IN THIS GUIDEBOOK... IT for Law Students page 2. Playing IT Safe Page 2. Student Access Page 3. Your Password page 5.

Size: px
Start display at page:

Download "IN THIS GUIDEBOOK... IT for Law Students page 2. Playing IT Safe Page 2. Student Email Access Page 3. Your Password page 5."

Transcription

1

2 IN THIS GUIDEBOOK... IT for Law Students page 2 Playing IT Safe Page 2 Student Access Page 3 Your Password page 5 Netiquette Page 6 Printing Page 6 Keep your Computer Secure Page 7 The UCT Network Page 7 Internet at UCT Page 8 Wireless internet Page 9 Laptop Access Points Page 9 Additional Facilities and Training Page 10 Vula Page 11 Electronic Research Resources Page 11 Rules Relating to the Use of UCT Computer Facilities Page 12 References That You May Find Useful Page 14 Problems or Queries Page 14 Contact List for 2012 Page 15

3 IT FOR LAW STUDENTS The Law Faculty believes that all its graduates should be computer literate. Upon arrival at UCT and as part of the Law Faculty Orientation programme, all 1 st year students are required to do an online assessment of their computer skills. The assessment enables the Faculty to gather information on students existing ICT skills compared to the faculty s ICT skills requirements, for study and career purposes. The faculty subsequently determines individual training needs, and students are then required to attend compulsory computer literacy training as specified in their assessment results. Seventy one terminals in the Law Library allow students access to a wide range of legal databases. These include indexes and full-text databases for case law, statutes, and journal articles. To access to these databases, visit: - select electronic resources law databases. Students are also provided with access to software programmes, such as Microsoft Word and Microsoft Excel, to type essays and prepare assignments. The Law Library Lab Administrator monitors and maintains the computer facilities in the Law Library and can assist with various technical problems. The computers in the Law Library are strictly for academic purposes only. There is an bar facility which students may use for private s, located on level 2 in the Law Faculty. Students are encouraged to be considerate while using the computer facilities. Should a student leave his or her terminal for longer than 10 minutes, he or she will be logged off to allow other students the opportunity to use that computer. PLAYING IT SAFE Install and update your antivirus protection As each new virus is found, McAfee adds its tell-tale signs to the antivirus signature (sdat) file. UCT receives these updates every night and distributes them to servers on campus. If you're connected to the UCT network and your McAfee installation is in working order, the sdat file is updated automatically every day. If you are ever in doubt about your virus protection while on campus, then try out the Test your McAfee tool on the ICTS home page. Note: Don t install more than one antivirus program on your computer. Instead, use McAfee, which is FREE to staff and students at UCT for both home and office use. Install updates and patches to keep your computer safe All software programmes and operating systems are vulnerable to attack, which is why developers regularly release patches and updates. ICTS provides an automatic update and patch service for Windows, Apple Mac and Linux computers via the Windows Server Update Service (WSUS). For your computer to receive these updates, make sure that it is connected to WSUS. See the link on the ICTS website home page. Back up your data A backup is a copy of the data on your computer that you make on another storage medium, such as a flash drive, CD, DVD or external hard drive. Once you ve made a backup of your data, keep it in a fireproof safe in another office or store it off-site (either at home or with a professional data storage company). Put your information under lock and key 1. If you receive a request from a company asking you to provide them with your bank account number and PIN, or your network username and password, just ignore it or delete it. No company will ever ask you for this; especially not via , web page or a phone call. University of Cape Town Faculty of Law Student Guidebook

4 2. Create strong passwords that include a mixture of upper and lower case letters, numbers and punctuation marks. By activating your profile on Password Self-Service you ll be able to reset your password yourself, whenever you need to. 3. Before you leave your desk, lock your workstation by pressing CTRL + ALT + Delete simultaneously, then select Lock Workstation. When you return to your desk, just type in your network password and continue working. STUDENT ACCESS Undergraduate and honours students have mailboxes on the myuct cloud-based mail system and have an address of: studentnumber@myuct.ac.za. myuct provides: 10GB mailbox space 25GB password protected online storage using SkyDrive instant messaging a calendaring solution an address for life: studentnumber@myuct.ac.za a central place to view your other accounts free use of Microsoft Office web applications spam free . If you are a registered UCT student, an account is automatically created for you. Currently, undergraduate and honours students have access to two mailboxes, one on the GroupWise server and another on UCT's new online service, myuct. If you are in this group you will only be able to use your GroupWise account until the end of December 2011, thereafter your mailbox and its account will be deleted. Until such time, you can pull your from your GroupWise mailbox into your myuct account, by following the instructions in the connected accounts article. Your Mailbox and address myuct.ac.za GroupWise Undergraduate and honours students make use of the myuct service. Your address is studentnumber@myuct.ac.za. Go to to access your account and read more about this service. You can also watch the Getting video for step by step instructions on how to use your account effectively or view the Questions section. myuct.ac.za offers you: 10GB mailbox space 25GB password protected online storage using SkyDrive Masters students are given a 50MB mailbox, while doctoral and postdoctoral students get a 250MB mailbox. Space is limited on the GroupWise mailbox so keep the following in mind: Your messages take up disk space. You need to ensure that you do not exceed your quota. If you run out of space you will not be able to send any new messages. It is your responsibility to manage the space in your mailbox. Hot tip! Each time you send a message, a copy is kept in your University of Cape Town Faculty of Law Student Guidebook

