WKU Information Technology Division ResNet 2012 Join ResNet on Facebook!

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Laptop Responsibilities Memorial Middle School Laredo ISD.
Northside I.S.D. Acceptable Use Policy
Technology & You! Download this PowerPoint at:
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Hart District Acceptable Use Policy Acceptable Use Policy.
A walk through the world of Help Desk. When you realize you need help with your computer, phone, or printer, and your supervisor can not help, please.
Thank you to IT Training at Indiana University Computer Malware.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
WKU Information Technology Division ResNet What is ResNet? ResNet is a network and computer support service available to all Western Kentucky University.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Information and Technology Services Customer Services.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Penn State University College Of Education Understanding College of Education Resources.
New Data Regulation Law 201 CMR TJX Video.
SWU Technology and Services for enrolled students Mike Preusz Information Technology.
TECH TALK IT Services Resources Include: WKU /TopperMail TopNet myWKU Blackboard Helpdesk Phone & Chat Support WKU myStuff (Network Storage)
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
Division of Information Technology IT Support Resources and Retail Services on Campus Division of IT University of Maryland
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Otterbein University Welcomes You New Student Information Guide Sep 2010.
Learning In A Techno World How Safe is Your Cyberspace?
Student Orientation. Provides Technical Support and Services Password resets Telephone and voice mail issues CourseDen, Multimedia Services, SITS contact.
Using SWHS: The AUP [Acceptable Use Policy]
Division of Information Technology What You Need To Know About Technology On Campus Welcome!
Essential CCHS Computing Information Computer Applications September 2009.
Chapter SIx Maintaining a Computer Part I: Configuring, Updating, and Upgrading the OS.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Specialist communication channel. Sarah-Jane king.
Introduction to ICT Chemical Engineering Duncan McLachlan and Nam Ly – ICT Support.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Safety Internet Safety LPM
Division of Information Technology Information Technology at the University of Maryland Welcome!
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction TO Network Administration
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
IRT: Your Student’s Technology Partner at Rowan University
IT Services Training Team
Technology and You!.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Everything you wanted to know about
Student Monmouth College
Welcome to iSolutions – your IT support service
Home Computer Security
Unit 4 IT Security.
Student IT induction.
Technology Resources Welcome to Texas State!.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Discovering Technology
INFORMATION TECHNOLOGY NEW USER ORIENTATION
24/7/365 Remote Computer Support
Presentation transcript:

WKU Information Technology Division ResNet 2012 Join ResNet on Facebook!

What is ResNet? ResNet is a network and computer support service available to all Western Kentucky University students. Service may be obtained by contacting the IT Helpdesk at or visiting the ResNet office which is located on the third floor of the Mass Media and Technology Hall.

IT Services ResNet Office Location Third floor of Mass Media and Technology Hall (Welcome Desk area) ResNet Office Hours Monday – Friday = 8 AM – 5 PM Closed on Saturday and Sunday IT Helpdesk Hours Monday – Friday = 7 AM – 10 PM Saturday = 8 AM – 8 PM Sunday = 12:00 PM – 8 PM Phone = ResNet Web Address = IT Helpdesk Web Address =

IT Services Resources Available Include: WKU /TopperMail TopNet WKU Portal Blackboard WKU My Stuff (Network Storage) Access to the WKU Librarys on-line database More information can be found at

ResNet Services ResNet provides hardware support and software troubleshooting for all WKU students. Virus and spyware removal, hardware diagnostic testing, operating system re-installations, game console registrations, and data backup are just a few of the services we provide.

ResNet Services *Starting in 2012, ResNet now offers full hardware diagnostic and replacement services for all desktop and laptop platforms. If we identify a hardware malfunction on a computer which has no warranty, ResNet will provide the student a quote for a compatible replacement and it will be left up to the student to purchase the new hardware component. Also, ResNet staff are certified to perform Dell warranty work. Whether it's a new Dell computer purchased through our special purchase program ( or an older Dell with current warranty coverage, we can perform diagnostic services, hardware ordering and replacement, and re-installation all free of charge to the student. * = Exclusions such as warranty violations to hardware do apply.

