What is spyware or adware?
Description: What is spyware or adware? Spyware and Adware are programs, scripts, or cookies that users install on their machine unknowingly when they download free programs. Spyware gathers information about a user’s Internet use and other computing operations and sells that information to other vendors. Adware creates advertising pop-ups on your computer. These programs not only […]
» Subjects: , » Tags:

Securing your computer on the UNC network
Description: For perspective: You should consider that once you connect your computer to the Internet, the entire Internet (and every user on the Internet) connects to your computer. If you are using a campus network connection to the Internet, then the security of your computers should be one of your concerns. Just as the campus police […]
» Subjects: , » Tags: , , ,

Login Banner Message for Use with Systems Hosting Nonpublic Services
Description: Login Banner Message Recommendations for Use with Systems Hosting Nonpublic Services Systems required by the Information Security Controls Standard to have a warning banner may use the text below (or other text specific to the system) to give notice to users.  Most University systems hosting nonpublic services, particularly those restricting access through Onyen login, ssh, […]
» Subjects: , » Tags: ,

About the Onyen
Description:     This document will automatically redirect to the document ITS Onyen Policy. You will be redirected in seconds  
» Subjects: , , , , » Tags: ,

SSL and TLS
Description: SSL (Secure Sockets Layer) is a security protocol used to transmit private communications via the Internet. Many web sites use the SSL protocol to protect confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with “https” instead of the normal “http“. Many email clients also support SSL […]
» Subjects: , » Tags:

University Process on Dealing with Possible Infringement of Intellectual Property Rights
Description: I. Introduction The Digital Millennium Copyright Act amends federal copyright law to provide certain liability protections for online service providers, including the University of North Carolina at Chapel Hill, when their computer systems or networks carry materials that violate (infringe) copyright law. To qualify for liability protection, the University is required to have a policy […]
» Subjects: , » Tags: , ,

Securing Microsoft Windows Server 2003
Description: The following links provide good information on how to secure Microsoft Windows Server 2003: Windows Server 2003 – Security Guide, v2.1 Windows Server 2003 – Security Guide – Read Me, v2.1 Windows Server 2003 – Security Guide – Release Notes, v2.1 NSA Windows Server 2003 Security Guide Addendum Windows Server 2003 – Security Guide – […]
» Subjects: » Tags: ,

Best Practices for Using the Campus VPN
Description: Introduction “If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees.” – Khalil Gibran Access Issues Access to campus resources from off-campus (for example, someone working at home) presents a number of issues related to maintaining a secure and available campus network environment. For one […]
» Subjects: ,

What are the symptoms of a virus?
Description: What are the symptoms of a virus? Some common symptoms that may indicate your computer system has been infected with a virus are: Unusual messages or displays on your monitor; Unusual sounds or music played at random times; Your system has less available memory than usual; A disk or volume name has changed; Programs or […]
» Subjects: , » Tags: , , ,

Securing Microsoft Windows Server 2008 and Windows Server 2008 R2
Description: The following links provide good information on how to secure Microsoft Windows Server 2008 and Windows Server 2008 R2: Windows Server 2008 Security Guide CIS Windows Server 2008 Benchmark v1.0.0
» Subjects: » Tags: , ,