Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Why small business is a prime target for hackers

    If you run a small business, and think that none of your data was of interest to a hacker, consider this: what if a hacker could take stolen bank account or credit card information from your computer and package it with the same information from a hundred or a thousand other small businesses? Would it be worth something then?

  • Mac OS X Lion Server is a downgrade that could see corporate IT switching to Windows

    The new Profile Manager is a nice addition, but in almost every other respect, Lion Server is a downgrade that may prompt a move to Windows Server.

  • Ten useful Android tips for professional IT admins

    Good news for network administrators, tech support staffers and other IT pros who use Android smartphones: There are hundreds of Android apps designed to help you get your work done faster, better and best of all remotely.

  • Web file sharing, the new torrents?

    Driven by increased crackdowns on BitTorrent sites such as The Pirate Bay, software pirates are fast moving their warez to file hosting websites.

  • The network manager's (free) toolkit

    10 great free downloads for your network.

  • Windows vs. Linux

    The over-hyped battle between Linux and Windows advocates continues, ultimately improving IT systems as each pulls off its own small victories.

  • Alan Turing was right

    Encryption is complex, misunderstood and unpopular. It is still set to become the most important security technology of the early 21st Century.

  • Get ready for corporate P2P apps

    There are fundamental differences between how P2P and client/server applications affect network loading, and as everyone from Microsoft down invests in P2P technology, it's not just for bootleggers anymore.

  • Countering spyware in the enterprise

    Spyware easily finds its way past conventional defences. Here, we assess two enterprise-level programs that aim to stop its spread.

  • Stop intruders hijacking TCP services

    Finger, FTP, Telnet, Ping ? open doors into a network if you?re not wary.

Featured White Papers

Virtual Hosting With PureFTPd And MySQL

How to run an FTP server backed by a MySQL database of users, allowing you to have thousands of ftp users on a single machine.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map