You've requested...

Share this with your colleagues:

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.

If a new window did not open, click here to view this asset.

Download this next:

How to configure Mac OS X Server

 


In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X.

 

These functions range from simple password protection and patch management through to full-disk encryption.

 

However, these are not the only security functions available. Indeed, OS X has a whole security and management infrastructure available for administrators called Managed Preferences, which can be managed most easily using OS X Server.

 

Capable of running on any Mac that can run OS X 10.8, it is priced at £13.99 for unlimited client connections, so easily affordable.

 

Apple also sells a customised Mac mini desktop computer with improved storage capabilities, which comes with OS X Server installed for small and medium-sized companies, as well as workgroups, which want a dedicated machine.

 

In this article, we’ll show you just a couple of the security features of OS X Server: global password policies and data loss prevention

 

Contents:

           

  •  Configuring Mac OS X Server for the first time
  • Types of user account
  • Setting up a global password policy
  • Creating a network user
  • Managing preferences
  • Binding clients
  • Next steps

 

 

Click on the button below to download this report

These are also closely related to: "Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers."

  • Protecting against modern password cracking

     

     

    Protecting against modern password cracking

     

    By Yiannis Chrysanthou  and Allan Tomlinson

     

    Attackers are increasingly turning to human psychology and the study of password selection patterns among user groups to develop sophisticated techniques that can quickly and effectively recover passwords.

     

    Passwords are commonly protected by applying a one-way cryptographic algorithm that produces a hash of set length given any password as input. However, cryptography can only protect something to the point where the only feasible attack on the encrypted secret is to try to guess it. When it comes to passwords, guessing can be easy.

     

    Passwords are insecure by nature because they are used to prevent humans from guessing a small secret created by humans themselves.

     

    This article shows that guessing passwords is as easy as creating them: most commonly used passwords are easy to guess and harder passwords are almost never used.

     


     

    Royal Holloway Information Security Thesis Series

     

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

     

     

    Today there is an urgent emphasis being placed by vendors on the need for antivirus to be installed on an increasing number of computing platforms used within organisations.

     

    The aim of this is to satisfy risk controls while also forming part of an organisation’s technical information security strategy.

     

    This market demand for antivirus has led to a number of security products which do little to actually protect the user, their data or the organisation.

     

    This paper outlines why, in our opinion, the antivirus based approach adopted by organisations to technical risk management, not only fails to provide the protection it is designed to, but it in fact increases an organisation’s susceptibility to attack.

     

    Overall our view is that signature based antivirus is tackling a problem we had 20 years ago and is not relevant to many of today’s threats for businesses, although we feel it still has a role in protecting the consumer. As a result, NCC Group’s opinion is that security budgets might be more effectively directed

     

    Click on the button below to download this report

     

     

    NCC Group is a global information assurance specialist.

Find more content like what you just read:

  • Smart cards: security risks

    This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks.

    Download

  • CW Buyer's Guide to Apple in the Enterprise

    This nine-page buyer's guide assesses the growth of Apple's computers and iPads in business and the enterprise.

    Download

  • Guide: Migrating from Windows XP to Windows 7

    This Computer Weekly Buyer's Guide gives you the facts and advice you need to migrate your organisation from Windows XP to Windows 7.

    Download

  • Gartner: Time to rethink backup procedures

    IT leaders and storage managers can realise cost savings and improve their use of backup infrastructure by rethinking their back-up procedures, says Gartner analyst Dave Russell.

    Download

  • Easy OS migration: The facts about Windows 10

    Migrating to Windows 10 may seem like a daunting task, especially since there are organizations out there that haven't finished the move from Windows XP to Windows 7. But in this e-guide, we have assembled some useful advice about best practices, planning, and helpful tools to make your clients' OS migrations as simple and pain-free as possible.

    Download

  • Applied Desktop Virtualisation

    This analyst report from Freeform Dynamics gives helpful advice for companies embarking on Desktop Virtualisation projects.

