How do I encrypt a file (security)? (link) |
Encryption refers to the conversion of data (e.g., plain text) to make it unreadable to anyone except to authorized people who have the appropriate encryption key.
Please read the instructions carefully, and make sure you have a backup and recovery plan!
Here are some Windows encryption resources:
http://support.microsoft.com/kb/307877
http://support.microsoft.com/kb/223316
Here are some Mac OS X encryption resources:
http://docs.info.apple.com/article.html?path=Mac/10.4/en/mh1906.html
http://www.macosxtips.co.uk/index_files/encrypt-and-hide-your-private-files.html
There are also many other software and hardware choices for encyption.
If you have any questions, please enter a Help Request.
|
Score: 100.0 - Updated: 6/7/2012 3:07:24 PM - Was this helpful? |
What is a firewall (security)? (link) |
A firewall is an appliance or software package that can be configured to help protect computer resources from external threats. Most computer operating systems have one (Windows and Mac) as well as other products like McAfee and Symantec. |
Score: 85.0 - Updated: 6/4/2012 2:13:48 PM - Was this helpful? |
What is phishing (security)? (link) |
Phishing is an attempt to steal personal information via email. Never respond to emails asking you to confirm your username and password, credit card number, bank account number, etc. See the ITS web page http://www.wlu.edu/x49702.xml#phish for more information. Report all phishing emails to Digitar by forwarding them to report_spam@spam.digitar.com Students use a separate spam filtering too within their Outlook Live accounts; see details. |
Score: 85.0 - Updated: 6/4/2012 1:17:11 PM - Was this helpful? |
What is a virus (security)? (link) |
A computer virus is a software program that can reproduce itself, and often causes damage to other programs or files. |
Score: 85.0 - Updated: 6/4/2012 2:14:15 PM - Was this helpful? |
What is a trojan (security)? (link) |
A trojan or trojan horse is non-self-replicating software/malware that appears to be or do one thing, but actually does something different - usually allowing unauthorized use or access to your computer. |
Score: 85.0 - Updated: 6/4/2012 1:19:26 PM - Was this helpful? |
What is malware (security)? (link) |
Malware is short for malicious software - software designed to infiltrate or damage your computer. Malware often arrives as a trojan and may also be spyware. |
Score: 85.0 - Updated: 6/4/2012 1:21:26 PM - Was this helpful? |
What is spyware (security)? (link) |
Spyware (a form of malware) is generally software used to gather your personal information without your knowledge. |
Score: 85.0 - Updated: 6/4/2012 1:26:54 PM - Was this helpful? |
What is encryption (security)? (link) |
Encryption refers to the conversion of data (e.g., plain text) to make it unreadable to anyone except to authorized people who have the appropriate encryption key. Encryption provides security and privacy, and can be in many forms and uses.
There is encryption software and hardware to encrypt data at rest (e.g., file/folder encryption) and data in motion (e.g., web traffic using SSL) or in any combination. It is very easy and cheap to encrypt files or a whole folder full of files, and both Windows and Mac OS X operating systems include encryption software.
Here are some good resources on encryption: http://www.wisegeek.com/what-is-encryption.htm and http://en.wikipedia.org/wiki/Encryption If you have any questions, please enter a Help Request. |
Score: 85.0 - Updated: 6/7/2012 3:07:32 PM - Was this helpful? |
How can I tell if my computer has a virus (security)? (link) |
There are many possible indications of a computer virus. Here is a helpful link from Microsoft to help determine if your computer has a virus. |
Score: 80.0 - Updated: 6/4/2012 2:14:40 PM - Was this helpful? |
What is confidential data (security)? (link) |
The University Confidentiality Policy covers "any personally-identifiable student and parent records, financial records (including social security and credit card numbers), and health records; contracts; research data; alumni and donor records; personnel records other than an individual's own personnel records; University financial data; computer passwords, University proprietary information/data; and any other information for which access, use, or disclosure is not authorized by: 1) federal, state, or local law; or 2) University policy or operations." If you have any questions, contact the ISP Coordinator or the Information Security Officer. |
Score: 80.0 - Updated: 6/4/2012 1:24:45 PM - Was this helpful? |
Where can I find information about IT security? (link) |
More information is available at the ITS Information Security SharePoint site; the University Information Security Program (ISP) site; as well as the ITS site. |
Score: 80.0 - Updated: 8/8/2013 1:53:38 PM - Was this helpful? |
How can I tell if an email is a hoax (security)? (link) |
You can search at http://www.snopes.com/ Snope.com or http://www.hoax-slayer.com/ Hoax-Slayer.com.
