Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

What is a Virtual Private Network?

... (confirming that you are who you say you are) and encryption to ensure only authorized users can read data transmitted ...

FAQ - Anonymous - Sep 12 2011 - 10:52am - 0 comments - 0 attachments

Response to Heartbleed SSL vulnerability

...   A security flaw in the SSL web encryption system was discovered on Monday, April 7. Campus servers have ...

ITS Story - bjt7001 - Apr 11 2014 - 10:31am - 0 comments - 0 attachments

Security :: Secure Disposal of Paper & Electronic Media

... the drive is ready for retirement, simply delete the encryption key which leaves the drive inaccessible. Labeling Wiped ...

Page - Anonymous - May 28 2013 - 12:18pm - 0 comments - 0 attachments

Secure Wireless :: How to Connect :: Windows 8

... for Security type. Select AES for Encryption type. Select Microsoft: Protected EAP (PEAP) as the ...

Page - bjt7001 - Dec 19 2013 - 3:47pm - 0 comments - 0 attachments

Security :: Secure Media Transfer & Disposal Procedures

... the vendor. Maintenance and warranty with encryption : In cases where HSU-supported encryption is enabled, such drives may be returned for ... sure that data is unrecoverable from an SSD is to utilize encryption. Using full disk encryption has a two-fold effect: secure the ...

Page - rrw1 - Dec 19 2012 - 3:27pm - 0 comments - 0 attachments

Security :: Protected Information Discovery Tools

... Cons: Uses non-standard encryption method Must be purchased Spider for Windows ... Stable Fast Cons: Uses non-standard encryption method Must be purchased Spider for Mac OS ...

Page - rrw1 - Sep 27 2012 - 1:57pm - 0 comments - 0 attachments

Wireless :: Regular Wireless Access Overview

... While HSU has adopted GMail , which uses SSL encryption , as the campus standard email system, other email systems may ... You can usually tell if a web site is using SSL encryption by the presence of a "lock" icon in the lower right-hand ...

Page - rrw1 - Apr 4 2014 - 8:46am - 0 comments - 0 attachments

Security :: Cornell Spider - Linux

... itself. Security Notes Spider uses an encryption and integrity checking mechanism intended to prevent the ... Blowfish is the default. Key (user defined) gives the encryption key used by both Spider client and spider_server for secure ...

Page - rrw1 - Sep 26 2012 - 8:42am - 0 comments - 0 attachments

Security :: Multifunction Copier/Printer Devices

... Consider the availability of security options such as encryption or hard drive overwriting before purchasing Any areas that ... Level 1 or Level 2 data should purchase an MFD with encryption capability Devices configured for Level 1 or Level 2 data must ...

Page - Anonymous - Dec 17 2013 - 2:19pm - 0 comments - 0 attachments

Security :: Information Security Basics

... for how to regain secure access to the HSU network. Encryption . Encryption converts data into a secure form that can be safely transferred and ...

Page - Anonymous - Feb 6 2013 - 5:56pm - 0 comments - 0 attachments

feedback