Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms.
Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation.
The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal.
So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world.
After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to.
Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx.
Jim Frank is the Head of Computer Services for the Berwyn Public Library. He can be reached by emailing jiminberwyn@gmail.com. A support forum for the Public Access Security Tool can be found by visiting http://www.securepc.org. (NOTE TO EDITORS: This article may be edited for publication in your newsletter or on your website, but must include the author's name, and the title of the article.)
Tools needed:1 - 10cc Injector1 - 4" - 5" of... Read More
Digital cameras have really taken off in popularity in recent... Read More
Many people simply go to the retail store and get... Read More
Much has been written about solid state disks (SSDs) becoming... Read More
As we study the issues associated with teaching kids in... Read More
Today, small form factor computers demolish the myth that bigger... Read More
Used laptop computers are everywhere these days. How can you... Read More
Digital voice recorders have become increasingly popular over the last... Read More
An Optical MouseNotebooks are normally equipped with touch pads which... Read More
CD ROMS - If you're adding or removing an internal... Read More
CCNA and CCNP candidates hear it all the time: "you... Read More
We live in an area that has begun to... Read More
This is the first article in the Understanding Your Computer... Read More
With the dropping prices on digital cameras and digital media... Read More
When Quality is the Target, but not the Result, what... Read More
It's most peoples worst computing nightmare. You wake up in... Read More
Inkjet printers were born in the 1980s, replacing the popular... Read More
Roll over lumbering desktop computers, the limber laptop is here,... Read More
If you are tight on budget, go for Inkjet Printer.... Read More
If you are running out of space on your computer... Read More
Should you buy an extended warranty with your laptop? You... Read More
After twelve years of owning desktop computers, I finally opted... Read More
A couple of the recent Tech Tips from www.geeks.com have... Read More
The data on your hard drive is the most critical... Read More
Data Centers are the core of the Internet. The computer... Read More
Contrary to popular belief, tape drives are generally robust and... Read More
It appears we need to further streamline health care and... Read More
Brother is right up there with HP and Samsung as... Read More
So you need to check your IP address, for whatever... Read More
With all the wheeling and dealing that seems to take... Read More
All in one printers, also known as multifunction printers (MFPs),... Read More
Ever wonder where all the cool gadgets come from? Ever... Read More
The power coming into a computer is the most critical... Read More
How To Choose the Best Student Laptop?Merchants are singing those... Read More
Wireless Networking, Part 1: Capabilities and HardwareThese days it isn't... Read More
You can purchase an inkjet printer for as little as... Read More
The power coming into a computer is the most critical... Read More
So you know a little bit about tape backup, but... Read More
All in one printers, also known as multifunction printers (MFPs),... Read More
We've all been there. You're in the middle of printing... Read More
Have you ever felt like throwing the fax machine out... Read More
Whenever there is a complaint about monitor contrast problem I... Read More
Compatible Laser Toner CartridgesRecently, there has been a huge legal... Read More
The following is a list of tips to help safeguard... Read More
IntroductionThis document explains topics relating to wireless networks. The main... Read More
From throwing our unnecessary files, to defragmenting, from partitions to... Read More
Whereas 2D bar codes offer more security and safety for... Read More
Someone recently asked me "I teach senior citizens in a... Read More
Toshiba offers a few of their refurbished laptops in the... Read More
If you've been looking to upgrade your computer video card... Read More
With the dropping prices on digital cameras and digital media... Read More
The notebook computer is coming of age. For the first... Read More
Are you sick of all the high priced notebooks out... Read More
In the first two installments of this series of Tech... Read More
Junk faxes waste the resources of every business. It is... Read More
The Inkjet printer industry is booming. Office supply companies report... Read More
Computer network installation has become an essential prerequisite for any... Read More
There is something good about esr meter because besides electrolytic... Read More
If you've been in the market for a new computer... Read More
Other then keeping your HDD free of viruses, spyware, and... Read More
The other day my son said to me, what else... Read More
EEPROM stands for Electrical Erasable Programmable Read Only Memory and... Read More
Tablet PCs are great. If you are a mobile person,... Read More
So you need to check your IP address, for whatever... Read More
Cheap laptop computers are coming to a store near you.... Read More
Laser toner refills can be expensive. Over the life of... Read More
Computer Hardware |