Print

Print


Hello everyone

(I have been in IT for 25+ years, k-7 for 15 years and now 10 months UNBC
Library)
 

If I worked for an organization that did not have the money to go either
replacement Win7 or Linux desktop for usability issues.
 
I would contact Faronics and get a deal for educational licenses to
install Deepfreeze.
Then setup all workstation basic accounts and to reboot if idle for 1
hour. (and shut down, startup between set times)
Deepfreeze also has a remote console to unfreeze and refreeze for
maintenance to the workstation. (e.g. browser updates flash adobe)
This in hand with PDQ deploy/inventory works very nice. (Basic version
free)
 

Last option would (no possible for most places) contact the Dell official
lease site via direct or eBay. (there is a Canada and US supplier)
 
You can by nice 780 Dell with win7 pro for about $140 with shipping.
Some companies like Dell of HP have be know to also donate to non-profit.

~Ben

System Administrator
Geoffrey R. Weller library
UNBC, BC Canada
PH (250) 960-6605
[log in to unmask]







On 2014-03-04, 11:12 AM, "Ingraham Dwyer, Andy" <[log in to unmask]>
wrote:

>I would not be surprised if there were black hats out there sitting on
>exploits they've discovered, waiting until *after* April to release
>malware that takes advantage of them.
>
>-A
>
>
>Andy Ingraham Dwyer
>Infrastructure Specialist
>State Library of Ohio
>274 E. 1st Avenue
>Columbus, OH 43201
>Tel: 614-644-6849
>library.ohio.gov
>
>Please contact my supervisor with any feedback regarding my customer
>service.
>
>-----Original Message-----
>From: Code for Libraries [mailto:[log in to unmask]] On Behalf Of
>Justin Coyne
>Sent: Saturday, March 01, 2014 8:35 PM
>To: [log in to unmask]
>Subject: Re: [CODE4LIB] Windows XP EOL
>
>They won't be a security risk on April 8th, but the first time that MS
>publishes security patches after that date for newer version, security
>researchers will examine the patches.  Doing so will give them an idea
>about how to exploit the problem the patch was for.  They will then try
>to run the exploit on XP and see if it is vulnerable. Eventually they
>will find an exploit that works against XP.
>
>Even if you have a AV, people can exploit your machine without using a
>virus.  Is that a risk you want to accept?
>
>-Justin
>
>
>On Sat, Mar 1, 2014 at 4:59 PM, Jimm Wetherbee <[log in to unmask]> wrote:
>
>> Just because MS won't support XP any more doesn't mean those machines
>> are instantly useless or a security risk come April 8th.  We will not
>> be doing anything with our lab computers until Summer because they are
>> too old to run Windows 8 but we cannot do without them.
>>
>> --jimm
>>
>>
>> On Sat, Mar 1, 2014 at 5:28 PM, Riley Childs <[log in to unmask]
>> >wrote:
>>
>> > Hi,
>> > I wanted to hear how people are dealing with the Windows XP
>> > End-of-Life (if anything at all :(
>> >
>> >
>> > Personally I am migrating the computers that can run it to Windows 8
>> > (we ran out of 7 licenses and someone (years ago) bought SA, but
>> > that's
>> another
>> > story), and when April 7th comes around: throw anything we can't use
>> > away (sigh).
>> >
>> > Riley Childs
>> > Student
>> > Asst. Head of IT Services
>> > Charlotte United Christian Academy
>> > (704) 497-2086
>> > RileyChilds.net
>> > Sent from my Windows Phone, please excuse mistakes
>> >
>>
>>
>>
>> --
>>