iPad Hardening Procedure
Description: The objective of this hardening procedure is to restrict the iPad to a single use device.  Please note that completing the steps outlined in this document will minimize the functionality of your iPad. Enable passcode lock Setting a passcode/password on your device enables data encryption.  Encrypting your device will prevent someone from accessing the data […]
» Subjects: , , , , » Tags: , ,

Computer Compromises
Description: What does “compromised” mean? “Compromised” is a nice way of saying that someone or something has maliciously broken into your computer without your knowledge or permission. It means that you can not trust the integrity of any file on your computer (including program files, image files, operating system files, etc.). You can not find out […]
» Subjects: , , » Tags: , ,

Sensitive Data (Onyen Restricted)
Description: -
» Subjects: , » Tags: ,

ClamX Antivirus
Description:   Table of Contents Purpose Installation Instructions Uninstall Instructions How to set the Preferences, Scheduled Scans, Sentry, and update Virus Definitions To Set General Preferences To Set Scheduled Scans and Preferences please do the following To Set the Sentry Scans and Preferences How to update Virus Definitions   Purpose The University’s ITS Security has released […]
» Subjects: , , , ,

Best Practices for Instant Messaging
Description: Do not click on links to files stored on a website Links sent by friends Do not assume that because a friend sent you a link to a website or file, the link is harmless. The link could point to malicious content. Your friend’s computer may be compromised and a malicious program could be using […]
» Subjects: , » Tags:

How to Disable Windows Autorun
Description: How to Disable Windows Autorun Background Windows operating systems have two similar features called autorun and autoplay. Autorun first appeared as a feature in Windows 95. When you insert removable media (such as a CD) in your computer, the autorun feature automatically runs a program on the removable media. Autoplay appears with Windows XP and […]
» Subjects: ,

Best Practices for Peer to Peer Computing
Description: SAVE OUR BANDWITH “Unlimited” sharing of files makes the network slow for everyone! Allowing others to GET copyrighted files from your machine (uploading) is illegal! Downloading may or may not be a problem – it depends on whether you own copyright rights to the file. Turn your file sharing program – or your computer – […]
» Subjects: ,

Basic Security FAQs
Description: Why do I need to think about security? By most standards, our campus sees very little crime, and so we don’t often think of UNC-Chapel Hill as a terribly “unsafe” place. Yet crime happens here once every second, every day out of the year. We never read about computer crimes in the police roundup of […]
» Subjects: ,

Protecting Your Sensitive Data
Description: Protecting Computer Data The encryption solutions mentioned in this article deal exclusively with files and folders, not disks. For more information on whole disk encryption please contact ITS Information Security. File/folder encryption solutions handle copies of encrypted files differently. There are cases where one could unintentionally decrypt files when they are e-mailed, backed up, copied […]
» Subjects: , » Tags: , , , ,

Securing your computer on the UNC network
Description: For perspective: You should consider that once you connect your computer to the Internet, the entire Internet (and every user on the Internet) connects to your computer. If you are using a campus network connection to the Internet, then the security of your computers should be one of your concerns. Just as the campus police […]
» Subjects: , » Tags: , , ,