W&L will never ask you to click a link in an email to verify/update/confirm/etc your account.
If you are still unsure, please contact the help desk at 458-HELP (4357). |
Score: 80.0 - Updated: 7/15/2013 3:53:36 PM - Was this helpful? |
How can I avoid identity theft (security)? (link) |
This resource from the Federal Trade commission explains identity theft, and what to do if your identity is stolen. |
Score: 77.5 - Updated: 6/4/2012 1:26:20 PM - Was this helpful? |
How can I tell if an email is a phishing scam (security)? (link) |
Look at examples of e-mail received by W&L community members, and see if you can tell the difference between legitimate e-mail and "phishing" attempts in this interactive quiz: http://www.wlu.edu/x31191.xml
Phishing is the fraudulent use of e-mail to extract confidential information. Often such messages appear to come from legitimate sources such as your bank, or W&L, and ask for information such as account information and passwords. Information Technology Services will never ask you to divulge your W&L password.
Beware of any e-mail purporting to be from Information Technology Services asking for your W&L password. Any such e-mail is “phishing”: an attempt to steal personal information. ITS staff will never ask you for your password, via email, phone, or any other means. Remember, your password is your secret.
Never respond to e-mails asking for your W&L password or other personal information, such as bank account or social security numbers. Instead, please follow the procedures to report it to our spam filtering vendor, and then delete the email.
Please protect yourself:
* If you disclosed your W&L password in response to a phishing email, change your password immediately at http://password.wlu.edu
* Never disclose your password to anyone.
* Your W&L password should not be used for any service outside the University. |
Score: 77.5 - Updated: 7/15/2013 3:55:46 PM - Was this helpful? |
What is the Information Security Program (ISP) at W&L? (link) |
The ISP and the ISP Committee were organized at the direction of the Provost in 2003 to comply with the Gramm-Leach-Bliley Act (GLBA) and to implement the “Safeguards Rule” issued by the Federal Trade Commission. The ISP Committee is chaired by the ISP Coordinator and the Committee has responsibility, in advising the Provost, for the ISP. The original program scope was intentionally broader than necessary for simple legal compliance, and requires all departments to have written procedures documenting the safeguards used to protect the University’s information assets. |
Score: 76.0 - Updated: 6/4/2012 1:24:10 PM - Was this helpful? |
Is email secure? (link) |
It all depends on what you’re trying to protect against. So, the simplest answer is 'no'! Email is not secure, unless you have taken extra steps to encrypt the message or the attachments (or both). Therefore, do not put confidential information (i.e., SSN, credit card number, etc.) in any email, unless you know it is encrypted. Briefly, access to your email account is secured by your username and password, so make sure you have a strong password. Email can be secured from network “snooping” by accessing it from a web page using Secure Socket Layers (SSL) – indicated by the “S” in HTTPS. If you access your email from your phone, then security depends on that device. These are just some of the variables/examples, and for more information please contact the Information Security Officer. |
