An Inexpensive Solution to Securing Public Access Computers
Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms.
Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation.
The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal.
So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world.
After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to.
Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx.
Jim Frank is the Head of Computer Services for the Berwyn Public Library. He can be reached by emailing firstname.lastname@example.org. A support forum for the Public Access Security Tool can be found by visiting http://www.securepc.org. (NOTE TO EDITORS: This article may be edited for publication in your newsletter or on your website, but must include the author's name, and the title of the article.)
This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news
Virginia hardware store at center of Boy Scout controversy fires employee accused of making anti-gay slur - Washington Post
Be Like the Big Guys: Optimizing Hardware in the Software-Defined Data Center - Data Center Knowledge
LCD Monitors: A Catching-On Technology
If you've been in the market for a new computer monitor fairly recently, you might have noticed just how many more LCD monitors you see in the stores now.It's obvious that the main benefit that's being pushed about computer LCD monitors is that they're flat, and you can put them almost anywhere, but you might be curious about just what you're giving up by going LCD.
Intel Celeron vs Pentium
The Celeron and Pentium Processors are two of Intel's best selling CPUs. They are found in a majority of home computer systems.
Cheap Ink Cartridge
A cheap ink cartridge is sometimes the only way that people can afford to keep all of their printers ready for use. Internet email addresses are constantly loaded with a number of offers from various online merchants, but one such email that a consumer might not want to ignore is any one that offers a great deal on ink cartridges.
DVD Recorders: Getting Started
IMO, these sd work 'like a VCR' as far as recording and playback. There are models w/ harddrives, VHS players, etc.
Computer Network Installation
Computer network installation has become an essential prerequisite for any efficient modern-day business as it allows employees to truly work as a team by sharing information, accessing the same database and staying in touch constantly. For a computer network to give the best results, a lot of detailed planning and foresight is required before installation.
Do you feel overwhelmed when buying a computer or a new printer?You are not alone. With so many products to choose from I know exactly how you feel.
The Merging of Humans and Computers
Soon the human brain will be completely interfaced with the computer. The benefit to mankind will be truly significant.
Coping with a Serious Data Loss from your Computer Hard Drive
Data loss is an expensive reality. It's a hard fact that it happens more often then users like to admit.
Ten Tips to Safeguard Your Laptops
The following is a list of tips to help safeguard your laptop while traveling or conducting business.1.
Today, small form factor computers demolish the myth that bigger PCs are faster. Specially designed SFF computers from Ovi PC, like the Prometheus, deliver tower-crushing performance in one-third the space, and at the fraction of the price.
The Importance Of Current Sense Resistor In Switch Mode Power Supply
Current sense resistor is usually located in the switch mode power supply section. Newer version of monitor-the b+ (boost) circuit also have this current sense resistor.
HIPPA Goes Mobile and Wireless for Hospitals and First Responders
It appears we need to further streamline health care and HIPPA now in effect is quite a nightmare trying to comply with and implement without making a mistake and possibly being sued as the trial lawyers testing the law. The Malpractice insurance rates may go up again.
Toner Cartridges - How They Work
In the past computers and their accompanying printers were huge. Toner reservoirs and toner cartridges were used instead of ink cartridges like the ones in use today.
Computer Parts Online
In today's age, building computers on yourself is often chosen as the safest and choicest option by a sizeable part of the market for computers. There are various advantages and disadvantages for doing so.
Used Laptop Computer: Your Quick Purchase Inspection Guide - Part 1
Used laptop computers are everywhere these days. How can you sift through the mass of available used laptop computers to narrow your search down to the right laptop for you? Here are a few suggestions to keep in mind.
Testing Flyback Transformer - How to Test and When to Replace It
Nowadays, more and more monitor comes in with flyback transformers problems. Testing flyback transformers arenot difficult if you carefully follow the instruction.
How To Take Care Of Your Laptop Computer
As the proud owner of a laptop computer, you'll want to keep your machine in the best possible condition.Aside from cleaning your screen and dusting the keyboard, however, you'll need to take a few extra steps to maintain your laptop's health:-- Play it coolA laptop computer generates a lot of heat, especially when running the latest high-powered software.
Rear Projection TV Facts - Understanding the Pros & Cons of Rear Projection in the Home Theater
Rear Projection Television - An Affordable OptionA great deal of consumer appeal for Rear Projection TV systems arise out of the shear simplicity that this product offers as an immediate solution to getting a bigger TV.No mess, no fuss, if you have the space, either visit your local big screen retailer - or better still, check at your favorite online electronics superstore - to order your product and get it delivered in just a few days; unpack the product and there you have a big screen TV in your living room ready for immediate use!Rear Projection TV Facts:As already stated, rear projection offers a most immediate solution to getting a bigger TV.
The Printer Cartridge Game
Think you got a great deal on a printer? Like the rest of us, you probably paid $50 to $75 for a decent Epson or Lexmark printer. What's the catch, you might have asked? Most salesmen would say there is no catch.
ESR Meter - The Capabilities To Check Beyond Electrolytic Capacitor
There is something good about esr meter because besides electrolytic capacitor it can be use to measure other type of capacitors such as the non polarity capacitor. From esr meter specification, it is usually mentioned only checking the electrolytic type.
|home | site map|