How can I tell if my computer has a virus (security)? (link) |
There are many possible indications of a computer virus. Here is a helpful link from Microsoft to help determine if your computer has a virus. |
Score: 100.0 - Updated: 6/4/2012 2:14:40 PM - Was this helpful? |
What is a virus (security)? (link) |
A computer virus is a software program that can reproduce itself, and often causes damage to other programs or files. |
Score: 100.0 - Updated: 6/4/2012 2:14:15 PM - Was this helpful? |
What is a firewall (security)? (link) |
A firewall is an appliance or software package that can be configured to help protect computer resources from external threats. Most computer operating systems have one (Windows and Mac) as well as other products like McAfee and Symantec. |
Score: 85.0 - Updated: 6/4/2012 2:13:48 PM - Was this helpful? |
What is phishing (security)? (link) |
Phishing is an attempt to steal personal information via email. Never respond to emails asking you to confirm your username and password, credit card number, bank account number, etc. See the ITS web page http://www.wlu.edu/x49702.xml#phish for more information. Report all phishing emails to Digitar by forwarding them to report_spam@spam.digitar.com Students use a separate spam filtering too within their Outlook Live accounts; see details. |
Score: 85.0 - Updated: 6/4/2012 1:17:11 PM - Was this helpful? |
What is a trojan (security)? (link) |
A trojan or trojan horse is non-self-replicating software/malware that appears to be or do one thing, but actually does something different - usually allowing unauthorized use or access to your computer. |
Score: 85.0 - Updated: 6/4/2012 1:19:26 PM - Was this helpful? |
What is malware (security)? (link) |
Malware is short for malicious software - software designed to infiltrate or damage your computer. Malware often arrives as a trojan and may also be spyware. |
Score: 85.0 - Updated: 6/4/2012 1:21:26 PM - Was this helpful? |
What is spyware (security)? (link) |
Spyware (a form of malware) is generally software used to gather your personal information without your knowledge. |
Score: 85.0 - Updated: 6/4/2012 1:26:54 PM - Was this helpful? |
What is encryption (security)? (link) |
Encryption refers to the conversion of data (e.g., plain text) to make it unreadable to anyone except to authorized people who have the appropriate encryption key. Encryption provides security and privacy, and can be in many forms and uses.
There is encryption software and hardware to encrypt data at rest (e.g., file/folder encryption) and data in motion (e.g., web traffic using SSL) or in any combination. It is very easy and cheap to encrypt files or a whole folder full of files, and both Windows and Mac OS X operating systems include encryption software.
Here are some good resources on encryption: http://www.wisegeek.com/what-is-encryption.htm and http://en.wikipedia.org/wiki/Encryption If you have any questions, please enter a Help Request. |
Score: 85.0 - Updated: 6/7/2012 3:07:32 PM - Was this helpful? |
What is confidential data (security)? (link) |
The University Confidentiality Policy covers "any personally-identifiable student and parent records, financial records (including social security and credit card numbers), and health records; contracts; research data; alumni and donor records; personnel records other than an individual's own personnel records; University financial data; computer passwords, University proprietary information/data; and any other information for which access, use, or disclosure is not authorized by: 1) federal, state, or local law; or 2) University policy or operations." If you have any questions, contact the ISP Coordinator or the Information Security Officer. |
Score: 80.0 - Updated: 6/4/2012 1:24:45 PM - Was this helpful? |
Where can I find information about IT security? (link) |
More information is available at the ITS Information Security SharePoint site; the University Information Security Program (ISP) site; as well as the ITS site. |
Score: 80.0 - Updated: 8/8/2013 1:53:38 PM - Was this helpful? |
How can I tell if an email is a hoax (security)? (link) |
You can search at http://www.snopes.com/ Snope.com or http://www.hoax-slayer.com/ Hoax-Slayer.com.
W&L will never ask you to click a link in an email to verify/update/confirm/etc your account.
