![]() | |
![]() | |
![]() |
Hardware Information |
|
![]() |
An Inexpensive Solution to Securing Public Access Computers
Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms. Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation. The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal. So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world. After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to. Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx. Jim Frank is the Head of Computer Services for the Berwyn Public Library. He can be reached by emailing jiminberwyn@gmail.com. A support forum for the Public Access Security Tool can be found by visiting http://www.securepc.org. (NOTE TO EDITORS: This article may be edited for publication in your newsletter or on your website, but must include the author's name, and the title of the article.)
MORE RESOURCES:
President Trump's 25% tariff on aluminum sparks concerns over rising PC enclosure and GPU costs Tom's Hardware Huskers Hunt for Hardware at Big Ten Championships - University of Nebraska - Official Athletics Website huskers.com Restoration Hardware's CEO cursed on an earnings call after he realized the stock was tanking Business Insider Sunshine Ace Hardware kicks off Spring Round Up to benefit Children’s Miracle Network Gulfshore Business New Kansas City hardware store to be built in suburb. Another location is on the way Kansas City Star Nintendo Says Switch 2 Lacks Hardware Gimmick So More Devs Will Make Games For New Console Bounding Into Comics Trimco Hardware acquired by Allegion HBS Dealer Learn about bear safety at Hardware Wildlife Education Center exhibit during April The Times-Independent Hardware Rebels Closets Expo to present wall beds and drawer systems at Closets Expo Woodworking Network Naugatuck developer seeks approval from land use boards for two buildings, hardware store CT Insider Behind the scenes at Germantown Hardware HBS Dealer Best Motherboards 2025 for Gaming, by Socket and Chipset Tom's Hardware Amazon reserves RTX 5070, RX 9070 XT GPUs as Amazon Prime exclusives, to the dismay of scalpers Tom's Hardware Sunshine Ace Hardware announces Spring Round Up to benefit Children’s Miracle Network Priority Marketing Roland SP-404 MKII 5.0, new firmware turns the hardware sampler into a Serato DJ and Studio controller synth anatomy Osmosis Becomes Exclusive Distributor of STW Technic's Telematics Hardware for the Marine Sector PR Newswire Chinese DRAM maker reportedly mulls DDR4 hike prices Tom's Hardware Ace Retailers Add Locations in Missouri, Kansas and Virginia Hardware Retailing This hardware store lasted 142 years. But it couldn’t survive 2025. The Washington Post Intel announces 18A process node has entered risk production — crucial milestone comes as company ramps to Panther Lake chips Tom's Hardware Arm aims to capture 50% of data center CPU market in 2025 Tom's Hardware Here’s a Switch 2 hardware supercut. The Verge The Helpful Hardware Man The Sun Times News Best Graphics Cards for Gaming in 2025 Tom's Hardware Hardware Ranch Wildlife Education Center has bear exhibit beginning Friday, April 4 Cache Valley Daily Game developers urge Nvidia RTX 30 and 40 series owners rollback to December 2024 driver after recent RTX 50-centric release issues Tom's Hardware Breaking Hardware Limits: A Render Farm Solution for Redshift Users befores & afters Learn about bear safety at Hardware Wildlife Education Center exhibit during April Utah Division of Wildlife Resources (.gov) Patients: The 420 Hardware Gift Guide Greenway Magazine Collier Hardware reaches the end of an era Chico Enterprise-Record Major IoT Recognition: Lantronix Secures Position in CRN's Exclusive 2025 IoT Leaders List Stock Titan SplatOverflow enables remote hardware troubleshooting Cornell Chronicle Family-owned CT hardware store for sale after 100 years. ‘It’s home,’ longtime customers say Hartford Courant Can Earthquake in Myanmar disrupt PC hardware production? Manufacturers are checking out Tom's Hardware Osmosis Becomes Exclusive Distributor of STW Technic's Telematics Hardware for the Marine Sector WV News Scalable And Energy Efficient Solution for Hardware-Based ANNs (KAUST, NUS) Semiconductor Engineering Russia Showboats Advanced Military Hardware to South America The National Interest Vernon Vipers hand out hardware as season ends Eagle Valley News CrystalMark Retro 2.0.0 brings retro benchmarking to systems from Windows 95 to Windows 11 Tom's Hardware 2025 Open Hardware Summit At-A-Glance Hackster.io AVL Unveils New Inverter Hardware Testing Solution StreetInsider US to send advanced military hardware to Philippines Radio Free Asia Intel and SK hynix close NAND business deal: Intel gets $1.9 billion, SK hynix gets IP and employees Tom's Hardware Closing DCD>Talks: Between a rock and hard-ware place - How to stay ahead of obsolescence despite rising costs Data Center Dynamics |
![]() |
![]() |
![]() |
RELATED ARTICLES
