You've requested...

Share this with your colleagues:

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.

If a new window did not open, click here to view this asset.

Download this next:

How to configure Mac OS X Server

 


In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X.

 

These functions range from simple password protection and patch management through to full-disk encryption.

 

However, these are not the only security functions available. Indeed, OS X has a whole security and management infrastructure available for administrators called Managed Preferences, which can be managed most easily using OS X Server.

 

Capable of running on any Mac that can run OS X 10.8, it is priced at £13.99 for unlimited client connections, so easily affordable.

 

Apple also sells a customised Mac mini desktop computer with improved storage capabilities, which comes with OS X Server installed for small and medium-sized companies, as well as workgroups, which want a dedicated machine.

 

In this article, we’ll show you just a couple of the security features of OS X Server: global password policies and data loss prevention

 

Contents:

           

  •  Configuring Mac OS X Server for the first time
  • Types of user account
  • Setting up a global password policy
  • Creating a network user
  • Managing preferences
  • Binding clients
  • Next steps

 

 

Click on the button below to download this report

These are also closely related to: "Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers."

  • Protecting against modern password cracking

     

     

    Protecting against modern password cracking

     

    By Yiannis Chrysanthou  and Allan Tomlinson

     

    Attackers are increasingly turning to human psychology and the study of password selection patterns among user groups to develop sophisticated techniques that can quickly and effectively recover passwords.

     

    Passwords are commonly protected by applying a one-way cryptographic algorithm that produces a hash of set length given any password as input. However, cryptography can only protect something to the point where the only feasible attack on the encrypted secret is to try to guess it. When it comes to passwords, guessing can be easy.

     

    Passwords are insecure by nature because they are used to prevent humans from guessing a small secret created by humans themselves.

     

    This article shows that guessing passwords is as easy as creating them: most commonly used passwords are easy to guess and harder passwords are almost never used.

     


     

    Royal Holloway Information Security Thesis Series

     

  • Smart cards: security risks

     

     

    Version 3 of the Java Card smart card specification, released in March 2008, overhauled the technical architecture of the smart card.

     

    The Connected Edition of the specification introduced a significantly enhanced execution environment and a new virtual machine. It includes new network-oriented features, support for web applications with new Servlet APIs, multi-threading and support for applets with extended and advanced capabilities.

     

    Such features add complexity to the smart card platform and the hosted applications, increasing the attack surface and introducing a multitude of vulnerabilities. The security models, testing and risk management programmes must cater for these susceptibilities.

     

    In this article we consider the new features of the Connected Edition and identify some of the security problems that developers need to be aware of.

     

    Click on the button to download this report

     

    Royal Holloway Information Security Thesis Series

Find more content like what you just read:

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

    Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.

    Download

  • CW Buyer's Guide to Apple in the Enterprise

    This nine-page buyer's guide assesses the growth of Apple's computers and iPads in business and the enterprise.

    Download

  • Guide: Migrating from Windows XP to Windows 7

    This Computer Weekly Buyer's Guide gives you the facts and advice you need to migrate your organisation from Windows XP to Windows 7.

    Download

  • The Open Group Service Integration Maturity Model (OSIMM) Version 2

    Download the Open Group Service Integration Maturity Model (OSIMM).

    Download

  • Gartner: Time to rethink backup procedures

    IT leaders and storage managers can realise cost savings and improve their use of backup infrastructure by rethinking their back-up procedures, says Gartner analyst Dave Russell.

    Download

  • The Banking Industry Architecture Network and TOGAF

    This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.

    Download

  • Applied Desktop Virtualisation

    This analyst report from Freeform Dynamics gives helpful advice for companies embarking on Desktop Virtualisation projects.

    Download

  • The mobile print enterprise

    Quocirca looks at the case for mobile printing in the enterprise and suggests best practices for a mobile print strategy.

    Download

  • Secure and scale your future with Windows Server 2016

    This is your ultimate guide to Windows Server 2016. Read on to drive your organization forward with new layers of security, data center efficiency, and agility in app development by learning to build cloud-native and hybrid apps, improve server density with software-defined infrastructure, and more.

    Download

  • CW Buyer's Guide: Server Virtualisation

    This Computer Weekly buyer’s guide to server virtualisation looks at the potential barriers to successful virtualisation and how they can be overcome.

    Download

  • BMC Mainframe Survey 2011

    Big businesses are planning to grow their mainframe computer capacity despite the downturn  this survey of 1,347 large mainframe users worldwide by BMC Software reveals.

    Download

  • How to simplifying IT support operations in your enterprise

    Growing end-user expectations and the increasingly complex IT landscape are creating new challenges and pushing IT support operations to adapt. This white paper analyses a solution that functions quickly and reliably, helping to reduce the time spent resolving individual support tickets by giving support staff ability to prepare support request.

    Download

  • Windows 10: Plan your transition strategy

    Everything is moving toward Windows 10 becoming the new norm--are you ready? Access this white paper to learn how to plan a successful move to Windows 10 and how it will impact your business.

    Download

  • Your guide to choosing the right technology for your team

    How do you ensure that everyone in your organization has the right equipment to deliver what's best for the organization? Download this instructive guide to learn to choose the right technology for your team, be servicing their device demands and accommodating the methods in which they work.

    Download

  • Discover an analytics system designed for genome sequencing

    In this case study, learn how Bionivid, an Indian life-science research company, was able to adopt accessible workstations and servers designed for high-speed analytical processes. Discover some of the benefits Bionivid found like a reduced cost of station launch, an easy to learn interface, and more.

    Download

  • Embrace PC device diversity with this IT tool consolidation kit

    With the rise of PC device diversity, IT decision makers are faced with doing far more with less. Access this tool to help your organization decide which solution to employ in order to decrease hardware complexity, seamlessly deploy VDI, enact advanced authentication, and more.

    Download

  • Mobile technologies empower on-the-go pros productivity

    Learn how to power up mobile professionals' productivity with greater portability by optimizing IT to accommodate the demands of your users. Read on to create the optimum IT experience by kick-starting efficiency with devices that multitask and protect devices with recovery services.

    Download

  • Mobile devices that can make – or break – employee productivity

    Dell, Intel, and Microsoft have put together an interactive eGuide on next-generation computing. In this eGuide they describe the main drivers for, and benefits of refreshing the hardware for increased productivity, security and a lower Total Cost of Ownership (TCO).

    Download

  • Comfort of desk-based workers has direct impact on enterprise success

    In this white paper, learn how to choose better hardware and software to create a more comfortable work environment for desk-based workers to increase business success. Read on and see how this can be applied to five common desk-based roles: engineer, accountant, customer support, executive assistant and inside salesman.

    Download

  • Guide to choosing the best Exchange for your business

    With the non-stop release of software promising shiny new features, it's easy to feel a little overwhelmed when considering migration options. This is especially true with the release of Exchange 2016. Focusing on the four versions of Exchange Server currently supported this guide reviews their usefulness and compatibility. Read on to learn more.

    Download

  • Make managing the desktop environment easier

    Giving employees a full, flexible, and configurable managed desktop environment can help organizations to meet diverse business requirements and user productivity. Learn about a service that enables clients in all industries to deploy and manage Windows-based end-user computers to optimize business performance.

    Download