Search results

From IThelp
Results 1 – 26 of 26
Advanced search

Search in namespaces:

Page title matches

  • For information about Information security, please see: ...//www.uib.no/en/personaldata UiB's main page about privacy and information security]
    537 bytes (79 words) - 07:04, 24 February 2022
  • There are recurring security problems with Java. It will thus be best to avoid using Java as much as ...sis! (Instructions on how to do this can be found for example [http://nakedsecurity.sophos.com/2012/08/30/how-turn-off-java-browser/ here].)
    1 KB (230 words) - 13:34, 9 March 2017
  • [[no:SSH_Secure_Shell]] SSH or Secure Shell is a network protocol for secure transfer of data between server and client.
    2 KB (242 words) - 13:34, 9 March 2017
  • 4 KB (648 words) - 06:32, 26 May 2020
  • A serious security loophole in Mac OS High Sierra (10.13.x) was announced on November 28., Apple has since released a security update fixing the loophole. This update is installed on Macs with versio
    541 bytes (83 words) - 13:39, 1 December 2017

Page text matches

  • A serious security loophole in Mac OS High Sierra (10.13.x) was announced on November 28., Apple has since released a security update fixing the loophole. This update is installed on Macs with versio
    541 bytes (83 words) - 13:39, 1 December 2017
  • For information about Information security, please see: ...//www.uib.no/en/personaldata UiB's main page about privacy and information security]
    537 bytes (79 words) - 07:04, 24 February 2022
  • [[no:SSH_Secure_Shell]] SSH or Secure Shell is a network protocol for secure transfer of data between server and client.
    2 KB (242 words) - 13:34, 9 March 2017
  • There are recurring security problems with Java. It will thus be best to avoid using Java as much as ...sis! (Instructions on how to do this can be found for example [http://nakedsecurity.sophos.com/2012/08/30/how-turn-off-java-browser/ here].)
    1 KB (230 words) - 13:34, 9 March 2017
  • * [[:Category:Security software|Security]]
    857 bytes (101 words) - 10:31, 24 March 2017
  • ...H Secure File Transfer Clien'''t is a part of the program package '''[[SSH Secure Shell]]'''. You may also use '''FileZilla'''. 1. Start the program '''SSH Secure File Transfer Client '''(can be downloaded from [https://tjinfo.uib.no/pro
    2 KB (312 words) - 13:33, 9 March 2017
  • ...ork which only should be used by guests who cannot use eduroam. Eduroam is secure, available many places all over the world and tailored for academic use. ...ts functions the share files and collaborate. Always store your files in a secure place. Your own PC may fail or get stolen. OneDrive enables you to manage
    1 KB (183 words) - 06:47, 31 July 2019
  • [[Category:IT security]]
    538 bytes (86 words) - 18:17, 20 March 2013
  • == Setup of SSH Secure File Transfer Client == 1) Start the SSH Secure File Transfer Client (can be downloaded from https://tjinfo.uib.no/program
    2 KB (317 words) - 13:33, 9 March 2017
  • ...e the PIN-code you use for Studentweb, your studentnumber, and your social security number. There are no stupid, or silly questions when it comes to IT security. If you have a question, please contact us through [https://hjelp.uib.no
    2 KB (255 words) - 09:05, 30 July 2020
  • # Secure data stored on the machine. [[Category: IT security]]
    2 KB (258 words) - 12:33, 25 September 2019
  • # Secure data stored on the machine. [[Category: IT security]]
    2 KB (258 words) - 12:32, 25 September 2019
  • ...ong. You are responsible for maintaining a sufficient level of information security so that electronic aids or information are not stolen or misused. * Use secure passwords. Consider changing your passwords before traveling to ensure tha
    3 KB (532 words) - 12:11, 8 May 2019
  • *Security -> Security "WPA Enterprise"
    1 KB (188 words) - 16:12, 15 December 2017
  • 7. A new dialog box appears with two window tabs, "Connection" and "Security". Click on the secuirty tab and check that the configuration information 8.1 Select the button "Configure" next to "Secured password (EAP-MSCHAP v2)"
    2 KB (329 words) - 15:58, 15 December 2017
  • Use [[WinSCP]] or [[SSH_Secure_Shell|SSH Secure File Transfer]] or any other application that talks scp / sftp and contact
    2 KB (256 words) - 09:19, 17 April 2020
  • If you have questions or wish to talk to us about data security, call us at: [[Category:IT security]]
    2 KB (343 words) - 13:34, 9 March 2017
  • Note that cloud services like Microsoft OneDrive are not considered secure storage locations for sensitive information! Make sure you do not store se * You have a 1TB storage space with high security in OneDrive
    3 KB (452 words) - 06:02, 30 July 2020
  • ''''Familiarize yourself with our recommendations for [[Secure behaviour in digital meetings]]!''' ...just the meeting settings, i.e. for [[Secure behaviour in digital meetings|security]]. If you select "Do not show this again" at the bottom, these settings
    5 KB (857 words) - 08:23, 13 January 2021
  • The ''UiB keycard'' identifies you as a user. This makes the system secure and easy to use.
    723 bytes (114 words) - 12:26, 15 May 2019
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)