Carolina CloudApps: Access to Firewall Protected Resources (Onyen Restricted)
Description: -
» Subjects: » Tags: , , , , , ,

2-Step Verification for Duo
Description: The University recommends registering more than one device. For example, you could register both a mobile device and a landline. If you only register one device and do not have it with you, then you may be unable to access your sensitive information or application. Security Tips: if you have access to privileged systems you […]
» Subjects: , , , , , , , , » Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Establishing a New Credit Card Merchant Account
Description: There is no excerpt because this is a protected post.
» Tags: , ,

How to Secure Linux
Description: This document is intended to provide basic and mid-level tips for securing your Linux system. These tips are designed to apply to most Linux distributions however you may need to consult with help documentation for your particular distribution if some of the commands do not work for you. General Principles Use a strong password (mix numbers, capital letters, and symbols) with length of eight […]
» Tags: ,

Installing Microsoft Security Essentials
Description: Microsoft Security Essentials is being depreciated on January 14, 2020 alongside Windows 7 – Please migrate to a more secure OS if still using Windows 7 The University recommends that Microsoft Security Essentials be installed on any personal computer used by Faculty, Staff, or Students.  For University-owned computers, Microsoft System Endpoint Protection is recommended.   […]
» Subjects: , , , , , » Tags: ,

Securing your computer on the UNC network
Description: This page has been consolidated/relocated to Safe Computing: Direct Link: https://safecomputing.unc.edu/
» Subjects: , » Tags: , , ,

Information Security Policy Guide
Description:   A Guide to Assist in Locating the Policies and Standards that Apply to You The University of North Carolina at Chapel Hill maintains an expansive network of Information Technology (IT) services and systems. From Sakai, email and wireless access to more specialized types of technology such as Qualys, Research Clusters and PeopleSoft, these services […]
» Subjects: , » Tags: , , , , ,

How to Use UNIX and Linux File Permissions
Description: Introduction This document explains how directory and file permissions on a UNIX or Linux machine are set and can be changed by the user. This allows you to share files or directories or to lock them down to be private. If you want to set file or directory permissions by right-clicking on the file or […]
» Tags: , ,