How can I protect myself from hackers?
Description: You can protect yourself by making sure that your virus definitions are up to date, that you open only e-mail attachments that you expect, that you visit only trusted Web sites, and that you download only trusted files. You will also want to keep your system up to date with all security patches (i.e. Windows […]
» Subjects: ,

What’s so bad about Kazaa?
Description: What’s so bad about Kazaa? Kazaa has been shutdown however if you have copies installed on your machine please read this notice. Kazaa, besides being a tool that could potentially violate UNC’s Acceptable Use Policy, also poses a threat to your privacy. It is very important to read any user agreements that appear with a […]
» Subjects: , » Tags: , , , ,

Basic Security Checklist
Description: Introduction This basic security checklist addresses general security topics. Password Security Your computer password is your best defense against damaging intrusions. Without a well-chosen password or set of passwords, any other security measures protecting your data are greatly weakened. Never share your passwords with anyone. The most frequent password mistakes made include choosing an obvious […]
» Subjects: , » Tags: ,

Safer Social Networking
Description: Safer Social Networking Think about how you want to use social networking. Facebook is an all-purpose, come-as-you-are social medium. The community is gigantic, and anybody with an email address can join. It’s best to limit your use of Facebook to sharing news, photos, music, videos, etc. casually with friends and family. For business, consider using […]
» Subjects: , » Tags:

Best Practices for Email Attachments
Description: About Email Attachments A popular use of email is to distribute computer files (e.g., text files, documents, spreadsheets, PDFs, etc.). This is accomplished by “attaching” a file to an email message and then sending the file with the message to a recipient. Virtually any kind of computer file can be attached to an email message […]
» Subjects: ,

Dangers of file sharing programs
Description: Table of Contents Some common misconceptions about BitTorrent Useful information about filesharing and what can precipitate a copyright violation Helpful Links Some common misconceptions about BitTorrent I used encryption, so my activities will be undetectable to outside sources.Encrypting BitTorrent files will not protect you from detection by copyright holders and their representatives. While encryption may […]
» Subjects: ,

How do I clean the hard drive on my Mac notebook?
Description: Guidelines on best practices for secure data deletion can include 1) physical destruction of the media (driving a nail several times through the hard drive) or 2) multiple overwriting passes with random data writes and subsequent zeroing of the data on the media. Experts recommend anywhere from 3 to 25 passes, but accounts will vary. […]
» Subjects: ,

Self-Managed Computers: Your Responsibilities
Description: Recommendations for maintaining your personal computer Every member of the University community has a responsibility to take precautions that will help protect our information and computer systems. If you decide to manage your own computer, your are responsible for the following: 1. Administration You are the administrator of your machine(s) and therefore you must acquire, […]
» Subjects: , » Tags:

Windows Security Checklist
Description: If your computer is maintained by a departmental IT technician, many of these steps may have already been taken. Make sure you have password protected your Windows account. You can set a password by going to Start Menu > ┬áControl Panel > User Accounts. Make sure all of your passwords are strong and complex. Visit […]
» Subjects: , » Tags: , , , ,

Best Practices for Erasing Data from Cell Phones
Description: Best Practices for Erasing Data from Cell Phones Erase Your Cell Phone Data! Before disposing of your cell phone in any manner, remove all University data and your personal information and data (e.g., contact names and phone numbers, notes, calendars, and documents) from the device. University cell phones that are turned over to Campus Recycling […]
» Subjects: ,