Skip to content

SSH – Turvallinen pääteyhteys

– 31.10.2007

SSH – Secure Shell Tavallisilla pääteohjelmilla, kuten Telnetillä, siirtyy tieto selväkielisinä verkon yli, tämä koskee myös salasanoja. SSH:ta suositellaan käytettäväksi aina, kun yhteys otetaan turvattoman verkon yli. Suojaamatonta yhteyttä voidaan salakuunnella muilta verkossa olevilta tietokoneilta. Nykyään useimmissa palvelimissa on estetty Telnet-yhteyksien käyttö oman verkon ulkopuolelta tulevilta yhteyksiltä. Oamkin palvelimille (kuten students ja staff) ei voi […]

» Read more

Published in categories: All instructions, Oamk , for Oamk staff, for Oamk students
Tags: , , ,

Rules of IT systems use: maintenance of IT systems

– 19.5.2005

The purpose of the rules of IT systems use Principles of use Access rights and user accounts Validity of access rights Maintenance of IT systems (this page) Maintenance of IT systems Each information system in the University of Applied Sciences must have a designated party responsible (an owner), who is in charge of the intended […]

» Read more

Published in categories: English version available, All instructions, Oamk , for Oamk staff, for Oamk students
Tags:

Rules of IT systems use: validity of access rights

– 19.5.2005

The purpose of the rules of IT systems use Principles of use Access rights and user accounts Validity of access rights (this page) Maintenance of IT systems Validity of access rights The access rights expire automatically when the user is no longer within the University of Applied Sciences community the access rights granted for a […]

» Read more

Published in categories: English version available, All instructions, Oamk , for Oamk staff, for Oamk students
Tags:

Rules of IT systems use: access rights and user accounts

– 19.5.2005

The purpose of the rules of IT systems use Principles of use Access rights and user accounts (this page) Validity of access rights Maintenance of information systems Access rights and user accounts The user is issued rights to access certain information systems. The access rights are based on the user’s position at the University of […]

» Read more

Published in categories: English version available, All instructions, Oamk , for Oamk staff, for Oamk students
Tags:

Rules of IT systems use: principles of use

– 19.5.2005

The purpose of the rules of IT systems use Principles of use (this page) Access rights and user accounts Validity of access rights Maintenance of information systems Principles of use The key general principles guiding the use of the equipment and electronic services of the University of Applied Sciences, the rules of IT systems use […]

» Read more

Published in categories: English version available, All instructions, Oamk , for Oamk staff, for Oamk students
Tags: ,

Rules of IT systems use: the purpose of the rules

– 19.5.2005

The purpose of the rules of IT systems use (this page) Principles of use Access rights and user accounts Validity of access rights Maintenance of information systems The purpose of the rules of IT systems use The University of Applied Sciences is both a science and research community and an educational institution. It should secure […]

» Read more

Published in categories: English version available, All instructions, Oamk , for Oamk staff, for Oamk students
Tags:

E-mail guidelines

– 7.4.2005

Consider the recipients of your e-mail When you reply to an e-mail check that the e-mail address in the to-field is correct. Use a descriptive heading. Don’t spread any circular e-mails. Prefer text only messages whenever possible (= No HTML-pages or word documents for message that is composed of just text) Instead of mail attachments, […]

» Read more

Published in categories: All instructions, Oamk , for Oamk staff, for Oamk students
Tags: , , ,