Hardware Information |
|
An Inexpensive Solution to Securing Public Access Computers
Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms. Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation. The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal. So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world. After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to. Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx. Jim Frank is the Head of Computer Services for the Berwyn Public Library. He can be reached by emailing jiminberwyn@gmail.com. A support forum for the Public Access Security Tool can be found by visiting http://www.securepc.org. (NOTE TO EDITORS: This article may be edited for publication in your newsletter or on your website, but must include the author's name, and the title of the article.)
MORE RESOURCES: Computer scientists discover vulnerability in cloud server hardware used by AMD and Intel chips Tech Xplore AMD takes CPU market share from Intel in desktops and servers, but Intel fights back in laptops Tom's Hardware My Mom and Dad Owned Competing Side-by-Side Hardware Stores. It Was a Lesson in Life. The Wall Street Journal Historically Speaking: Zimmerman Hardware Store Dodge City Daily Globe Saunders Hardware to Close After 131 Years Montclair Local Eclypsium offers protection for GenAI hardware infrastructure Help Net Security Soledad Ace Hardware officially opens its doors Salinas Valley Tribune UPDATE: Westlake Ace Hardware to locate in south Columbia, where Big Lots is closing 939theeagle.com Ludington baseball, Hart softball win Larson's Ace Hardware tournament shorelinemedia.net Intel issues revenue warning after US revokes Huawei export licenses — further efforts to restrict China's access to AI ... Tom's Hardware DoD is focused on software, but it can't forget hardware Federal News Network Siemens intros edge IT control system to replace myriad OT hardware; Ford to deploy RCR Wireless News Newcomer Campbell Collects Major Hardware in CAA Softball Postseason Honors Colonial Athletic Association Windows 11 24H2 will enable BitLocker encryption for everyone — happens on both clean installs and reinstalls Tom's Hardware AI in Design: In Need of New Hardware Digital Engineering 24/7 News Microsoft is switching RAM speed units in Task Manager — finally moving to the more technically correct MT/s Tom's Hardware Apple's new iPad Pro: A hardware marvel waiting for software magic - ET Edge Insights ET Edge Insights Clippy's revenge: assistant comes back to purge Windows 11 of bloatware, ads and annoyances Tom's Hardware AMD Ryzen 7 5700X3D Review: A Value Gaming Masterpiece Tom's Hardware Explosive HBM demand fueling an expected 20% increase in DDR5 memory pricing — demand for AI GPUs drives ... Tom's Hardware Artificial Intelligence (AI) in Hardware Market to Expand at a Robust 26.96% CAGR through 2031 | SkyQuest Technology Yahoo Finance Overclocker sold a die-less Core i9-14900K in China — product suffered from serious silicon deficiency Tom's Hardware Multi-million dollar Cheyenne supercomputer auction ends with $480085 bid — buyer walked away with 8064 Intel ... Tom's Hardware MVD: Hardware Wars (Collector’s Edition) Midwest Film Journal Ludington’s baseball team crowned champions in the Ace Hardware Tournament localsportsjournal.com Photo of egregious hardware product packaging sparks frustration online: 'That is infuriating' The Cool Down Chinese-made GPU beats performance of 10-year-old integrated AMD graphics — Lingjiu GP201 hits mass production Tom's Hardware Historic building in Hardware District to become regional HQ for development services company buildingsaltlake.com Eclypsium Supply Chain Security Platform Protects GenAI Infrastructure with Addition of Hardware and Traini... Security Boulevard Intel reportedly demands all board partners implement Intel Default (Baseline) Profile by May 31 — company hopes to ... Tom's Hardware Thermalright Frozen Notte and Aqua Elite 360 White V3 Review: Strong AIOs available for less than $65 Tom's Hardware Get rid of Microsoft's Start Menu ads with this new software tool — the "Oh F*ck Go Back" program cleans up Windows 11 Tom's Hardware Securing Supply Chains for GenAI Hardware and Models Security Boulevard Panthers Collect New Hardware at Polish Nationals - Pitt Panthers #H2P PittsburghPanthers.com Our newest hardware office in Taiwan The Keyword | Google Product and Technology News Meletrix Boog75 Review: More enthusiast than gamer Tom's Hardware SK hynix is teasing 300TB SSDs as it pushes into AI Tom's Hardware Qualcomm responds to benchmark cheating allegations — Snapdragon X Elite/Plus benchmarks claimed to be ... Tom's Hardware AMD revamps 40th Anniversary special featuring Nvidia CEO Jensen Huang — uses Ryzen AI to upscale old footage Tom's Hardware Microsoft blocks some PCs from Windows 11 24H2 — CPU must support SSE4.2 or the OS will not boot Tom's Hardware Hardware Wildlife Education Center Utah Division of Wildlife Resources Cytron Edu Pico Review: Learning to FAIL Tom's Hardware Hardware visit Utah Division of Wildlife Resources FULL RESULTS: Concho Valley Track Athletes Bring Home Hardware San Angelo LIVE! TSMC's labor practices draw serious concern in Arizona — the company's new chip plant allegedly plagued by worker ... Tom's Hardware Optical Network Hardware Market size to record USD 6.07 billion growth from 2023-2027, Emerging new age ... PR Newswire Lenovo Legion Pro 5i (Gen 9) review: Admirable gaming value Tom's Hardware Nvidia criticizes AI PCs, says Microsoft's 45 TOPS requirement is only good enough for 'basic' AI tasks Tom's Hardware |
