General Information
WPI Policy
- The WPI Acceptable Use Policy
- The WPI Campus Code of Conduct
- The WPI IT Division Policy and Procedures
- The WPI CCC Policies and Procedures
- WPI Copyright Compliance
- WPI General Policy Website
WPI Accounts
Anti-Virus Information
- CCC Helpdesk Virus Information
- CCC Helpdesk McAfee Install Procedures
- McAfee Threat Library
- Symantec Security Response Virus Database
- McAfee Virus Hoax list
Anti-Spyware Information
- Free Anti-Spyware software - Spybot Search and Destroy
- Free Anti-Spyware software - Microsoft Windows Defender
Firewalls
- Using the Windows Firewall
- Setting the Mac OS X 10.5 firewall
- Linux Home Networking - Linux Firewalls Using IP Tables
Microsoft Windows
Apple Mac OS X
Linux
- WPI Network Operations Linux Mirror (Fedora, CentOS)
- WPI ACM Linux Mirror (Debian, Gentoo, Ubuntu, NetBSD, OpenBSD, FreeBSD)
- WPI Computer Science Linux Mirror (SuSE)
- Fedora Security Resources
- Securing Debian Linux Manual
- Gentoo Linux Security Guide
- Ubuntu Linux Community Security Documentation
- Linuxdocs.org, lots of general Linux information
Sun Solaris
Encryption
- WPI's Virtual Private Network, encrypted remote access
- Secure Access at WPI
- OpenSSH, A free, multi-platform, open-source SSH server
General Reading
- SANS Infosec Reading Room
- SANS/FBI List of Top 20 system vulerabilities
- Security Focus, Articles and News in Information Security
- Bugtraq, Up-to-the-minute vulerability discussion
Last modified: Sep 19, 2008, 13:35 EDT
