Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

36 total results found

UC Ready

UCLA Tech Resources

UC Ready is a UC-wide Business Continuity Planning (BCP) tool. Originally created at Berkeley, the software is now being adopted by all UC campuses. UCLA BCP – https://www.irm.ucla.edu/uc-ready (UC Ready Flyer) Campus business continuity guidance available he...

BCP
business continuity
dr
kuali
planning
security

Detecting Mac OS X Trojan "Flashback"

Cybersecurity

BackgroundAs of October 2011, a Trojan named Flashback has been targeting Mac OS X users by masquerading as a legitimate version of the Adobe Flash Player installer. Its visual elements and user interface are is quite similar, if not identical in certain cases...

IT Security
Adobe Flash
anti-virus
flash
infection
Mac OS X
security
trojans
trojans
virus
viruses

Firefox Extension Check

Internet and Web Browsers Firefox

Mozilla has created a page to detect and verify status of plugins: http://www.mozilla.org/en-US/plugincheck/ Includes Flash player, Shockware, Java, RealPlayer, Silverlight, and others(Quoting) The Mozilla Plugin Check page is a general tool for keeping web br...

Firefox
malware
security
vulnerabilities
web browsing

Disabling Java in web browsers

Internet and Web Browsers

If you want to improve your web browsing security by disabling Java, here are directions for different web browsers: http://tantek.com/2012/364/b1/how-to-disable-java-now-chrome-firefox-opera-safari http://antivirus.about.com/od/securitytips/ht/How-To-Disable-...

Java
security

Explaining to your mother how to safely surf the web at Starbucks

Cybersecurity

The title is mostly for fun, but I’m curious if anyone has found fairly simple guides to safely browsing at public internet cafes or open wireless like UCLA_WIFI.Not simple enough for some mothers, I did like this guide. (9 Tips to stay safe on public wifi)

best practices
internet cafe
mobile security
security
UCLA Wi-Fi
web browsing

Heartbleed Remediation

Cybersecurity

For up to date status of Dell products in relation to Heartbleed visit — http://www.dell.com/learn/us/en/04/campaigns/heartbleed-remediationMashable’s List of sites to watch for Heartbleed— The Heartbleed Hit List: The Passwords You Need to Change Right Now, ...

Dell
Lynda.com
heartbleed
kace
security
sonicwall

IE Browser bug

Internet and Web Browsers Internet Explorer

We have learned of a vulnerability which makes it possible for hackers to take control of a user’s computer after it has been infected with malicious code. This vulnerability affects all versions of Windows released since 2001. A permanent fix is expected by ...

IE
Internet Explorer
security

De-identification doesn't work

Useful Links

Fascinating article. Please add more on this if you find any. No silver bullet: De-identification still doesn’t work – July 9, 2014

anonymize
privacy
security

Microsoft Enhanced Mitigation Experience Toolkit (EMET)

MacOS, Windows, and Linux Windows Vista

Microsoft EMET 5 has now been released to general availability.Could be an interesting addition for those needing Internet Explorer and added protection— http://www.microsoft.com/emet http://support.microsoft.com/kb/2458544TechNet Blogs– http://blogs.technet.c...

Microsoft
browser
emet
security
web browsing

Using a Google Account "Application Specific Password"

Internet and Web Browsers

Quoting, “Some applications that access your Google Account (such as Gmail on your phone or Outlook) cannot ask for verification codes. To use these applications, you will not use verification codes. Instead, you’ll enter an application-specific password in pl...

2FA
Google Apps
security

Securing your Facebook account

Social Media

The 6 Things Everybody Should Do To Secure Their Facebook Account – Forbes – Oct. 19, 2015

privacy
security

Bitcoin

Useful Links

Princeton releases Bitcoin textbook freely available draft pdf

currency
digital money
security

SSL Configuration Generator

Programming and Web Development

This Mozilla tool helps sysadmins properly configure openSSL for various platforms.https://mozilla.github.io/server-side-tls/ssl-config-generator/

Apache
NGINX
security
webserver

What is Heat Software (formerly Lumension) and What Does It Do?

Applications/Software

Heat Endpoint Managememt and Security Suite allows department IT personnel to proactively manage threats by automating the collection, analysis and delivery of computer software patches throughout their department. In order to support compliance with the camp...

software
threats
computers
free
patch
security

Reducing Laptop Theft

Cybersecurity

To assist in reducing laptop theft UCPD participates in part of a nationwide security tracing program. The STOP system is applicable to computer laptops, digital projectors, and other portable devices. For $20 UCPD will affix a permanent tag which ‘tattoos’ t...

tagging
UCPD
STOP
prevention
theft
projectors
laptops
security

Evening Escorts and UCLA Safe Ride

UCLA Resources

Evening Escorts If you are on campus by yourself between dusk and 1 a.m., please note this free program sponsored by the UC Police Department. If you call (310) 794-WALK about 15 minutes before you leave, a Community Service Officer will come to your location...

CSO
UCPD
police
escort
safety
security

FERPA (Student Records) Data Elements

UCLA Resources

FERPA – Student Records Grades / Transcripts Class lists or enrollment information Student Financial Services information Athletics or deparment recruiting information Credit Card Numbers Bank Account Numbers Wire Transfer information Payment History Financial...

FERPA
student records
security

HIPAA (Protected Health Information) Data Elements

UCLA Resources

HIPAA – Protected Health Information Patient Names Street address, city, county, zip code Dates (except year) for dates related to an individual Telephone/Facsimile numbers E-mail, URLs, & IP #’s Social security numbers Account/Medical record #’s Health pl...

HIPAA
Protected Health Information
Data Elements
security