RELATED ARTICLES
Generation Laptop In May 2005 U.S hardware history was made. Wireless Networking, Part 2: Setup and Security The first installment in this two-part series of Tech Tips provided an introduction to the basic capabilities and hardware involved in wireless networking. In the final installment of this two-part series, we will look at some of the basic setup and security considerations that should be addressed. Review of Popular Wireless Headphones Just about everyone would I agree, I think, that wires on headphones are just about the most annoying wires associated with any electronic device. When you listen to music you don't want to have to stay in anyone one place, and you don't want to have to worry about cords tripping you are pulling your headphones down. Flash Memory Part 2: MMC and SD MMC and SDFlash memory is available in so many formats that it can be difficult to know what will work with any particular device. Devices such as MP3 players, PDAs, mobile phones, digital cameras, and personal computers can take advantage of flash memory to bolster their storage capacity, but selecting the right format may be easier said than done. What You Should Know Before You Buy Computer Equipment You will have many factors to consider when deciding on which computer equipment to buy. The bewildering amount of choices can seem overwhelming. ABCs Of DVD Drive Abbreviations The number of different formats available in DVD drives can be confusing to anyone in the market for one. The list is much longer, but to address a few of the common formats, we have DVD-ROM, DVD-R, DVD-RW, DVD+R, DVD+RW, DVD-RAM ,DVD+R DL and DVD±RW. Motherboard Basics A recent Tech Tip covered the basics of selecting a computer case and made mention of the various sizes that correspond to motherboards of different form factors. A few people wrote in expressing interest in understanding more about the basics of motherboards, and that's exactly what this Tech Tip intends to address. Computer Hardware Preventive Maintenance Software Computers often break down at the worst of all times. These problems can be averted, or at least minimized with preventive maintenance. Used Laptop Computer: Your Quick Purchase Inspection Guide - Part 3 Used laptop computers are everywhere these days. How can you sift through the mass of available used laptop computers to narrow your search down to the right laptop for you? This is the third part of a series of articles designed to give you a few suggestions for your next purchase. Facing DVD Software Dilemma? Its Brainlessly Simple 1. Pocket DVD Wizardhttp://www. What to Do Once You Are Infected with Spyware, Ad-ware or Viruses What to do once your PC is infected with spyware, ad-ware or virusesSo you've been running a virus program. Or you haven't. A Technical Introduction to Audio Cables What is so important about cables anyway?One of the most common questions asked by consumers faced with purchasing cables for their audio or home theater system is, "What is so important about cables anyway?" They can cost as much or more than some of the hardware in the system and to many it is difficult to understand why wire isn't just wire.To begin to understand how audio cables work, we have to start with the two fundamentally different types of audio cables you are likely to have in your system. 7 Steps to Cleaning the Laser Toner From Your Laser Printer Cleaning a laser printer, fax, or copier of laser toner canbe easy, provided you know what you're doing and use theright tools. This article will share with you some simpletips to help you clean your laser printers of laser tonerlike a pro. How to Choose a New Hard Drive for Your Computer If you are running out of space on your computer or find that programs load a little slow, or that big files take a long time to open, it may be time for a new hard drive.Making a more careful decision about the hard drive can mean a much longer working life for the hard drive. The Making of Energy Efficient Datacenters The Crooked E: The Unshredded Truth About Enron is a wonderful movie to watch. It is based on the book, The anatomy of greed, written by a former employee of Enron, Brian Cruver. Looking for Information on CD Duplication and Replication? Time is one of the most important things we have that we are always short on. One way to maximize your time is to have the most up to date technology available. LCD Monitors: A Catching-On Technology If you've been in the market for a new computer monitor fairly recently, you might have noticed just how many more LCD monitors you see in the stores now.It's obvious that the main benefit that's being pushed about computer LCD monitors is that they're flat, and you can put them almost anywhere, but you might be curious about just what you're giving up by going LCD. How To Refill Your Ink Cartridge Forget about emptying your wallets every time you see the blinking light. Quit worrying and start doing it yourself! It's an easy process that won't take you more than five minutes. Coping with a Serious Data Loss from your Computer Hard Drive Data loss is an expensive reality. It's a hard fact that it happens more often then users like to admit. Building A PC Many people simply go to the retail store and get sold to when it comes to computing equipment. You would be very surprised how easily you can pick up all the core components and assemble yourself or get a friend or family member in the know to do it for you. |
home | site map |
© 2006 |