Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt.edu
Walk-In: Library 101 • Hours
Reset HSU Password
System Status

Search

Search results

  1. Security :: Information Security Basics

    ... identity management is good password management. Encryption . Encryption converts data into a secure form that can be safely transferred and ...

    Page - Anonymous - Nov 3 2015 - 13:17

  2. Wireless :: Windows XP Wireless Connection Instructions

    ... sent over this connection will NOT be protected by encryption . Click the Connect Anyway button. 5. Open your web ...

    Page - rrw1 - Aug 11 2015 - 12:24

  3. Network Folders :: WebDAV Connections to Network Folders - Linux KDE

    ... Folder: /folders/HSUUserName x Create an icon x Use encryption ...

    Page - rrw1 - Jul 22 2015 - 16:47

  4. Google Apps :: POP Settings for Unsupported Email Clients

    ... having trouble sending mail but you've confirmed that encryption is active for SMTP in your mail client, try to configure your ...

    Page - blg10 - Jul 22 2015 - 16:45

  5. Google Apps :: IMAP Settings for Unsupported Email Clients

    ... having trouble sending mail but you've confirmed that encryption is active for SMTP in your mail client, try configuring your SMTP ...

    Page - blg10 - Jul 22 2015 - 16:43

  6. Security :: TrueCrypt Encryption for Windows 2000 & Linux

    TrueCrypt is an open source on-the-fly encryption program for Windows 2000 and Linux; it should NOT be used with ... password so it is very important to keep a backup of the encryption key. Do not encrypt the only copy of protected data. Mobile ...

    Page - rrw1 - Jul 22 2015 - 16:32

  7. Security :: Multifunction Copier/Printer Devices

    ... Consider the availability of security options such as encryption or hard drive overwriting before purchasing Any areas that process Level 1 or Level 2 data should purchase an MFD with encryption capability Devices configured for Level 1 or Level 2 data must ...

    Page - Anonymous - Jul 22 2015 - 15:27

  8. Protecting Yourself and Others

    ... for how to regain secure access to the HSU network. Encryption . HSU uses encryption to convert confidential data into a secure form that can be safely ...

    Page - Anonymous - Jul 22 2015 - 14:54

  9. Secure Tomcat SSL

    Purpose:  The current java encryption library on RHEL, and by extension Tomcat, is not able to directly use the more robust forms of encryption required by current browsers. In order to fix this, an apache ...

    ITS Change Procedure - psg53 - Jun 22 2015 - 09:39

  10. Summary of CSU and HSU Requirements for Storage of Level 1 Data

    ... been implemented to protect the data. Campuses must use encryption , or equally effective measures, on all mobile devices that store ... in the CSU Data Classification Standard. Alternatives to encryption must be reviewed on a case-by-case basis and approved in writing by ...

    Page - Anonymous - Jun 16 2015 - 09:47

Pages