www.1001TopWords.com |
An Inexpensive Solution to Securing Public Access Computers
Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms. Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation. The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal. So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world. After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to. Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx. Jim Frank is the Head of Computer Services for the Berwyn Public Library. He can be reached by emailing jiminberwyn@gmail.com. A support forum for the Public Access Security Tool can be found by visiting http://www.securepc.org. (NOTE TO EDITORS: This article may be edited for publication in your newsletter or on your website, but must include the author's name, and the title of the article.)
|
RELATED ARTICLES
USB Drive Popularity So many people have small USB drives today, but what is the attracting of owning one? What is EEPROM ? EEPROM stands for Electrical Erasable Programmable Read Only Memory and also referred to as E²PROM. As the name suggest, an EEPROM can be both erased and programmed with electrical pulses. Since it can be both electrically written into and electrically erased, the EEPROM can be rapidly programmed and erased in circuit for reprogramming without removing them from the circuit board. A Look at Laser Toners Laser toner is the ink for laser printers. It is an extremely fine synthetic powder (usually plastic) packed into a cartridge. You insert the cartridge into your laser printer according to the manufacturer's instructions. When the printer goes to print a page, there are several steps to the process: Best DVDs for Your Personal DVD Player When bought personal DVD player, the very next thing to do is purchasing an important DVDs collection with your favourite movies, documentaries, shows, cartoons. Here are few hints before buying. Discover Everything About Wholesale Bar Code Reader And Software! It is a given fact that buying wholesale would make us save more money than buying individual items at retail. Purchasing in bulk means more profit for the seller that he could be afforded the leeway of granting discounts. This principle is important when you're planning on buying wholesale bar code reader and software. USB Key Drives - Useful Tool There are many different names for these drives, just so we are all on the same wavelength about what I'm talking about, here are a few of the other names: What is Over-clocking a Processor? Q : What is over clocking? Purchasing Laser Toner Refills Laser toner refills can be expensive. Over the life of the printer, expect to spend many times more on laser toner refill than you paid for the printer itself. How To Stop Junk Faxes From Wasting Your Paper and Toner Junk faxes waste the resources of every business. It is estimated that they cost businesses tens of millions of dollars a year in wasted paper, toner and fax machine maintenance. There is nothing more aggravating then coming into the office each morning to find a pile of junk faxes promotion everything from mortgage refinancing to septic tank solutions. I don't even have a septic tank! Testing Diode -The Accurate Way on How to Test Semiconductor Diode Using Multimeter Testing diodes is different from testing a resistor because you need a skill to do it. If you do not know or wrongly test a diode you will be unable to repair the equipment. A bad diode you think it is good. This will definitely waste your precious time. Alternatives to Tape Backup You may ask, isn't tape an anachronism in the age of optical disks, removable hard drives and a plethora of whiz-bang, random-access storage media? In many ways it is, but because of the nature of backup it doesn't really matter that tape is slow and sequential-access. Remember, tape is cheap. Businesses use tape because they find it to be a cost-effective backup solution. Dell Inspiron 600m Notebook Computer After twelve years of owning desktop computers, I finally opted for a laptop so I would no longer be chained to my desk. After months of research and weighing various makes and models, I settled on the Dell Inspiron 600m Notebook Computer. This particular model has exceeded all of my expectations and at a price that is hundreds of dollars lower than many competing brands. ATA vs SATA Hard Drives: ATA versus SATA The Road Ahead We live in an area that has begun to use GreenBins for household waste. Our regular garbageis picked up every other week and the onlyweekly garbage collection is our green plasticbins, to be filled with leftover food productsand other organic waste. When the program first started, I was surewe could never change our ways, but beforelong, depositing bones and leftover food inthe bin became automatic.Why am I telling you this? Because using thecomputer will also become easy for you themore you try. Sure, the learning curve issteeper than remembering which containerto use for which type of garbage, but theidea is the same. Every time you perform afunction or solve a problem on your computer, it will be easier than the time before.This week, I read a book written by Bill Gatesin 1996 titled 'The Road Ahead'. Gates said, "Computers frighten almost everyone(everyone but children), before they learn touse them. When people spend more time withcomputers, they understand them better.You can start by playing computer games ordoing other simple things. Once you startusing them, I think you'll like them."With the Internet, we can keep in touch withold friends and make new ones; have virtualexperiences of flying an airplane, driving acar, even dissecting a toad. Pilots and doctorspractice their work without worrying aboutaccidents. Every school can have a wonderfullibrary thanks to the Internet. Gates saw then how much our world wouldchange because of computers. Banking andshopping online, distance learning, the abilityto telecommute and work from home - all ofthese grew as software became better andmore powerful.Gates talked about his own futuristic house. Anyone in the house wore an electronic pin thattold the house who and where you were. Whenit got dark, the pin would turn on lights nearbyand turn them off when you went away. Musicwould play near you and the phone ring nearbyonly if the call was for you. A home control console activated choices of lighting, music,and temperature. That was in 1996, so whoknows what his home is like now!The book ended with a cartoon showing a muttusing a computer and saying "On the Internet,nobody know's you're a dog." How true - onthe Internet, we are all on equal ground.When in my 40's, the university library where I worked was computerized. The thought of using those machines at my age was so intimidating that I moved to another department. I transferred back a year later, determined to learn. How to Read CRT Tube Part Numbers All picture tubes, whether monochrome or color type are identified by a specific code consisting of numbers and letters. The codes are different from each other because different tubes have different characteristics. Dusting Your Computer - Keeping it Cool My mother always told me to dust, but I never did, mostly because I was lazy, but also because I couldn't find any tangible benefit to dusting. I just didn't see how I'd benefit from my room or my things being less dusty. Well now I've gotten a bit older, and I finally found a reason to dust - a cooler running computer. I'm going to give some background on my own system and circumstances first, then run tests before and after dusting, as well as explain how and what I used to dust. Be sure to take a look at this article - with pictures and graphs - plus a whole lot more, at aworldofhelp.com. Laptop Computer Extras for the Mobile Traveler A laptop computer certainly provides you with an unprecedented level of freedom and mobility away from the office. However there are a few extras you might want to bring along on your laptop travels: Used Laptop Computer: Your Quick Purchase Inspection Guide ? Part 2 Used laptop computers are everywhere these days. How can you sift through the mass of available used laptop computers to narrow your search down to the right laptop for you? This is the second part of a series of articles designed to give you a few suggestions for your next purchase. Setting up a Network -- Wired or Wireless? Wireless networks are en vogue, but your installation won't be successful unless you chose the right type of network and set it up properly. Wired networks require that each computer be connected via a wire to a central location, called a switch or hub. This often involves installing cables through walls and ceilings and can present a challenge for anyone. Ten Tips to Safeguard Your Laptops The following is a list of tips to help safeguard your laptop while traveling or conducting business. |
© Athifea Distribution LLC - 2013 |