Publisher's Version/PDF (3.676Mb)
Total Page:16
File Type:pdf, Size:1020Kb
III Public Access Com puter Software · Management · BV RICHARD \NAVNE 24 JUNE 2004 ' COMPUTERS IN LIBRARIES feature: PAC management tools ost libraries now recog nize that public access computers are essential M to providing excellent service to patrons. Managing these computers has become a major re sponsibility for library staffs. Patrons expect to find secure and well-main tained computers that have simple, stable, and predictable interfaces. In my capacity as assistant director for Information Systems at The Uni versity of Texas Southwestern Medical Center at Dallas (UT Southwestern) Library, I have grappled with public access computer issues for years. Ten years ago there were few software tools available; however, today there are many easy-to-use and cost-effective al ternatives to help manage public ac cess computers. Tools to Help Manage PACs I'm about to describe a representa tive sample of software tools in several important categories. This article does or not attempt to address all programs in Tools all software management categories • because there are too many products to do that. I'll discuss specific products LI rarl from specific vendors, but won't rec ommend any. You should do further re search and make a purchase decision appropriate to your environment. Most of the software discussed in this arti cle is available for testing prior to pur chase. Some of the programs are free. The categories of management soft ware that I will address are setup soft ware, security programs, integrity main Today, there are many tenance software, browser control tools, antivirus software, anti-spyware soft easy-to-use and cost-effective ware, patch management tools, session managers, print management systems, system utilities, and some Microsoft tools to help manage software options. However, I won't ad dress filtering software, anti-spam soft public access computers. ware, privacy tools, network trouble shooting tools, firewall software, and some other categories of management tools in this article. }} COMPUTERS iN LIBRARIES feature: PAC management tools Computer Setup configurations. In December 2003, Fortres 101 from Fortres Grand does Symantec acquired PowerQuest. not provide a menu, but it does lock I prefer an iterative method of de Develop a test environment ifpossi down specific Windows settings. By lock veloping a new computer configura ble. Then you can try various software ing Windows settings, you can control tion. Richard Wayne's Iterative Devel packages without impacting your pro what your patrons can and can't do. Fool opment Methodology goes something duction systems. Your test environment Proof Security from Riverdeep is another like this: should mimic your production environ product that provides desktop security ment as closely as possible. Microsoft's by locking down Windows features. • Start with the best available Virtual PC 2004 can help you to emu hardware. The new hardware late several operating system environ Integrity Maintenance Software ideally consists of identical models ments on a single test computer. to minimize deployment issues. Even with security software loaded, it is likely that, over time, your public • Talk to library and information Security Programs access computer software will become technology staff and patrons, and I will discuss security programs in corrupted and collect extraneous data. then create your first hardware and two sections. Those that prevent pa The solution to the problem is integrity software configuration for testing. trons from intentional or unintentional maintenance software. • Place the configuration someplace mischief and access are presented in Centurion Technologies provides where you can gather further this section. The programs that clean two alternatives. Centurion Guard uses staff feedback. up the potential clutter after patron both hardware and software. Drive sessions are listed in the next section Shield uses software only. Upon reboot, • Develop a second computer ("integrity maintenance software"). any changes patrons have made are re configuration based upon moved, and the system is restored to staff feedback. its initial configuration. • Place the configuration in a /I You need to have Deep Freeze from Faronics Tech location to gather further staff nologies and Clean Slate from Fortres and patron feedback. aggressive[ real-time Grand are also software-only options for integrity maintenance. All of the • Develop a third configuration based products in this category allow you to upon staff and patron feedback. virus scanning protect only the drives that you wish • Place the configuration in a to protect. For example, if you have an limited number of locations for 1f antivirus product on your D:\ drive, further staff and patron feedback. enabled at all times. then you could configure the software Further revise the configuration to protect your C: \ drive from changes, if necessary after usage. CybraryN