If you are still unsure, please contact the help desk at 458-HELP (4357). |
Score: 80.0 - Updated: 7/15/2013 3:53:36 PM - Was this helpful? |
How do I encrypt a file (security)? (link) |
Encryption refers to the conversion of data (e.g., plain text) to make it unreadable to anyone except to authorized people who have the appropriate encryption key.
Please read the instructions carefully, and make sure you have a backup and recovery plan!
Here are some Windows encryption resources:
http://support.microsoft.com/kb/307877
http://support.microsoft.com/kb/223316
Here are some Mac OS X encryption resources:
http://docs.info.apple.com/article.html?path=Mac/10.4/en/mh1906.html
http://www.macosxtips.co.uk/index_files/encrypt-and-hide-your-private-files.html
There are also many other software and hardware choices for encyption.
If you have any questions, please enter a Help Request.
|
Score: 80.0 - Updated: 6/7/2012 3:07:24 PM - Was this helpful? |
How can I avoid identity theft (security)? (link) |
This resource from the Federal Trade commission explains identity theft, and what to do if your identity is stolen. |
Score: 77.5 - Updated: 6/4/2012 1:26:20 PM - Was this helpful? |
How can I tell if an email is a phishing scam (security)? (link) |
Look at examples of e-mail received by W&L community members, and see if you can tell the difference between legitimate e-mail and "phishing" attempts in this interactive quiz: http://www.wlu.edu/x31191.xml
Phishing is the fraudulent use of e-mail to extract confidential information. Often such messages appear to come from legitimate sources such as your bank, or W&L, and ask for information such as account information and passwords. Information Technology Services will never ask you to divulge your W&L password.
Beware of any e-mail purporting to be from Information Technology Services asking for your W&L password. Any such e-mail is “phishing”: an attempt to steal personal information. ITS staff will never ask you for your password, via email, phone, or any other means. Remember, your password is your secret.
Never respond to e-mails asking for your W&L password or other personal information, such as bank account or social security numbers. Instead, please follow the procedures to report it to our spam filtering vendor, and then delete the email.
Please protect yourself:
* If you disclosed your W&L password in response to a phishing email, change your password immediately at http://password.wlu.edu
* Never disclose your password to anyone.
* Your W&L password should not be used for any service outside the University. |
Score: 77.5 - Updated: 7/15/2013 3:55:46 PM - Was this helpful? |
What is the Information Security Program (ISP) at W&L? (link) |
The ISP and the ISP Committee were organized at the direction of the Provost in 2003 to comply with the Gramm-Leach-Bliley Act (GLBA) and to implement the “Safeguards Rule” issued by the Federal Trade Commission. The ISP Committee is chaired by the ISP Coordinator and the Committee has responsibility, in advising the Provost, for the ISP. The original program scope was intentionally broader than necessary for simple legal compliance, and requires all departments to have written procedures documenting the safeguards used to protect the University’s information assets. |
Score: 76.0 - Updated: 6/4/2012 1:24:10 PM - Was this helpful? |
Is email secure? (link) |
It all depends on what you’re trying to protect against. So, the simplest answer is 'no'! Email is not secure, unless you have taken extra steps to encrypt the message or the attachments (or both). Therefore, do not put confidential information (i.e., SSN, credit card number, etc.) in any email, unless you know it is encrypted. Briefly, access to your email account is secured by your username and password, so make sure you have a strong password. Email can be secured from network “snooping” by accessing it from a web page using Secure Socket Layers (SSL) – indicated by the “S” in HTTPS. If you access your email from your phone, then security depends on that device. These are just some of the variables/examples, and for more information please contact the Information Security Officer. |
Score: 70.0 - Updated: 7/15/2013 3:50:44 PM - Was this helpful? |
What is Notepad and where do I find it on my computer? (link) |
Notepad is a Windows program (PC). You can access it by going to Start > Run and typing in Notepad. The program should then open. Applies To: Faculty, Staff, Students |
Score: 10.0 - Updated: 9/24/2010 11:22:30 AM - Was this helpful? |
How do I clone (image) my computer? (link) |
Bring your computer to the Information desk in Leyburn Library. You can find the hours in the Trip Saver section on the Student homepage. We will work with you to find out what you need to have done to your image (for example back data up) and take your computer in and process your request. Applies To: Students |
