Results 1-10 of 34
Results Per Page: 
Email headers: Fraudulent or Legitimate? Overview: Email is a quick and convenient method for communication, but it was never designed to be secure. When you receive a message, email clients and web services by default display information like who it is from, who it was sent to, etc. However, it is trivial for potential attackers to...
Article Id: 16564
Category: Security

Linux IAAS SLA Introduction This document is to establish the Service Level...
Article Id: 17667
Category: Security

Quick Reference PS-01 Equal Opportunity PS-107 Computer Users'...
Article Id: 12912
Category: Security

Article Id: 20163
Category: Security

Report Phishing E-mails The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. The application will be available for all @lsu.edu mailboxes automatically without any user intervention.
Article Id: 19636
Category: Security

Security Access Detail - Database Objects Needed Tables: Current_* (move data from MAPP01) Security_Access_Detail Security_Access_SODetai SecurityMap* (move data from MAPP01) Stored Procs: All common to Security Access Detail View: ...
Article Id: 17434
Category: Security

Article Id: 19781
Category: Security

Imaging through System Center: PXE Booting 1. Before attempting to PXE boot, verify that network stack boot options are enabled in the BIOS. This may look different depending on the manufacturer and age of the machine. Picture below is the BIOS option for a Dell from the year 2019, where the setting is found under "System Configuration" ->...
Article Id: 20488
Category: Security

Article Id: 12819
Category: Border Firewall & DMZ

Article Id: 6975
Category: Passwords