Hardware Information |
An Inexpensive Solution to Securing Public Access Computers
Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms. Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation. The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal. So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world. After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to. Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx. Jim Frank is the Head of Computer Services for the Berwyn Public Library. He can be reached by emailing jiminberwyn@gmail.com. A support forum for the Public Access Security Tool can be found by visiting http://www.securepc.org. (NOTE TO EDITORS: This article may be edited for publication in your newsletter or on your website, but must include the author's name, and the title of the article.)
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Buying a Plasma or LCD TV FAQs This article focuses on frequently asked questions by buyers of plasma and LCD televisions.Q: Does the "plasma" in plasma televisions need to be recharged or replaced over time?A: No. Wireless Notebooks: What You Need To Know About Going Wireless! It's not exactly breaking news that our world is becoming increasingly wireless. Many of our daily activities that once needed a wired connection can now be done wirelessly!The cell phone craze was probably the first revolution that seemingly happened overnight. All In One Printers - Home Office Workhorses All in one printers, also known as multifunction printers (MFPs), are printers that also can copy, scan, and in some cases, fax. These machines perform all of these functions, generally using a single set of ink cartridges for both printing and copying. Digital Camera Prints - Getting the Most for Your Money Digital cameras have really taken off in popularity in recent years. It's not uncommon anymore to see several people at an event with a digital camera. The Making of Energy Efficient Datacenters The Crooked E: The Unshredded Truth About Enron is a wonderful movie to watch. It is based on the book, The anatomy of greed, written by a former employee of Enron, Brian Cruver. What is EEPROM ? EEPROM stands for Electrical Erasable Programmable Read Only Memory and also referred to as E²PROM. As the name suggest, an EEPROM can be both erased and programmed with electrical pulses. To Upgrade or Not? To upgrade or not? That is the question. At least, since the release of the new Athlon 64 FX-57, that is the question I have been pondering. Video Encryption What is Video Encryption?Video Encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information, for example from a law enforcement video surveillance being relayed back to a central viewing centre.The scrambling is the easy part. A Review of HP Laser Toners Hewlett-Packard is, along with Brother and Samsung, one of the most readily available brands of laser toner. This is due, in part, to the fact that HP was first to release a laser toner inexpensive enough to catch the attention of the average consumer, in 1984. How to Read CRT Tube Part Numbers All picture tubes, whether monochrome or color type are identified by a specific code consisting of numbers and letters. The codes are different from each other because different tubes have different characteristics. How to Check Your IP So you need to check your IP address, for whatever reason. Maybe you're playing an online game with a friend, or you need to access your PC remotely. Electronic Schematics Diagram-The Four Commonly Asked Questions I came across quite a number of questions about electronic circuit schematics diagram.Most of the question asked are:a) Do we really need a schematic diagram in order to repair any electronic equipment?b) Will schematic diagram help us to repair faster?c) At where we can get a particular schematic diagram?d) How to read schematic diagram?Well, the answers is as below:a)-Theoretically yes, practically not necessary, it all depends on how good you arein electronic repair knowledge. SED is Coming One of the bigger challenges facing display manufacturers is to develop a picture with the same warm characteristics as Cathode Ray Tube, but with far less weight and size.The disadvantage of CRT, however is the size, weight and power consumption. Would You Like An Extended Warranty With That? Should you buy an extended warranty with your laptop? You may not want to think about it now, but sooner or later, something is going to break down on your laptop. When it happens, the big question will be who gets stuck with the bill, you or the manufacturer. 5 Ways To Backup Your Data... The data on your hard drive is the most critical item inside your computer, and the only item which can not be replaced. It may be an unwanted hassle and expense to replace a defective memory module, monitor, or processor, but there is no replacing data once lost. DVD ROMs DVD CD ROMs have become predominantly the most used CD drive for desktop and notebook computers. They are very reliable and now come as a standard in most computers. Generation Laptop In May 2005 U.S hardware history was made. Laptop Computers Instigate Classroom Revolution! Have you noticed that laptop computers are beginning to dictate what happens in the classroom? Additionally, mobile technology is changing where learning takes place. This is especially true as laptops are entering the educational arena in ever increasing numbers. Laptop Security -Where'd My Laptop Go? Laptops are lovely. They are convenient, mobile, powerful and prestigious. What Is A Fuse? And How To Test It. A fuse is a very thin wire, which either melts or vaporizes when too much current flows through it. The thin wire may be made of aluminum, tin-coated copper or nickel. |
home | site map | Contact Us |