5 instant messaging a calendaring solution an address for your life: studentnumber@myuct.ac.za a central place to view your other accounts free use of Microsoft Office web applications spam free . Sent folder in your mailbox. Similarly, every message that you delete is kept in the Trash folder. Make sure that you regularly clean up the Sent & Trash folders to ensure that you don't run out of quota. Your current UCT address preferredname.surname@uct.ac.za. Accessing in Student Labs If you use myuct, you will use the same login process as when you are on campus by going towww.myuct.ac.za. Just remember that you need Internet access. If you use GroupWise, you can access your UCT mailbox from off campus by using GroupWise's WebAccess web client. You will be able to see your new mail and your mail folders on the GroupWise mail server. How to use WebAccess. Class mailing lists Each UCT course has its own class mailing list. You will automatically be added to a class mailing list for each course for which you are registered. ** IMPORTANT TIP ** Each time you send a message, a copy is saved to your Sent folder on the mail.uct.ac.za server. In order to save space, make sure you clean up your Sent folder regularly. Using in a student lab As a UCT student, you will have access to a number of student computing microlabs. You will automatically be granted access to at least one of your faculty's labs. You may also have access to additional labs depending on the courses you are registered on. UCT makes use of the GroupWise program and the myuct.ac.za online system. The myuct platform is only for undergraduate and honours students. Masters, doctoral and postdoctoral students will continue using GroupWise until they migrate to a new system in late Follow this link for more information about using GroupWise. For more detailed information about student labs, take a look at these web pages: Commerce student facilities Student computing labs University of Cape Town Faculty of Law Student Guidebook

6 YOUR PASSWORD Initial Password: Your initial password is sent to you with your letter of offer to study at UCT. The first time you log in with this password you will be prompted to change it. Go to Password Self-Service to change it as soon as possible, as it only works 6 times! (Read the article about Password Self-Service to see how to manage your own password.) The network password is used to: log in to computers in UCT student computing microlabs; access your ; access Vula; access PeopleSoft student self service ( Current students Undergraduate Online services & resources Student administration self service (PeopleSoft)) access the online self training materials. Managing your Password Your default password is temporary and will expire soon after initial use. You must change your password immediately after receiving it by going to Password Self-Service. Password Self-Service is a secure, online tool that allows you to manage your own password. When you access Password Self-Service for the first time, you will be prompted to complete a set of challenge-response questions. These, and the answers you provide, will register you on the Password Self-Service system, so that you can change your password at any time, from anywhere that has Internet access. This means that even if you forget your password at some stage in the future, you can use Password Self-Service to change it the challenge-response questions will confirm your identity and allow you to change your password. Your password... must not contain any spaces. should be as difficult as possible to guess. Don t use obvious words or dates such as your family s names, birth dates, or ages. should be longer than six characters. If you access sensitive information or work on one of UCT s central administrative systems, you should consider using an even longer password. should include a mixture of upper and lower case letters and numerals. could include punctuation marks, such as: ()~!?<>*^_ must be changed immediately after first use and whenever prompted (every 90 days) so that you don t get locked out. must be kept secret - do not divulge it to anyone else - not even to an IT consultant. ** IMPORTANT TIP ** Change your password as soon as possible! Remember that your initial password will only work 6 times! University of Cape Town Faculty of Law Student Guidebook

7 NETIQUETTE Etiquette on the Internet is very often perceived as a casual form of communication. Do not be deceived! has fast become the single most frequently used tool for business correspondence and administration. Therefore the manner used within the itself, is as important. The following are the basic guidelines to following when writing s: 1. Make yourself understood. Word your message clearly, and ensure that the recipient understands the context of your message. 2. Treat an message as you would any other correspondence or document: * Check your spelling. * Format the text for readability. * Ensure that your contact details are included. 3. Do not use all caps when writing an - AS IT LOOKS AS THOUGH YOU ARE SHOUTING! 4. Be careful about sending sensitive or confidential information in an . Unfortunately the internet is more open to abuse than traditional means of communication are. 5. Do not send an to someone you do not know - unless you have a justifiable reason for doing so. 6. It is very likely that you will receive SPAM (unsolicited messages usually promoting a product and/or service) or chain letters at some point. Do not forward these on. 7. If you wish to stop receiving from someone you do not know - do not reply to the offending sender. Instead, send a message of complaint to the webmaster at the sender's ISP (Internet Service Provider). 8. Be cautious of registering your address with a websites you are unfamiliar with. Although most sites claim that your information is confidential and that they will not pass your information on, many do in fact sell your address to other websites, resulting in your inbox becoming inundated with s from unfamiliar sources. For more useful information on netiquette, visit: - select A Beginner's Guide to Effective . PRINTING Printing in student labs via Campus Copy & Print (CCP) Nashua is contracted to provide a printing solution for students on campus. The service is called Campus Copy & Print and is available from all student labs and from the Document Centres on campus. You will need your student card in order to access this facility. Support: Contact the Campus Copy & Print Helpdesk on /5. Multi-functional printers in departments from Campus Copy & Print (CCP) Nashua multi-functional printers in departments across UCT can be activated for both copy and print functions. Your existing UCT access card is used to release your print jobs or make copies on your department s Nashua device. The CCP Helpdesk can also activate a password on your card so that your print jobs can be released at other Nashua devices. All print and copy jobs will be charged to departmental funds and cost centres. Students and visitors can purchase copy or print credits from Campus Copy & Print (CCP). University of Cape Town Faculty of Law Student Guidebook

