KnowledgeBase

Browse the KnowledgeBase

Main / Computing best practices


26 solutions matched your criteria:

ID Description
1104 Asset Management: Kace software download and installation instructions
Updated! 9407 Copyrighted music, film, video, and game files: Are they illegal to have on my computer?
9944 Encryption software: How to protect your computer and University data
1109 Encryption: How can I tell if my computer has encryption software installed?
5841 How do OIT staff typically detect that Unix account may have been compromised?
4784 Information for people who want official statements about the University
4822 Is a copyright notice required to copyright something published on the web?
1133 Laptop best practices: Guidelines for safe computing at Princeton (OSX)
1022 Laptop best practices: Guidelines for safe computing at Princeton (Windows)
1007 Laptop best practices: Use hibernate mode when carrying your laptop
9803 Laptop best practices: Use wired network connection when you can
9706 Phishing: How to protect your personal information by avoiding phishing scams
3718 PU Rights, Rules, and Responsibilities: Companion IT Policy document
9960 PUaccess: Answers to Frequently Asked Questions (FAQ)
9967 PUaccess: Documentation and support
9962 PUaccess: What if I have forgotten my password after setting my ESP?
9961 PUaccess: What is an Access Pad?
9710 Safe Computing: Computing best practices and appropriate IT resource use
9959 Security: How to lock your Mac OS X computer when leaving it unattended
9958 Security: How to lock your Windows computer when leaving it unattended
9310 Security: What do I do if I think someone has hacked into my computer?
9371 Spam: Answers to Frequently Asked Questions (FAQ)
5879 Spam: E-mail not from Princeton but is forged to appear so
9363 Spam: Questions regarding X-rated spam (unsolicited mass e-mail)
5184 Spam: University stance regarding unsolicited commercial e-mail
9538 What is Spyware/Adware? How do I safeguard myself against Spyware?