Results 1-10 of 35
Results Per Page: 
Email headers: Fraudulent or Legitimate? Overview: Email is a quick and convenient method for communication, but it was never designed to be secure. When you receive a message, email clients and web services by default display information like who it is from, who it was sent to, etc. However, it is trivial for potential attackers to...
Article Id: 16564
Category: Security

Linux IAAS SLA Introduction This document is to establish the Service Level...
Article Id: 17667
Category: Security

Report Phishing E-mails The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. The application will be available for all @lsu.edu mailboxes automatically without any user intervention.
Article Id: 19636
Category: Security

Article Id: 6976
Category: Border Firewall & DMZ

Microsoft Accessment and Planning ToolKit General Information Microsoft Assessment and Planning (MAP) Toolkit is a FREE utility created by Microsoft to help system administrators plan and migrate legacy systems to newer Windows 7, Windows 8, Server 2008R2, and Server 2012 Operating Systems as well as Microsoft Office 2010 and 2013 and...
Article Id: 17031
Category: Microsoft Assessment & Planning Toolkit

Article Id: 6975
Category: Passwords

A password is a common form of authentication and is often the only barrier between you and your personal information. There are several tools that attackers use to assist in guessing or cracking a password. By creating a complex password and keeping it confidential, you make it more difficult for hackers to gain unauthorized access to your...
Article Id: 16865
Category: Passwords

This article goes through the steps of implementating a renewed TLS (SSL) certificate for Microsoft Internet Information Services (IIS) version 7 and above. 1. Download the renewed certificate from https://pki.its.lsu.edu and move it to the target server. Download the ...
Article Id: 18039
Category: PKI Certificates & E-mail Encryption

General Information Disclaimer: BEFORE USING ANY Encryption Programs, please contact your Local TSP (Technology Support Professional) or IT Administrator / Contact. If you are required to or you do store sensitive information on an electronic device, you should protect yourself...
Article Id: 6983
Category: PKI Certificates & E-mail Encryption

The following article gives a brief overview of LSU's Public Key Infrastructure (PKI) system. What is a Public Key Infrastructure (PKI)? A PKI is a secure method for exchanging information over the Web. PKI's use a public and/or private key to encrypt IDs, documents, or messages. It starts with a Certificate Authority (CA), which...
Article Id: 194
Category: PKI Certificates & E-mail Encryption