Results 1-10 of 37
Results Per Page: 
Email headers: Fraudulent or Legitimate? Overview: Email is a quick and convenient method for communication, but it was never designed to be secure. When you receive a message, email clients and web services by default display information like who it is from, who it was sent to, etc. However, it is trivial for potential attackers to...
Article Id: 16564
Category: Security

Linux IAAS SLA Introduction This document is to establish the Service Level...
Article Id: 17667
Category: Security

Report Phishing E-mails The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. The application will be available for all @lsu.edu mailboxes automatically without any user intervention.
Article Id: 19636
Category: Security

Article Id: 6976
Category: Border Firewall & DMZ

Microsoft Accessment and Planning ToolKit General Information Microsoft Assessment and Planning (MAP) Toolkit is a FREE utility created by Microsoft to help system administrators plan and migrate legacy systems to newer Windows 7, Windows 8, Server 2008R2, and Server 2012 Operating Systems as well as Microsoft Office 2010 and 2013 and...
Article Id: 17031
Category: Microsoft Assessment & Planning Toolkit

Why Do I Need a Password? Think about the number of PIN numbers, passwords, or passphrases you use every day: getting money from the ATM or using your debit card in a store, logging on to your computer or e-mail, signing in to an online bank account or shopping cart...the list seems to just keep getting longer. Keeping track of all of the number,...
Article Id: 6975
Category: Passwords

A password is a common form of authentication and is often the only barrier between you and your personal information. There are several tools that attackers use to assist in guessing or cracking a password. By creating a complex password and keeping it confidential, you make it more difficult for hackers to gain unauthorized access to your...
Article Id: 16865
Category: Passwords

This article goes through the steps of implementating a renewed TLS (SSL) certificate for Microsoft Internet Information Services (IIS) version 7 and above. 1. Download the renewed certificate from https://pki.its.lsu.edu and move it to the target server. Download the ...
Article Id: 18039
Category: PKI Certificates & E-mail Encryption

This article is intended for Windows XP, Vista, 7, 2003 Server and 2008 Server. There are small changes between the Windows versions, but the overall...
Article Id: 16561
Category: PKI Certificates & E-mail Encryption

Import InCommon Intermediate Certificate: This article is intended for Windows 7, 2008 Server, and 2012 Server. There are small...
Article Id: 16563
Category: PKI Certificates & E-mail Encryption