Generation Laptop In May 2005 U.S hardware history was made. Wireless Networking, Part 2: Setup and Security The first installment in this two-part series of Tech Tips provided an introduction to the basic capabilities and hardware involved in wireless networking. In the final installment of this two-part series, we will look at some of the basic setup and security considerations that should be addressed. Review of Popular Wireless Headphones Just about everyone would I agree, I think, that wires on headphones are just about the most annoying wires associated with any electronic device. When you listen to music you don't want to have to stay in anyone one place, and you don't want to have to worry about cords tripping you are pulling your headphones down. Flash Memory Part 2: MMC and SD MMC and SDFlash memory is available in so many formats that it can be difficult to know what will work with any particular device. Devices such as MP3 players, PDAs, mobile phones, digital cameras, and personal computers can take advantage of flash memory to bolster their storage capacity, but selecting the right format may be easier said than done. What You Should Know Before You Buy Computer Equipment You will have many factors to consider when deciding on which computer equipment to buy. The bewildering amount of choices can seem overwhelming. ABCs Of DVD Drive Abbreviations The number of different formats available in DVD drives can be confusing to anyone in the market for one. The list is much longer, but to address a few of the common formats, we have DVD-ROM, DVD-R, DVD-RW, DVD+R, DVD+RW, DVD-RAM ,DVD+R DL and DVD±RW. Motherboard Basics A recent Tech Tip covered the basics of selecting a computer case and made mention of the various sizes that correspond to motherboards of different form factors. A few people wrote in expressing interest in understanding more about the basics of motherboards, and that's exactly what this Tech Tip intends to address. Computer Hardware Preventive Maintenance Software Computers often break down at the worst of all times. These problems can be averted, or at least minimized with preventive maintenance. Used Laptop Computer: Your Quick Purchase Inspection Guide - Part 3 Used laptop computers are everywhere these days. How can you sift through the mass of available used laptop computers to narrow your search down to the right laptop for you? This is the third part of a series of articles designed to give you a few suggestions for your next purchase. Facing DVD Software Dilemma? Its Brainlessly Simple 1. Pocket DVD Wizardhttp://www. What to Do Once You Are Infected with Spyware, Ad-ware or Viruses What to do once your PC is infected with spyware, ad-ware or virusesSo you've been running a virus program. Or you haven't. A Technical Introduction to Audio Cables What is so important about cables anyway?One of the most common questions asked by consumers faced with purchasing cables for their audio or home theater system is, "What is so important about cables anyway?" They can cost as much or more than some of the hardware in the system and to many it is difficult to understand why wire isn't just wire.To begin to understand how audio cables work, we have to start with the two fundamentally different types of audio cables you are likely to have in your system. 7 Steps to Cleaning the Laser Toner From Your Laser Printer Cleaning a laser printer, fax, or copier of laser toner canbe easy, provided you know what you're doing and use theright tools. This article will share with you some simpletips to help you clean your laser printers of laser tonerlike a pro. How to Choose a New Hard Drive for Your Computer If you are running out of space on your computer or find that programs load a little slow, or that big files take a long time to open, it may be time for a new hard drive.Making a more careful decision about the hard drive can mean a much longer working life for the hard drive. The Making of Energy Efficient Datacenters The Crooked E: The Unshredded Truth About Enron is a wonderful movie to watch. It is based on the book, The anatomy of greed, written by a former employee of Enron, Brian Cruver. Looking for Information on CD Duplication and Replication? Time is one of the most important things we have that we are always short on. One way to maximize your time is to have the most up to date technology available. LCD Monitors: A Catching-On Technology If you've been in the market for a new computer monitor fairly recently, you might have noticed just how many more LCD monitors you see in the stores now.It's obvious that the main benefit that's being pushed about computer LCD monitors is that they're flat, and you can put them almost anywhere, but you might be curious about just what you're giving up by going LCD. How To Refill Your Ink Cartridge Forget about emptying your wallets every time you see the blinking light. Quit worrying and start doing it yourself! It's an easy process that won't take you more than five minutes. Coping with a Serious Data Loss from your Computer Hard Drive Data loss is an expensive reality. It's a hard fact that it happens more often then users like to admit. Building A PC Many people simply go to the retail store and get sold to when it comes to computing equipment. You would be very surprised how easily you can pick up all the core components and assemble yourself or get a friend or family member in the know to do it for you. ![]() |
home | site map |
© 2006 |