Score: 10.0 - Updated: 4/5/2011 11:13:47 AM - Was this helpful? |
How do I deauthorize a computer with iTunes? (link) |
1. Open iTunes.
2. From the Store menu, choose Deauthorize This Computer. (In earlier versions of iTunes, access this option from the Advanced menu).
3. When prompted, enter your Apple ID and password, then click Deauthorize.
Remember to deauthorize your computer before you sell it, give it away, or get your computer serviced. Also, make sure you deauthorize your computer before you upgrade your RAM, hard disk or other system components, or reinstall Windows. If you do not deauthorize your computer before you upgrade these components, one computer may use multiple authorizations.
To deauthorize all computers associated with your Apple ID
If you need to authorize your new computer and are unable due to already having five authorized computers, you can deauthorize all computers by doing the following:
4. Click iTunes Store on the left side of iTunes.
5. If you're not signed in to the store, click the Account button, then enter your account name and password.
6. Click the Account button again (your Apple ID appears on the button), enter your password, and then click View Account.
7. In the Account Information window, click Deauthorize All. |
Score: 10.0 - Updated: 4/20/2012 8:47:38 AM - Was this helpful? |
My computer is saying it would be rebooting within ## minutes, what should I do? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Faculty, Staff |
Score: 10.0 - Updated: 2/5/2015 1:54:06 PM - Was this helpful? |
How do I get my laptop computer to display on the projector? (link) |
Most laptop computers require you to turn on the external monitor output in order to send the computer image to the projector. Follow these steps for WINDOWS based laptops: -Be sure you have a proper cable connected from your laptop's external monitor port directly to the projector or to the classroom podium connectors. -Press and hold the Fn key on your keyboard (usually located in the lower left). -Press the specific key for your laptop (F1-F12) that controls your external monitor port. The key is usually indicated by an external monitor icon or the words "CRT/LCD". For example, on a Dell laptop the proper keystroke combination is Fn+F8. Other brands may use Fn+F5, Fn+F7 or another combination. Check your owner's manual if you are unsure. -Repeat the keystroke combination if the laptop does not project after the first attempt.
ForMAC laptops: -An adaptor cable is usually necessary to connect a MAC laptop to one of the classroom systems or directly to a projector. There are several different styles that are model dependent. This cable normally comes with your laptop. See your owner's manual for more details. -Hook the adaptor cable directly to the projector or to the classroom podium connectors. -It is best to turn on your MAC laptop after making the proper cable connections. The laptop will see the external monitor and set itself up to send an image to it. |
Score: 7.5 - Updated: 3/9/2010 10:49:26 AM - Was this helpful? |
How can I get the Outlook client on my home computer? (link) |
Faculty and staff can purchase the current Office suite, which includes Outlook, at the University Store. Once you have installed Outlook, you can configure a mail profile using "Outlook Anywhere" so that you can use Outlook from home.
Note: If you are configuring a laptop for Outlook Anywhere connectivity while on campus, make sure to disconnect any wired and/ or wireless network connection. Otherwise Outlook will automatically configure the profile for you and none of the options below will be available.
- Go to: Start|Control Panel|Mail
- Click on Show Profiles
- Click the Add button
- Enter a profile name: (suggest something like "Off-campus username")
- Then check the box next to: Manually configure server settings or additional server types.
