AuthorMonique ArchivesCategories |
Back to Blog
DO NOT track or keep any logs of users and their activities. Encryption of all traffic on users's device 4. Hide users's IP, identity and location and nobody can track users's activities on the Internet. Protect users as anonymity with a private browser 2.
Get Token Server To Internet Using Vpn Install One TimeYou will receiveConfiguration instructions for a PC, MAC, iPad, iPhone, or AndroidIf you are using using a "managed" or work-issued computer or device:Note: When you access the D-H network in this way, you will not be able to cut and paste between files that are open on your computer, and files that are open in Secure Access. Follow the instructions in the linked document. Install the Citrix Receiver (only necessary to install one time) Server hostname: This can either be the IP.If you are using Secure Access for the first time from an "unmanaged" or personal home computer or device: If you encounter problems,If youre using your Chromebook with an organization, you might need to get this information from your administrator.Utilities and My Files, which includes your network drives (H and I drives)Additional resources are being added all the time. Terminal Systems, which includes DH1, DH8i, DH11i, and DH9i Microsoft Office, which includes Excel, PowerPoint, and Word Library Information Resources from the Biomedical Libraries
0 Comments
Read More
Leave a Reply. |