8 If your department is considering using a Nashua device, contact the CCP Helpdesk to request a site inspection. If additional power points are required, you will need to contact Properties & Services or your building supervisor. Support: CCP Helpdesk via ucthelp@cape.nashua.co.za or telephone: (021) /15. Note: This service applies only to Nashua devices and not to those printers connected to the UCT network. KEEP YOUR COMPUTER SECURE Install and Keep your Anti-Virus Software Up-to-Date Versions for Windows, Apple Mac and Linux UCT uses McAfee anti-virus software to protect all computers connected to the network. No other anti-virus software may be installed on your computer. Different versions of McAfee, depending on which operating system you use, are available from the ICTS Downloads page. Staff and students are also entitled to use McAfee on one home PC. Keeping up-to-date New virus signature files are released by McAfee on a daily basis and ICTS makes these available immediately to ensure that your computer remains protected. Staff members who connect to the UCT network will automatically receive the latest daily updates as the McAfee agent will install the update in the background each time the machine connects to the UCT network. If you are unsure whether your campus PC is receiving the latest updates, use the Check your McAfee tool on the ICTS home page. If you are a student who doesn t connect to the network, you must ensure that you either manually download and install the updates, or that you configure your McAfee installation to point to the McAfee website to receive the updates from their repositories. Keep your Operating System and Applications Patched If you don t regularly update your operating system or the applications you use, you run the risk of your PC becoming compromised. ICTS provides central locations where the latest operating system and application patches are made available after undergoing testing to ensure that they are suitable for our environment. Patches are available for Windows, Apple Mac and Linux operating systems. Just point your machine to the correct location for your operating system and all the latest patches will automatically be downloaded and installed. THE UCT NETWORK Local, Wireless and Wide Area Network ICTS maintains a large fully-switched network, connecting a number of campuses to two state-of-the-art data centres. Most of the network infrastructure consists of high-speed fibre-optic cabling that allows connection speeds up to 1Gbps across the network and a speed of 100Mbps to each desktop. In some cases, line-of-sight wireless connectivity is used to link up buildings located outside main campus. The Wireless Network UCT makes use of secured wireless access points situated across campus. Wireless access points may only be installed by ICTS. Any rogue devices found a ached to the network will be removed as they contravene the Network as a core service policy and, if not correctly implemented, pose a security risk to the network. Please log a call with the IT Helpdesk if you wish to install a wireless access point in your area. In order to connect to the UCT wireless network, you need to follow the setup instructions on the ICTS website. Thereafter, you can log on using your username and password. Maps showing the location of wireless hotspots are available on the ICTS website. University of Cape Town Faculty of Law Student Guidebook

9 ResNet, the Residence Network Most student residences have been cabled and connected to ResNet, the residence network. While ICTS manages the network infrastructure, Student Housing and Residence Life manages the application process and provides first level support for students in residence. ICTS does not provide any first level support to residence students. ResNet Connection and Support Students in residence must contact their house committee IT representatives for assistance or send an to the ResNet administrator Applications to join ResNet are available at INTERNET AT UCT How is Internet bandwidth managed at UCT? UCT implemented bandwidth management to analyse, control and prioritise campus Internet bandwidth. This provides better support for academic and administrative requirements and aligns patterns of Internet use with UCT s core business needs. Internet traffic is managed as follows: When required, bandwidth is allocated to essential services, e.g. Library services. The volume of Internet traffic is recorded and assigned to individual users. Note: Volume, not content, is recorded UCT protects the individual s right to privacy. How does Bandwidth Management Affect You? Authenticate to browse Each time you browse the Internet (i.e. go to an off-campus website) a dialog box will appear on your screen. In order to access the Internet you will need to log on with your username and password. Don t forget to add the domain (@wf.uct.ac.za) after your username, as shown below. The addition of the domain is only used when logging in to access the Internet - don t add it to your username when logging on to other UCT services such as the network or . You can choose to save your password, so that the dialog box does not pop up each time you access the Internet. However, you will be prompted to re-enter it (and save it again) each time you change your password. If you share a workstation with other users, don t select the Remember my password checkbox. Make Sure You use the Correct Proxy Setting Your browser must be set to: Laptop owners don t need to change this setting when moving between campus and other off campus locations. Check your Bandwidth Usage You can check how much quota you have used by going to: University of Cape Town Faculty of Law Student Guidebook

