Library items tagged:

5. Appendices 5.1. Appendix I – Summary of Requirements 5.1.1. Common requirements 1. Participating organisations MUST observe the requirements set out in section two of this document. 2. Participants that choose to participate as a Home organisation MUST observe the requirements set out in section 3 of this document. 3. Participants that choose to participate as a Visited organisation MUST observe the requirements set out in section 4 of this document.
Anonymous
16/10/2013 Written by Pranay Pancholi at Loughborough University, WTAS adviser Wireless networks share the 2.4GHz and 5GHz spectrums along with a variety of other interfering devices. By conducting a Spectrum Analysis, IT administrators can quickly identify and troubleshoot common sources of interference of their local RF environment in Wi-Fi (802.11 a/b/g/n) networks.    
By Pranay Pancholi - Loughborough University 25/4/2014 Introduction
This page lists the most common frequently asked questions about eduroam in the UK. The table of contents summarises the questions asked; please scroll down to the relevant section for the answer. Contents: 1) Policy Scope of provision of eduroam services to users How can visitors without eduroam credentials be provided with network access? Is there a portal for users to register as a guest within eduroam or for events? 2) Business Case Objections/Concerns
Terms and Conditions of domain name registration
The Starleaf GT Mini and PT Mini was recently evaluated by our advisers based at University of Edinburgh. The full report can be found on the community site at this link. Starleaf's response to the evaluation can be found at this link.
Anonymous
Information and Guidelines on Logfiles LINX Best Current Practice – Traceability: https://www.linx.net/good/bcp/traceability-bcp-v1_0.html Information Commissioner’s Employee Monitoring code: http://www.ico.gov.uk/upload/documents/library/data_protection/detailed_specialist_guides/employment_practices_code.pdf
There may come a time when you may require to sinkhole or block some domains. One of the easiest way of doing this is within your DNS infrastructure by making your DNS Resolvers authoritative for the domains that you wish to block. Within your BIND configuration file which on Debian based systems is normally located at /etc/bind/named.conf.local you will need to specify which domains you want to block. named.conf.local //// Do any local configuration here//
How to block or sinkhole domains on Windows server 2008 DNS. There may come a time when you may require to sinkhole or block a large number of domains. One of the easiest way of doing this is within your BIND DNS infrastructure by making your DNS Resolvers authoritative for the domains that you wish to block. However if you do not have a BIND DNS server then this guide will allow you to sinkhole domains within a windows server 2008 environment.