Score: 70.0 - Updated: 7/15/2013 3:50:44 PM - Was this helpful? |
What is an avi file? (link) |
Click here for an explanation AND a chart listing programs that open .avi files. |
Score: 15.0 - Updated: 10/1/2010 3:08:15 PM - Was this helpful? |
What is an mp3 file? (link) |
Click here for an explanation AND a chart listing programs that open .mp3 files |
Score: 15.0 - Updated: 10/1/2010 3:18:57 PM - Was this helpful? |
What is a wma file? (link) |
Click here for an explanation AND a chart listing programs that open .wmafiles. |
Score: 15.0 - Updated: 10/1/2010 3:20:08 PM - Was this helpful? |
What is a wav file? (link) |
Click here for an explanation AND a chart listing programs that open .wavfiles. |
Score: 15.0 - Updated: 10/1/2010 3:21:29 PM - Was this helpful? |
What is an ra file? (link) |
Click here for an explanation AND a chart listing programs that open .ra files. |
Score: 15.0 - Updated: 10/1/2010 3:22:02 PM - Was this helpful? |
What is an aac file? (link) |
Click here for an explanation AND a chart listing programs that open .aac files. |
Score: 15.0 - Updated: 10/1/2010 3:22:36 PM - Was this helpful? |
What is an aif file? (link) |
Click here for an explanation AND a chart listing programs that open .aif files. |
Score: 15.0 - Updated: 10/1/2010 3:23:20 PM - Was this helpful? |
I deleted an important file can I get it back? (link) |
Yes, quite often you can. First make sure it is not in your trash folder. If it is there undelete it by (on a PC) right clicking on the object and choosing undelete or (on a Mac) dragging it back to the desk top.
If you deleted it from the trash folder and it was orrigionally in a network drive (H, I, L, J) you can request that the item be recovered from an old copy on the server. To do this log a help ticket (choose webticket on the menu above) and under request type choose "network" then "file recovery" Then give us as many details about the files as possible. |
Score: 10.0 - Updated: 5/10/2010 8:51:33 AM - Was this helpful? |
What is a mid or MIDI file? (link) |
Click here for an explanation AND a chart listing programs that open .mid or MIDIfiles. |
Score: 10.0 - Updated: 10/1/2010 3:20:58 PM - Was this helpful? |
How do I attach a file using RightFax? (link) |
Under Attachments
Click Attach File
You have PDF Attachment Type options
- Text
- Photos & Images
- Light
|
Score: 10.0 - Updated: 12/8/2014 10:00:32 AM - Was this helpful? |
Where can a student look for a lost file opened from Sakai? (lost file,attachment) (link) |
1. Open Internet Explorer.
2. Go up to the gear menu in the upper right and select "Internet Options".
3. On the first page, you'll see a subheading named "Browsing history" and two buttons--hit "Settings".
4. In the new window that pops up, select "View Files" and a file window will open up. There, you can sort by name or size or type (although the name will likely be meaningless, just look for a file of the right type that was edited at or near the right time.
5. DO NOT double-click the file--it will try to open it up from the web, not where you saved it, and may corrupt what you have saved. Select the right file or files, and copy them to the desktop (either drag-and-drop or Ctrl-C and Ctrl-V). There you can open it and resave it properly with the right name. Applies To: Students |