10 riq.uct.ac.za (for the ResNet Internet Quota) ciq.uct.ac.za (for the Campus Internet Quota) You can determine how much of your quota has been used in the current month, or view a history of your quota illustrating how much you ve used on any given day of the current month's quota allocation. YOUR BANDWIDTH USAGE IS MONITORED. Doctoral and Postdoctoral Students. The volume of your Internet traffic is centrally recorded. Monthly bandwidth reports, showing individual usage, are sent to Faculty Deans and Executive Directors. Undergraduate and Honours Students Each student accessing the Internet from campus receives a monthly quota. This quota was approved by all faculties on campus and was based on usage information gathered across campus. Frequently Asked Questions > I have already used up my student quota for the month. Can I buy more Internet bandwidth? No, it is not possible to buy more Internet bandwidth. You will need to wait until your next month s allocation. You can, however, access many library and academic sites without using your Campus Internet Quota. > A particular class of students need to access a particular site, can it be added it to the list of sites that don t use up their Campus Internet Quota (CIQ)? Yes! You can request that your lecturer logs a call with the IT Helpdesk, giving as much information as you can about the site, including the full URL plus any other URLs that may need to be accessed. He/she will also need to specify for how long this URL should be exempt from the CIQ. > Is Skype blocked at UCT? No. Skype is not blocked at UCT. You can download and install Skype on your computer, but you should follow the set up instructions in this article ( Networking Internet Skype usage at UCT) > Does UCT block access to any web sites? No. However, ICTS reserves the right to limit bandwidth/block access to malicious sites and to block machines on campus that are in violation of the acceptable use policy or in breach of copyright legislation WIRELESS INTERNET Eduroam Eduroam is an international service to which UCT has subscribed. It allows university staff and students to access the Internet from any other subscribed campus around the world simply by logging in using their home campus credentials (username@wf.uct.ac.za) and password. LAPTOP ACCESS POINTS There are currently 24 laptop points (i.e. network point + power source) available to students in the Law library, on level 1 and an additional 16 on level 2. In order to access the network, our notebook/laptop computer must comply with the UCT Networking policies before connecting to the UCT wireless network. Please ensure that your computer has: University of Cape Town Faculty of Law Student Guidebook

11 the latest Windows/Mac updates installed the latest anti-virus signatures For more information, visit Networking Networking policies Unsecured computers ADDITIONAL FACILITES AND TRAINING Additional Facilities Additional computing facilities are available to students on campus, depending on their registration status. These include facilities on the upper campus, in the Main Library, and the Baxter Learning Centre. For additional information on Student Computing Services, visit: - select Student Computing. Virtual Expert Training ( Students who wish to acquire additional skills are encouraged to make use of the Virtual Expert online training programmes. This programme offers self-training - in your own time - at your own pace. There are two methods of accessing Virtual Expert: Navigate directly to Virtual Expert 1. Using your browser, navigate to Virtual Expert ( If you experience any problems using this interface or have any other questions, comments or suggestions, please send a message to icts-helpdesk@uct.ac.za. Access Virtual Expert via Vula 1. Using your browser, navigate to Vula ( 2. Enter your network username and password to access the site. 3. The extreme left hand tab is My Workspace. 4. Select LearnOnline (from the grey menu on the left). 5. The Virtual Expert main menu will appear. If you experience any problems using Vula or the LearnOnline interface or have any other questions, comments or suggestions, please send a message to help@vula.uct.ac.za. What does Virtual Expert look like and how do I use it? Instructions The Welcome menu 1. Using one of the methods above, log into Virtual Expert. o You will be presented a Welcome menu showing the list of subjects available. o Select the subject you wish to look at, e.g. Word A list of tutorials is presented for your selection. o Double-click on a tutorial University of Cape Town Faculty of Law Student Guidebook

12 to load it into view. 3. The tutorial loads. o Decide whether you want the audio activated or not. o Click Let me learn (Interactive) 4. The tutorial begins. o You are instructed via text instructions at the bottom of the screen. o You are also prompted to click on certain parts of the screen indicated by a large red arrow. o Continue through the tutorial until completion. 5. The next tutorial in the list will automatically load. 6. Either continue with this tutorial; or return to the Main Menu; or Close to quit. A diagram showing some of the Word 2007 tutorials VULA "Vula" is UCT's online learning environment. It is a new open-source learning, collaboration and research content management system, which will replace WebCT & Connect, over a 2-year period. Vula is being built on a technology developed by a consortium of universities including UCT, MIT, Stanford, the University of Michigan and Indiana University, as well as a number of others around the world. It offers a broad spectrum of features, including tools for assessment, communication, resource sharing and collaborative learning. For more information, visit: ELECTRONIC RESEARCH RESOURCES Comprehensive information on the Law Library, which includes access to electronic resources (i.e. databases, journals, books and online catalogues), can be found on the Law library website at: University of Cape Town Faculty of Law Student Guidebook

13 RULES RELATING TO THE USE OF THE UCT COMPUTER FACILITIES The following rules are an adaptation for the Law Faculty of those pending incorporation into the UCT rules book: Access to the computers is granted by the Dean or his / her nominee, in terms of the stated usage policy for that lab. The University's labs exist first for teaching and learning activities which will always enjoy propriety over other activities. General Rules 1.1 Neither food nor drink may be consumed at a computer facility, unless formally stated otherwise. 1.2 Animals, with the exception of guide dogs, are not allowed in the computer facility area. 1.3 A student shall not make a noise, cause a disturbance, use a cellular telephone, hold meetings or demonstrations, or behave in such a manner that would interfere with or impact negatively on study and research activities of computer facility users. Student Accounts 2.1 A student is responsible for his or her own account and its password, which must be kept secure. A student is responsible for any actions that take place from a computer logged in with his or her account. 2.2 A student must log out prior to leaving the lab. 2.3 A student shall not give other people access to his or her account. 2.4 No student may make use of any user account other than those they have been issued with by the University. 2.5 Student accounts are not transferable. Use of Computing Facilities 3.1 A student shall not send a broadcast message. 3.2 A student shall not send unsolicited bulk . The definition of unsolicited bulk (Unsolicited Commercial [UCB] or Spam) is to mass-mail unrequested identical or nearly identical messages. This shall exclude all messages sent for the purposes of legitimate research, teaching and learning activities. 3.3 Tampering with the facilities is not permitted and specifically: A student may not install or run any computer virus, worm or program on a computer facility that may adversely affect the academic process. University of Cape Town Faculty of Law Student Guidebook

