Quick Links
No content has been promoted to the front page yet.
Events
TSO Content
Title | Summary | Last revised |
---|---|---|
zfs-data-recovery | How to restore mistakenly deleted files on a zfs filesystem | |
How To Not Handle a Ticket | An example of a customer complaint and recommendations on service improvements. | |
Cool (Linux) Tools | Cool (Linux) Tools | |
How to install Linux with an ISO image | This guide covers the basic process of installing an ISO Linux image onto a server or desktop | |
How to merge tickets in RT | Instructions for merging ticket in RT (help.cc.gatech.edu & hr-help.cc.gatech.edu) | |
College of Computing Data Center Access Process | This process describes how the College of Computing will adhere to USG and GT data center access policies and standards to physically protect data and assets in the data centers. | |
Colloge of Computing Information Security Incident Process | This process is to describe how the College of Computing will adhere to USG and OIT Security Incident policies and standards. It is not intended to replace any policies or processes from USG and OIT. Any conflicts with these policies or any other should be reported to the College of Computing Information Security Engineer Lead or TSO management | |
College of Computing End User Security Primer | This primer aims to familiarize users with the myriad security challenges in today's computing landscape. While it can't cover every aspect, it serves to increase awareness of risks, promote a questioning attitude, and encourage the reporting of suspicious activity. | |
College of Computing Firewall Process | This process is to describe how the College of Computing will adhere to USG and GT Firewall policies and standards. | |
Installing Linux Commvault Client | Installing Linux Commvault Client | |
Infiniband: Configuration and Troubleshooting | Infiniband: Configuration and Troubleshooting | |
How to Deploy an OS with Cobbler | This guide is meant to cover deploying Rhel and Ubuntu OS to a system using Cobbler | |
College of Computing Vulnerability Management Process | This process is to describe how the College of Computing will adhere to USG and OIT Vulnerability management policies and standards. It is not intended to replace any policies or processes from USG and OIT. Any conflicts with these policies or any other should be reported to the College of Computing Information Security Engineer Lead or TSO management. | |
Pynq Board Deployment Guide | Pynq Board Deployment Guide | |
Completing the Incident/Event Log | The Purpose of this Hot-To is to explain when and how to use the Incident log. The more accurate the log, the more it is possible to recognize and record trends for reporting and possible proactive prevention measures. | |
GTIPAM/DNS Cleanup and Review | Directions for annual cleanup and review of IPAM for housekeeping and security purposes. This procedure should precede firewall review and clean-up as it directly affects maintaining effective and secure firewall practices. | |
Configure SSL for Apache | How to set up Apache to use SSL | |
Linux Laptop Deployment Supplemental | This guide is meant to be a supplement for deploying an ubuntu laptop | |
Backing up ZFS | This guide is meant to be an overview of configuring a ZFS system to be backed up with out syncoid/sanoid service. | |
Linux Server Deployment Quickstart Guide | This is a guide meant to be a checklist through the server build process. This guide should also include supplement information for desktop and laptop information |