Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results
Security :: Viruses and Other Malware

Malware , short for malicious software , is an all-ecompassing term for ... (or smartphone) without the user's informed consent. Malware includes viruses, worms, trojan horses, spyware, adware, scareware, ... Twenty years ago, worms and viruses were the only forms of malware in circulation, and they were not subtle. You knew you were in trouble ...

Page - rrw1 - Apr 2 2015 - 4:12pm - 0 comments - 0 attachments

Security :: Compromised Host Procedure - For IT Support Staff Use Only

... identified as being infected by a virus or other malware , proceed to the next step. If you run all the listed tools and ... Tools Sophos Root Kit Detector Malware Bytes F-Secure Blacklight GMER SysInternals ...

Page - rrw1 - Jul 22 2015 - 3:32pm - 0 comments - 0 attachments

Security :: Email Attachments

... should be constantly on guard against the threat of malware and take personal responsibility for ensuring that individual ... in those file formats most commonly used to distribute malware. Gmail will block these types of files even if they are sent in a ...

Page - rrw1 - Apr 2 2015 - 4:11pm - 0 comments - 0 attachments

Security :: Virus Protection

... your screen, or applications stopped working. Today's malware instead tries to be as secretive as possible - the goal is to get ... Because certain file types are commonly used to transmit malware, those types of file may not be sent over the HSU email system as an ...

Page - rrw1 - Jul 22 2015 - 3:35pm - 0 comments - 0 attachments

Security :: Spammers, Phishers, and How to Stop Them

... a link to a website that may infect your machine with malware and/or turn it into a “spambot”. This enables the ...

Page - rrw1 - Jun 16 2015 - 11:57am - 0 comments - 0 attachments

Security :: Approved Antivirus Software

... spyware, worms, Trojans, and a long list of other malware that can damage data or steal your identity. In order to protect ...

Page - rrw1 - Apr 28 2015 - 11:02am - 0 comments - 0 attachments

Security :: Information Security Online Training

... the CFA and CSUEU. Protecting yourself against malware and other threats Keeping your email and mobile devices secure ...

Page - rrw1 - Jul 22 2015 - 4:31pm - 0 comments - 0 attachments

Wireless :: Windows Vista Registration Instructions

... Note: Certain file types can may contain malware that will harm your computer, so you may see an additional ...

Page - rrw1 - Aug 11 2015 - 12:19pm - 0 comments - 0 attachments

Security :: Network Access Control

... way to protect the network is to proactively prevent malware or hackers from gaining access. At HSU, this is tackled at two ...

Page - rrw1 - Apr 2 2015 - 4:14pm - 0 comments - 0 attachments

Security :: Personal Responsibility

... illegal business activities Knowingly distributing malware or spam Specific rules and penalties apply to P2P ...

Page - rrw1 - Dec 16 2013 - 4:42pm - 0 comments - 0 attachments