archive-edu.com » EDU » C » COLUMBIA.EDU

Total: 400

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Legal Music and Movies Online | Columbia University Information Technology
    addition Amazon offers digital media in the form of DRM less MP3 s for music and DRM ed TV shows and movies Music and video is available on an a la carte basis but a large portion of video is also availble by yearly subscription through their Amazon Prime service Hulu Hundreds of free television shows and movies streaming through your web browser Paid subscription to their Hulu Plus service gives you accses to hundreds more and lets you stream it all through your smartphone tablet console or set top box Redbox Instant Hundreds of kiosks all over the city and a large library of streaming titles let Redbox users enjoy movies at any time for low prices Whether it s renting a DVD from a kiosk or streaming through their devices Pandora More Internet radio including the results of a method of music analysis they call The Music Genome Project Spotify Search for any song or album anywhere and stream it to your desktop or laptop Paid subscriptions also offer downloads and portable device support eMusic eMusic operates a bit differently than iTunes while also working on both Mac and Windows Subscriptions cover a certain amount of downloads per month and the music is presented in MP3 format which can be transferred to any portable music player They offer a free trial Rhapsody Rhapsody offers a subscription service for streaming music online through their client Downloads are also available on individual songs Emphasis is placed on reviewing as well as presenting material ShoutCast Internet radio from the creators of WinAmp Insound Insound is a nice merchant site for ordering music especially if you re looking for new vinyl GameFly GameFly is best described as The NetFlix of Console Games Free trial available Live365 An elder statesman among Internet radio

    Original URL path: http://cuit.columbia.edu/cuit/it-security-practices/filesharing-networks/legal-music-movies-online (2016-05-01)
    Open archived version from archive


  • Encryption Tools | Columbia University Information Technology
    files containing sensitive or confidential information must be encrypted and password protected before being transfered to another party via email or any file transfer method The following tools can help you secure your data and meet university standards Contents File Encryption Microsoft Office WinZip Disk Encryption Microsoft Encrypting File System FileVault TrueCrypt Guardian Edge Hard Disk Encryption myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Anti virus Backing Up CUIT Security Downloads CUIT Security How To s CUMC IT Security Filesharing Networks Handling Personally Identifying Information Information Security Tips and Tricks Keep Your Operating System Up To Date Phishing Scams and Spam Physical Security Protecting Your Passwords Social Networking Do s and Don ts Students Getting Started with Computer Security Symantec Security Response Using Strong Passwords Windows Update Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups Columbia University Medical Center Information Technology CUMC IT Center for Digital Research and Scholarship CDRS Business School Information Services ITG Law School Information

    Original URL path: http://cuit.columbia.edu/cuit/it-security-resources/handling-personally-identifying-information/encryption-tools (2016-05-01)
    Open archived version from archive

  • PII Scanning Software | Columbia University Information Technology
    the centralized Spider scanning software please contact the CUIT Security Office CISO at security columbia edu Spider original Cornell University version Vendor Website http www2 cit cornell edu security tools Use Identifies files that contain SSN Current Version Spider2008 Cost Free Open Source NOT supported by CUIT Spider the original SSN scanning tool developed at Cornell University can be used to scan a computer for Social Security Numbers and other sensitive information Spider produces a list of files which appear to contain this information and provides options for you to take immediate actions for remediation Verify each file that Spider finds Due to the method Spider uses to discover potentially sensitive files Spider may produce false alarms Each file must be opened and examined before decisions can be made concerning what actions must be taken There are several versions of Spider available for different operating systems Please use the one that is applicable to your computer This version of Spider is NOT supported by CUIT OpenDLP Vendor Website http code google com p opendlp Use Identifies files that contain SSN via centrally managed deployment Current Version 0 4 4 Cost Free Open Source NOT supported by CUIT OpenDLP is another open source alternative though more strongly geared towards a centrally managed server client envrionment It can push out scans over network shares and to any Windows Domain connected computer even without a pre installed client agent It has a much lighter memory footprint than Spider or CUSpider though it does not posses the ability to scan as many specific types of files as either This program is NOT supported by CUIT Identity Finder Vendor Website http www identityfinder com Use Enterprise level PII scanning program with centrally managed server software and proprietary algorithms to reduce false positives Current Version 5

    Original URL path: http://cuit.columbia.edu/cuit/it-security-resources/handling-personally-identifying-information/pii-scanning-software (2016-05-01)
    Open archived version from archive

  • Supplemental DLP Programs | Columbia University Information Technology
    to control the execution of applications by establishing a unique key or signature for each application and device Applications requiring the use of the CPU must present the unique pre approved key to gain access to resources If the key is not presented the application cannot execute and in the case of malware it will be contained and cannot spread For more information on your requirement and usage please contact the CUIT Security Office CISO at security columbia edu myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Anti virus Backing Up CUIT Security Downloads CUIT Security How To s CUMC IT Security Filesharing Networks Handling Personally Identifying Information Information Security Tips and Tricks Keep Your Operating System Up To Date Phishing Scams and Spam Physical Security Protecting Your Passwords Social Networking Do s and Don ts Students Getting Started with Computer Security Symantec Security Response Using Strong Passwords Windows Update Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups Columbia

