|
||||||||
Need to Access Network Drives from Off-Campus?A timely reminder: Just because you're at home, or away at a conference doesn't mean you don't have access to files stored on network drives. The NetStorage system allows you easy access to your Novell Netware files from any standard browser. With this services, you get easy point-and-click access to your drives. You may find this services to be more convenient and easier to use than standard FTP services. Remember that when trying to access the NetStorage system from off-campus, you must be connected to the campus network before you can continue. You can do this either by connecting to the network via a dial-up connection, or you can use the college's VPN system to connect. Computer Security - Locking Your WorkstationWant to add an extra level of security to your workstation when you leave for lunch or meeting? Want to keep folks from 'borrowing' your computer to do things when you step away from your desk? Why not lock your workstation? Follow these simple steps to password protect your workstation: On a PC -
To unlock your PC when you return to your desk, simply hit ctrl-alt-del again, and then enter your Novell password. You an also set your computer to automatically lock itself when the screensaver kicks in. This is very handy if you're away from your computer for longer than you'd expected to be, and didn't lock your machine. To do this:
There are actually two different ways to do this on a Mac: Method One
Method Two
|
Cyber SecurityEmail Phishing Attempts We here in Information Technology have had reports of a significant number of unauthorized emails asking our faculty and staff to verify account information and to include your password in the response. You may periodically receive this type of email asking you for confidential information that claims it came from TCNJ. These are "phishing" attempts and are not legitimate requests for information. Please be assured that we will never ask you to submit your password via email or ask you to provide your password to a "verification" form at an off-campus location. Your password is confidential information and should not be shared. For more information on email security in general, click the link below. Back Up Inportant Files You may find that an infection has affected your computer so much that the operating system and applications need to be reinstalled. In cases like this, it is best to have your important data backed up already so you can restore your system without fear of losing your data. Obviously, the best way to do this is to not store any important data on your computer's local ("C") drive. Save files to your network drives ("H" for personal files, "S" for files shared with your department) or to removable drives (such as USB flash drives). The more locations in which you can save files you need, the better. It never hurts to be ready for a just-in-case situation. What Info Is Collected When Visiting Webpages? When visiting unknown web sites, be vigilant with protecting your identity. Remember that some information is automatically made visible to the site. Information such as the computer's IP address, domain name (e.g. .com, .gov or .edu), software details, and page visit information is often saved in cookies so that the organization whose page you're visiting may develop and store user profiles of website visitors. If a web site uses cookies, the organization may be able to collect even more information, such as your browsing paggerns, which include other sites you've visited. If the site you're visiting is malicious, files on your computer, as well as passwords stored in temporary memory may be at risk. Generally, organizations use the information that is gthered automatically for legitimate purposes, such as generating statistics about their sites. Be careful supplying personal information - unless you trust a site, don't give your address, password or credit card information. Look for indications that the site uses SSL to encrypt your information. Although some sites require you to supply your Social Security Number (e.g. sites associated with financial transactions such as loans or credit cards), be especailly ware of providing this information. Think before you Click Be cautious about all communications you receive, and clicking on links in an email, instant message or webpage. Even if you know and trust the sender of the email or instant message, or are on a known website or a friend's social networking page, it is still prudent to use caution when navigating pages and clicking on links and photos becuase links, images or other content contained on the pages may include malicious code placed there by hackers. MailMan - TCNJ's New Discussion List SystemAs of the fall 2009 semester, TCNJ has replaced the old tcnjlists system with the Mailan list management system for creating and managing campus discussion list. There are a number of benefits to this new system which include:
|
|||||||
|
Would you like a question answered in the next issue? Please forward comments/questions to techtalk@tcnj.edu