Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: typos fixed

This page is for content that will eventually be used to create formal documentation.  Please include information, questions, links and any other lore that may be of use.

Best Practices 

  • Don't register a VM for DHCP on wireless.
  • When restoring from backup use move, not copy.

...

You will not be able to use a backed-up virtual machine at the same time as the original because you will have a MAC Address conflict on your network. If you need to be able to run the backed-up virtual machine at the same time as the original, you should make a copy using the Copied It option.

  • Networking: NAT

The security recommendations below were taken from our getting connected (Passport) doc's.

Security Recommendations

  • Feed me content! 
  • Back Up Your Data
    The importance of backing up your data cannot be stressed enough. If your
    hard drive fails or your computer is compromised, a backup can make a world of
    difference in recovering from such an event. Backups are always advised prior to
    updating your operating system. More information on MIT backup services is at
    http://web.mit.edu.ezproxyberklee.flo.org/ist/topics/backup/Image Removed.
  • Install Anti-Virus Software
    While MIT does its best to prevent virus attacks, no computer is immune to them. To
    encourage protection of your computer, MIT provides anti-virus software for free.
    • Linux: VirusScan
    • Macintosh: VirusScan
    • Windows PC: VirusScan
    For more information about virus protection at MIT, go to
    http://web.mit.edu.ezproxyberklee.flo.org/ist/topics/virus/Image Removed.

Once installed, VirusScan is configured to update your virus definitions automatically. You can also download virus definition files (known as DAT
files) from the vendor's web site: http://www.nai.com/us/downloads/default.aspImage Removed. W

  • Choose Strong Passwords
    Weak passwords can be guessed, thus giving someone else access to your files and your system. Create passwords that are at least eight
    characters long, containing numbers, upper and lower case letters, and symbols. More information on creating strong passwords can be found at
    http://web.mit.edu.ezproxyberklee.flo.org/ist/topics/network/passwords.htmlImage Removed.