatically and systematically catalogues every document, image, web site or other data that is web accessible so that it can be quickly retrieved using the Google search engine. That includes potentially sensitive or confidential data that wasn't intended to be shared publicly. Google your own network or sites to identify possible security holes.

  • Still More Disk Quota "Gotchas" 15 March 2005 Mitch Tulloch

    Understanding the default quota notification time interval can help you interpret disk quota Event log messages.

  • Find It Fast With Desktop Search Tools 10 March 2005 Tony Bradley

    Hard drive space has gotten cheaper and the size of the drives has grown to enormous proportions. That is great for saving data, but makes it increasingly difficult to find what you're looking for when you need it. Enter the desktop search tools to help solve that problem.

  • More Disk Quota "Gotchas" 10 March 2005 Mitch Tulloch

    Users need to know how the Recycle Bin applies to quota-enabled volumes.

  • Can I convert existing PCs to thin clients? 10 March 2005 William Henderson

    Yes you can. There is no need to have to buy thin client devices, you can simply convert old (or new) PC's to thin clients. The advantage of doing this is that you will significantly reduce management of these PC's. There are several solutions to convert PC's to thin clients:

Show More