archive-edu.com » EDU » C » COLUMBIA.EDU

Total: 400

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • IT Policies | Columbia University Information Technology
    s Guide to Safer Computing Data Security Please also read the Columbia University Information Security Charter Data Security Data Classification Policy Sanitization and Disposal of Information Resources Policy Electronic Data Security Breach Reporting and Response Policy Social Security Numbers SSN Usage Policy Information Resource Access Control and Log Management Email Usage Policy External Hosting Policy Equipment Security Network Protection Policy Registration and Protection of Endpoints Policy Registration and Protection of Systems Policy Information Security Risk Management Policy Business Continuity And Disaster Recovery Policy Standards Processes and Procedures The Distribution of Copyrighted Material Internet Domain Name Policy Sending a Broadcast Email Message Desktop Laptop Mobile Device Security Requirements When Accessing Sensitive Data Data Security Breach Response Checklist Standard Operating Environments UNIX Standard Operating Environment Document Web Security Standard Operating Environment Document Recommended Columbia University Web Environment Policy Summary Policy History To contact CUIT Security Send reports of security incidents attacks or questions to security columbia edu myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Manage my UNI Security Awareness Training Software and

    Original URL path: https://cuit.columbia.edu/cuit/it-policies (2016-05-01)
    Open archived version from archive


  • IT Security Resources | Columbia University Information Technology
    built in firewall if it s available Use a built in firewall to protect your computer from unknown exploits Use Anti Malware Application and keep it up to date Use an Anti virus program and keep it up to date to avoid known viruses worms and trojans Use strong passwords everywhere Use strong passwords both online and on your PC to prevent anyone from guessing them Protect your password Keep your identity safe by ensuring that no one else knows your passwords Prevent Identity Theft Protect yourself from Identity Theft and know what to do if your information is compromised Protect your personally identifiable information Identify remediate and secure sensitive information PII that could be on your computer Keep your machine physically secure Take steps to ensure that your computer and the data inside of it never falls into the wrong hands Don t use filesharing programs To avoid trojans and legal liability stay away from filesharing networks Be skeptical and avoid phishing scams Protect confidential data by being skeptical online Make backups Even if your computer is lost you can save your data by making backups Sysadmin s Guide Resources for System s Administrators IT Policies apply to all individuals who access or control Columbia University information resources For more information see the Columbia University Information Security Office page Reporting Security Problems Send reports of security incidents attacks or questions to security columbia edu myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Anti virus Backing Up CUIT Security Downloads CUIT Security How To s CUMC IT Security Filesharing Networks Handling Personally Identifying Information Information Security Tips and Tricks Keep Your

    Original URL path: https://cuit.columbia.edu/cuit/it-security-resources (2016-05-01)
    Open archived version from archive

  • Security Awareness Training | Columbia University Information Technology
    extract sensitive information Internet attacks that are used to harvest sensitive information about employees or customers through activities on search engines social media sites message boards or forums Fraudulent web pages may be designed to gather sensitive information like log in credentials and get you to complete them Personal attacks where social engineers conduct visits to buildings or offices using a fake identity to gather information eavesdrop access conference calls or log into an unsecured computer Protecting Sensitive Information Major information loss is reported almost daily and most but not all are from simple human error Learn your role in understanding the following What information needs to be protected What are the consequences of exposing information Learn the many ways that information can be lost or stolen Your role in protecting sensitive information FERPA Family Education Rights and Privacy Act FERPA created in 1974 defines the protection of student education records Learn what is or is not considered part of the education record Directory and non directory information Situations in which stated information may or may not be disclosed Learn about a student s rights regarding their education record and the parent s rights regarding the education record of his or her child Gain an understanding of what the University may disclose without a student s consent Guidelines for student written consent of disclosure PCI Basics Payment Card Industry PCI Data Security Standards were established by major credit card companies to help organizations that process credit cards prevent credit card fraud and breaches of cardholder information Learn about PCI s 12 requirements that constitutes compliance by organizations when handling credit card transactions HIPAA Privacy HIPAA applies to the employees faculty and students within the covered entity of the University This training module will define Electronic Protected Health Information and the

    Original URL path: https://cuit.columbia.edu/cuit/security-awareness-training (2016-05-01)
    Open archived version from archive

  • UNIX Groups | Columbia University Information Technology
    the functionality of multiple group owners but does not have password protected groups or public groups We changed from the classic group command in June 2004 Put Files and or Directories in the Group At the UNIX prompt type chgrp R groupname from within the directory you want to add to the group This will add the directory itself as well as all files in that directory Note the period at the end of this command For example cd www data cu directory chgrp R ourgroup Ensure that New Files Added Later Will Be Owned by Your Group To force new files uploaded to a directory to have the same group designation as the directory you must turn the sticky bit on For a particular directory type chmod g s directory name where directory name is of course the name of a directory If you need to turn on the sticky bit for your top level directory and all of directories beneath it change directories to your top level web directory cd public html or if you are managing a website on the central servers for example the Art History site cd www data cu arthistory Then type find type d exec chmod g s Change file protections To allow your group to change the files you ve added to the group it is necessary to change the protection to allow any kind of group access Type the following at the UNIX prompt within the file s directory chmod R g rwX note the period at the end of this command It is necessary to type this verbatim as UNIX is case sensitive For example cd www data cu directory chmod R g rwX To allow others to read group s Web files use the standard UNIX chmod command For

