IT Services for Students and Information Security at Aalto University (AALTO SCHOOL OF BUSINESS)

Size: px
Start display at page:

Download "IT Services for Students and Information Security at Aalto University (AALTO SCHOOL OF BUSINESS)"

Transcription

1 Jaakko Salonen Development Manager / Aalto IT IT Services for Students and Information Security at Aalto University (AALTO SCHOOL OF BUSINESS) Aalto IT Orientation Autumn 2013 (Töölö) 1

2 Feedback from students AYY KY S S S S S Student Community TOKYO S S Account Manager for Students Customer Services/ Service Desk Aalto IT Orientation Autumn 2013 (Töölö) 2

3 IT Services for Students Computer classrooms (Windows 7) Home directory Campus wifi Home use licenses for certain pieces of software Print service provided by Aalto IT and Unigrafia Aalto Inside, Into, Student Wiki, Blog Service IT Service Desk Aalto IT Orientation Autumn 2013 (Töölö) 3

4 Aalto Inside and Into Communication channels for the whole Aalto University mainly for staff all studying information All the information on this presentantion and a lot more! Aalto IT Orientation Autumn 2013 (Töölö) 4

5 Computer classrooms Several computer classrooms in several buildings Over 350 PCs in public use (Töölö) Your account also works at Otaniemi and Arabia Different applications depending on the classroom, more info at Aalto Inside All workstations have basic software (Windows 7, MS Office, Firefox, etc.) Scanner in Kesko-Sali (A505) All night open Computer labs Main building C-250 Arkadia till 02:00 AM Keycard needed Aalto IT Orientation Autumn 2013 (Töölö) 5

6 Microsoft Exchange based with 3 GB of space with any browser anywhere Microsoft Outlook at Aalto workstations You can use Microsoft Outlook, Mozilla Thunderbird, etc. (IMAP) Instructions to configure at Aalto Inside Uses same password as other services Spam filtering, Junk folder Aalto IT Orientation Autumn 2013 (Töölö) 6

7 Home directory Home directory automatically visible as Z: drive when you log on to a Windows (or Linux/Mac) workstation in a classroom Directory quota 5 GB Also accessible remotely via SSH+SFTP on a Linux server (e.g. kosh.org.aalto.fi and lyta.aalto.fi) Aalto IT Orientation Autumn 2013 (Töölö) 7

8 Print service provided by Aalto IT and Unigrafia Classroom BW printers Currently no print quota, but it may be turned on (previous quota was 250 pages/month) Professional print jobs etc. provided by Unigrafia, costs money, details available at Aalto Inside Out of toner / printer jammed? send to servicedesk@aalto.fi visit the information desk at the specific building Aalto IT Orientation Autumn 2013 (Töölö) 8

9 Campus Wifi Two networks: Aalto Open and eduroam Aalto Open: Unsecured network! Free to use without passwords, just connect and browse Traffic itself is not encrypted! eduroam: pan-european network of wifi networks, secure You can use any eduroam network in Europe Traffic encrypted Needs configuration, check Aalto Inside for instructions Most services allowed, SMTP blocked Terms of Use for wireless network Printing not possible Over 40 Access Points at the campus, notify IT if there is lack of coverage Aalto IT Orientation Autumn 2013 (Töölö) 9

10 Home use licenses Download.aalto.fi Antivirus software, SSH Tectia Client, Comsol, SPSS, etc May only be used while studying at Aalto! Accessible from home as well Microsoft products for Aalto students Check Aalto Inside for information about Microsoft DreamSpark Aalto IT Orientation Autumn 2013 (Töölö) 10

11 Student Wiki, Blog Service Studentwiki.aalto.fi Wiki for students Create your own workspaces for collaboration, sharing information, etc. Control who gets to edit, read, administrate Wiki.aalto.fi Primarily for staff, students cannot create spaces Blogs.aalto.fi Start writing your own blog Follow other blogs and comment Aalto IT Orientation Autumn 2013 (Töölö) 11

12 User Account and password One Aalto password for all your needs ( , workstations, wifi,...) Password policy Minimum 10 characters password maximum lifetime 6 months password minimum lifetime 24 hours Complexity: must have 3 of ABC, abc, 012,! # % Äöå are allowed, but may cause problems password history (24) Aalto IT Orientation Autumn 2013 (Töölö) 12

13 Password Security Never tell anyone your password IT Services personnel will never want or need your password Your account is personal, not for sharing Try to remember If you have to write it down, hide it and keep it away from your username Phishing If you get an from anywhere asking for your password, do not reply Instructions on reporting phishing attempts in Inside If you forget: password.aalto.fi (with banking credentials or HST card) come to IT Service Desk with your ID. Must be done in person. Change all your passwords regularly and also when you suspect it s no longer secret More information about good passwords in Inside. Aalto IT Orientation Autumn 2013 (Töölö) 13

