Results 1-10 of 33
Results Per Page: 
Email headers: Fraudulent or Legitimate? Overview: Email is a quick and convenient method for communication, but it was never designed to be secure. When you receive a message, email clients and web services by default display information like who it is from, who it was sent to, etc. However, it is trivial for potential attackers to...
Article Id: 16564
Category: Security

Linux IAAS SLA Introduction This document is to establish the Service Level...
Article Id: 17667
Category: Security

Article Id: 20163
Category: Security

Report Phishing E-mails The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. The application will be available for all mailboxes automatically without any user intervention.
Article Id: 19636
Category: Security

Article Id: 19781
Category: Security

Article Id: 6976
Category: Border Firewall & DMZ

Microsoft Accessment and Planning ToolKit General Information Microsoft Assessment and Planning (MAP) Toolkit is a FREE utility created by Microsoft to help system administrators plan and migrate legacy systems to newer Windows 7, Windows 8, Server 2008R2, and Server 2012 Operating Systems as well as Microsoft Office 2010 and 2013 and...
Article Id: 17031
Category: Microsoft Assessment & Planning Toolkit

Article Id: 6975
Category: Passwords

A password is a common form of authentication and is often the only barrier between you and your personal information. There are several tools that attackers use to assist in guessing or cracking a password. By creating a complex password and keeping it confidential, you make it more difficult for hackers to gain unauthorized access to your...
Article Id: 16865
Category: Passwords

This article goes through the steps of implementating a renewed TLS (SSL) certificate for Microsoft Internet Information Services (IIS) version 7 and above. 1. Download the renewed certificate from and move it to the target server. Download the ...
Article Id: 18039
Category: PKI Certificates & E-mail Encryption