2015 Code4Lib Midwest Meeting
623 bytes added
16:46, 7 July 2015
Tentative Friday, July 24th
8:45 - 9:45: Lightning Talks #2<br />
9:45 - 10:00: Break<br />
10:00 - 10:20:
Paul Butler, Ball State University <br />
EZProxy – The Canary in the Coal Mine for Compromised User Credentials <br />
EZProxy is one of the most used, and exposed, applications that library IT supports. Libraries use EZProxy to restrict access to some of our most coveted resources. As such, EZProxy can be used as one of the frontlines in identifying compromised user credentials. In this presentation Paul Butler (Library Technologies Support Analyst at Ball State University) will discuss the techniques, EZProxy customizations, and custom code Ball State University Libraries uses to identify compromised user credentials.
10:20 - 10:40: Presentation #6<br />
10:40 - 11:00: Presentation #7<br />
← Older edit
Newer edit →
Retrieved from "