Results 1-10 of 32
Results Per Page: 
Email headers: Fraudulent or Legitimate? Overview: Email is a quick and convenient method for communication, but it was never designed to be secure. When you receive a message, email clients and web services by default display information like who it is from, who it was sent to, etc. However, it is trivial for potential attackers to...
Article Id: 16564
Category: Security

Linux IAAS SLA Introduction This document is to establish the Service Level...
Article Id: 17667
Category: Security

Article Id: 20163
Category: Security

Report Phishing E-mails The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. The application will be available for all @lsu.edu mailboxes automatically without any user intervention.
Article Id: 19636
Category: Security

Article Id: 19781
Category: Security

Article Id: 12819
Category: Border Firewall & DMZ

Article Id: 6976
Category: Border Firewall & DMZ

Article Id: 6975
Category: Passwords

A password is a common form of authentication and is often the only barrier between you and your personal information. There are several tools that attackers use to assist in guessing or cracking a password. By creating a complex password and keeping it confidential, you make it more difficult for hackers to gain unauthorized access to your...
Article Id: 16865
Category: Passwords

This article goes through the steps of implementating a renewed TLS (SSL) certificate for Microsoft Internet Information Services (IIS) version 7 and above. 1. Download the renewed certificate from https://pki.its.lsu.edu and move it to the target server. Download the ...
Article Id: 18039
Category: PKI Certificates & E-mail Encryption