Purchase Programs Western Kentucky University has Educational Purchase Pricing with both Apple and Dell available for WKU faculty, staff, and students. Special discounts and offers that are made available to an employee or student of Western Kentucky University are not available to the general public. More information can be found at

ResNet ServicesApple EPP Western Kentucky University and Apple have teamed up to offer faculty, staff, and students the benefit of participating in the Apple Educational Purchase Program. In addition, the discounts are not limited to computers. Most Apple products are available at a discount, with the actual discount percentage averaging around 10%. purchasing WKUs Apple Store

ResNet ServicesDell EPP Western Kentucky University and Dell have teamed up to offer faculty, staff, and students the benefit of participating in the Dell Educational Purchase Program. One can purchase LCD TVs, handheld devices, printers, as well as choose from over thousands of electronics and accessories at discount prices. purchasing WKUs Dell Store Front

Getting Linked Up Hardware Requirements A wired connection to our network requires an Ethernet network card and a patch cable. We recommend your network cable length to be between 15 to 20 feet. Network Access Control For your computer to be allowed on our network, you will be required to download and install a network security program from Cisco called Network Access Control (NAC). Once installed, the program will check and see if your computer meets necessary security requirements such as anti-virus protection and Windows Updates. Once your machine meets security requirements, your machine will be allowed onto our network.

What Do I Need? ResNet does not provide specified system recommendations to students because each students needs can be different. *As a general rule of thumb, most computers will be supported on our network; this includes both PCs and Macs. The only required equipment that you will need to provide is an ethernet cable if you wish to connect in the residence halls via a wired connection. *ResNet does not support the Linux OS for students.

Operating Systems ResNets computer repair division provides support for the following operating systems regardless of the computer brand: PC: *Windows 2000 Windows XP (Home, Pro, Media Center Ed.) Windows Vista (Basic, Home Premium, Business and Ultimate) Windows 7 (Starter, Basic, Home Premium, and Ultimate) Macintosh: *OS 9 OS X (Cheetah, Puma, Jaguar, Panther, Tiger, Leopard, Snow Leopard, Lion, and Mountain Lion) *Important Note: The academic year will be the final year in which ResNets computer repair division will support the Windows 2000 and MAC OS 9 operating systems.

Looking for a PC? When looking for a computer, consider the following: Your major - The requirement for the computer, depending on your major, is different. Your advisor can advise you on what software you will be needing to better aid you in deciding on a computer that will fit your needs. Portability Extended warranty - Consider extended warranty for duration of time in school. Extended warranties are highly advisable for any computer system. Anti-Virus software – This is a must to have. Fortunately, Western Kentucky University provides Symantec Endpoint Anti-Virus software for all WKU students. Make sure to uninstall your existing anti-virus software before you install Symantec Endpoint Anti- virus. You can download it at

Costs Does it cost anything when I bring my computer to ResNet? ResNet does not charge students for the services it currently provides. The only costs a student might incur is dealing with post-warranty issues on hardware or hardware replacement. For example, if ResNet determines a hard drive in your computer has gone bad, the student will be responsible for purchasing a new hard drive. We do assist student in providing price quote information for components the computer needs. However, the responsibility of purchasing the item lies with the student.

WKU Wireless

Network Equipment Are wireless access points allowed in the residence halls? No, you are not permitted to extend the network service in any way. This includes, but is not limited to, the installation and use of non-IT sanctioned hubs, switches, NAT routers, and wireless access points. These devices are prohibited and can result in service termination.

File Sharing File sharing is the practice of making files available for other users to download over the Internet and smaller networks. Peer-to-peer programs are often the preferred method of users that want to download and share files. While P2P programs have legitimate uses, using peer-to- peer (p2p), ftp, irc, or other applications to download or distribute copyrighted materials is against the law and against University Policy. WKU takes copyright violations very seriously and responds accordingly to each incident and violation.

File Sharing Consequences Western Kentucky University does not actively monitor users or look for those sharing files. However, copyright owners and organizations representing them often scan the internet for users sharing movies, music, or software and in turn contact the University to stop the activity. Failure to restrict your P2P application from sharing copyrighted files, whether you are aware of the violation or not, may result in your machine being removed from the campus network until the copyright violation is rectified. Additionally, legal action may be taken against you by the holder of the copyright for the material that was found on your system. Repeat offenders may have their network access privileges revoked and the infraction will be reported to the appropriate administrative department for further action. More information is available at

NetIDs Once you have been admitted to WKU, your NetID will be created. This NetID and password will be your universal login to the WKU Portal, TopNet, Blackboard, MyStuff, computer labs, WKU Wireless network and other IT services. You may look up your NetID and set your password at It is very important that you keep your login information secure.

