results for "security"
Results 1-4 of 4
Results Per Page: 
General Information Solid State Drives (SSDs) are quickly replacing traditional, mechanical, hard disk drives due to their higher speed, lower power consumption, lighter weight, and being more shock proof. However, traditional whole disk erasing utilities like Darik's Boot and Nuke (DBAN) do not work well with SSDs because the placement of data blocks is not as predictable as...
Article Id: 16716

OpenSSH is the most common method used for remotely accessing Linux, BSD, and UNIX machines. When properly configured, it can provide a very secure environment; however, not all installations of OpenSSH are created equally, and taking the time to increase the security of an install can help to keep a machine from getting compromised. Restarting OpenSSH Most of these changes...
Article Id: 7913

After installing Red Hat Enterprise Linux (RHEL) Server or Workstation on your computer, you must register it with LSU’s Red Hat Satellite Server. Registration allows your computer(s) to receive critical security updates as well as access to optional software that you might need. *This is a required process. *Registration must be done on campus or from an anyconnect VPN connection.
Article Id: 15351

General Information Support for Linux is limited, however, ITS has successfully configured and connected Linux devices to eduroam. The following steps will show you how to connect to eduroam. 1. Click on the Network Manager icon on the top right near the clock. 2. Select the eduroam wireless network. In the Wireless Network Authentication window, make sure...
Article Id: 17485

Provide Search Feedback Logo
Search Google Logo