14 Account Security Do not use the same password in other services! inherently suspicious: do not trust the Sender field or attachments Check your URL when entering passwords Always lock your workstation when stepping out Take care of the security of your own PC as well USB memory sticks Easy to lose or break Viruses Aalto IT Orientation Autumn 2013 (Töölö) 14

15 Account Security (cont d) Respect other users privacy Other people s , files, passwords, sessions Personal data (e.g. addresses, student numbers) not to be distributed Confidential research/business data You are responsible for the activity on your account Commercial, political, sectarian activity forbidden per Usage Policy Exception: student union activity We back-up most of the data, but you have the ultimate responsibility Second, private address convenient You will lose your university address upon leaving/graduation Secondary address easier to throw away Use common sense More policies and instructions: Aalto IT Orientation Autumn 2013 (Töölö) 15

16 IT Service Desk First point of contact for all issues Possible problems elevated to proper address by IT Service Desk IT Service Desk visiting address: Basement of the main building, Room A022 Tel Opening times Every day: Aalto Inside and Into Aalto IT Orientation Autumn 2013 (Töölö) 16

17 Questions? Aalto IT Orientation Autumn 2013 (Töölö) 17

Short introduction to Aalto University IT environment 2014-08-25 Mikkeli Campus

Short introduction to Aalto University IT environment 2014-08-25 Mikkeli Campus Short introduction to Aalto University IT environment 2014-08-25 Mikkeli Campus IT SERVICES Personnel IT System Administrator, Mr. Sauli Hänninen - office #303, mobile +358 400 522 527 IT Support person,

More information

User guide Business Internet e-mail features

User guide Business Internet e-mail features User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features

More information

Business Internet Email service from Bell User Guide

Business Internet Email service from Bell User Guide Business Internet Email service from Bell User Guide Table Of Contents (click a page number to access that page) Getting Started 3 Access your email remotely using Webmail 3 Basic Features 4 Out Of Office

More information

Forefront Spam Filtering

Forefront Spam Filtering Forefront Spam Filtering What s Happening? W&L s incoming e-mail filtering system has switched from Digitar to Microsoft ForeFront as of about 6:00 a.m. on Tuesday, August 14. How Will This Affect You?

More information

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information

More information

Introduction to Computing @ WSU

Introduction to Computing @ WSU Introduction to Computing @ WSU Table of Contents 1 - Information Technology (IT) Security... 2 Information to Remember... 2 2 - Malware... 2 Information to Remember... 3 3 - Firewalls... 3 Information

More information

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS)

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) This document provides an installation and configuration guide for MDaemon Messaging Server along with

More information

Cryptshare for Outlook User Guide

Cryptshare for Outlook User Guide Cryptshare for Outlook User Guide V1.6.2 Befine Solutions AG Werthmannstr. 15 79098 Freiburg i. Br. Germany Web: https://www.cryptshare.com E-Mail: info@cryptshare.com Tel.: +49 761 389 13 0 Fax: +49 761

More information

Secure Mail Registration and Viewing Procedures

Secure Mail Registration and Viewing Procedures Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email

More information

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS)

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) This document is designed to provide a quick installation and configuration guide for MDaemon along

More information

Accessing your Staff (N and O drive) files from off campus

Accessing your Staff (N and O drive) files from off campus Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document

More information

Introduction to Email. Jan 24 th 2010

Introduction to Email. Jan 24 th 2010 Introduction to Email Jan 24 th 2010 Email Need special software (called email-reader or emailclient) to connect to the email-server and download the emails Email-server has limited space for each user

More information

Customer Control Panel Manual

Customer Control Panel Manual Customer Control Panel Manual Contents Introduction... 2 Before you begin... 2 Logging in to the Control Panel... 2 Resetting your Control Panel password.... 3 Managing FTP... 4 FTP details for your website...

More information

IT@DUSON. IT Service Desk

IT@DUSON. IT Service Desk IT@DUSON Technology plays a key role in the learning process for nursing students at Duke. This is your guide to the technology used at the Duke School of Nursing and how to request assistance for all

More information

TUT IT services www.tut.fi/pop > STUDY INFO > IT Services

TUT IT services www.tut.fi/pop > STUDY INFO > IT Services TUT IT services www.tut.fi/pop > STUDY INFO > IT Services TUT IT Helpdesk The single point of contact for all your IT-related questions When you contact the IT Helpdesk by email, please include the following

More information

1 Accessing E-mail accounts on the Axxess Mail Server

1 Accessing E-mail accounts on the Axxess Mail Server 1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

NEVER guess an e-mail address. Your mail will nearly always go to the wrong person.