Score: 7.5 - Updated: 9/24/2013 8:12:25 AM - Was this helpful? |
How to I combine mutliple PDFs into one file? (link) |
1. Open Adobe Acrobat Professional (White Icon with a Red A)
2. Click on the "Create PDF" Button
3. Choose "Create from Multiple Files"
4. In the Add Files Section, Click on Browse and browse to the files you want to add.
5. When you are done adding files, you may arrange the files in the order you choose.
6. When you are done, Click Ok.
7. The PDF will combine all the files, click on Save to safe your file. |
Score: 7.5 - Updated: 9/24/2010 2:03:31 PM - Was this helpful? |
What is an mpa or MPEG-2 file? (link) |
Click here for an explanation AND a chart listing programs that open .mpa files. |
Score: 7.5 - Updated: 10/1/2010 3:19:36 PM - Was this helpful? |
How do I convert an inDesign file to a pdf? (link) |
A user followed the steps here and was able to convert and send document as pdf. |
Score: 7.5 - Updated: 6/17/2011 10:32:32 AM - Was this helpful? |
How do I create an Outlook pst file? (link) |
( Restricted to authenticated ITS users. ) |
Score: 7.5 - Updated: 11/1/2011 3:20:44 PM - Was this helpful? |
What is the Box file upload limit? (link) |
The file upload limit in Box is 5GB. This is a system wide setting that cannot be changed. |
Score: 7.5 - Updated: 12/1/2014 9:08:32 AM - Was this helpful? |
What file types are BLOCKED and cannot be loaded in SharePoint? (link) |
For a complete list, please visit the following URL:
http://technet.microsoft.com/en-us/library/cc262496.aspx |
Score: 6.0 - Updated: 7/29/2013 9:32:52 AM - Was this helpful? |
What files or file formats will play in QuickTime? (link) |
The following file formats are supported in QuickTime:
- 3DMF (Mac OS 9 & Windows)
- 3GPP
- 3GPP2
- AIFF
- AMC
- AMR
- Animated GIF
- AU
- Audio CD Data (Mac OS 9)
- AVI
- BMP
- CAF (Mac OS X)
- Cubic VR
- DLS
- DV
- FLC
- GIF
- GSM
- JPEG/JFIF
- Karaoke
- MacPaint
- MIDI
- MPEG-1
- MP3 (MPEG-1, Layer 3)
- M3U (MP3 Playlist files)
- MPEG-2
- MPEG-4
- MQV
- M4A, M4B, M4P (iTunes 4 audio), M4V (iTunes video)
- PDF (Mac OS X)
- Photoshop
- PICS
- PICT
- PLS
- PNG
- Quartz Composer Composition (Mac OS X)
- QCP (Mac OS 9 & Windows)
- QuickTime Image File
- QuickTime Movie
- SD2 (Mac OS 9 & Windows)
- SDP
- SDV
- SF2 (SoundFont 2)
- SGI
- SMIL
- Targa
- Text
- TIFF
- TIFF Fax
- VDU (Sony Video Disk Unit)
- Virtual Reality (VR)
- Wave
|
Score: 6.0 - Updated: 6/17/2011 11:56:06 AM - Was this helpful? |
Can I attach a file to include in the fax with RightFax? (link) |
Yes, you can attach a file to include in your fax. Many document types are supported, including Adobe PDF, Microsoft Word, Microsoft Excel, and image files such as JPG and PNG. *Keep in mind that some documents such as detailed spreadsheets or PowerPoint slideshows may not render clearly when printed on a recipient’s fax machine. |
Score: 6.0 - Updated: 4/21/2014 9:46:45 AM - Was this helpful? |
How do I get Microsoft Security Essentials for my Windows 7 operating system? (link) |
You can download Microsoft Security Essentials at the following site:
http://www.microsoft.com/security_essentials/
Please uninstall any other antivirus software you might have before installing.
|
Score: 4.3 - Updated: 10/1/2010 2:29:31 PM - Was this helpful? |
How do I reduce the file size of an Adobe Acrobat PDF document? (link) |
If you are scanning texts into Acrobat, it's good practice to take the following steps before sharing them so that the file size will be smaller and the document easier to download and print:
1. Document > OCR Text Recognition > Recognize Text Using OCR (this recognizes the text and reduces the file size a lot)
2. Document > Reduce File Size, then choose Acrobat 7.0 (this is the backwards-compatibility issue mentioned above)
3. Document > Optimized Scanned PDF, then make sure the indicator is somewhere in the middle between Smaller File and Higher Quality. Applies To: Faculty, Staff, Students |
Score: 4.3 - Updated: 6/14/2012 9:59:59 AM - Was this helpful? |
My reply in Outlook 2010 opens in file not message - how do I fix it? (link) |
The arrow next to the blue question mark in the top right should be pointing up.
