In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
Encrypt File (WinZip for Mac)
Guidelines for personal computers & equipment
To view the contents of this post, you must be authenticated and have the required access level.
NUS Data Management Policy(DMP)
To view the contents of this post, you must be authenticated and have the required access level.
FAQ: Encrypting Flash Drive
Encrypt File (WinZip for Windows)
In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
NUS Bug Bounty Challenge Scope and Rules
NUS IT is excited to announce the NUS Bug Bounty Program, an initiative to improve our cybersecurity awareness and posture through community effort. Partnering with HackerOne and SOC, we aim to expose ALL NUS students to ethical hacking through online games, sharing by hackers and discovering bugs on NUS production systems. Sign up now!
SAP-Oracle 12c Database Baseline Security Standard 1.0
To view the contents of this post, you must be authenticated and have the required access level.
IT Security E-Learning Video Guides
To view the contents of this post, you must be authenticated and have the required access level.
Software term of use
To view the contents of this post, you must be authenticated and have the required access level.