An Inexpensive Solution to Securing Public Access Computers

Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms.

Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation.

The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal.

So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world.

After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to.

Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx.

Jim Frank is the Head of Computer Services for the Berwyn Public Library. He can be reached by emailing jiminberwyn@gmail.com. A support forum for the Public Access Security Tool can be found by visiting http://www.securepc.org. (NOTE TO EDITORS: This article may be edited for publication in your newsletter or on your website, but must include the author's name, and the title of the article.)

In The News:


pen paper and inkwell


cat break through


Unclogging Epson Print Heads

Tools needed:1 - 10cc Injector1 - 4" - 5" of... Read More

Digital Camera Prints - Getting the Most for Your Money

Digital cameras have really taken off in popularity in recent... Read More

Building A PC

Many people simply go to the retail store and get... Read More

War of the Disks: A Close-in Analysis of the Hard Disk Drive vs. the Solid State Disk

Much has been written about solid state disks (SSDs) becoming... Read More

Pixel Disruption To Cause Nausea From User of Computer Screen

As we study the issues associated with teaching kids in... Read More

Small Computers

Today, small form factor computers demolish the myth that bigger... Read More

Used Laptop Computer: Your Quick Purchase Inspection Guide ? Part 3

Used laptop computers are everywhere these days. How can you... Read More

Sony vs. Olympus: Digital Voice Recorders

Digital voice recorders have become increasingly popular over the last... Read More

Three Must Have Accessories For Notebook Computers

An Optical MouseNotebooks are normally equipped with touch pads which... Read More

How to Add or Remove an IDE ROM drive

CD ROMS - If you're adding or removing an internal... Read More

Cisco CCNA Certification: Why You NEED Hands-On Practice !

CCNA and CCNP candidates hear it all the time: "you... Read More

The Road Ahead

We live in an area that has begun to... Read More

RAM - What is It & Why You Need Plenty

This is the first article in the Understanding Your Computer... Read More

Digital Cameras, Media, and Card Readers

With the dropping prices on digital cameras and digital media... Read More

Quality Recovery and Rework - When It All Goes Wrong

When Quality is the Target, but not the Result, what... Read More

Your Hard Drive is Going to Explode ? Why a UPS is Essential

It's most peoples worst computing nightmare. You wake up in... Read More

Getting to Know Inkjet Printers

Inkjet printers were born in the 1980s, replacing the popular... Read More

Laptop Computers and the PVP Effect!

Roll over lumbering desktop computers, the limber laptop is here,... Read More

Inkjet Printer Tips to Select Proper Printer

If you are tight on budget, go for Inkjet Printer.... Read More

How to Choose a New Hard Drive for Your Computer

If you are running out of space on your computer... Read More

Would You Like An Extended Warranty With That?

Should you buy an extended warranty with your laptop? You... Read More

Dell Inspiron 600m Notebook Computer

After twelve years of owning desktop computers, I finally opted... Read More

Basics of RAID

A couple of the recent Tech Tips from www.geeks.com have... Read More

5 Ways To Backup Your Data...

The data on your hard drive is the most critical... Read More

Top Three Factors to Consider While Choosing a Data Center for Your Business

Data Centers are the core of the Internet. The computer... Read More

Preventing Tape Drive Failure

Contrary to popular belief, tape drives are generally robust and... Read More

HIPPA Goes Mobile and Wireless for Hospitals and First Responders

It appears we need to further streamline health care and... Read More

A Review of Brother Laser Toners

Brother is right up there with HP and Samsung as... Read More

How to Check Your IP

So you need to check your IP address, for whatever... Read More

Getting A New Laptop At A Great Price

With all the wheeling and dealing that seems to take... Read More

All In One Printers ? Home Office Workhorses

All in one printers, also known as multifunction printers (MFPs),... Read More

Where does technology come from?

Ever wonder where all the cool gadgets come from? Ever... Read More

Power and Your PC

The power coming into a computer is the most critical... Read More