WKU Information Technology Division ResNet 2011. What is ResNet? ResNet is a network and computer support service available to all Western Kentucky University.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
WKU Information Technology Division ResNet 2012 Join ResNet on Facebook!
Thank you to IT Training at Indiana University Computer Malware.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Information and Technology Services Customer Services.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Penn State University College Of Education Understanding College of Education Resources.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
SWU Technology and Services for enrolled students Mike Preusz Information Technology.
TECH TALK IT Services Resources Include: WKU /TopperMail TopNet myWKU Blackboard Helpdesk Phone & Chat Support WKU myStuff (Network Storage)
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
March 14, Microsoft Microsoft officially announced the date and time that Internet Explorer 9 (IE9) will move away from a release candidate and.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
Division of Information Technology IT Support Resources and Retail Services on Campus Division of IT University of Maryland
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Help Desk A walk through the world of Help Desk. Realizing you need help When you realize you need help with your computer, phone, or printer, and your.
Otterbein University Welcomes You New Student Information Guide Sep 2010.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
Learning In A Techno World How Safe is Your Cyberspace?
Student Orientation. Provides Technical Support and Services Password resets Telephone and voice mail issues CourseDen, Multimedia Services, SITS contact.
Using SWHS: The AUP [Acceptable Use Policy]
Division of Information Technology What You Need To Know About Technology On Campus Welcome!
Essential CCHS Computing Information Computer Applications September 2009.
 Academic   Administrative ◦ Departments  Desktop Services  Networking & Telecommunications  Computer Center ◦ Office of Computer and Information.
IT security By Tilly Gerlack.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Specialist communication channel. Sarah-Jane king.
Introduction to ICT Chemical Engineering Duncan McLachlan and Nam Ly – ICT Support.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Safety Internet Safety LPM
Division of Information Technology Information Technology at the University of Maryland Welcome!
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction TO Network Administration
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
IRT: Your Student’s Technology Partner at Rowan University
Technology and You!.
Student Monmouth College
Welcome to iSolutions – your IT support service
Home Computer Security
Unit 4 IT Security.
Technology Resources Welcome to Texas State!.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Discovering Technology
INFORMATION TECHNOLOGY NEW USER ORIENTATION
24/7/365 Remote Computer Support
Presentation transcript:

WKU Information Technology Division ResNet 2011

What is ResNet? ResNet is a network and computer support service available to all Western Kentucky University students. Service may be obtained by contacting the IT Helpdesk at or visiting the ResNet office which is located on the third floor of the Mass Media and Technology Hall.

IT Services ResNet Office Location Third floor of Mass Media and Technology Hall (Welcome Desk area) ResNet Office Hours Monday – Friday = 8 AM – 5 PM Closed on Saturday and Sunday IT Helpdesk Hours Monday – Friday = 8 AM – 10 PM Saturday = 8 AM – 8 PM Sunday = 12:00 PM – 8 PM Phone = ResNet Web Address = IT Helpdesk Web Address =

IT Services Resources Available Include: WKU /TopperMail TopNet WKU Portal Blackboard WKU My Stuff (Network Storage) Access to the WKU Library’s on-line database More information can be found at

ResNet Services ResNet provides hardware support and software troubleshooting for all WKU students. Virus and spyware removal, hardware diagnostic testing, operating system re-installations, game console registrations, and data backup are just a few of the services we provide.

ResNet Services ResNet staff is certified to perform Dell warranty work. Whether it's a new Dell computer purchased through our special purchase program ( or an older Dell with current warranty coverage, we can perform diagnostic services, hardware ordering and replacement, and re-installation all free of charge to the student. For all other computers, we are able to do diagnostic work and re-installations. However, if we identify a hardware malfunction on a non-Dell computer or a computer that has no warranty, it will be left up to the student to purchase the new hardware.