NEVER guess an e-mail address. Your mail will nearly always go to the wrong person. 16. WebMail (E-mail) E-mail is a mechanism for sending messages and information between computer users. Individuals are identified by their e-mail address, which is used in much the same way as a postal

More information

COMPUTER SERVICES FOR STUDENTS

COMPUTER SERVICES FOR STUDENTS COMPUTER SERVICES FOR STUDENTS IT Administration Services/ Helpdesk University of Oulu Jorma Heikka, Janne Lindqvist 2012 IT Administration Services... 1 What s free and what s not!... 1 User account and

More information

General Security Best Practices

General Security Best Practices General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking

More information

Common Student Computing Environment

Common Student Computing Environment Getting started Computer clusters www.gla.ac.uk/services /it/forstudents University central provision University Library McMillan Reading Room Fraser Building Social Sciences College provision Stair Building

More information

DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK. Fall & Spring: Monday Thursday 8am to 9pm. Summer & Breaks:

DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK. Fall & Spring: Monday Thursday 8am to 9pm. Summer & Breaks: DECS Community IT Michigan State University College of Engineering DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK For all questions and requests visit www.egr.msu.edu/decs or 1325EB, e mail

More information

johnireland@eircom.net

johnireland@eircom.net Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network

More information

How To Connect To the WIT Wi-Fi Using Eduroam CAT Tools

How To Connect To the WIT Wi-Fi Using Eduroam CAT Tools How To Connect To the WIT Wi-Fi Using Eduroam CAT Tools Introduction To connect to the Internet in WIT with your laptop or phone, you need to have a current student login or a current staff login with

More information

JMA Domain Instructions/Policies

JMA Domain Instructions/Policies JMA Domain Instructions/Policies Login (for faculty and students): If you have used one of our labs before (you have a JMA account), your username is the same. If you have not been in the lab before, your

More information

Installation Guide. Research Computing Team V1.9 RESTRICTED

Installation Guide. Research Computing Team V1.9 RESTRICTED Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots

More information

TIPS IN PREVENTING INFORMATION LEAKAGE

TIPS IN PREVENTING INFORMATION LEAKAGE TIPS IN PREVENTING INFORMATION LEAKAGE 1 Presented by Christina Keing and Frankie Fu Information Security Section (ISS), ITSC 5 Sept 2008 AIMS 2 AGENDA Recent incidents What information to protect? How

More information

Plesk for Windows Copyright Notice

Plesk for Windows Copyright Notice 2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.

More information

STUDENT S INFORMATION SECURITY GUIDE

STUDENT S INFORMATION SECURITY GUIDE STUDENT S INFORMATION SECURITY GUIDE April 2013 Table of contents Information security is important - also for you...1 Use strong passwords and keep them safe...2 E-mail use...3 Beware of phishing and

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Basic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann

Basic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring

More information

Frequently Asked Questions The next section includes FAQs to help you to access and use your student email account.

Frequently Asked Questions The next section includes FAQs to help you to access and use your student email account. Factsheet 22 Student Email September 2011 This factsheet can be made available in alternative formats. Please make your request at the Library Help Desk, telephone 01642 342100 or email libraryhelp@tees.ac.uk

More information

Introduction to Computing @ WSU

Introduction to Computing @ WSU Introduction to Computing @ WSU Table of Contents 1 - Account Information... 2 2 - Setting up Accounts for First Time Use... 3 3 - Important Systems... 4 4 - CaTS Website... 5 5 - Logging into the Campus

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2010, Parallels, Inc.

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Security considerations are denoted by a lock icon.

Security considerations are denoted by a lock icon. About This Guide This guide introduces you to some of the technology resources available at the University of Iowa, with the aim of making those resources easily accessible to you. It is an overview of

More information

Computer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College

Computer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College Defining the Problem Symantec documented 2,636 new vulnerabilities in 2003, an average of seven

More information

Connecting to the University Wireless Network

Connecting to the University Wireless Network Connecting to the University Wireless Network Wifi is available to staff and registered students of University in certain areas of the three campuses of the University. This area of coverage will be expanded

More information

Law College Computer and Technology Information

Law College Computer and Technology Information Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow

More information

HOW WILL I KNOW THAT I SHOULD USE THE IAS EMAIL CONTINUITY SERVICE? https://web.ias.edu/updateme/

HOW WILL I KNOW THAT I SHOULD USE THE IAS EMAIL CONTINUITY SERVICE? https://web.ias.edu/updateme/ WHEN DO I NEED TO ACCESS THE IAS EMAIL CONTINUITY SERVICE? This service is provided to address the following actions during periods where the IAS email servers are offline: 1. If you need to check for

More information

Barracuda Spam Firewall

Barracuda Spam Firewall Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive

More information

NETWORK AND INTERNET SECURITY POLICY STATEMENT

NETWORK AND INTERNET SECURITY POLICY STATEMENT TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004

More information

Overview of Registered Envelopes. Registered Envelope Notification Message

Overview of Registered Envelopes. Registered Envelope Notification Message Overview of Registered Envelopes A Registered Envelope is a type of encrypted email message. Some Registered Envelopes are password-protected, while others are encrypted but do not require a password.

