Policy

Why Should I Keep My Computer Secure?

The purpose of many security threats today is to allow a hacker to gain access to your computer. The hacker can then:

The following policies outline the terms of agreement for ResNet Internet access. This is a supplement to the University's Use of Computing Resources Policy.

  1. What is ResNet?

For a good description of this, view our About Us page.  If you need immediate help, click here.

2. Why are Internet download speeds different at different times of the day?

Click here for information.

  Peer to peer (p2p) file sharing is used to both download files and make them available for upload to other computers. Some common peer to peer clients are LimeWire, Kazaa, FrostWire, and BitTorrent.  More information on removing peer to peer software may be found here.

Dangers of File Sharing Programs

File sharing can be a useful and powerful tool; however, due to the nature of this technology, it carries with it a variety of potential problems:

Overview

Subscribe to RSS - Policy