How to create a non-admin user in Windows 10
Description: Step 1. Type ‘add user’ into the Cortana search box and click Add, edit, or remove other users. Step 2. Select ‘Add some else to this PC’. Step 3. Select ‘I don’t have this person’s sign in information’. Step 4. Select ‘Add a user without a Microsoft Account’. Step 5. Create a username and password. […]
» Tags: Microsoft Windows, non-admin account, user account, windows 10
Connecting to the UNC Wired Network
Description: Connecting your computer or device to the University network involves three steps: Finding your network card(s) hardware address. Registering your network card(s) hardware address. Configuring your system for the University wired or wireless network (Some Game Systems).
» Subjects: Connecting to the Network, Game Systems, Networking, PS3, PS4, Wii, WiiU, Xbox 360, Xbox One » Tags: Mac OS X, Microsoft, Microsoft Windows, Network, Nintendo, PS3, PS4, Sony, Wii, Xbox 360, Xbox One
How to enable a firewall on Windows and Mac OS X?
Description: To protect the campus network from the spread of viruses and malware, we require all computers to have a firewall installed, enabled and configured to block malicious traffic. A firewall provides a layer of protection between your computer and the internet. It serves as a barrier and can help defend against someone attempting to access […]
» Subjects: Mac OS X, Microsoft, Security, Security Best Practice » Tags: firewall, Mac OS X, Microsoft Windows
Update Your Software Regularly
Description: As a best practice the University recommends that you keep your software up to date on a regular basis. This software includes, Operating Systems, Web Browsers, and Web applications/ web browser plug-ins. Leaving these unattended can leave them open to attacks and breach in sensitive information. How to update you operating system: Windows Turn on […]
» Subjects: Mac OS X, Microsoft, Security, Security Best Practice » Tags: browser, Mac OS X, Microsoft Windows, Update
Identity Finder Search on Windows
Description: Starting a Search What will Identity Finder scan and how long will it take? Identity Finder will search your computer for any occurrences of Social Security numbers, credit card numbers, and passport numbers. It will only search local hard drives (C:, D:, etc.) and external USB drives. It will not search remote drives connected to […]
» Subjects: Data Identification, Data Loss Prevention, Microsoft, Security » Tags: Identity Finder, Microsoft Windows
Connecting to the UNC Wireless Network
Description: Please click the buttons below to expand and see the configuration instructions:
» Subjects: Connecting to the Network, Networking, WiFi, Wireless Networking » Tags: Android, eduroam, go.unc.edu, guest token, Guest Wifi, iOS, Mac OS X, Microsoft Windows, UNC-PSK SSID, UNC-Secure, url, web, Windows
Suggested Best Practices for Securing Windows
Description: Introduction Take the following measures in order to secure your Windows Vista, Windows 7, and Windows 8 systems. For basic security tips visit the Windows Security Checklist. More resources can be found at the end of this article. Windows Secure Windows Accounts Rename the Administrator account. This will prevent most attacks that try the login […]
» Tags: Microsoft Windows, security
Software Acquisition – Available Software
Description: For a full listing of software available through the ITS Software Acquisition office please visit their Available Software page.
» Subjects: Software, Software Acquisition » Tags: Adobe Acrobat Pro, Adobe Acrobat Reader, Adobe Creative Suites, Adobe Photoshop CS, Adobe Photoshop Elements, Amos, Apple Mac OS X, ArcGIS, Blackberry Enterprise Service, ChemDraw Ultra, Dave, Deep Freeze, df Power DBMS/Copy, Dreamweaver, Elluminate Plan!, Elluminate Publish!, EndNote, ENVI with IDL, F-Secure, Final Draft, Firefox, Flash Professional, Host Explorer, iron mountain, JMP, JMP Genomics, KClient, maple, mathematica, Matlab, Microsoft DreamSpark, Microsoft Office Suite, Microsoft Windows, Mulberry., Novell, nQuery Advisor, OpenAFS, Oracle Database, Patchlink Service, PGP Whole Disk Encryption, R, Red Hat Enterprise Linux, RefWorks, Respondus, SAS 8.2, SAS 9.1.3, SAS 9.2, Secure-CRT, software, software acquisition, SPSS, SSH/SFTP Secure Shell, Stata GradPlan, StetchWare, Stuffit Expander, SUDAAN, Sun, Symantec AntiVirus CE, Symantec AntiVirus for Mac, Symantec Ghost, Thunderbird, VPN Client, Winzip, X-Win32
What is Windows Update and why should I run it?
Description: The Windows Update (or Microsoft Update) utility is used to keep your Windows-based computer up-to-date with the latest patches. PCs connected to the UNC Network must be up-to-date on critical patches that have been available for 2 months or longer to connect to our network. These updates will close security holes in your computer and […]
» Subjects: Microsoft, Software » Tags: Microsoft Windows, software update, viruses
Windows Security Checklist
Description: If your computer is maintained by a departmental IT technician, many of these steps may have already been taken. Make sure you have password protected your Windows account. You can set a password by going to Start Menu > Control Panel > User Accounts. Make sure all of your passwords are strong and complex. Visit […]
» Subjects: Security, Security Best Practice » Tags: "Best Practices", checklist, ISO docs, Microsoft Windows, security