Results 1-10 of 45
Email headers: Fraudulent or Legitimate? Overview: Email is a quick and convenient method for communication, but it was never designed to be secure. When you receive a message, email clients and web services by default display information like who it is from, who it was sent to, etc. However, it is trivial for potential attackers to...
Article Id: 16564
Category: Security

Linux IAAS SLA Introduction This document is to establish the Service Level...
Article Id: 17667
Category: Security

Report Phishing E-mails The LSU IT Security and Policy (ITSP) Team has deployed PhishMe Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. The application will be available for all @lsu.edu mailboxes automatically without any user intervention.
Article Id: 19636
Category: Security

Article Id: 6976
Category: Border Firewall & DMZ

What is Windows Firewall? Windows Firewall is a piece of software that helps screen out hackers, viruses, and worms that try to reach a computer over the Internet. Windows Firewall protects a computer by blocking communications that might actually be dangerous software trying to find a way to connect to a computer. ...
Article Id: 153
Category: Border Firewall & DMZ

Microsoft Accessment and Planning ToolKit General Information Microsoft Assessment and Planning (MAP) Toolkit is a FREE utility created by Microsoft to help system administrators plan and migrate legacy systems to newer Windows 7, Windows 8, Server 2008R2, and Server 2012 Operating Systems as well as Microsoft Office 2010 and 2013 and...
Article Id: 17031
Category: Microsoft Assessment & Planning Toolkit

Microsoft Assessment and Planning Toolkit: Reporting General Information This article deals with using the Microsoft Assessment and Planning (MAP) Toolkit for reporting after an assessment has been completed. For general information about the MAP Toolkit, for download and installation instructions, and for...
Article Id: 17032
Category: Microsoft Assessment & Planning Toolkit

Please Note: Impending LSU Mail and myLSU Synchronization Currently, the LSU community maintains both LSU Mail and myLSU credentials LSU Mail is used to authenticate into Office 365 services like Outlook and Skype for Business .
Article Id: 15909
Category: Passwords

Why Do I Need a Password? Think about the number of PIN numbers, passwords, or passphrases you use every day: getting money from the ATM or using your debit card in a store, logging on to your computer or e-mail, signing in to an online bank account or shopping cart...the list seems to just keep getting longer. Keeping track of all of the number,...
Article Id: 6975
Category: Passwords

A password is a common form of authentication and is often the only barrier between you and your personal information. There are several tools that attackers use to assist in guessing or cracking a password. By creating a complex password and keeping it confidential, you make it more difficult for hackers to gain unauthorized access to your...
Article Id: 16865
Category: Passwords