Updating...
Skip to main content
(opens in a new tab)
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
ITC Services Portal
Sign In
Search
Home
Faculty
Staff
Students
Feedback
Services
Knowledge Base
More Applications
Skip to Knowledge Base content
Search
Articles
Knowledge Base
Information Security and Data Protection
Safe Computing and Data Security
Safe Computing and Data Security
Articles to help you be safe on your computer.
Categories (1)
Security Guides
Security Guides for faculty, staff, and students.
Expand
Articles (6)
A Practical Guide to DISC Classification
Managing API Keys
Securely Deleting Files
Sharing Sensitive Data
Understanding Dork Bot, Gastronaut, and CISA Web Vulnerability Scanning
Dartmouth Information Security partners with the University of Texas at Austin’s DorkBot project to proactively identify and remediate common web application vulnerabilities across Dartmouth’s public-facing websites and services.
DorkBot is an open-source, research-driven security scanner developed by the Center for Identity at UT Austin. It automates the detection of OWASP Top 10 vulnerabilities, helping organizations improve their web security posture in a safe and controlled manner.
IT Security Guidelines While Traveling Internationally
Search this category
Search
Blank
Popular Articles
Excel - Arrow keys no longer move cursor from cell to cell
Word - insert side by side images into document
Logging in to Banner Self-Service
Microsoft Excel: Combine data from multiple cells into single cell
Insert personal signature into Word for Mac document
Recent Articles
AI Data Sensitivity Guide
Mayer’s 12 Principles of Multimedia Learning
Add A Zoom Room to A Registered Event
Configuring Mail on Apple iOS Mail
macOS Tahoe: Before you Upgrade
Popular Tags
DartmouthRemoteReadiness
(50)
Oak
(46)
zoom
(35)
welcome
(31)
panopto
(24)
Zoom-phone
(24)
email
(22)
Outlook
(21)
Canvas
(18)
polycom
(18)