- Click Next
- Select Microsoft Exchange
- Click Next
- In the field labeled "Microsoft Exchange Server" type: mexmba.ad.wlu.edu
- In the field labeled "User Name" type: username (this is your network login ID)
- Click the More Settings button
- Go to the Connection tab
- Make sure the check box labeled "Connect to Microsoft Exchange using HTTP" is checked
- Click on the Exchange Proxy Settings button
- Enter the following information:
- https://autodiscover.wlu.edu
- Check the box next to Connect using SSL only
- UNcheck the box next to Only connect to proxy servers that have this…
- Enter the following information:
- msstd:autodiscover.wlu.edu
- Check the box next to On slow networks, connect using HTTP first…
- Choose NTLM Authentication for Proxy authentication Settings
|
Score: 7.5 - Updated: 7/15/2013 3:36:10 PM - Was this helpful? |
How do I set the region on a Macintosh computer? (link) |
Assuming you're talking about the region for the DVD device, it's a difficult question to answer. The only real way to set it is to insert a disc into the optical drive and wait for the regional interface to appear, and then select your region. I do believe, however, that the region can only be changed so many times before it becomes locked in place. Alternatively, you can download a piece of software known as VLC Media Player, which ignores the region protocol and will allow you to play media from any region so long as you have it set to the default media player instead of Apple's DVD Player. |
Score: 7.5 - Updated: 9/18/2012 3:18:25 PM - Was this helpful? |
How do I change the screen resolution on my computer? (link) |
Windows XP -
- Right click on your desktop
- Click Properties
- Click the Settings tab
- In the Screen Resolution section, use the slider bar to choose the resolution you want.
- Click the Apply button
Windows 7 -
- Right click on your desktop
- Click on Screen Resolution
- Use the drop down box beside Resolution, use the slider bar to choose the resolution you want.
- Click the Apply button
Macintosh
- Click on System Preferences
- Click Displays (If necessary, click the Display tab)
- Choose the appropriate resolution from the list
|
Score: 7.5 - Updated: 10/1/2010 4:04:36 PM - Was this helpful? |
What do I do if my Palm is not performing sync with my computer? (link) |
It can be a two step problem
1st the Hot Sync Manager with the icon in the bottom tray must be on.
Start menu - Programs - Hot Sync Manager
2nd the proper User must be activated
Open Hot Sync Manager - Network - Correct User
Run Sync |
Score: 7.5 - Updated: 4/7/2011 10:25:27 AM - Was this helpful? |
How can I move my music (iTunes)to a new computer? (link) |
For this example, I'll go from a Windows machine to Apple, but the process should work in reverse, as well.
If you want to make this easy, you'll need to move all your music into the iTunes folder. There's an easy way to do this: In iTunes go the Advanced menu and choose Consolidate library.
Any music not already in the iTunes folder will not be deleted. You'll just have two copies. One inside the iTunes folder and one outside.
Now quit iTunes and go to My Documents, then My Music, and you should see the iTunes folder. Now you need a place to put that folder. It could be an external drive, a network drive, USB or the fasts is to use a jump drive. Whatever you use just needs to be big enough to hold all your data. Right click on the folder and choose Properties to find out how big it is.
Drag the iTunes folder and copy it to wherever you're temporarily storing it.
Then connect the storage device to the new computer. In this case a Mac.
1. Install and launch iTunes. If iTunes asks to find your music say "no."
2. Quit iTunes.
3. Go to your Music folder.
4. Move the existing iTunes folder to the trash.
5. Copy the old iTunes folder off your storage device and put it where the old folder was.
6. Open iTunes again.
You should see your familiar library with ratings, play counts, etc. |
Score: 7.5 - Updated: 4/20/2012 8:49:24 AM - Was this helpful? |
How do I run softwear not installed on my computer? (link) |
( Restricted to authenticated users. Log In to view this answer. ) |
Score: 7.5 - Updated: 8/17/2015 10:44:31 AM - Was this helpful? |
Is there a computer in 345 Elrod Commons? (link) |
Yes, while there construction on the front campus Commons 345 is considered a classroom and there will be a laptop for the school year.
