Flaws are found in application software on a regular basis and the manufacturer often corrects these issues by releasing patches or new versions. To determine whether your system is using old versions of software, use Microsoft Baseline Security Analyzer.


*While Windows Vista is shown in the following video, the steps can be used for both Windows XP or Windows Vista platforms.

NOTE: Do not encrypt your boot disk if you currently use, or plan to use Bootcamp to run a Windows operating system on your Mac. Also, there is a known incompatibility with Sophos and FileVault on Mac OS X 10.5.x. If you choose to use FileVault please do not install Sophos Antivirus at this time.


This is a do it yourself option. Please refer to the documentation and training videos on the following topics for information on how to configure and encrypt laptop computers. 


Please note: It is recommended that the steps be performed in the order they are listed. Some sections may not have videos or documents associated with a particular operating system. Also, if you have a dual-boot (dual operating system), Dell Inspiron M1210, Dell E5400, Dell XPS, Dell Media Direct, Mac, Linux or IBM system, please call AskIT at 205-996-5555 before attempting to perform these steps.

 

Videos Docs
How to create a strong password XP | Vista | Mac XP | Vista | Mac
How to configure your laptop XP | Vista | Mac XP | Vista | Mac
How to scan for missing patches XP | Vista | Mac XP | Vista | Mac
How to update applications XP | Vista | Mac XP | Vista | Mac
How to install OS updates XP | Vista | Mac XP | Vista | Mac
How to install antivirus XP | Vista | Mac XP | Vista | Mac
How to backup your machine XP | Vista | Mac XP | Vista | Mac
How to defragment your hard drive XP | Vista | Mac XP | Vista | Mac
How to run Spinrite XP | Vista | Mac XP | Vista | Mac
How to encrypt your laptop XP | Vista | Mac XP | Vista | Mac

 

 

 

Please feel free to contact us with any questions through our help desk, AskIT, by email or phone at 205-996-5555.

 

January 01, 2012

Defrag - Windows

This section will show you how to defrag your hard drive in order to correct problems with files and folders.


*While Windows Vista is shown in the following video, the steps can be used for both Windows XP or Windows Vista platforms.

Published in FAQ - Infrastructure

Antivirus software protects your computer from malicious files and exploits by scanning files on access and creation. The effectiveness of the antivirus software's ability to detect malicious files is based on the definition files that are updated seveeral times a day by the manufacturer. Therefore, it is important that the antivirus software is updated regularly to detect the latest threats.


*While Windows Vista is shown in the following video, the steps can be used for both Windows XP or Windows Vista platforms.

January 01, 2012

Spinrite - Windows

Run Spinrite to analyze your hard disk in order to identify and attempt to correct any disk errors prior to encryption.

Order/Download Now


*While Windows XP is shown in the following video, the steps can be used for both Windows XP or Windows Vista platforms.

January 01, 2012

Policy Violations

While it is impossible to anticipate every possible violation, examples are provided below to assist in defining what is considered to be responsible and ethical behavior.  This list is not intended to be exhaustive; in general, any activity which does not directly contribute to UAB's mission may be considered inappropriate use. 

  • Commercial activities, advertising, or any other "for-profit" ventures not specifically approved by the UAB administration.
  • Sustained promotion of any non-UAB activity or venture, profit or non-profit, public or private, personal or commercial, without approval of the UAB administration.
  • Creating, displaying, or transmitting threatening, racist, sexist, or harassing language and/or materials.
  • Creating, displaying, transmitting, or obtaining obscene or pornographic materials or any form of content which violates state and/or federal statutes and/or local standards of decency.
  • Copyright and licensing violations including, but not limited to, providing or obtaining illegal copies of software or digital media (movies, videos, music, etc.) for which legal permission to distribute or possess has not been granted.
  • Vandalism or mischief intended to incapacitate, compromise, or destroy UAB or other facilities, resources, or services.
  • Forgery or attempted forgery of electronic mail or posts to electronic forums or any other act of deceptive labeling of the originator of an electronic communication.
  • Obtaining goods, services, or funds of any form via electronic means by using the name and/or credentials of another person or entity without their consent and knowledge.
  • Deliberately sending un-welcomed or off-topic messages to an individual or discussion forum. This includes continuing to send such messages after being asked by the individual or forum's owner/moderator to stop doing so even though the originator does not consider the material offensive or inappropriate.
  • Transmitting unreasonable quantities of data or messages to persons or groups without their consent or request.
  • Spamming or transmitting unsolicited material to a large number of individual persons and/or discussion lists, newsgroups, or other forums even though the material itself may not otherwise violate these guidelines.
  • Being a continued impediment to other users through mass consumption of computing or network resources after receipt of a request to cease such activity, even if the activity is not otherwise disallowed.
  • Transmitting without permission private information such as grades, medical records, financial data, or any other information that is protected by the Public Records Law or by legislation such as HIPAA, FERPA, etc.
  • Attempts to compromise computer and/or network security measures or providing information/instructions for how to do so.
  • Unauthorized, deliberate action which damages or disrupts a computing system or network, alters its normal performance, or causes it to malfunction. This includes intentional attempts to "crash" network systems or programs.
  • Attempts to gain unauthorized access to other systems on the UAB campus or the Internet.
  • Sharing of secure access credentials, such as passwords or private keys.
  • Attempts to guess, capture, "hack" or decrypt the secure access credentials of other users.
  • Attempts to possess, decrypt, or distribute data to which access has not been authorized.
  • Attempts to elevate system privileges or access without consent.
  • Unauthorized access of internal or external services through the use of stolen, guessed, hacked, copied, or discovered secure access credentials or other private data obtained without consent.
  • The willful or negligent introduction of computer "viruses" or other disruptive/destructive programs into the UAB network or into external networks.