    Download

  • 2016 server hardware, OS assessment: IT managers speak out

    Explore the findings of the ITIC's 2016 Global Server Hardware and Server OS Reliability Survey, and discover what executives and IT managers from over 600 organizations are saying about the most common causes of downtime—and the most reliable servers on the market.

    Download

  • Take full advantage of Windows 10 using modern hardware

    Explore some of the challenges facing client computing, security, and compliance teams and how these challenges can be addressed through the deployment of Windows 10. You'll also learn how well current hardware takes advantage of these core functions and features.

    Download

  • The Open Group Service Integration Maturity Model (OSIMM) Version 2

    Download the Open Group Service Integration Maturity Model (OSIMM).

    Download

  • Windows Server 2016 delivers SMBs a cloud-ready infrastructure

    Download this e-book to prepare for Windows Server 2016. This book introduces its latest developments for the software-defined data center, and serves an instructive guide for designing a Windows Server 2016 infrastructure for your business.

    Download

  • Windows 10: Costs, benefits, and potential risks

    To understand the benefits, costs, and risks associated with a Windows 10 implementation, check out this analyst report which explores what four customers, who were early adopters of Windows 10, faced.

    Download

  • CW Buyer's Guide: Server Virtualisation

    This Computer Weekly buyer’s guide to server virtualisation looks at the potential barriers to successful virtualisation and how they can be overcome.

    Download

  • Secure and scale your future with Windows Server 2016

    This is your ultimate guide to Windows Server 2016. Read on to drive your organization forward with new layers of security, data center efficiency, and agility in app development by learning to build cloud-native and hybrid apps, improve server density with software-defined infrastructure, and more.

    Download

  • BMC Mainframe Survey 2011

    Big businesses are planning to grow their mainframe computer capacity despite the downturn  this survey of 1,347 large mainframe users worldwide by BMC Software reveals.

    Download

  • The Banking Industry Architecture Network and TOGAF

    This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.

    Download

  • How to simplifying IT support operations in your enterprise

    Growing end-user expectations and the increasingly complex IT landscape are creating new challenges and pushing IT support operations to adapt. This white paper analyses a solution that functions quickly and reliably, helping to reduce the time spent resolving individual support tickets by giving support staff ability to prepare support request.

    Download

  • Your DC service partner: Local solutions for operations worldwide

    This short video introduces an international service partner that offers fast local solutions that can be applied to operations worldwide. Watch now to see how this partner can ensure reliability and maintain business critical continuity.

    Download

  • 10 reasons LinuxONE is the preferred choice for Linux workloads

    Learn how IBM LinuxONE servers can provide IT executives with an alternative Linux infrastructure solution that will help organizations contain costs, become more competitive, and assist with a transformation to a least-cost consumption-based usage model.

    Download

  • The mobile print enterprise

    Quocirca looks at the case for mobile printing in the enterprise and suggests best practices for a mobile print strategy.

    Download

  • How to better support next generation applications at scale

    This white paper introduces the IBM LinuxONE platform and dives into its unsurpassed ability to help organizations deliver applications at scale faster and more cost-effectively than ever before.

    Download

  • Windows 10: Take a look at the financial impact

    Explore the financial impact and benefits across the business and IT departments who use Windows 10 including, mobile productivity, deployment and restart times, IT management time savings, and more.

    Download

  • Guide to choosing the best Exchange for your business

    With the non-stop release of software promising shiny new features, it's easy to feel a little overwhelmed when considering migration options. This is especially true with the release of Exchange 2016. Focusing on the four versions of Exchange Server currently supported this guide reviews their usefulness and compatibility. Read on to learn more.

    Download

  • Case study: Windows 10 takes customer service to new levels

    Find out how Virgin Atlantic teamed up with Microsoft to create an Immersive Digital Adventure (Ida) built as a Windows 10 universal app, to showcase the advantages that they can provide to their business customers.

    Download

  • IoT trends lead to increasing thin client market demands

    Watch this on-demand webinar to learn how to enhance traditional thin client platforms to meet cross-industry market demands for highly available IoT device performance. Additionally, discover how to improve IT operational efficiencies and create a richer customer experience by leveraging advanced remote IoT management.

    Download