Maintain your old Siemens Hipath system

An Inexpensive Solution to Securing Public Access Computers

Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms.

Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation.

The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal.

So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world.

After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to.

Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx.

Jim Frank is the Head of Computer Services for the Berwyn Public Library. He can be reached by emailing jiminberwyn@gmail.com. A support forum for the Public Access Security Tool can be found by visiting http://www.securepc.org. (NOTE TO EDITORS: This article may be edited for publication in your newsletter or on your website, but must include the author's name, and the title of the article.)

In The News:


Warning: simplexml_load_file() [function.simplexml-load-file]: http://feeds.skynews.com/feeds/rss/world.xml:1: parser error : Document is empty in /home/infob/public_html/includes/rss.php on line 2

Warning: Invalid argument supplied for foreach() in /home/infob/public_html/includes/rss.php on line 9


tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Wireless Notebooks: What You Need To Know About Going Wireless!

It's not exactly breaking news that our world is becoming... Read More

Buying a New Computer

Someone recently asked me "I teach senior citizens in a... Read More

How to Save Money With Cheap Computers

We all know that computers change more then any other... Read More

Would You Like An Extended Warranty With That?

Should you buy an extended warranty with your laptop? You... Read More

The Constantly Changing World of Inkjet Technology

We have finally advanced to a time when technology can... Read More

Security Risks and Ways to Decrease Vulnerabilities in a 802.11b Wireless Environment

IntroductionThis document explains topics relating to wireless networks. The main... Read More

The Importance of Ergonomic Products

Interestingly, ergonomics though sounds to be a modern and trendy... Read More

A Guide to Refurbished Laptops

Computing freedom, independence, and mobility don't have to come with... Read More

5 Tips For Buying The Right Laptop Computer

It's easy to be intimidated by all the laptop models... Read More

Batteries for Your Laptop

With technology advancing more every day, electronics have become smaller... Read More

Laptop and Notebook Theft Prevention

Laptops or Notebook computers are an expensive personal and business... Read More

Power Protection in the Home Theater - Use of Surge Suppressors to Guard Expensive Electronic Gear

Surge Suppressors ? A First Line of DefenseAll home theater... Read More

How To Buy A Printer That Won?t Break The Bank

OK I confess I've bought at least 10 inkjet printers... Read More

Inkjet Jargon Explained

With all the technical terms out there, it is becoming... Read More

Learn About The Three Basic Types Of Computer Mouse

1) Mechanical: This is a type of computer mouse that... Read More

Personal Asset Preventive Maintenance Software

Personal asset preventive maintenance software exists to help people manage... Read More

Wireless Networking, Part 2: Setup and Security

The first installment in this two-part series of Tech Tips... Read More

When Good Color Goes Bad...

Even with the popularity of digital technology, and the availability... Read More

Choosing The Right Bar Code Reader

The importance of a bar code reader in this day... Read More

Testing a Transformer- How To Accurately Test A Transformer

There is two types of transformers in the market- linear... Read More

How To Choose The Best Gaming Laptop

The gaming laptop is coming of age! It is steadily... Read More

Bluetooth Basics - Bluetooth Technology Tutorial

Bluetooth BasicsBluetooth technology is nothing new, but in many respects... Read More

Testing Flyback Transformer - How to Test and When to Replace It

Nowadays, more and more monitor comes in with flyback transformers... Read More

Two Essential Accessories For Notebook Computers

A Good Notebook BagForget those that are bundled with your... Read More

Best DVDs for Your Personal DVD Player

When bought personal DVD player, the very next thing to... Read More