Every computer on a network has a unique identifier. Just as you would address a letter to send in the mail, computers use the unique identifier to send data to specific computers on a network. Most networks today, including all computers on the Internet, use the TCP/IP protocol as the standard for how to communicate on the network.

ACCC Satellite Services Helpdesk provides hands-on technical support for personal computers and other devices of UIC students, staff, and faculty. Support is available for connecting to campus networks, including UIC-WiFi, virus removal, and installing campus-licensed software.

Audience: Faculty, Staff, Students

Do you have an "always on" Internet connection? It's easy to think that no one could possibly be interested in your personal computer, but that's simply not the case. Having a fast Internet connection that's "always on" when you want to surf the Web is great for you, but it's also great for hackers from around the world who sweep through thousands of random IP addresses looking for computers that they can exploit. And what they can do is really quite scary.

Your NetID and associated password are the only credentials needed to access most University and campus networking and computing services.  Services such as the my.UIC portal, Blackboard, email, campus computer labs, printers and more.

Passwords are managed centrally via the IAM Password Management service. 

Service: Security

Password managers can help you remember and secure all of your passwords.

A server certificate is needed to enable secure-socket layer (SSL) operation on a server (typically a web server) which verifies the server's identity to clients (typically web browsers). To avoid warning dialogs issued by web browsers, the certificate must be digitally signed by a trusted third party, a Certificate Authority (CA) such as Comodo, VeriSign, or Thawte, whose signatures are recognized by the browser. 

Audience: Faculty, Staff

The University of Illinois has provided an easy to use tool that uses a email notifications along with a Web site that allows you to securely send files to that anyone with a University of Illinois Enterprise ID and password. That is everyone at any campus of the University, these days -- faculty and staff must have them for Positive Time Reporting and other administrative tasks and students use them for registration. The tool is called PEAR, Protected E-Mail Attachment Repository Application.

Install Shibboleth service provider software

Red Hat Enterprise Linux, CentOS, and SUSE Linux

ACCC Security's mission is to protect the UIC community from active and potential security threats.

Audience: Faculty, Staff, Students, IT
Tags: security

Only University faculty or staff members my request SSL certificates. To obtain a SSL certificate for your server, log in to the WebStore and select Unit Purchase (certificates are not available for Personal Purchase). Place an order for SSL InCommon Comodo Certificate.   We offer 1 and 2-year new requests and renewals.  

There is a Web service whose purpose is to authenticate the end user (either by IP address or Bluestem id), check an authorization list, and supply the Web page if approved. All you have to do to use it is set up a configuration file that contains the authorization list.

Tags: security
Service: Security

A firewall is a network protection tool that guards against and reports intrusions on your computer from the outside, or unauthorized communications from the inside which runs whenever your computer is on.

ACCC offers UIC faculty, staff, and students Zone Labs Integrity Desktop personal firewall for Windows. Zone Labs Integrity Desktop is Zone Lab's popular and effective Zone Alarm firewall software with additional privacy and protection features.

Phishing is the term used to refer to email that is sent to you by someone trying to get information from you.

Network Scanning is a scan engine with a web-based interface that can be used to perform an external scan of your computer system. This comprehensive scan looks for potential vulnerabilities that could be used by remote attackers to control or access sensitive data on a system.  

Audience: Faculty, Staff, Students, IT

This page answers general questions about Web security, and lists the ways one can limit access to particular Web pages at UIC.

Tags: security

Viruses exploit weaknesses in your computer's system. As a user of UIC's network, it is your responsibility to secure your machine. Failure to do so will result in a suspension of your Res-Net account or general account privileges. Res-Net users and all other users with a history of infection and/or disregard of computer security may have their Res-Net access or account access permanently revoked.

Tags: security
Service: Security

This answer helps walk you through how to use the basics of Zone Labs Integrity Desktop after its has been installed and configured.

zone labs integrity desktop main page

Broadly speaking, computer security means that your computer behaves as you want it to, and that your information is used as you intend. There are always risks, and always costs associated with reducing those risks.

Service: Security

ACCC scanned all of its internal networks to look for hosts running a vulnerable version of the openSSL software. We identified approximately 25 machines with vulnerable versions of the software and immediately patched the software.

Although patching the systems resolves the immediate vulnerability, we will be updating private keys and installing new certs on all of the affected systems in the next few days.

Service: Security

As you are most likely aware, Microsoft is discontinuing support for Windows XP after the patches released on April 8, 2014 and it is widely anticipated that hackers will begin to target machines running Windows XP soon after.

Network security liaisons have been notified about any devices connected to the network still running Windows XP. To ensure the security of your data and your network, devices running Windows XP need to be remediated immediately.


Browse by tag