Computers/Technology

Technology Training: The Nonprofit Viewpoint

Technology Training: The Nonprofit Viewpoint

Lack of resources often a challenge

By: Marc Osten and Beth Kanter

October 1, 2002

How Nonprofits Can Get the Most out of Flickr

How Nonprofits Can Get the Most out of Flickr

Tips for using the online photo-sharing community successfully

By: Beth Kanter

March 5, 2008

Internetworking and Information Security Workshop

Missions Computing Education Program: A Ministry of LightSys Technology Services, Inc.

Internetworking and Information Security Workshop

 

This attached workbook contains information on:

- Internetworking topics

  • how does TCP/IP work?
  • routing, subnetting, and CIDR
  • masquerading and NAT
  • IP Tunneling
  • Advanced Routing with Linux

- Firewalling Topics

ThinClient Recommended Specification

 

 

Windows 2003 Terminal Services

Windows 2003 Terminal Services

 

 

Terminal Services allow:

  • the sharing of applications and desktops over the network

A CIC Vision Statement

A CIC Vision Statement

 


The Vision For Using Community Internet Cafes As A Means Of Sending Filipino Missionaries Into Unreached People Groups In Asia

Handbook for Bloggers and Cyber-Dissidents

Handbook for Bloggers and Cyber-Dissidents: Reporters without Borders

 

The attached 46-page handbook contains:

- What's a Blog?

- "Bloggers, the New Heralds of Free Expression" (Julien Pain)

- "The Language of Blogging" (Pointblog.com)

- "Choosing the Best Tool" (Cyril Fievet and Marc-Olivier Peyer)

- "How to Set up and Run a Blog" (The Civiblog system)

- "What Ethics Should Bloggers Have?" (Dan Gillmor)

- "Getting Your Blog Picked up by Search Engines" (Olivier Andrieu)

A Naive User's Guide to Running Windows More Securely

A Naive User's Guide to Running Windows More Securely

 

Written by special contributor Alcibiades on 2006-01-04 18:04:04
           

Security - PowerPoint Presentation

Security - PowerPoint Presentation

The attached PowerPoint presentation offers guidelines:

- The Impact of Security Breaches

- Types of Security Threats

- Identifying Security Threats

- Exploits in Computing Environments

- Implementing Group Policy

- Installing a Firewall

Security Operations Guide for Windows 2000 Server

Security Operations Guide for Windows 2000 Server

The attached PDF document outlines information on the Microsoft Operations Framework.

 

Chapters include:

- Understanding Security Risk

- Managing Security with Windows 2000 Group Policy

- Securing Servers Based on Role

- Patch Management

- Auditing and Intrusion Detection

- Responding to Incidents

Pages

Subscribe to RSS - Computers/Technology