If it is pointing down you click it to change the direction and view. Applies To: Faculty, Staff |
Score: 4.3 - Updated: 5/1/2012 9:39:40 AM - Was this helpful? |
How long does a deleted file stay in the trashcan in Box at W&L? (link) |
Deleted files remain in the Box at W&L trashcan for 30 days, during which time, the owner can restore the file if needed. There are an additional 14 days that Box Admin can recover the file after that. If you have questions, please contact the information Desk by emailing help@wlu.edu or by calling (540) 458-4357. |
Score: 4.3 - Updated: 11/21/2014 12:39:44 PM - Was this helpful? |
How can I show a file directory listing in a folder on my web site? (link) |
Open the folder in which you wish to enable file listing. Create a file named "access.www". Open that file in notepad or wordpad and paste in the following text and then save:
Options +Indexes
IndexIgnore *.www
IndexOptions FancyIndexing
IndexOptions FoldersFirst
IndexOptions IgnoreCase
IndexOptions NameWidth=*
IndexOptions ShowForbidden |
Score: 3.8 - Updated: 6/7/2012 3:08:58 PM - Was this helpful? |
Can I use an .mp3 file that I bought as background music in a digital story for a class? (link) |
Yes, but because of copyright limitations, only a small portion of the file.
Click here for an good explanation of just how much from the University of Texas system. note: section 4.2.3
|
Score: 3.3 - Updated: 5/11/2010 5:32:14 PM - Was this helpful? |
How do I save a file from email to the iPad dropbox (using the Dropbox app and the iAnnotate app?) (link) |
How to Save a File from Email to the Dropbox with iAnnotate
1. On your PC or Macintosh desktop computer, download the Dropbox program from www.dropbox.com
a. As part of the installation process, Dropbox will create a file in your "My Documents" folder. Anything that you save to that folder will viewable from your iPad.
2. Create a Dropbox account for yourself; remember the password because you'll have to enter it every time you access the account from your iPad. It can be the same or different from your University password.
a. You should now have a Dropbox account with 2 GB of free storage.
b. Drag a file into that folder for testing purposes.
3. Download the Dropbox application on your iPad.
a. Log into the dropbox once it's installed.
b. You should see the file you dragged to the Dropbox.
4. You can upload any photos or video files from your iPad to your Dropbox, but not any documents or PDFs. This is where iAnnotate comes in...it communicates between your email and your dropbox, being the 3rd party.
5. Download the iAnnotate application on your iPad.
6. You should now be able to send a PDF from email to iAnnotate, and from iAnnotate to the Dropbox, all from the iPad. |
Score: 3.3 - Updated: 9/1/2010 2:16:11 PM - Was this helpful? |
Excel formatting of phone/social security columns does not merge to Word - is there a fix? (link) |
Word 2007 and Word 2010
- Start Word, and then open a new blank document.
- Go to Word Options
- In Word 2007, click the Office Button, and then click Word Options.
- In Word 2010, click File, and then click Options.
- On the Advanced tab, go to the General section.
- Click to select the Confirm file format conversion on open check box, and then click OK.
- On the Mailings tab, click Start Mail Merge, and then select Step By Step Mail Merge Wizard.
- In the Mail Merge task pane, select the type of document that you want to work on, and then click Next.
- Under Select starting document, select the starting document that you want to use, and then click Next.
- Under Select recipients, click Use an existing list, and then click Browse.
- In the Select Data Source dialog box, locate the folder that contains the Excel workbook that you want to use as your data source, select the workbook, and then click Open.
- In the Confirm Data Source dialog box, click to select the Show all check box. Click MS Excel Worksheets via DDE (*.xls), and then click OK.
- In the Microsoft Excel dialog box, under Named or cell range, select the cell range or worksheet that contains the data that you want to use, and then click OK.
NOTE: Your data now appears in the Mail Merge Recipients dialog box with the same formatting that appears in the Excel worksheet.
|
Score: 2.7 - Updated: 7/28/2011 3:12:21 PM - Was this helpful? |