Maintain your old Siemens Hipath system

An Inexpensive Solution to Securing Public Access Computers

Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms.

Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation.

The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal.

So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world.

After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to.

Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx.

Jim Frank is the Head of Computer Services for the Berwyn Public Library. He can be reached by emailing jiminberwyn@gmail.com. A support forum for the Public Access Security Tool can be found by visiting http://www.securepc.org. (NOTE TO EDITORS: This article may be edited for publication in your newsletter or on your website, but must include the author's name, and the title of the article.)

In The News:

Saudis condemn US 'interference' over Khashoggi death
Mon, 17 Dec 2018 07:03:00 +0000
Saudi Arabia has rejected the US Senate's conclusion that its crown prince was responsible for the murder of journalist Jamal Khashoggi.

Ex-Indian MP jailed over role in deadly 1984 riots
Mon, 17 Dec 2018 11:03:00 +0000
An Indian politician has been jailed for life over his role in anti-Sikh riots more than 30 years ago that killed thousands of people following the assassination of Indira Gandhi.

Germany to compensate Kindertransport refugees
Mon, 17 Dec 2018 12:37:00 +0000
Germany has agreed to pay survivors who fled Nazi Germany as children €2,500 (£2,245) each, negotiators fighting for compensation have said.

DNA confirms Tenerife body is missing British woman
Mon, 17 Dec 2018 14:01:00 +0000
The family of a British woman found dead off the coast of Tenerife are "heartbroken" after DNA testing confirmed the body was hers.

Thousands protest against Hungary's 'slave laws'
Mon, 17 Dec 2018 08:07:00 +0000
Thousands of people have marched through Budapest in protest at new laws that threaten labour rights and the independence of the judiciary.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Tips To Select Proper Motherboard

Selecting motherboard is really simple. As name suggests "Motherboard" acts... Read More

A Review of Refurbished HP Laptops

HP refurbished laptops can be found on their website hpshopping.com.... Read More

Easy to Execute!

Plug and play equipment or hardware solves the problem of... Read More

All In One Printers ? Home Office Workhorses

All in one printers, also known as multifunction printers (MFPs),... Read More

Laptop Notebook ? Inexpensive Business Laptops

Laptop Notebook ? Your Portable OfficeIn much of today's business... Read More

How to Avoid Getting Ripped-Off When You Purchase A New Printer

It's no big secret that printer companies like HP and... Read More

Laptop Computers Instigate Classroom Revolution!

Have you noticed that laptop computers are beginning to dictate... Read More

A Short Introduction to Blu Ray

Blu ray is a next generation optical media format developed... Read More

Using System Restore to Save Yourself from Formatting Your Hard Drive

It is the most annoying thing when one day you... Read More

Laptop and Notebook Theft Prevention

Laptops or Notebook computers are an expensive personal and business... Read More

Testing Capacitor-How To Test A Capacitor When Breakdown Under Load

Have you ever come across power problem where once you... Read More

Your Printer Is Out Of Ink -- Now What?

We've all been there. You're in the middle of printing... Read More

Refurbished Laptop Batteries

There are three refurbished laptop battery types, each named for... Read More

Buying a Refurbished Dell Laptop

Dell offers a full line of refurbished laptops on their... Read More

Security Risks and Ways to Decrease Vulnerabilities in a 802.11b Wireless Environment

IntroductionThis document explains topics relating to wireless networks. The main... Read More

SED is Coming

One of the bigger challenges facing display manufacturers is to... Read More

Dell Inspiron 600m Notebook Computer

After twelve years of owning desktop computers, I finally opted... Read More

How To Take Care Of Your Laptop Computer

As the proud owner of a laptop computer, you'll want... Read More

What to Do Once You Are Infected with Spyware, Ad-ware or Viruses

What to do once your PC is infected with spyware,... Read More

A Guide To Bar Code Reader Downloads

Bar code readers have proven themselves to be essential tools... Read More

The Road Ahead

We live in an area that has begun to... Read More

An Inexpensive Solution to Securing Public Access Computers

Offering secure public Internet access is not as easy as... Read More

Cisco CCNA Certification: An Illustrated Guide To Ethernet CSMA/CD

When you're studying for your CCNA exams, you're going to... Read More

Basics of RAID

A couple of the recent Tech Tips from www.geeks.com have... Read More

Refurbished Laptops are the Real Deal!

Laptop computers have found usefulness as portable media devices.Even refurbished... Read More