Accounts If you are a new WKU student, you will be issued a WKU account called TopperMail. Your TopperMail account will be accessible hours after you have registered for classes. As a student, you will receive official communications via your TopperMail account, including administrative announcements, registration information, financial aid and important class information from your professors. Its very important that you maintain and check your TopperMail account regularly! You can access your TopperMail account through the WKU Portal or Portalwww.wku.edu/it/webmail Visit to learn more about TopperMail. You can use your WKU via the web at We also support all standard mail protocols such as POP3, IMAP and SMTP.

Problems? What if I experience problems with my Internet connection? You can call the Help Desk at for questions or problems related to your network connection. Or, you can stop by the ResNet office in Mass Media and Technology Hall. If you call the Help Desk, you will be asked to provide your WKU ID.

Gaming Consoles You must register your game console to play online. You will need to provide the IT Helpdesk with the following information: Your WKU ID Username (ex. John.Smith or smithjc) Residence Hall and Room number (ex. Barnes Cambell Room 123) Contact phone number (ex xxxx) Console MAC Address (12 characters in this format: xx:xx:xx:xx:xx:xx)

iWKU iWKU is your easy mobile guide to information about Western Kentucky University. iWKU is a suite of apps that gives you instant access to campus maps, contact information, the course catalog, libraries, news, events, and more. Search for student, faculty, staff contact information with the Directory app. Store contacts, send , or call directly. Use the Courses button to search the course catalog for current and future semesters. Find your way around campus with the Maps app, where you can search for building by name and find your way from here to there. With the Library button, search the WKU collection catalog on the fly. Get up-to-the-minute campus information, sports, and activities on the News, Athletics, and Events apps. Check out campus photos and multimedia on the Images and Videos buttons. Accessible from iTunes at: ku/id ?mt=8 ku/id ?mt=8 Other web-enabled mobile devices can visit

Safe Computing Create Strong Passwords Choose passwords that are difficult to guess, using upper case, numbers, and special characters. One way to create good strong passwords is to use part of a phrase that is easy for you to remember. This phrase can be a set of words taken from a book, a song, a quotation, a statement, or anything else that you always easily remember. This phrase should be easy for you, but no one else should ever think about attributing it to you. Install Anti-virus Software Anytime you open an attachment, or download a file from the Internet, you are in danger of getting a virus on your computer. Viruses can potentially send themselves to everyone else on your list, damage/delete files and programs on your disk drive or install hidden programs that allow an intruder to remotely control your computer. This is why it is very important that you install anti-virus software. Once installed, be sure to keep it updated. Antivirus developers continually release updates or virus definitions that help catch new viruses. WKU offers all WKU Students with a free copy of Symantec Endpoint Antivirus Software. You can access this at Run Windows Update Windows Update is the online extension of Windows that helps you to keep your computer up- to-date. Use Windows Update to choose updates for you computers operating system, software, and hardware. New content is added to the site regularly, so you can always get the most recent updates and fixes to protect your computer and keep it running smoothly.

Safe Computing Never open an attachment from someone you do not know. Be sure your anti-virus software scans your s. Never forward letters. Never forward virus warnings, as they may not be legitimate. Never use the "Unsubscribe" feature of Spam s or reply to Spam mails because by doing so, you confirm the validity of your address and the spammer can keep on sending you unsolicited commercial . The proper way to deal with Spam is to delete it. You can also forward spam that you receive in your WKU account to Back Up Your Critical Files Saving your files on your hard disk, portable media such as flash drives, and external hard drives is encouraged to prevent data loss. Downloading Files Be very careful about the software and files that you download. Only download files from trusted sources. Files from un-trusted sources may contain viruses or have adverse affects on your computer. Some downloaded software may also contain spyware. Spyware collects personal data about your web surfing and other habits and sends that information to advertisers or other interested third parties. Some examples of spyware carrying programs are Limewire, Imesh, Frostwire, and Bearshare. Do not download or share copyrighted files such as music or movies with out permission from the copyright owners. Copyright infringement is against university policy and state and federal law. The No Electronic Theft (NET) Act of 1997 allows for criminal prosecution of individuals who electronically copy and distribute copyrighted work, even if there is no commercial gain from doing so.