Purchase Programs Western Kentucky University has Educational Purchase Pricing with both Apple and Dell available for WKU faculty, staff, and students. Special discounts and offers that are made available to an employee or student of Western Kentucky University are not available to the general public. More information can be found at

ResNet ServicesApple EPP Western Kentucky University and Apple have teamed up to offer faculty, staff, and students the benefit of participating in the Apple Educational Purchase Program. In addition, the discounts are not limited to computers. Most Apple products are available at a discount, with the actual discount percentage averaging around 10%. WKU’s Apple Store

ResNet ServicesDell EPP Western Kentucky University and Dell have teamed up to offer faculty, staff, and students the benefit of participating in the Dell Educational Purchase Program. One can purchase LCD TVs, handheld devices, printers, as well as choose from over thousands of electronics and accessories at discount prices. WKU’s Dell Store Front

Getting Linked Up Hardware Requirements A wired connection to our network requires an Ethernet network card and a patch cable. We recommend your network cable length to be between 15 to 20 feet. Network Access Control For your computer to be allowed on our network, you will be required to download and install a network security program from Cisco called Network Access Control (NAC). Once installed, the program will check and see if your computer meets necessary security requirements such as anti-virus protection and Windows Updates. Once your machine meets security requirements, your machine will be allowed onto our network.

What Do I Need? ResNet does not provide specified system recommendations to students because each student’s needs can be different. As a general rule of thumb, most computers will be supported on our network; this includes both PCs and Macs. The only required equipment that you will need to provide is an ethernet cable if you wish to connect in the residence halls via a wired connection.

Operating Systems ResNet’s computer repair division provides support for the following operating systems regardless of the computer brand: PC: *Windows 2000 Windows XP (Home, Pro, Media Center Ed.) Windows Vista (Basic, Home Premium, Business and Ultimate) Windows 7 (Starter, Basic, Home Premium, and Ultimate) Macintosh: *OS 9 OS X *Important Note: The academic year will be the final year in which ResNet’s computer repair division will support the Windows 2000 and MAC OS 9 operating systems.

Looking for a PC? When looking for a computer, consider the following: Your major - The requirement for the computer, depending on your major, is different. Your advisor can advise you on what software you will be suitng to better aid you in deciding on a computer that will fit your needs. Portability Extended warranty - Consider extended warranty for duration of time in school. The ResNet staff is certified to handle Dell warranty work. This is a service provided at no additional cost. Extended warranties are highly advisable for any computer system. Anti-Virus software – This is a must to have. Fortunately, Western Kentucky University provides Symantec Endpoint Anti-Virus software for all WKU students. Make sure to uninstall your existing anti-virus software before you install Symantec Endpoint Anti- virus. You can download it at

Costs Does it cost anything when I bring my computer to ResNet? ResNet does not charge students for the services it currently provides. The only costs a student might incur is dealing with post-warranty issues on hardware or hardware replacement for any non-Dell computer. For example, if ResNet determines a hard drive in your computer has gone bad and the computer is not a Dell and/or if it is a Dell computer that is not under warranty, the student will be responsible for purchasing a new hard drive. We do assist student in providing price quote information for components the computer needs. However, the responsibility of purchasing the item lies with the student.

WKU Wireless

Network Equipment Are wireless access points allowed in the residence halls? No, you are not permitted to extend the network service in any way. This includes, but is not limited to, the installation and use of non-IT sanctioned hubs, switches, NAT routers, and wireless access points. These devices are prohibited and can result in service termination.

File Sharing File sharing is the practice of making files available for other users to download over the Internet and smaller networks. Peer-to-peer programs are often the preferred method of users that want to download and share files. While P2P programs have legitimate uses, using peer-to- peer (p2p), ftp, irc, or other applications to download or distribute copyrighted materials is against the law and against University Policy. WKU takes copyright violations very seriously and responds accordingly to each incident and violation.

File Sharing Consequences Western Kentucky University does not actively monitor users or look for those sharing files. However, copyright owners and organizations representing them often scan the internet for users sharing movies, music, or software and in turn contact the University to stop the activity. Failure to restrict your P2P application from sharing copyrighted files, whether you are aware of the violation or not, may result in your machine being removed from the campus network until the copyright violation is rectified. Additionally, legal action may be taken against you by the holder of the copyright for the material that was found on your system. Repeat offenders may have their network access privileges revoked and the infraction will be reported to the appropriate administrative department for further action. More information is available at WKU

NetIDs Once you have been admitted to WKU, your NetID will be created. This NetID and password will be your universal login to the WKU Portal, TopNet, Blackboard, MyStuff, computer labs, WKU Wireless network and other IT services. You may look up your NetID and set your password at It is very important that you keep your login information secure.