14 3.3.2 A student may not tamper with university computer hardware, CMOS settings, software, the network, data or any UCT server A student may not attempt to physically open computers, access their internal hardware components or remove any part of the computer unit Tampering with, or circumventing access control and security systems is strictly forbidden. 3.4 Use of the computer facilities by a student for financial gain, whether directly or indirectly is prohibited. 3.5 Playing computer games is not permitted, unless formally stated otherwise. Penalties 1. Should a student contravene these rules, the Student Tutor or his/her nominee may at his/her discretion apply the penalties listed below. 2. A student may appeal in writing against the decisions of the Student Tutor to the Dean. 3. The Dean or his / her nominee may revoke a student's authorisation to use a computer lab. Category # Rules 1 st Offence 2 nd Offence 3 rd Offence Account disabled for 3 days* Account disabled for 14 days* Account disabled and offence escalated to the Dean** Account disabled for 7 days* Account disabled and offence escalated to the Dean** Account disabled 1 day for every 5 mails. (to a maximum of 7 days* ) Account disabled and offence escalated to the Dean** University of Cape Town Faculty of Law Student Guidebook

15 Account disabled and offence escalated to the Dean** Account disabled and escalated to the University Student Discipline Tribunal # The category of offence determines the penalty. * The period for which accounts are disabled is measured in elapsed days. ** Offences are escalated to the Dean or his / her designate and the student is required to state their case in writing. REFERENCES THAT YOU MAY FIND USEFUL As a member of the UCT community, your access to the network and computing resources is a privilege. You are required to use computing and information resources responsibly and to guard against abuse. Please read the following UCT policies/documentation: Networking The UCT Network Getting connected to the UCT network Core SLA Core ICT Services Service Level Agreement About ICTS Policies Policy on unsecured computers About the University Policies Appropriate Use of Computer Facilities About the University Policies UCT Policy and Rules on Internet and usage For more information about Student Computing at UCT, go to Student Computing and read the articles published there PROBLEMS OR QUERIES Should you experience problems while working on a computer in the Law Library, please contact the Law Library Lab Administrator - located in the Law Library, on level 1. Alternatively you can Valentino.Arendse@uct.ac.za. In the event that the Lab administrator is unable to assist, the matter will be escalated to Library I.T. (lithelpdesk@uct.ac.za or on ) - Alternatively to the Faculty I.T. Manager, if and when appropriate. Should you wish to register a complaint to the Law Faculty I.T. and Equipment Committee, please direct your complaint to the Law Students Council Representative, who is a member of this Committee. University of Cape Town Faculty of Law Student Guidebook

16 CONTACT LIST FOR 2012 The contact details and addresses of the relevant I.T. staff are as follows: Name Department Address Contact number Jenny Erasmus I.T. Manager, Law Faculty Valento Arendse Law Library Lab Administrator LSC Representative Law Student Council Library Helpdesk Library I.T. Helpdesk Helpdesk ICTS Helpdesk NOTES University of Cape Town Faculty of Law Student Guidebook

17 Brand van Zyl Law Library University of Cape Town Private Bag X3 Rondebosch 7701 South Africa Phone: /9 Fax: address: This student guide was collated by the I.T. Manager, Faculty of Law. University of Cape Town Faculty of Law Student Guidebook

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

Frequently Asked Questions The next section includes FAQs to help you to access and use your student email account.

Frequently Asked Questions The next section includes FAQs to help you to access and use your student email account. Factsheet 22 Student Email September 2011 This factsheet can be made available in alternative formats. Please make your request at the Library Help Desk, telephone 01642 342100 or email libraryhelp@tees.ac.uk

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

ResNet services Roles and responsibilities

ResNet services Roles and responsibilities ResNet services Roles and responsibilities Suppliers: Information and Communication Technology Services (ICTS), Student Housing and Residence Life (SH&RL) Customer: Residents in UCT accommodation managed

More information

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 Owner: Cynthia Tan IT Services Table of Contents GENERAL FAQS... 4 1. How to access to Sunway imail account?... 4 2. I can t login to my

More information

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 Talk America Services Customer Service 1-855-546-5000, press 3 TALK

More information

Introduction to Computing @ WSU

Introduction to Computing @ WSU Introduction to Computing @ WSU Table of Contents 1 - Information Technology (IT) Security... 2 Information to Remember... 2 2 - Malware... 2 Information to Remember... 3 3 - Firewalls... 3 Information

More information

ResNet Guide. Information & Learning Services. Here to support your study and research

ResNet Guide. Information & Learning Services. Here to support your study and research ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,

More information

Vancouver Community College Web Orientation

Vancouver Community College Web Orientation Access the myvcc Web Portal The myvcc portal provides a secure environment for VCC students to: Access VCC s Moodle online learning environment Access your student email (Microsoft Office365) Check your

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

THE OPEN UNIVERSITY OF TANZANIA INSTITUTE OF EDUCATIONAL AND MANAGEMENT TECHNOLOGIES. ICT security procedures for staff

