Check Operating System for Security Vulnerabilities  
  Check Operating System for Validity (optional, but recommended)  
  Check Servers & Workstations for Viruses, Trojans, Spyware, Adware, & other Malicious Software  
  Check DSL or Cable modem for proper settings and security best practices  
  Check Router or Firewall for proper settings and security best practices  
  Check Wireless Access Point for security best practices  
  Provide a written report identifying vulnerabilities found and prioritizing any needed repairs  
  Post-Assessment Discussion of General Business & Computer Security Risks  
Home About Me Contact Support BLive To Me! Monthly Specials
 
  Check Operating System for Validity (optional, but highly recommended)


Upon request, we will validate that your copy of the Microsoft Windows operating system is genuine

  Microsoft's Genuine Advantage validation process does not collect any information, such as your name or email address, that can be used to identify you or contact you.

Click here to see an on-line simulation of the Microsoft validation process.

Validation can help assure that your license key cannot be used by another person in a malicious manner, such as activating a pirated or non-genuine copy of Windows.

It can also provide you with assurance that your computer supplier sold you a legal copy of the operating system:  computers purchased through internet auctions do not always have valid licenses for the operating system installed by the seller, and may even arrive with security exploits pre-installed.


Please note:  Duke IS IT does not condone, and cannot support, the use of pirated software: this violates my IT Code of Ethics.  Duke IS IT does not sell commodity hardware or software, but we can help you to select appropriate software for your business and assist you in obtaining it legally at the best possible prices.


 
 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices