Messaging
OS X Server 10.4 and beyond is equipped with embedded iChat Server. Developed on the jabber protocol, Mac OS X Server has the ability to farm jabber services to any jabber-able client; this includes iChat, Adium X on Mac OS X, and Trillian for Windows. Your employees are able to communicate with each other on the network, or with remote access, to exchange files, text, and audiovisual chat. It's all able to be administrated from Mac OS X's Open Directory. Enabling the service on the X Admin application is a simple process. Sysadmins are able to encrypt by making a self-signed certificate or by simply going with a vendor such as GoDaddy or Verisign - to encrypt all IM communications. The best thing is that there aren't any client access license limitations. You may even already use an Active Directory system; if so, no problem. Just merge OS X to Active Directory, and use the AD credentials to IM with the iChat.
Content
A profile or group is able to be managed locally or on the OS X Server. This lets sysadmins block users from particular websites, even allowing the creation of an all-inclusive list of sites which employees are allowed to visit. If you already have Web Filtering by Postini in use, consider using it in tandem with the OS X policy to restrict undesirable content away from your employees' web browsers.
Security
You really should be proactive about the security of your small business, and that's exactly why OS X is complete with secure encryption of nearly all aspects of the user's experience. Three top ways to maintain safe and secure data include:
1) File Vault can encrypt the whole profile or folder into a disk image which is kept on the local system, protected by password.
2) Applemail and Entourage are both able to be modified for certificates which are self-signed or commercial-verified. Thawte provides free certificates by email, and other companies supply the same at low cost. This can allow workers to transmit encrypted email amongst each other as clients.
3) Keychain assistant, built into OS X, provides easy ways to store credentials in a high-security encrypted area, automatically.
The keychain created by OS X is pre-set to unlock after logging in, and lock again upon logging out. This allows users to keep passwords and other credentials secure. Apple's password assistant shows you the encryption strength of a password live as it is being selected. The user can develop the benefit of Keychain assistant by creating secure keychain notes manually, even adding several keychains devoted to storing certain kinds of passwords, software serial numbers, personal info, etc.
Archives
As you probably have an incredible number of emails or locally-stored files, it may be difficult for the newbie user to search for a particular file or email. Fortunately, OS X 10.4 comes with Spotlight, which PC-users can really only be prepared for using with prerequisite knowledge of Google Desktop or Windows Vista search tools. Spotlight is able to locate files by name, content, or file type. It's even able to do a boolean query, like 'apple .xls' to find Excel spreadsheets with 'apple' in the name. Spotlight can also be extended by the use of valuable plugins.
Saturday, February 9, 2008
Blog Archive
Categories
- 4 Things You Should Know About Hard Drive Crashes (1)
- A Complete Data Recovery Solution (1)
- back up for laptops (1)
- Backing Up Data on CD's and DVD's (1)
- Backing Up Your Data Frequently Can Save You Money (1)
- Bare Metal Server (1)
- Can I Recover Deleted Files? How to Retrieve Deleted Files (1)
- Consumers and Communications (1)
- Data Recovery (3)
- Data Recovery Freeware - Take Advantage of the Freeware Available to You (1)
- Data Recovery Help (1)
- Data Recovery Situations (1)
- Data Recovery Software (1)
- DBX File Corruption (1)
- Defragmenting Your Hard Drives (1)
- Diagnostic Tips For Hard Drive Data Recovery (1)
- Do You Back Up Your Website (1)
- Do You Know Where Your Data Is (1)
- Ease the Headache of Saving Files (1)
- File Recovery - 3 Ways I Prevent Hard Drive Crashes (1)
- Formatted Data Recovery (1)
- Fully Utilize the Full Benefit of a SAN With Automatic Defragmentation (1)
- Hard Disk Data Recovery - How to Restore Deleted Data (1)
- How to avoid data loss and data recovery (1)
- How to Backup Your Computer Hard Drive (1)
- How to Create an Offsite Data Backup and Restore Plan (1)
- How to Recover Lost Data From a Flash Drive (1)
- How to Recover Photos Deleted From SD Disk Or XD Card (1)
- How to Retrieve Deleted Data From Your Computer (1)
- How to Retrieve Deleted Files From Your Computer (1)
- Identity Theft by Selling a Used Computer (1)
- iPhone Data Recovery Advice (1)
- IT Disaster Recovery - A Finance Perspective (1)
- Laptop Backup Software Program (1)
- need laptop back up software (1)
- Online Backup and the Consequences of Data Loss For Business (1)
- Outlook Express Recovery (1)
- password finders (1)
- PDF Password Finder Tips (1)
- RAID Arrays (1)
- RAID Data Recovery (1)
- Recover Deleted Files - Vista (1)
- Recover Hard Disk Files - How to Recover Deleted Files (1)
- remove a password (1)
- Remove a Password From Your PDF Files (1)
- Restore Deleted Data (1)
- Restore Deleted Files - Vista (1)
- Retrieving Deleted Files From Your Computer (1)
- SQL Data Recovery (1)
- SQL Server Snapshot (1)
- SQL Servers (1)
- The Role of This Software Tool (1)
- Understanding Data Loss and Data Recovery (1)
- website back ups (1)
- What to Do When Everything is Lost (1)
- Why to Buy Online Data Back Up Services (1)
- Will Data Recovery Work (1)