Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

Security :: Secure Disposal of Paper & Electronic Media

... the drive is ready for retirement, simply delete the encryption key which leaves the drive inaccessible. Labeling Wiped ...

Page - Anonymous - Jun 2 2014 - 2:29pm - 0 comments - 0 attachments

Protecting Yourself and Others

... for how to regain secure access to the HSU network. Encryption . HSU uses encryption to convert confidential data into a secure form that can be safely ...

Page - Anonymous - Sep 3 2014 - 3:22pm - 0 comments - 0 attachments

Secure Wireless :: How to Connect :: Windows 8

... for Security type. Select AES for Encryption type. Select Microsoft: Protected EAP (PEAP) as the ...

Page - bjt7001 - Sep 15 2014 - 2:54pm - 0 comments - 0 attachments

Security :: Secure Media Transfer & Disposal Procedures

... the vendor. Maintenance and warranty with encryption : In cases where HSU-supported encryption is enabled, such drives may be returned for ... sure that data is unrecoverable from an SSD is to utilize encryption. Using full disk encryption has a two-fold effect: secure the ...

Page - rrw1 - Sep 16 2014 - 12:48pm - 0 comments - 0 attachments

Wireless :: Regular Wireless Access Overview

... While HSU has adopted GMail , which uses SSL encryption , as the campus standard email system, other email systems may ... You can usually tell if a web site is using SSL encryption by the presence of a "lock" icon in the lower right-hand ...

Page - rrw1 - Sep 15 2014 - 2:44pm - 0 comments - 0 attachments

Security :: Cornell Spider - Linux

... itself. Security Notes Spider uses an encryption and integrity checking mechanism intended to prevent the ... Blowfish is the default. Key (user defined) gives the encryption key used by both Spider client and spider_server for secure ...

Page - rrw1 - Sep 22 2014 - 2:31pm - 0 comments - 0 attachments

Security :: Multifunction Copier/Printer Devices

... Consider the availability of security options such as encryption or hard drive overwriting before purchasing Any areas that ... Level 1 or Level 2 data should purchase an MFD with encryption capability Devices configured for Level 1 or Level 2 data must ...

Page - Anonymous - Sep 3 2014 - 2:29pm - 0 comments - 0 attachments

Security :: Information Security Basics

... for how to regain secure access to the HSU network. Encryption . Encryption converts data into a secure form that can be safely transferred and ...

Page - Anonymous - May 5 2014 - 3:02pm - 0 comments - 0 attachments

feedback