    Original URL path: http://cuit.columbia.edu/unix-groups (2016-05-01)
    Open archived version from archive

  • Telnet and SSH | Columbia University Information Technology
    Public Computing Facilities IT Policies IT Security Resources Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups Columbia University Medical Center Information Technology CUMC IT Center for Digital Research and Scholarship CDRS Business School Information Services ITG Law School Information Technology SIPA Computer Facilities Social Work Computing and Instructional Technology Columbia College Information Technology CCIT Columbia Center for New

    Original URL path: https://cuit.columbia.edu/cuit/software-downloads/telnet-ssh (2016-05-01)
    Open archived version from archive

  • A Quick Guide To Emacs | Columbia University Information Technology
    string Show all commands containing string in their name M n Used before a command repeats it n times same as C u n C q Insert special characters for example typing C q C l inserts C l C x d Display and edit directory lists C h m shows commands Getting out C x C s Write this buffer to disk overwrites old file contents C x C w string Write this buffer to a disk file with specified name C x C z Exit to the shell can be continued later C x C c Exit and kill this Emacs cannot be continued later M x shell Start up a UNIX shell in its own buffer Buffer Operations C x C f file Get or create file named file in buffer of same name C x b file Select existing buffer named file for editing C x k file Delete buffer named file C x C b Display the list of available buffers M Move to the top of the current buffer file M Move to the end of the current buffer file Character Operations C b Move point one character to the left backward C f Move point one character to the right forward C p Move point up one line previous line C n Move point down one line next line DELETE Delete character to the left of point also marked RUBOUT C d Delete character to the right of or under point C t Transpose two characters around point for example ht becomes th Word Operations M b Move point one word to the left backward word M f Move point one word to the right forward word M DELETE Delete one word to the left C y yanks it back at point M d Delete one word to the right C y yanks it back at point M t Reverse words around point for example if only becomes only if Line Operations C a Move point to the beginning of this line C e Move point to the end of this line C o Open up blank line at point C x C o Close up all blank lines above and below point C k Delete from point to end of line C y yanks it back M 0 C k Delete from beginning of line to point C y yanks it back Sentence Operations M a Move point to the beginning of this sentence M e Move point to the end of this sentence C x DELETE Delete beginning of sentence to point C y yanks it back M k Delete from point to end of sentence C y yanks it back Paragraph Operations M Move point to beginning of this paragraph M Move point to end of this paragraph M q Fill this paragraph M 1 M q Justify this paragraph M n C x f Set fill column to n for example M 60 C x f sets it to

    Original URL path: https://cuit.columbia.edu/quick-guide-emacs (2016-05-01)
    Open archived version from archive

  • A Quick Guide to Pico and Pilot | Columbia University Information Technology
    given to pico by typing special control key sequences A caret is used to denote the control key sometimes marked CTRL so the CTRL q key combination is written as Q The following functions are available in pico where applicable corresponding function key commands are in parentheses G F1 Display this help text F move Forward a character B move Backward a character P move to the Previous line N move to the Next line A move to the beginning of the current line E move to the End of the current line V F8 move forward a page of text Y F7 move backward a page of text W F6 Search for where is text neglecting case L Refresh the display D Delete the character at the cursor position Mark cursor position as beginning of selected text Note Setting mark when already set unselects text K F9 Cut selected text displayed in inverse characters Note The selected text s boundary on the cursor side ends at the left edge of the cursor So with selected text to the left of the cursor the character under the cursor is not selected U F10 Uncut paste last cut text inserting it at the current cursor position I Insert a tab at the current cursor position J F4 Format justify the current paragraph Note paragraphs delimited by blank lines or indentation T F12 To invoke the spelling checker C F11 Report current cursor position R F5 Insert an external file at the current cursor position O F3 Output the current buffer to a file saving it X F2 Exit pico saving buffer Pilot Pilot displays and manipulates files Pilot is built into Pico You see the Pilot functions if you use the R Read File command and then the T To Files

    Original URL path: https://cuit.columbia.edu/quick-guide-pico-pilot (2016-05-01)
    Open archived version from archive

  • Endnote | Columbia University Information Technology
    saving BOTH the installer and License dat files to a temporary folder From that temporary folder run ENX7Inst msi NOTE You must have both the installer and the license file in this folder for the install to work Accept all default settings and if prompted agree to the terms of the license Macintosh If it does not open automatically double click on the downloaded EndNote X7 Site Installer dmg file An installer will appear on your desktop Drag the EndNote folder to your Applications folder in your Hard Drive It may take a couple of minutes for the files to copy completely The first time you click on the EndNote icon in its folder in Applications you will be walked through a setup process Accept the default settings and agree to the terms of license Upgrading from a Previous Version While it is not required it is best to uninstall older versions of EndNote before you install a new one Before you begin be sure to back up custom styles filters connection files and databases Windows Uninstall your older EndNote by going to Start Programs EndNote Uninstall EndNote Any filters or styles you may have created under a new name will be saved in the appropriate folders of the older version which will otherwise be empty You can put them into the appropriate folders of your newly installed version Macintosh Uninstall your older EndNote versions by opening EndNote going to the EndNote menu selecting Customizer and then Uninstall Be sure to pull out any filters or styles you may have created or edited before you drag the EndNote folder to the trash You can put them back in the appropriate folders of your new installed EndNote program Getting Help The EndNote Help file is available from the Help menu Many

    Original URL path: http://cuit.columbia.edu/endnote (2016-05-01)
    Open archived version from archive