Who is the designated agent to receive notification of claimed copyright infringement?
Description: Who is the designated agent to receive notification of claimed copyright infringement? The designated agent to receive notification of claimed infringement under Title II of the Digital Millenium Copyright Act is: ITS Security Office University of North Carolina at Chapel Hill Chapel Hill, NC 27599-3420 e-mail: copyright@unc.edu telephone: (919) 445-9393 fax: (919)445-9488
» Subjects: , » Tags: , ,

Using fport
Description: Fport is a free tool that will show you what programs on your system are opening which ports (both TCP and UDP). You can look at the output and see if you notice any strange programs that don’t belong on the machine. Then you can use a command-line “kill” utility such as PSKill to stop […]
» Subjects: » Tags: ,

UNC-Chapel Hill Wireless Spectrum Management Policy
Description: Data Network Policy Data Network Standard Wireless Standard On May 2, 2017 new Policy and Standards superseded this Policy.  This page was updated to direct to the new documents.
» Subjects: , » Tags: , , , ,

Securing a Solaris Workstation
Description: Getting Started By default, Solaris installations contain numerous potential security problems. Many unneeded services are installed and enabled. This document attempts to provide a solid foundation for the beginning administrator. Remember to test these tactics on a non-production server, particularly when applying a patch or installing a new security tool. Most of the recommendations below […]
» Subjects: » Tags: ,

What subnet ranges are used with campus VPN? (Onyen Restricted)
Description: -
» Subjects: , » Tags:

Systems Administration Initiative (SAI) Overview
Description: What is the Systems Administration Initiative? The focus of the Systems Administration Initiative (SAI) is on UNC-Chapel Hill servers. For the purposes of this initiative, a server is a computer that provides computing services to more than one user simultaneously over a network connection. At a high level, the approach will be comprised of the […]
» Subjects: , » Tags: ,

Self-Managed Computers: Your Responsibilities
Description: Recommendations for maintaining your personal computer Every member of the University community has a responsibility to take precautions that will help protect our information and computer systems. If you decide to manage your own computer, your are responsible for the following: 1. Administration You are the administrator of your machine(s) and therefore you must acquire, […]
» Subjects: , » Tags:

PGP Overview
Description: Table of Contents What is PGP Whole Disk Encryption? Why do I need it? Can I encrypt files with PGP and send them to others? Can I encrypt e-mail with PGP? What differences will a WDE user see? How do I get it? How do I change my PGP Whole Disk Encryption password? What happens […]
» Subjects: , » Tags: ,

Windows Security Checklist
Description: If your computer is maintained by a departmental IT technician, many of these steps may have already been taken. Make sure you have password protected your Windows account. You can set a password by going to Start Menu > ┬áControl Panel > User Accounts. Make sure all of your passwords are strong and complex. Visit […]
» Subjects: , » Tags: , , , ,

Blocked Ports (Onyen Restricted)
Description: -
» Subjects: , , » Tags: , , , , , ,