from Computers By De but not your D: \ drive. sign prevents changes to a PC's config • Replicate the revised configuration uration. It can be configured to au by replacing the old configuration Browser Control Tools thenticate to your integrated library with the revision. system (ILS). For example, CybraryN Let's face it, the Web is tremendously works with systems from Innovative, popular with our library patrons. As a Once you have developed your final Dynix, Sirsi, Gaylord, and other ILS result, they will attempt to use every configuration, preserve it. Make a copy vendors. If a patron does not have a available computer for general Web ac of the configuration and place it on a valid bar code, has excessive overdues, cess. Sometimes, these can be comput server, another computer, an external or is not a valid patron type, then he or ers designated for OPAC or licensed hard drive, or a DVD. Then you can she will not be able to use the public ac database use only. When that happens, replicate your configuration using soft cess computer if you design it that way. you want to make sure that only the cat ware tools like these: CybraryN provides a menu and alog or subscription databases can be Symantec Ghost can back up, store, other features to prevent patrons from accessed from those computers. If you and replicate configuration images. corrupting the computer's software. The don't, they will end up becoming general PowerQuest's DeployCenter has su patron is locked into the CybraryN in Internet access computers. perseded PowerQuest's Drive Image terface and cannot execute programs or Public Web Browser (PWB) from Pro and can also help deploy software utilities that damage the configuration. TeamSoftware Solutions controls Web 26 JUNE 2004 » COMPUTERS IN LIBRARIES feature: PAC management tools browser sessions. PWB replaces the In cation (for non-commercial use) is Ad ured for use in a patron self-service ternet Explorer interface with an in aware from Lavasoft. mode or a staff-managed mode. It even terface that is highly configurable. It supports making reservations via the allows you to specifY sites that can or Patch Management Tools Web or telephone. can't be accessed via the browser. PWB also lets you customize a number of Information technology profession other options such as buttons, drop als have been accustomed to keeping II Running anti-spyware down menu items, home page default, antivirus software up-to-date. The pop-up policies, printing settings, and Blaster worm opened our eyes to a new software on a system for download capabilities. threat in 2003-we saw that Windows K-Meleon from kmeleon.org also al systems also needed to be kept up-to lows you to control many browser func date with critical updates issued by the first time can be tions. It is free, open source software. Microsoft. The industry has been in a WINSelect from Faronics gives you whirlwind of activity since Blaster, try control over many browser and Win ing to anticipate the next round of ma an enlightening and dows features. licious software. There are a number of applications available to help keep shocking experience. /I Antivirus Software systems patched and secure. Microsoft has developed a patch In 1992, extensive media coverage led management tool called Software Up Comprise Technologies offers Smart to Michelangelo virus hysteria. It was a date Services or SUS. It is used to de Access Management or SAM. It has a DOS-based virus and was a new expe ploy critical Windows updates through number of interesting modules for rience for computer users at that time. out your library. As ofthis writing, SUS time, reservation, Internet, desktop, At UT Southwestern, we distributed 1.0 with Service Pack 1 is available. and report management. Michelangelo detection and removal SUS 2.0 is in development and has been tools on diskette to hundreds of cus renamed ''Windows Update Services." Print Management Systems tomers at a centralized "crisis center." Shavlik Technologies provides a Virus writers have come a long way, powerful patch management product Print management systems help to and so have the applications to combat called HFNetChkPro. The Microsoft reduce wasted paper and ink cartridges. them. Today, you need to update your Baseline Security Analyzer (MBSA) They also make the printing cost-recov antivirus software at least daily. You uses the HFNetChkPro scanning en ery process more efficient for both pa need to have aggressive, real-time gine. MBSA is a free tool that allows trons and staff. virus scanning enabled at all times. systems administrators to identify re With LPT:One from EnvisionWare, A number of good tools are available quired patches for computers through you can set a price per page, a maximum to help with this effort. A few of the out the network. number of pages that a patron can print, major antivirus vendors are Computer and different prices per printer. A sim Associates, McAfee, Panda, Sophos, Session Managers ple dialogue leads the patron through and Symantec.