There is a DVD player and a VHS player in the room, along with cable TV. Everything must be projected through the projector. |
Score: 6.0 - Updated: 8/26/2014 1:05:52 PM - Was this helpful? |
How do I reserve a hands-on computer lab for a class? (link) |
( Restricted to authenticated users. Log In to view this answer. ) |
Score: 6.0 - Updated: 10/1/2010 2:22:47 PM - Was this helpful? |
What free student software is available and how do I install on my computer? (link) |
Anti-Virus Software (Windows)
To install anti-virus software on your computer you must first uninstall any other antivirus software you might have before installing ours. Then click on the link Microsoft Security Essentials for Windows 7/Vista/XP and install using Internet Explorer.
Microsoft Office 2010 or 2013 and 2011
Our license agreement with Microsoft provides students with rights to Windows operating system upgrades, Microsoft Office for Windows and MacOS.
- Students are entitled to upgrade to the latest versions until their graduation then you will have a perpetual license(s) for your installed version.
- Students that withdraw from the University without graduating must uninstall the Microsoft products acquired through this license agreement.
To install Office on your computer go to http://wlu.onthehub.com and click the "Sign In" link. If you are prompted, provide your W&L username and password. Click on the product you want and Add to Cart.
- Microsoft downloads are FREE for students.
- You can order backup discs for your products for $13.95 each.
- You can order an Extended Access Guarantee for $4.95 which gives you 24 months of access to your download(s) and license key(s).
Complete and confirm your order. Once your order has been placed, you'll receive an e-mail with a link to your downloads. KEEP TRACK OF YOUR PRODUCT KEY(S) You will be prompted to do a one time installation of Secure Download Manager. Follow the steps on the web page. Check the Download location at the top of the screen and make sure you have sufficient disk space in the Download Location and "Start Download".
If you have questions, please e-mail helpdesk@wlu.edu Applies To: Students |
Score: 6.0 - Updated: 6/6/2013 10:02:03 AM - Was this helpful? |
Which computer labs on campus have Audacity installed? (link) |
Audacity is installed on the computers in the Innovation Lab in Leyburn Library on the main level. It is also on the computers in Parmly 302.
Audacity is on the American Saddlebred and the Morgan images in the Stable. |
Score: 6.0 - Updated: 4/13/2011 10:13:35 AM - Was this helpful? |
How do I connect my Macintosh computer to a TV, VCR or a projector? (link) |
Mac Basics: Ports and connectors
This page: http://support.apple.com/kb/PH3672?viewlocale=en_US has information that will help you identify your video ports on your Macintosh.
For more information about your ports and connectors on your Macintosh, click on this link: http://support.apple.com/kb/HT2494?viewlocale=en_US
|
Score: 5.0 - Updated: 10/21/2013 5:23:28 PM - Was this helpful? |
How do I configure a Linux computer for the secure wireless network? (link) |
1. Edit the following file: /etc/wpa_supplicant/wpa_supplicant.conf2. Copy and paste the following entries:
network={ ssid="WLUsec" scan_ssid=1 key_mgmt=WPA-EAP pairwise=CCMP TKIP group=CCMP TKIP eap=PEAP identity="WLU Username" password="WLU Password" ca_cert="/etc/ssl/certs/Equifax_Secure_CA.pem" phase1="peaplabel=0" phase2="auth=MSCHAPV2" }
3. Save the wpa_supplicant.conf changes 4. Restart the WPA supplicant with the following command: /etc/init.d/wpa_supplicant restart5. Restart networking with the following command: /etc/init.d/network restart |
Score: 5.0 - Updated: 10/1/2010 4:04:59 PM - Was this helpful? |
How do I get Microsoft Security Essentials for my Windows 7 operating system? (link) |
You can download Microsoft Security Essentials at the following site:
http://www.microsoft.com/security_essentials/
Please uninstall any other antivirus software you might have before installing.
