Advanced Search
Search Results
36 total results found
Why shouldn't I email or post Microsoft Word documents?
Many people send Microsoft Word documents as email attachments without realizing that there are s...
National Vulnerability Database
National Vulnerability Database is a comprehensive cyber security vulnerability database that int...
Identifying phishing in your e-mail
For information about phishing, what to do, and examples of past email phishing attempts in UCLA ...
HIPAA (Protected Health Information) Data Elements
HIPAA – Protected Health Information Patient Names Street address, city, county, zip code Dates (...
FERPA (Student Records) Data Elements
FERPA – Student Records Grades / Transcripts Class lists or enrollment information Student Financ...
Tips for creating a secure password
How can I create a secure password?Update: Read this first: Choosing a Secure Password by Bruce ...
SSH Authentication Agents and Secure Password-less Logins
In conventional password authentication, you prove you are who you claim to be by proving that yo...
How to Make Zope Think It's Someone Else
“All HTTP servers identify themselves. Here’s how to change Zope’s default identity.If you have a...
Reducing Laptop Theft
To assist in reducing laptop theft UCPD participates in part of a nationwide security tracing pro...
I need a free file encryption software
TrueCrypt is a simple, easy-to-use, on-the-fly encryption program. It works on Windows 2000/XP/2...
What is Identity 2.0 and as a web developer, why do I care?
I’m not really sure what Identity 2.0 is but here are some very interesting slide show talks abou...
What is Heat Software (formerly Lumension) and What Does It Do?
Heat Endpoint Managememt and Security Suite allows department IT personnel to proactively manage ...
Security Engineering - free e-book
Free online copy of a good and comprehensive computer security book: Security Engineering: A Guid...
What is CAPTCHA?
CAPTCHA stands for *C*ompletely *A*utomated *P*ublic *T*uring test to tell *C*omputers and *H*uma...
Anti-virus, firewall and Internet security software
AVG Anti-virus – free; anti-virus Microsoft Security Essentials – Free anti-virus and anti-spywa...
How can I make phpMyAdmin avoid sending MySQL passwords in the clear?
Although phpMyAdmin is an excellent tool for administering MySQL databases, you don’t want to exp...
How can I make more secure passwords that I can still remember?
This link below leads to a few simple systems described in a paper titled “Simple Formula for Str...
What is a simple easy software for implementing SSH on a Windows machine?
OpenSSH is a simple, free solution for Windows machines to implement SSH. OpenSSH can be downloa...
Programming Securely
Article on Validating Input from IBM’s Best Practices series Top Ten Web Security Flaws – OWASP ...
Evening Escorts and UCLA Safe Ride
Evening Escorts If you are on campus by yourself between dusk and 1 a.m., please note this free ...