THE OPEN UNIVERSITY OF TANZANIA INSTITUTE OF EDUCATIONAL AND MANAGEMENT TECHNOLOGIES. ICT security procedures for staff THE OPEN UNIVERSITY OF TANZANIA INSTITUTE OF EDUCATIONAL AND MANAGEMENT TECHNOLOGIES ICT security procedures for staff October 2014 1.1 Information Systems Usage Guidelines 1.1.1 Users and Computers Accounts

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Using Outlook WebAccess

Using Outlook WebAccess Using Outlook WebAccess Outlook Toolbars - Terminology Update all folders New Move/Copy Reply Forward Check for New Messages Help Show/Hide Folders Delete Reply to All Show/Hide Reading Pain Search Address

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

Eastern Shore Community College. Employee Information Technology Handbook

Eastern Shore Community College. Employee Information Technology Handbook Eastern Shore Community College Employee Information Technology Handbook 6/5/2008 Table of Contents ESCC Network Account Quick Facts...3 Overview... 3 What is my login name and password?... 3 What happens

More information

Getting started with Outlook Webb App (OWA) The new Tilburg University Webmail

Getting started with Outlook Webb App (OWA) The new Tilburg University Webmail Getting started with Outlook Webb App (OWA) The new Tilburg University Webmail This manual was made by Library and IT Services, within the scope of the project The New Workspace. April 2011 (version 1.0)

More information

Email Archiving. Follow these steps to archive your email:

Email Archiving. Follow these steps to archive your email: Email Archiving Archiving is a process by which your email messages and attached files are moved from the database on our email server to a location on your computer. This document contains step-by-step

More information

mycampus Portal Student Email ASU Network Software Student Edition ASU IT Services 082212

mycampus Portal Student Email ASU Network Software Student Edition ASU IT Services 082212 mycampus Portal Student Email ASU Network Software Student Edition ASU IT Services 082212 YOUR STUDENT ACCOUNT AND EMAIL INFORMATION Are you admitted to ASU? If so, congratulations! You have an ASU account!

More information

Outlook Web App McKinney ISD 5/27/2011

Outlook Web App McKinney ISD 5/27/2011 Outlook Web App McKinney ISD 5/27/2011 Outlook Web App Tutorial Outlook Web Access allows you to gain access to your messages, calendars, contacts, tasks and public folders from any computer with internet

More information

Law School Computing Services User Memo

Law School Computing Services User Memo Law School Computing Services User Memo Accessing and Using Shared No. 37 7/28/2015 Email Accounts in Outlook Overview: Many Law School departments and organizations use shared email accounts. Shared email

More information

Introduction to Computer Facilities

Introduction to Computer Facilities Introduction to Computer Facilities Contacting IT Support Email Phone Offices Webpage support.education@utas.edu.au 1818 UTAS - IT Service Desk 3987 Newnham Campus 3161 Newnham Campus 1949 Sandy Bay Campus

More information

Network Usage Guidelines Contents

Network Usage Guidelines Contents Network Usage Guidelines Contents Network Usage...2 Peer to Peer and File Sharing...2 Servers or Server Technologies...2 Routers...2 Wireless...2 Network Storage...2 Security and Privacy...3 Security...3

More information

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE INTRODUCTION You can access your email account from any workstation at your school using Outlook Web Access (OWA),

More information

Student guide to IT services 2015-16

Student guide to IT services 2015-16 Student guide 2015-16 Student guide Introduction Technology is an essential part of university life and IT Services provides the tools and support to help you study successfully at the University of Bristol.

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

NC State College GroupWise V.7 WebAcess Employee Email System

NC State College GroupWise V.7 WebAcess Employee Email System 1 NC State College GroupWise V.7 WebAcess Employee Email System This document provides a quick overview of the basic GroupWise features available using the Web Browser interface. It contains the following

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Wimba Pronto. Version 3.1. Administrator Guide

Wimba Pronto. Version 3.1. Administrator Guide Wimba Pronto Version 3.1 Administrator Guide Wimba Pronto 3.1 Administrator Guide Overview 1 Accessing the Wimba Pronto Administration Interface 2 Managing Multiple Institutions 3 General Features 4 Configuring

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

Outlook Web Access User Guide

Outlook Web Access User Guide Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

NASDAQ Web Security Entitlement Installation Guide November 13, 2007

NASDAQ Web Security Entitlement Installation Guide November 13, 2007 November 13, 2007 Table of Contents: Copyright 2006, The Nasdaq Stock Market, Inc. All rights reserved.... 2 Chapter 1 - Entitlement Overview... 3 Hardware/Software Requirements...3 NASDAQ Workstation...3

More information

Imaging License Server User Guide

Imaging License Server User Guide IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44

More information

GroupWise Web Access 8.0

GroupWise Web Access 8.0 GroupWise Web Access 8.0 How to check your email via the Internet For More Information, please contact: Administrative Office of the Courts Technology Help Desk (615) 532 9503 or (800) 448-7980 Table of

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review

More information

COX BUSINESS ONLINE BACKUP

COX BUSINESS ONLINE BACKUP COX BUSINESS ONLINE BACKUP Quick start Guide www.cox.com Services and features not available in all areas and package options vary by market. Rates and speeds vary by market. Number of users and network

More information

Outlook Web Access (OWA) with Exchange Server 2007 (Windows version)

Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) 1. Login into your Baylor email account via a web browser such as Internet Explorer, Fire Fox, or Netscape. The web URL is still http://mail.baylor.edu/

More information

2.1 It is an offence under UK law to transmit, receive or store certain types of files.

2.1 It is an offence under UK law to transmit, receive or store certain types of files. Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that

More information

RSCCD REMOTE PORTAL TABLE OF CONTENTS: Technology Requirements NOTE

RSCCD REMOTE PORTAL TABLE OF CONTENTS: Technology Requirements NOTE RSCCD REMOTE PORTAL The RSCCD Remote Portal allows employees to access their RSCCD Email (via Outlook Web Access), Department (Public) Folders, Personal (H Drive) Folder, and the District Intranet from

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

Secure Mail Registration and Viewing Procedures

Secure Mail Registration and Viewing Procedures Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email

More information

Introduction to Computing @ WSU

Introduction to Computing @ WSU Introduction to Computing @ WSU Table of Contents 1 - Account Information... 2 2 - Setting up Accounts for First Time Use... 3 3 - Important Systems... 4 4 - CaTS Website... 5 5 - Logging into the Campus

More information

How to Use Remote Access Using Internet Explorer

How to Use Remote Access Using Internet Explorer Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote

More information

Security considerations are denoted by a lock icon.

Security considerations are denoted by a lock icon. About This Guide This guide introduces you to some of the technology resources available at the University of Iowa, with the aim of making those resources easily accessible to you. It is an overview of

More information

Directory and Messaging Services Enterprise Secure Mail Services

Directory and Messaging Services Enterprise Secure Mail Services Title: Directory and Messaging Services Enterprise Secure Mail Services Enterprise Secure Mail Services for End Users Attention: Receivers of Secure Mail Retrieval of Secure Mail by the Recipient Once

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources

More information

https://mail.wheelock.edu

https://mail.wheelock.edu The Wheelock College Guide to Understanding Microsoft Outlook Web Access Maintained by: Wheelock College Department of Information Technology Version 1.1 June 2006 https://mail.wheelock.edu This document

More information

Information Technology Department. Miller School of Medicine New User Guide

Information Technology Department. Miller School of Medicine New User Guide Information Technology Department Miller School of Medicine New User Guide EDUCATION & COMMUNICATIONS Miller School of Medicine New User Guide 1051 NW 14 th Street #165, Miami, FL 33136 (305) 243-5999

More information

MHC CareMail User Guide

MHC CareMail User Guide MHC CareMail User Guide Get Started with MHC CareMail Secure Communications Version 1.7 Table of Contents About MHC CareMail Communications... 4 Getting Started with... 5 Your MHC CareMail Account... 5

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

BTC STUDENT EMAIL GUIDE

BTC STUDENT EMAIL GUIDE BTC STUDENT EMAIL GUIDE All students have a BTC email account. If you are unable to access your account, please contact your instructor. Student Email Each student has an email account. Your email address

More information

Get Connected! How to Configure Your Computer for MITnet. Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista

Get Connected! How to Configure Your Computer for MITnet. Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista Get Connected! How to Configure Your Computer for MITnet Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista 2008 Massachusetts Institute of Technology Table of Contents Introduction...3 About

More information

Background Information

Background Information User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system

More information

Outlook Web App User Guide

Outlook Web App User Guide Outlook Web App Table of Contents QUICK REFERENCE... 2 OUTLOOK WEB APP URL... 2 Imagine! Help Desk...... 2 OUTLOOK WEB APP MAIN WINDOW... 2 KEY NEW FEATURES... 3 GETTING STARTED WITH OUTLOOK... 4 LOGGING

More information

Frequently Asked Questions

Frequently Asked Questions What is ecentral? Who can use ecentral? What can ecentral do? Frequently Asked Questions How do I start using ecentral? What if I forget my User ID? Step-by-step: How to find your User ID Can I change

More information

LSGMI REMOTE DESKTOP SERVICES.

LSGMI REMOTE DESKTOP SERVICES. LSGMI REMOTE DESKTOP SERVICES. This Document is to describe the steps that you should follow in order to have a secured Remote Access to this Service. Requirements: Access to Remote Services is only supported

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

POLICY PATROL MFT. Manual

POLICY PATROL MFT. Manual POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated

More information

Office of Information Technology Resources Handbook for NSC Employees

Office of Information Technology Resources Handbook for NSC Employees NEVADA STATE COLLEGE Office of Information Technology Resources Handbook for NSC Employees Becoming Familiar with NSC s IT Resources and Policies Office of Information Technology Summer 2012 Table of Contents

More information

Using Your New Webmail

Using Your New Webmail Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...

More information

Amazon WorkMail. User Guide Version 1.0

Amazon WorkMail. User Guide Version 1.0 Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection

More information

OUTLOOK WEB ACCESS. User Guide

OUTLOOK WEB ACCESS. User Guide OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.

More information

PolyU Staff Email Service. Outlook 2011 Client. For Mac. Setup Guide

PolyU Staff Email Service. Outlook 2011 Client. For Mac. Setup Guide PolyU Staff Email Service Outlook 2011 Client For Mac Setup Guide Version 1.3 Last Update: 16 January 2013 PolyU Staff Email: www.polyu.edu.hk/email ITS HelpCenter Support: www.polyu.edu.hk/hots ITS Help

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

Welcome. Thank you for choosing Cogeco High Speed Internet.

