Skip to Knowledge Base content

Information Security

Articles (9)

Pinned Article Acceptable Use of Computing Resources Policy: Addendum

Amendments to State of Oregon Policies on Acceptable Use of State Electronic Information Systems (Version 3: 8/1/97).

Pinned Article UO Acceptable Use of Computing Resources Policy

This document presents policies for acceptable use of University of Oregon computing resources. It neither reduces nor expands existing acceptable-use policies, but merely clarifies and illustrates the sorts of behaviors that may result in a response by the university or other interested parties.

Account Security and What to Do if Your Account is Compromised

This article contains information on Preventing an account compromise as well as how to regain access once an account is compromised.

Email Spoofing FAQ

This is a FAQ article regarding email spoofing.

Installing McAfee Management Agent

Guide to installing the McAfee Management Agent.

McAfee VirusScan

How to install McAfee VirusScan and McAfee Agent.

Technical guide: Meltdown and Spectre security vulnerabilities

Meltdown and Spectre are two recently-disclosed vulnerabilities present in many modern CPUs. These vulnerabilities may allow an untrusted webpage or client process to completely compromise the computer. Complete compromise could allow password theft, document theft, document deletion, malware installation, and other malfeasance.

Uninstalling McAfee Enterprise in Windows

Steps for uninstalling McAfee Enterprise in windows.