Securing Microsoft Windows Server 2003
Description: The following links provide good information on how to secure Microsoft Windows Server 2003: Windows Server 2003 – Security Guide, v2.1 Windows Server 2003 – Security Guide – Read Me, v2.1 Windows Server 2003 – Security Guide – Release Notes, v2.1 NSA Windows Server 2003 Security Guide Addendum Windows Server 2003 – Security Guide – […]
» Subjects: » Tags: ,

Best Practices for Using the Campus VPN
Description: Introduction “If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees.” – Khalil Gibran Access Issues Access to campus resources from off-campus (for example, someone working at home) presents a number of issues related to maintaining a secure and available campus network environment. For one […]
» Subjects: ,

What are the symptoms of a virus?
Description: What are the symptoms of a virus? Some common symptoms that may indicate your computer system has been infected with a virus are: Unusual messages or displays on your monitor; Unusual sounds or music played at random times; Your system has less available memory than usual; A disk or volume name has changed; Programs or […]
» Subjects: , » Tags: , , ,

Basic Security Checklist
Description: Introduction This basic security checklist addresses general security topics. Password Security Your computer password is your best defense against damaging intrusions. Without a well-chosen password or set of passwords, any other security measures protecting your data are greatly weakened. Never share your passwords with anyone. The most frequent password mistakes made include choosing an obvious […]
» Subjects: , » Tags: ,

Securing Microsoft Windows Server 2008 and Windows Server 2008 R2
Description: The following links provide good information on how to secure Microsoft Windows Server 2008 and Windows Server 2008 R2: Windows Server 2008 Security Guide CIS Windows Server 2008 Benchmark v1.0.0
» Subjects: » Tags: , ,

Safer Social Networking
Description: Safer Social Networking Think about how you want to use social networking. Facebook is an all-purpose, come-as-you-are social medium. The community is gigantic, and anybody with an email address can join. It’s best to limit your use of Facebook to sharing news, photos, music, videos, etc. casually with friends and family. For business, consider using […]
» Subjects: , » Tags:

Information Security Policy Guide
Description:   A Guide to Assist in Locating the Policies and Standards that Apply to You The University of North Carolina at Chapel Hill maintains an expansive network of Information Technology (IT) services and systems. From Sakai, email and wireless access to more specialized types of technology such as Qualys, Research Clusters and PeopleSoft, these services […]
» Subjects: , » Tags: , , , , ,

Best Practices for Email Attachments
Description: About Email Attachments A popular use of email is to distribute computer files (e.g., text files, documents, spreadsheets, PDFs, etc.). This is accomplished by “attaching” a file to an email message and then sending the file with the message to a recipient. Virtually any kind of computer file can be attached to an email message […]
» Subjects: ,

Do I Need to Change My Password if I Never Use My Onyen?
Description: Do I Need to Change My Password if I Never Use My Onyen? Click here for a list of sites that use the Onyen for access. If you do not use any of these services and therefore, you never use your Onyen, do not worry about the expired password. If you need access to these […]
» Subjects: , ,

Uninstalling the VPN Client in Mac OS X
Description: Uninstalling the VPN Client for Mac OS X You must have administrator privileges to uninstall the VPN Client. If you do not have administrator privileges, you must have someone with administrator privileges uninstall the product for you. The VPN Client uninstall script uninstalls any previous command-line or GUI versions of the VPN Client from your […]
» Subjects: , » Tags: , ,