SlideShare a Scribd company logo
1 of 37
How to Secure and Maintain Your Computer Lab  August 6, 2008 Facilitator: Kami Griffiths Presenters: Claire Murray and John Neale   Sponsored by ReadyTalk   Remember to call: 866-740-1260 Code: 6339392
Using ReadyTalk ,[object Object],[object Object],[object Object],[object Object]
 
You are being recorded… ,[object Object],[object Object]
How to Secure and Maintain Your Computer Lab  Facilitator: Kami Griffiths Presenters: Claire Murray and John Neale  Sponsored by:
Today’s Speakers Kami Griffiths Volunteer: Chris Peters Claire Murray John Neale
[object Object],[object Object],[object Object],Important aspects of managing public computers
 
 
 
 
Local Policy Settings: no Domain ,[object Object],[object Object],[object Object]
User Rights Policies are Extensive
Security Permissions also Extensive
Policies have various options  ,[object Object],[object Object],[object Object]
Domain Policies ,[object Object],[object Object],[object Object]
Domain Policies Set policy  based on  Logon Script Set access  limits based on logon or group
Domain Policies: Many Options ,[object Object],[object Object],[object Object]
Tracking Updates & Issues ,[object Object],[object Object]
Red Background & Extension Cords  ,[object Object],[object Object],[object Object]
Reception can see all display screens
Tabs on cover & base for locking
Zip Ties Keep Items on Desktop Zip Ties connect “easily  taken” speaker & USB  extension cords  to the keyboard or mouse cable.  Items can be moved easily from right to left of monitor to accommodate left-handed users.
USB & Speaker Extension Cords
 
 
The 10 Commandments for this Computer Lab (sample) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Acceptable Use Policy (sample) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Q & A Raise your hand to ask a question, or type the  question in the chat box.
Important Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The MaintainIT Project www.maintainitproject.org
Get the Most Out of TechSoup ,[object Object],[object Object],[object Object],[object Object],[object Object]
TechSoup Stock Vendor Partners ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Continue the discussion… ,[object Object]
Upcoming Online Seminars ,[object Object],[object Object],[object Object],[object Object]
Thank you ReadyTalk!
For More Information Contact: Kami Griffiths 415-633-9392 [email_address] www.techsoup.org

More Related Content

Viewers also liked

Viewers also liked (11)

03 secure the computer
03 secure the computer03 secure the computer
03 secure the computer
 
Firefox Cookies and Cache Instructions
Firefox Cookies and Cache InstructionsFirefox Cookies and Cache Instructions
Firefox Cookies and Cache Instructions
 
Health care tips
Health care tipsHealth care tips
Health care tips
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
Computer lab rules and regulations
Computer lab rules and  regulationsComputer lab rules and  regulations
Computer lab rules and regulations
 
15 Awesome Health Tips
15 Awesome Health Tips15 Awesome Health Tips
15 Awesome Health Tips
 
Techniques, Tips & Tools for Managing a Computer Lab
Techniques, Tips & Tools for Managing a Computer LabTechniques, Tips & Tools for Managing a Computer Lab
Techniques, Tips & Tools for Managing a Computer Lab
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using Computer
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Literary Appreciation
Literary AppreciationLiterary Appreciation
Literary Appreciation
 

Similar to Secure and Maintain Your Computer Lab

Prevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Controlmorticelocksnational21
 
Disaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechDisaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechTechSoup
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetupJason Weaver
 
Protecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletProtecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletprestamonster
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
Support Goes Home
Support Goes HomeSupport Goes Home
Support Goes HomeChris Dancy
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Outsmart the geek slideshare
Outsmart the geek slideshareOutsmart the geek slideshare
Outsmart the geek slideshareCamille Williams
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitysuperb11b
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 

Similar to Secure and Maintain Your Computer Lab (20)

Prevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Control
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Disaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechDisaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their Tech
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
H.O.S.T.
H.O.S.T.H.O.S.T.
H.O.S.T.
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
 
Protecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletProtecting yourself online - second edition - booklet
Protecting yourself online - second edition - booklet
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Pace IT - Prohibited Content and Activity
Pace IT - Prohibited Content and ActivityPace IT - Prohibited Content and Activity
Pace IT - Prohibited Content and Activity
 
Support Goes Home
Support Goes HomeSupport Goes Home
Support Goes Home
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Outsmart the geek slideshare
Outsmart the geek slideshareOutsmart the geek slideshare
Outsmart the geek slideshare
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 

More from TechSoup

Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseTechSoup
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesTechSoup
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTechSoup
 
Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App HouseTechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural DifferencesTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageTechSoup
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)TechSoup
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdfTechSoup
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfTechSoup
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowTechSoup
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfTechSoup
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfTechSoup
 

More from TechSoup (20)

Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App House
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App House
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdf
 

Recently uploaded

ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 

Recently uploaded (20)

ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

Secure and Maintain Your Computer Lab

  • 1. How to Secure and Maintain Your Computer Lab August 6, 2008 Facilitator: Kami Griffiths Presenters: Claire Murray and John Neale Sponsored by ReadyTalk Remember to call: 866-740-1260 Code: 6339392
  • 2.
  • 3.  
  • 4.
  • 5. How to Secure and Maintain Your Computer Lab Facilitator: Kami Griffiths Presenters: Claire Murray and John Neale Sponsored by:
  • 6. Today’s Speakers Kami Griffiths Volunteer: Chris Peters Claire Murray John Neale
  • 7.
  • 8.  
  • 9.  
  • 10.  
  • 11.  
  • 12.
  • 13. User Rights Policies are Extensive
  • 15.
  • 16.
  • 17. Domain Policies Set policy based on Logon Script Set access limits based on logon or group
  • 18.
  • 19.
  • 20.
  • 21. Reception can see all display screens
  • 22. Tabs on cover & base for locking
  • 23. Zip Ties Keep Items on Desktop Zip Ties connect “easily taken” speaker & USB extension cords to the keyboard or mouse cable. Items can be moved easily from right to left of monitor to accommodate left-handed users.
  • 24. USB & Speaker Extension Cords
  • 25.  
  • 26.  
  • 27.
  • 28.
  • 29. Q & A Raise your hand to ask a question, or type the question in the chat box.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 37. For More Information Contact: Kami Griffiths 415-633-9392 [email_address] www.techsoup.org

Editor's Notes

  1. Introduce myself What I do at TS, my role in MIT Previous work with CTC