You've requested...

Share this with your colleagues:

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.

If a new window did not open, click here to view this asset.

Download this next:

How to configure Mac OS X Server

 


In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X.

 

These functions range from simple password protection and patch management through to full-disk encryption.

 

However, these are not the only security functions available. Indeed, OS X has a whole security and management infrastructure available for administrators called Managed Preferences, which can be managed most easily using OS X Server.

 

Capable of running on any Mac that can run OS X 10.8, it is priced at £13.99 for unlimited client connections, so easily affordable.

 

Apple also sells a customised Mac mini desktop computer with improved storage capabilities, which comes with OS X Server installed for small and medium-sized companies, as well as workgroups, which want a dedicated machine.

 

In this article, we’ll show you just a couple of the security features of OS X Server: global password policies and data loss prevention

 

Contents:

           

  •  Configuring Mac OS X Server for the first time
  • Types of user account
  • Setting up a global password policy
  • Creating a network user
  • Managing preferences
  • Binding clients
  • Next steps

 

 

Click on the button below to download this report

These are also closely related to: "Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers."

  • Protecting against modern password cracking

     

     

    Protecting against modern password cracking

     

    By Yiannis Chrysanthou  and Allan Tomlinson

     

    Attackers are increasingly turning to human psychology and the study of password selection patterns among user groups to develop sophisticated techniques that can quickly and effectively recover passwords.

     

    Passwords are commonly protected by applying a one-way cryptographic algorithm that produces a hash of set length given any password as input. However, cryptography can only protect something to the point where the only feasible attack on the encrypted secret is to try to guess it. When it comes to passwords, guessing can be easy.

     

    Passwords are insecure by nature because they are used to prevent humans from guessing a small secret created by humans themselves.

     

    This article shows that guessing passwords is as easy as creating them: most commonly used passwords are easy to guess and harder passwords are almost never used.

     


     

    Royal Holloway Information Security Thesis Series

     

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

     

     

    Today there is an urgent emphasis being placed by vendors on the need for antivirus to be installed on an increasing number of computing platforms used within organisations.

     

    The aim of this is to satisfy risk controls while also forming part of an organisation’s technical information security strategy.

     

    This market demand for antivirus has led to a number of security products which do little to actually protect the user, their data or the organisation.

     

    This paper outlines why, in our opinion, the antivirus based approach adopted by organisations to technical risk management, not only fails to provide the protection it is designed to, but it in fact increases an organisation’s susceptibility to attack.

     

    Overall our view is that signature based antivirus is tackling a problem we had 20 years ago and is not relevant to many of today’s threats for businesses, although we feel it still has a role in protecting the consumer. As a result, NCC Group’s opinion is that security budgets might be more effectively directed

     

    Click on the button below to download this report

     

     

    NCC Group is a global information assurance specialist.

Find more content like what you just read:

  • How to tackle trust and co-operation

    It is well-known that eCommerce transactions require a level of trust between participants in that trust, in this context, gives each partner confidence that the other will fulfil his part of a bargain in the future.

    Download

  • Smart cards: security risks

    This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks.

    Download

  • CW Buyer's Guide to Apple in the Enterprise

    This nine-page buyer's guide assesses the growth of Apple's computers and iPads in business and the enterprise.

    Download

  • Guide: Migrating from Windows XP to Windows 7

    This Computer Weekly Buyer's Guide gives you the facts and advice you need to migrate your organisation from Windows XP to Windows 7.

    Download

  • Applied Desktop Virtualisation

    This analyst report from Freeform Dynamics gives helpful advice for companies embarking on Desktop Virtualisation projects.

    Download

  • Best practices to keep your enterprise desktops secure

    Before you try to implement a comprehensive security policy, take a look at this exclusive handbook where you'll learn how to get ahead of threats to enterprise desktop security.

    Download

  • Gartner: Time to rethink backup procedures

    IT leaders and storage managers can realise cost savings and improve their use of backup infrastructure by rethinking their back-up procedures, says Gartner analyst Dave Russell.

    Download

  • The Open Group Service Integration Maturity Model (OSIMM) Version 2

    Download the Open Group Service Integration Maturity Model (OSIMM).

    Download

  • CW Buyer's Guide: Server Virtualisation

    This Computer Weekly buyer’s guide to server virtualisation looks at the potential barriers to successful virtualisation and how they can be overcome.

    Download

  • Migration strategies optimize business continuity plan

    This report examines the ability of businesses to maintain service even in the face of threats and challenges and explores why organizations turn to migration strategies to solve business productivity challenges.

    Download

  • BMC Mainframe Survey 2011

    Big businesses are planning to grow their mainframe computer capacity despite the downturn  this survey of 1,347 large mainframe users worldwide by BMC Software reveals.

    Download

  • The mobile print enterprise

    Quocirca looks at the case for mobile printing in the enterprise and suggests best practices for a mobile print strategy.

    Download

  • The Banking Industry Architecture Network and TOGAF

    This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.

    Download

  • Report: Assessing the modern worker's primary work device

    This report takes a closer look at the experiences of end users and IT managers with their primary work devices. Uncover expert tips for delivering better device support, security, and mobility to the modern worker.

    Download

  • Best practices for a successful migration

    This white paper details a complete migration strategy that ensures your success when embarking on a migration initiative. Download now to discover top tips for successfully migrating your servers.

    Download

  • Introducing a series of secure-by-design thin clients

    This brochure takes a look at the Dell Wyse ThinOS thin client desktops, software and hardware platforms, and reveals why ThinOS product offerings feature one of the most secure operating systems for cloud and virtual computing environments.

    Download

  • A series of secure-by-design thin clients

    This whitepaper takes a look at the Dell Wyse ThinOS thin client desktops, software and hardware platforms.

    Download

  • Thin client 101: Uncover your options

    This white paper takes a look at a series of desktop virtualization hardware solutions with dual and quad core options to suit your unique budget, application, and performance needs

    Download

  • Simplify server migrations with near-zero downtimes

    In this data sheet, learn about a platform combining replication technology with expert services to simplify migrations, eliminate risks, and virtually eliminate downtime. Read on and discover how this platform works, and learn how it supports migration between physical, virtual, and cloud servers.

    Download

  • County council migrates infrastructure with little downtime

    This case study reveals how Leicestershire County Council turned to a migration approach to help complete their infrastructure migration, from planning to completion in less than three months with almost no downtime. Find out how they were able to do this without the need to shut down vital applications.

    Download

  • Migrate cloud, physical, or virtual workloads with ease

    This data sheet introduces a solution allowing you to migrate physical, virtual, and cloud-based Windows server workloads with real-time replication from a single, intuitive user console. You'll discover how you can protect your productivity with technology that eliminates user and application downtime during migrations.

    Download

  • Life after WS 2003: Top 3 ways to minimize IT grief

    This white paper offers the top 3 ways to deal with end of support for Windows Server 2003. Access now to learn what you can do minimize your IT grief.

    Download

  • Streamline cloud migrations with little downtime

    Explore a cloud migration platform enabling you to perform and manage migrations from any Windows server to the cloud and deliver successful, simplified, near-zero downtime migrations.

    Download