Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

36 total results found

Why shouldn't I email or post Microsoft Word documents?

Cybersecurity

Many people send Microsoft Word documents as email attachments without realizing that there are s...

National Vulnerability Database

Cybersecurity

National Vulnerability Database is a comprehensive cyber security vulnerability database that int...

Identifying phishing in your e-mail

Email

For information about phishing, what to do, and examples of past email phishing attempts in UCLA ...

HIPAA (Protected Health Information) Data Elements

UCLA Resources

HIPAA – Protected Health Information Patient Names Street address, city, county, zip code Dates (...

FERPA (Student Records) Data Elements

UCLA Resources

FERPA – Student Records Grades / Transcripts Class lists or enrollment information Student Financ...

Tips for creating a secure password

Cybersecurity

How can I create a secure password?Update: Read this first: Choosing a Secure Password by Bruce ...

SSH Authentication Agents and Secure Password-less Logins

Internet and Web Browsers

In conventional password authentication, you prove you are who you claim to be by proving that yo...

How to Make Zope Think It's Someone Else

Applications/Software

“All HTTP servers identify themselves. Here’s how to change Zope’s default identity.If you have a...

Reducing Laptop Theft

Cybersecurity

To assist in reducing laptop theft UCPD participates in part of a nationwide security tracing pro...

I need a free file encryption software

Cybersecurity

TrueCrypt is a simple, easy-to-use, on-the-fly encryption program. It works on Windows 2000/XP/2...

What is Identity 2.0 and as a web developer, why do I care?

Programming and Web Development

I’m not really sure what Identity 2.0 is but here are some very interesting slide show talks abou...

What is Heat Software (formerly Lumension) and What Does It Do?

Applications/Software

Heat Endpoint Managememt and Security Suite allows department IT personnel to proactively manage ...

Security Engineering - free e-book

Cybersecurity

Free online copy of a good and comprehensive computer security book: Security Engineering: A Guid...

What is CAPTCHA?

Useful Links

CAPTCHA stands for *C*ompletely *A*utomated *P*ublic *T*uring test to tell *C*omputers and *H*uma...

Anti-virus, firewall and Internet security software

Cybersecurity

AVG Anti-virus – free; anti-virus Microsoft Security Essentials – Free anti-virus and anti-spywa...

How can I make phpMyAdmin avoid sending MySQL passwords in the clear?

Programming and Web Development PHP

Although phpMyAdmin is an excellent tool for administering MySQL databases, you don’t want to exp...

How can I make more secure passwords that I can still remember?

Cybersecurity

This link below leads to a few simple systems described in a paper titled “Simple Formula for Str...

What is a simple easy software for implementing SSH on a Windows machine?

Applications/Software

OpenSSH is a simple, free solution for Windows machines to implement SSH. OpenSSH can be downloa...

Programming Securely

Programming and Web Development

Article on Validating Input from IBM’s Best Practices series Top Ten Web Security Flaws – OWASP ...

Evening Escorts and UCLA Safe Ride

UCLA Resources

Evening Escorts If you are on campus by yourself between dusk and 1 a.m., please note this free ...