results for "security"
Results 41-50 of 195
Results Per Page: 
LSU DNSSEC: DNS Security Extensions What is DNSSEC? In short : A secure domain name resolution system . The Domain Name System (DNS) was not designed with security in mind. Many Internet protocols have changed from their original design to accommodate changes needed for protection against the not-so-honest script junkies out in the world today. Many protocols, that...
Article Id: 14500

Active Directory FAQs What is an Active Directory (AD)? The Microsoft Windows Active Directory glossary defines an Active Directory as Microsoft's directory service database for Windows networks. Stores information about resources on the network and provides a means of centrally organizing, managing, and controlling access to the resources. Recently renamed Active Directory...
Article Id: 5268

Who reviews/approves the IT100 and why? The IT100 is reviewed by three different groups: Data Governance, ITS Security, and the Digital Resource and Content Committee (DRC). These groups analyze the potential data involved, security risks related to use of the software, and compliance with accessibility standards. Is IT100 approval required for purchases made by LaCarte card? ...
Article Id: 20507

Your Blackberry contains your personal information, e-mail, contacts, and calendar. To prevent this information from being accessible if your Blackberry device is lost, stolen, or left unattended, you can set your Blackberry to lock after a specified period of inactivity. You will then be able to use a password to unlock the device and resume usage. To Set Your Blackberry Timeout and...
Article Id: 502

General Information: Shared resources should be secured so that only those who need to access the resource can access the resource. While there are many ways to secure your Windows box, this document will describe the methods normally used by the Office of Computing Services Active Directory staff. By default, Windows installs NTFS permissions with the Everyone group having full...
Article Id: 5273

General Information Adobe is a software with numerous programs designed to help the user create, edit, and view different types of files such as images, videos, and PDF's. These programs include Acrobat Reader,...
Article Id: 16375

General Information Google Chrome is a internet web browser designed for...
Article Id: 16489

General Information Before proceeding make sure you have the latest Service Packs and Windows updates installed, and also make sure your wireless adapter has the latest drivers. If your computer has a built-in wireless adapter, download the latest drivers from the computer manufacturer's website. If you have an external wireless adapter, download the latest drivers from the adapter...
Article Id: 17404

Naming Conventions Everything in the Active Directory must have a unique name. Since all resources in the directory are shared, the names must be distinguishable as well as unique. To accomplish this, the following naming scheme has been put into place. All objects start with the organization’s organizational code; except for the organization’s Organizational Unit (OU) which is just the...
Article Id: 12838

Report Phishing E-mails The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. The application will be available for all @lsu.edu mailboxes automatically without any user intervention. The application is implemented with the University's Office365...
Article Id: 19636

Provide Search Feedback Logo
Search Google Logo