An Inexpensive Solution to Securing Public Access Computers

Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms.

Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation.

The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal.

So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world.

After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to.

Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx.

Jim Frank is the Head of Computer Services for the Berwyn Public Library. He can be reached by emailing jiminberwyn@gmail.com. A support forum for the Public Access Security Tool can be found by visiting http://www.securepc.org. (NOTE TO EDITORS: This article may be edited for publication in your newsletter or on your website, but must include the author's name, and the title of the article.)

In The News:


pen paper and inkwell


cat break through


How to Check Your IP

So you need to check your IP address, for whatever... Read More

Your Business versus Mother Nature

Business Consultants earn hundreds of thousands of dollars every year... Read More

A Short Introduction to Blu Ray

Blu ray is a next generation optical media format developed... Read More

Quality Recovery and Rework - When It All Goes Wrong

When Quality is the Target, but not the Result, what... Read More

Cisco CCNA Certification: An Illustrated Guide To Ethernet CSMA/CD

When you're studying for your CCNA exams, you're going to... Read More

A Guide to Refurbished Laptops

Computing freedom, independence, and mobility don't have to come with... Read More

The Right Way To Discharge Capacitor In Switch Mode Power Supplies

Switch mode power supply contain some large filter capacitors that... Read More

Would You Like An Extended Warranty With That?

Should you buy an extended warranty with your laptop? You... Read More

Best DVDs for Your Personal DVD Player

When bought personal DVD player, the very next thing to... Read More

The Hard Disk

From throwing our unnecessary files, to defragmenting, from partitions to... Read More

Wireless Networking, Part 2: Setup and Security

The first installment in this two-part series of Tech Tips... Read More

Ceramic Disc Capacitor-How to Accurately Test It

The last article I mentioned about electrolytic capacitor breakdown when... Read More

How to Avoid Getting Ripped-Off When You Purchase A New Printer

It's no big secret that printer companies like HP and... Read More

Introduction to Dedicated Servers

A dedicated server is a single computer on a web-hosting... Read More

Understanding Transistor Data and Replacement

If, for some reason, you can't get an exact replacement... Read More

Printer Cartridges - Step Back in History

You are working and trying to print out important documents... Read More

How to Get the Case Off Your PC!

This is the first step to servicing, upgrading or removing... Read More

Surge Protector: A Simple Mechanism Description

A surge protector [AKA surge suppressor] is an electrical plug-in... Read More

Generation Laptop

In May 2005 U.S hardware history was made.This was the... Read More

How To Save Big Bucks On A Laptop Computer

If you're a bargain shopper looking to get the most... Read More

Printer Ink Cartridges - The History

You are working at your computer and trying to print... Read More

How To Buy The Perfect Student Laptop

If you are like most student's, money isn't exactly growing... Read More

How to Purchase a Flat Panel TV

When purchasing a flat panel TV, there are a few... Read More

Does Size Really Matter In Our Digital Age?

Well, we've all seen the advert, but that's not what... Read More

Build Your First Computer from Hardware Scratches

Wow- if you do it first time and have some... Read More

Expansion Cards Part 2: AGP

Expansion Cards Part 2: AGPThe first in this series of... Read More

Easy to Execute!

Plug and play equipment or hardware solves the problem of... Read More

What Tablet PCs Can Do for You

Tablet PCs are great. If you are a mobile person,... Read More

RAID Disk Recovery

RAID is short for Redundant Array of Independent (or Inexpensive)... Read More

Computer Cooling Hardware

PC cooling systems are one of the hottest - and... Read More

Laptop Security -Where?d My Laptop Go?

Laptops are lovely. They are convenient, mobile, powerful and prestigious.... Read More

Intel Celeron vs Pentium

The Celeron and Pentium Processors are two of Intel's best... Read More

How to Add or Remove an IDE ROM drive

CD ROMS - If you're adding or removing an internal... Read More