|
Score: 4.3 - Updated: 10/1/2010 2:29:31 PM - Was this helpful? |
How do I (Student) install the Microsoft Office product on my computer? (link) |
( Restricted to authenticated users. Log In to view this answer. ) Applies To: Students |
Score: 4.3 - Updated: 2/25/2015 11:19:36 AM - Was this helpful? |
How can a guest login on classroom computer or in the Stackhouse Theater? (link) |
On the Login screen: 1) Use the drop down box to change from the "AD" setting to the "this computer" setting. 2) Login name is W&LGuest 3) Password is W&Lpassword (entries are case sensitive)
*note: classroom guest login screen will look very similar to this laptop pool login screen below

|
Score: 3.8 - Updated: 6/14/2012 11:05:31 AM - Was this helpful? |
Is there a computer in the Chavis Board Room (Elrod Commons room 206)? (link) |
( Restricted to authenticated users. Log In to view this answer. ) |
Score: 3.3 - Updated: 10/1/2010 1:57:41 PM - Was this helpful? |
How do I access network drives (L:, H:, I:, J: ) on my computer or smart device? (link) |
1. Go to myvi.wlu.edu and authenticate. If it the first time you will be asked to install the Citrix client.
2. Choose a virtual desktop
3. Go to Computer (My Computer on Windows XP) and you should see the L: drive listed.
If you would like instructions for mapping a network drive on your computer, please send an email with your request to help@wlu.edu or call the Information Desk at extension 4357. |
Score: 3.3 - Updated: 10/26/2015 1:45:47 PM - Was this helpful? |
How do I copy music from my iPhone, iPad, or iPod touch to my Computer for Free? (link) |
Click this link found by our Mac technician. Applies To: Students |
Score: 3.3 - Updated: 1/2/2012 1:34:24 PM - Was this helpful? |
How do I add the Active Directory Users and Computers MMC to a Windows 7 Computer? (link) |
1. Open the folder: \\maltiris2\SoftwareDelivery\Microsoft\Management Tools
2. Open the appropriate folder and install the MMC
3. Select the Windows Start button and search for "Turn Windows Features On" and open the application.
4. Expand Remote Server Administration tools
5. Open Role Administration Tools
6. Open AD DS and AD LDS Tools
7. Open AD DS Tools
8. Check Active Directory Administrative Center
9. Select OK |
Score: 3.0 - Updated: 11/15/2013 12:56:12 PM - Was this helpful? |
Excel formatting of phone/social security columns does not merge to Word - is there a fix? (link) |
Word 2007 and Word 2010
- Start Word, and then open a new blank document.
- Go to Word Options
- In Word 2007, click the Office Button, and then click Word Options.
- In Word 2010, click File, and then click Options.
- On the Advanced tab, go to the General section.
- Click to select the Confirm file format conversion on open check box, and then click OK.
- On the Mailings tab, click Start Mail Merge, and then select Step By Step Mail Merge Wizard.
- In the Mail Merge task pane, select the type of document that you want to work on, and then click Next.
- Under Select starting document, select the starting document that you want to use, and then click Next.
- Under Select recipients, click Use an existing list, and then click Browse.
- In the Select Data Source dialog box, locate the folder that contains the Excel workbook that you want to use as your data source, select the workbook, and then click Open.
- In the Confirm Data Source dialog box, click to select the Show all check box. Click MS Excel Worksheets via DDE (*.xls), and then click OK.
- In the Microsoft Excel dialog box, under Named or cell range, select the cell range or worksheet that contains the data that you want to use, and then click OK.
NOTE: Your data now appears in the Mail Merge Recipients dialog box with the same formatting that appears in the Excel worksheet.
|
Score: 2.7 - Updated: 7/28/2011 3:12:21 PM - Was this helpful? |
Why am I unable to log into various Windows authenticated sites using FireFox 30 on a Mac or Linux computer? (link) |
FireFox version 30.0 breaks Windows authentication. Look for the resource document to the right for the fix. |
Score: 2.3 - Updated: 10/7/2014 7:05:25 AM - Was this helpful? |