Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms.
Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation.
The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal.
So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world.
After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to.
Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx.
Jim Frank is the Head of Computer Services for the Berwyn Public Library. He can be reached by emailing jiminberwyn@gmail.com. A support forum for the Public Access Security Tool can be found by visiting http://www.securepc.org. (NOTE TO EDITORS: This article may be edited for publication in your newsletter or on your website, but must include the author's name, and the title of the article.)
![]() |
|
![]() |
|
![]() |
|
![]() |
So you need to check your IP address, for whatever... Read More
Business Consultants earn hundreds of thousands of dollars every year... Read More
Blu ray is a next generation optical media format developed... Read More
When Quality is the Target, but not the Result, what... Read More
When you're studying for your CCNA exams, you're going to... Read More
Computing freedom, independence, and mobility don't have to come with... Read More
Switch mode power supply contain some large filter capacitors that... Read More
Should you buy an extended warranty with your laptop? You... Read More
When bought personal DVD player, the very next thing to... Read More
From throwing our unnecessary files, to defragmenting, from partitions to... Read More
The first installment in this two-part series of Tech Tips... Read More
The last article I mentioned about electrolytic capacitor breakdown when... Read More
It's no big secret that printer companies like HP and... Read More
A dedicated server is a single computer on a web-hosting... Read More
If, for some reason, you can't get an exact replacement... Read More
You are working and trying to print out important documents... Read More
This is the first step to servicing, upgrading or removing... Read More
A surge protector [AKA surge suppressor] is an electrical plug-in... Read More
In May 2005 U.S hardware history was made.This was the... Read More
If you're a bargain shopper looking to get the most... Read More
You are working at your computer and trying to print... Read More
If you are like most student's, money isn't exactly growing... Read More
When purchasing a flat panel TV, there are a few... Read More
Well, we've all seen the advert, but that's not what... Read More
Wow- if you do it first time and have some... Read More
Expansion Cards Part 2: AGPThe first in this series of... Read More
Plug and play equipment or hardware solves the problem of... Read More
Tablet PCs are great. If you are a mobile person,... Read More
RAID is short for Redundant Array of Independent (or Inexpensive)... Read More
PC cooling systems are one of the hottest - and... Read More
Laptops are lovely. They are convenient, mobile, powerful and prestigious.... Read More
The Celeron and Pentium Processors are two of Intel's best... Read More
CD ROMS - If you're adding or removing an internal... Read More
When buying a new computer, or upgrading your monitor, you... Read More
Cleaning a laser printer, fax, or copier of laser toner... Read More
Should you buy an extended warranty with your laptop? You... Read More
There is a great need for preventive maintenance in correctional... Read More
Video displays are most recent technique used in both outdoor... Read More
The power coming into a computer is the most critical... Read More
Protecting Against A Power Surge:Your computer is an expensive investment;... Read More
You are working and trying to print out important documents... Read More
It is the most annoying thing when one day you... Read More
OK I confess I've bought at least 10 inkjet printers... Read More
If you've been in the market for a new computer... Read More
Throughout the years there have been many technologies involved with... Read More
The gaming laptop is coming of age! It is steadily... Read More
PCIThe expansion slots available on motherboards allow for a variety... Read More
Printer technology has made tremendous advances in the past five... Read More
There are many fancy add-ons for computers, but the basic... Read More
DVD is an optical disc storage media format that can... Read More
The first installment in this two-part series of Tech Tips... Read More
There is something good about esr meter because besides electrolytic... Read More
IBM boasts a very large array of older and newer... Read More
There are many different names for these drives, just so... Read More
You really enjoy those dvd movies and games and the... Read More
When you're studying for your CCNA exams, you're going to... Read More
This is the first article in the Understanding Your Computer... Read More
ROUTING PROTOCOLSA generic term that refers to a formula, or... Read More
Video technology has increased significantly over the past years, and... Read More
Thinking about a mini DVD camcorder? You're not alone, it's... Read More
The Pocket DVD Wizard allows you to make backup copies... Read More
Why are there faint areas or gaps in my print... Read More
A couple of the recent Tech Tips from www.geeks.com have... Read More
When comparing refurbished laptop models, ask about these specifications:Central Processing... Read More
To Wire or Not to Wire Wireless networks... Read More
There are three refurbished laptop battery types, each named for... Read More
Computer Hardware |