Welcome. Thank you for choosing Cogeco High Speed Internet. Welcome Welcome Thank you for choosing Cogeco High Speed Internet. Welcome to the endless range of possibilities available to you with your new High Speed Internet service. When it comes to speed, you

More information

What browsers can I use to view my mail?

What browsers can I use to view my mail? How to use webmail. This tutorial is our how-to guide for using Webmail. It does not cover every aspect of Webmail; What browsers can I use to view my mail? Webmail supports the following browsers: Microsoft

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

UniCom Enterprise Phone (Polycom CX600) User Guide

UniCom Enterprise Phone (Polycom CX600) User Guide UniCom Enterprise Phone (Polycom CX600) User Guide 1 6 What is UniCom Enterprise?...1 Frequently Used Make a Call...6 What is Microsoft Lync?...1 Call Functions Use Call Controls...7 Who can use UniCom

More information

BARRACUDA SPAM FIREWALL FAQ

BARRACUDA SPAM FIREWALL FAQ BARRACUDA SPAM FIREWALL FAQ Feb. 25, 2004 1. What is the Barracuda SPAM Firewall? 2. Where are my quarantined emails stored? How do I login? 3. What if I forgot my password? 4. How do I change the password?

More information

Outlook Web Access (OWA) User Guide

Outlook Web Access (OWA) User Guide Outlook Web Access (OWA) User Guide September 2010 TABLE OF CONTENTS TABLE OF CONTENTS... 2 1.0 INTRODUCTION... 4 1.1 OUTLOOK WEB ACCESS SECURITY CONSIDERATIONS... 4 2.0 GETTING STARTED... 5 2.1 LOGGING

More information

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006 The VPN connection supports mainly access to the HWS network drives, not streaming audio/video or downloading large amounts of data. Contents Before Connecting via VPN Before setting up a Virtual Private

More information

CSOS Certificate Support Guide. Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority

CSOS Certificate Support Guide. Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority Document Revision History Version # Revision Sections Summary of Changes Initials Date Affected 1.0 4/27/2006 All Version

More information

Connecting to the University Wireless Network

Connecting to the University Wireless Network Connecting to the University Wireless Network Wifi is available to staff and registered students of University in certain areas of the three campuses of the University. This area of coverage will be expanded

More information

School Mail System. - Access through Office 365 Exchange Online. User Guide FOR. Education Bureau (EDB)

School Mail System. - Access through Office 365 Exchange Online. User Guide FOR. Education Bureau (EDB) School Mail System - Access through Office 365 Exchange Online User Guide FOR Education Bureau (EDB) Version: 1.0 May 2015 The Government of the Hong Kong Special Administrative Region The contents of

More information

User guide Business Internet e-mail features

User guide Business Internet e-mail features User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features

More information

Setting up a Mac on the CU network

Setting up a Mac on the CU network School of Medicine IT Office Setting up a Mac on the CU network v1.3 JAM 23/12/13 This document explains how to setup a Mac on the Cardiff University network, access useful resources and configure native

More information

Business Internet Email service from Bell User Guide

Business Internet Email service from Bell User Guide Business Internet Email service from Bell User Guide Table Of Contents (click a page number to access that page) Getting Started 3 Access your email remotely using Webmail 3 Basic Features 4 Out Of Office

More information

Configuring, Customizing, and Troubleshooting Outlook Express

Configuring, Customizing, and Troubleshooting Outlook Express 3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane

More information

Citrix Remote Access Portal U s e r M a n u a l

Citrix Remote Access Portal U s e r M a n u a l Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting

More information

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...

More information

Evoko Room Manager. System Administrator s Guide and Manual

Evoko Room Manager. System Administrator s Guide and Manual Evoko Room Manager System Administrator s Guide and Manual 1 1. Contents 1. Contents... 2 2. Read this first! Introduction to this Guide... 6 3. User Guide... 6 4. System Architecture Overview... 8 ----

More information

You can attach email accounts to this domain name (eg. sales@acme.com.au or mary@acme.com.au) which also increases your corporate branding.

You can attach email accounts to this domain name (eg. sales@acme.com.au or mary@acme.com.au) which also increases your corporate branding. EMAIL SET UP 1 Your website is placed on the Internet using a domain name (eg. www.acme.com.au). This is your virtual address and it allows people to find your website amongst the millions of websites

More information

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0 Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:

More information

Student ANGEL FAQs. General Issues: System Requirements:

Student ANGEL FAQs. General Issues: System Requirements: Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first

More information

Common Student Computing Environment

Common Student Computing Environment Getting started Computer clusters www.gla.ac.uk/services /it/forstudents University central provision University Library McMillan Reading Room Fraser Building Social Sciences College provision Stair Building

More information

College of Marin Email Accounts Fall 2010. marin.edu Email Access,

College of Marin Email Accounts Fall 2010. marin.edu Email Access, marin.edu Email Access, There are two email accounts assigned to each full-time and part-time faculty member, firstname.lastname@marin.edu, referred to as your marin.edu account and yourlogin@mycom.marin.edu,

More information

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6 MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack

More information

Google Apps Migration

Google Apps Migration Academic Technology Services Google Apps Migration Getting Started 1 Table of Contents How to Use This Guide... 4 How to Get Help... 4 Login to Google Apps:... 5 Import Data from Microsoft Outlook:...

More information