    Original URL path: http://cuit.columbia.edu/cuit/it-security-resources/handling-personally-identifying-information/supplemental-dlp-programs (2016-05-01)
    Open archived version from archive

  • Finding your IP and MAC Addresses | Columbia University Information Technology
    and typing ipconfig all Look for the value of IP Address to determine your IP address and Physical Address to determine your MAC For Macintosh OS X open a Terminal window and type ifconfig a Look for the value of ether Reporting Security Problems Send reports of security incidents attacks or questions to security columbia edu myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Anti virus Backing Up CUIT Security Downloads CUIT Security How To s CUMC IT Security Filesharing Networks Handling Personally Identifying Information Information Security Tips and Tricks Keep Your Operating System Up To Date Phishing Scams and Spam Physical Security Protecting Your Passwords Social Networking Do s and Don ts Students Getting Started with Computer Security Symantec Security Response Using Strong Passwords Windows Update Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups Columbia University Medical Center Information Technology CUMC IT Center for Digital Research and Scholarship CDRS Business School Information Services ITG Law School Information Technology

    Original URL path: http://cuit.columbia.edu/cuit/it-security-practices/information-security-tips-tricks/finding-your-ip-mac-addresses (2016-05-01)
    Open archived version from archive

  • Forwarding Messages with Full Headers | Columbia University Information Technology
    second gives instructions for other clients courtesy of haltabuse org Full email headers Columbia supported email programs Full email headers other email programs To reach this page quickly in the future use the keyword headers Reporting Security Problems Send reports of security incidents attacks or questions to security columbia edu myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Anti virus Backing Up CUIT Security Downloads CUIT Security How To s CUMC IT Security Filesharing Networks Handling Personally Identifying Information Information Security Tips and Tricks Keep Your Operating System Up To Date Phishing Scams and Spam Physical Security Protecting Your Passwords Social Networking Do s and Don ts Students Getting Started with Computer Security Symantec Security Response Using Strong Passwords Windows Update Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups Columbia University Medical Center Information Technology CUMC IT Center for Digital Research and Scholarship CDRS Business School Information Services ITG Law School Information Technology SIPA Computer Facilities Social Work Computing

    Original URL path: http://cuit.columbia.edu/cuit/it-security-practices/information-security-tips-tricks/forwarding-messages-full-headers (2016-05-01)
    Open archived version from archive

  • Protect Data Using Encryption | Columbia University Information Technology
    if you ever forget the password that you use to log in to your machine all data that you have encrypted will be lost forever Microsoft s best practices for the Encrypting File System in Windows Apple s FileVault encryption tool for OS X 10 5 Instructions for password protecting and encrypting MS Office 2003 documents Instructions for password protecting and encrypting MS Office 2007 documents Instructions for password protecting and encrypting MS Office 2010 documents To reach this page quickly in the future use the keyword encryption Reporting Security Problems Send reports of security incidents attacks or questions to security columbia edu myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Anti virus Backing Up CUIT Security Downloads CUIT Security How To s CUMC IT Security Filesharing Networks Handling Personally Identifying Information Information Security Tips and Tricks Keep Your Operating System Up To Date Phishing Scams and Spam Physical Security Protecting Your Passwords Social Networking Do s and Don ts Students Getting Started with Computer Security Symantec Security Response Using Strong

    Original URL path: http://cuit.columbia.edu/cuit/it-security-resources/information-security-tips-tricks/protect-data-using-encryption (2016-05-01)
    Open archived version from archive

  • Valid SSH Keys | Columbia University Information Technology
    SSH Keys To reach this page quickly in the future use the keyword sshkeys Reporting Security Problems Send reports of security incidents attacks or questions to security columbia edu myUNI Service Desk myColumbia FAQ A Z Services About Us Give Us Feedback Computing Support About CUIT CUIT Careers CUIT Email Services Research Computing Services Teaching Learning Applications CUIT Public Computing Facilities IT Policies IT Security Resources Anti virus Backing Up CUIT Security Downloads CUIT Security How To s CUMC IT Security Filesharing Networks Handling Personally Identifying Information Information Security Tips and Tricks Keep Your Operating System Up To Date Phishing Scams and Spam Physical Security Protecting Your Passwords Social Networking Do s and Don ts Students Getting Started with Computer Security Symantec Security Response Using Strong Passwords Windows Update Manage my UNI Security Awareness Training Software and Downloads Search CUIT Go Text Size a a Other Columbia IT Groups Columbia University Medical Center Information Technology CUMC IT Center for Digital Research and Scholarship CDRS Business School Information Services ITG Law School Information Technology SIPA Computer Facilities Social Work Computing and Instructional Technology Columbia College Information Technology CCIT Columbia Center for New Media Teaching and Learning Search Columbia edu Submit Webmaster

    Original URL path: http://cuit.columbia.edu/cuit/it-security-resources/information-security-tips-tricks/valid-ssh-keys (2016-05-01)
    Open archived version from archive



  •