Accounts If you are a new WKU student, you will be issued a WKU account called TopperMail. Your TopperMail account will be accessible hours after you have registered for classes. As a student, you will receive official communications via your TopperMail account, including administrative announcements, registration information, financial aid and important class information from your professors. It’s very important that you maintain and check your TopperMail account regularly! You can access your TopperMail account through the WKU Portal or Visit to learn more about TopperMail. You can use your WKU via the web at We also support all standard mail protocols such as POP3, IMAP and SMTP.

Problems? What if I experience problems with my Internet connection? You can call the Help Desk at for questions or problems related to your network connection. Or, you can stop by the ResNet office in Mass Media and Technology Hall. If you call the Help Desk, you will be asked to provide your WKU ID.

Gaming Consoles You must register your game console to play online. You will need to provide the ResNet office with the following information: Your WKU ID Username (ex. John.Smith or smithjc) Residence Hall and Room number (ex. Barnes Cambell Room 123) Contact phone number (ex xxxx) Console MAC Address (12 characters in this format: xx:xx:xx:xx:xx:xx)

iWKU iWKU is your easy mobile guide to information about Western Kentucky University. iWKU is a suite of apps that gives you instant access to campus maps, contact information, the course catalog, libraries, news, events, and more. Search for student, faculty, staff contact information with the Directory app. Store contacts, send , or call directly. Use the Courses button to search the course catalog for current and future semesters. Find your way around campus with the Maps app, where you can search for building by name and find your way from here to there. With the Library button, search the WKU collection catalog on the fly. Get up-to-the-minute campus information, sports, and activities on the News, Athletics, and Events apps. Check out campus photos and multimedia on the Images and Videos buttons. Accessible from iTunes at: ku/id ?mt=8 ku/id ?mt=8 Other web-enabled mobile devices can visit

Safe Computing Create Strong Passwords Choose passwords that are difficult to guess, using upper case, numbers, and special characters. One way to create good strong passwords is to use part of a phrase that is easy for you to remember. This phrase can be a set of words taken from a book, a song, a quotation, a statement, or anything else that you always easily remember. This phrase should be easy for you, but no one else should ever think about attributing it to you. Install Anti-virus Software Anytime you open an attachment, or download a file from the Internet, you are in danger of getting a virus on your computer. Viruses can potentially send themselves to everyone else on your list, damage/delete files and programs on your disk drive or install hidden programs that allow an intruder to remotely control your computer. This is why it is very important that you install anti-virus software. Once installed, be sure to keep it updated. Antivirus developers continually release updates or virus definitions that help catch new viruses. WKU offers all WKU Students with a free copy of Symantec Endpoint Antivirus Software. You can access this at Run Windows Update Windows Update is the online extension of Windows that helps you to keep your computer up- to-date. Use Windows Update to choose updates for you computer’s operating system, software, and hardware. New content is added to the site regularly, so you can always get the most recent updates and fixes to protect your computer and keep it running smoothly. Visit to update your computer.

Safe Computing Never open an attachment from someone you do not know. Be sure your anti-virus software scans your s. Never forward letters. Never forward virus warnings, as they may not be legitimate. Never use the "Unsubscribe" feature of Spam s or reply to Spam mails because by doing so, you confirm the validity of your address and the spammer can keep on sending you unsolicited commercial . The proper way to deal with Spam is to delete it. You can also forward spam that you receive in your WKU account to Back Up Your Critical Files Saving your files on your hard disk, portable media such as flash drives, and external hard drives is encouraged to prevent data loss. Downloading Files Be very careful about the software and files that you download. Only download files from trusted sources. Files from un-trusted sources may contain viruses or have adverse affects on your computer. Some downloaded software may also contain spyware. Spyware collects personal data about your web surfing and other habits and sends that information to advertisers or other interested third parties. Some examples of spyware carrying programs are Limewire, Imesh, Frostwire, and Bearshare. Do not download or share copyrighted files such as music or movies with out permission from the copyright owners. Copyright infringement is against university policy and state and federal law. The No Electronic Theft (NET) Act of 1997 allows for criminal prosecution of individuals who electronically copy and distribute copyrighted work, even if there is no commercial gain from doing so..