More information

Quarantine Network for Specialised Equipment.

Quarantine Network for Specialised Equipment. Quarantine Network for Specialised Equipment. Using Remote Desktop to get data in and out of the quarantine network V1.2 It is now possible to connect through a gateway or terminal server to PCs connected

More information

Setting up a Mac on the CU network

Setting up a Mac on the CU network School of Medicine IT Office Setting up a Mac on the CU network v1.3 JAM 23/12/13 This document explains how to setup a Mac on the Cardiff University network, access useful resources and configure native

More information

Plesk 7.6 For Windows E-mail User Guide

Plesk 7.6 For Windows E-mail User Guide SWsoft, Inc. Plesk 7.6 For Windows E-mail User Guide (Revision 1.0) (c) 1999-2006 ISBN: N/A SWsoft, Inc. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703)

More information

Quick Start Guide. Your New Email Account

Quick Start Guide. Your New Email Account Quick Start Guide Your New Email Account http://www.names.co.uk/support/ Table of Contents Adding a new email account... 3 Adding a new email address... 5 Adding a mail group... 6 How to check your emails...

More information

Basic Citrix Manual. Windows Computers and Laptops. Version 1.3. Created by Joshua Lindemann

Basic Citrix Manual. Windows Computers and Laptops. Version 1.3. Created by Joshua Lindemann Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring

More information

Parallels Plesk Control Panel

Parallels Plesk Control Panel Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,

More information

Information Security Guide for Students

Information Security Guide for Students Information Security Guide for Students August 2009 Contents The purpose of information security and data protection...1 Access rights and passwords...2 Internet and e-mail...3 Privacy protection...5 University

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

How to Setup an IMAP account in Outlook Express to Connect to Your Arrowmail Mailbox

How to Setup an IMAP account in Outlook Express to Connect to Your Arrowmail Mailbox How to Setup an IMAP account in Outlook Express to Connect to Your Arrowmail Mailbox Why would you want to use Outlook Express? If you have Microsoft Outlook installed on your PC you should use it, with

More information

IT Resources at NCSU. ISE s 2 minute guide to NCSU s IT resources. www.ise.ncsu.edu

IT Resources at NCSU. ISE s 2 minute guide to NCSU s IT resources. www.ise.ncsu.edu IT Resources at NCSU ISE s 2 minute guide to NCSU s IT resources Support @ NCSU ISEHELP (isehelp@ncsu.edu) ISE s IT Group (Justin and Robert) ITECS (eoshelp@ncsu.edu) College of Engineering IT OIT (help@ncsu.edu)

More information

What browsers can I use to view my mail?

What browsers can I use to view my mail? How to use webmail. This tutorial is our how-to guide for using Webmail. It does not cover every aspect of Webmail; What browsers can I use to view my mail? Webmail supports the following browsers: Microsoft

More information

File Management and File Storage

File Management and File Storage File Management and File Storage http://training.usask.ca Information Technology Services Division Table of Contents File Management at the University of Saskatchewan...3 Introduction...3 Creating Files

More information

Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment

Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment What services do I use with the old TKK password, and what do I use

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods: ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This

More information

Computing Facilities Orientation September, 2017

Computing Facilities Orientation September, 2017 Computing Facilities Orientation September, 2017 Introductions Steve Miley Director of IT Brad Hill Manager of Desktop Support Geoff Jewel Help Desk Manager First, a few questions Most common food dropped

More information

Web Hosting Getting Started Guide

Web Hosting Getting Started Guide Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload

More information

https://mail.wheelock.edu

https://mail.wheelock.edu The Wheelock College Guide to Understanding Microsoft Outlook Web Access Maintained by: Wheelock College Department of Information Technology Version 1.1 June 2006 https://mail.wheelock.edu This document

More information

Email User Guide. Contents. Information Systems and Technology Dawson College v 1.3, 15 November 2013

Email User Guide. Contents. Information Systems and Technology Dawson College v 1.3, 15 November 2013 Information Systems and Technology Dawson College v 1.3, 15 November 2013 Contents 1 Overview... 2 2 Access... 2 2.1 Outlook... 2 2.2 Outlook Web Access (OWA)... 3 2.3 Outlook for Mac... 4 2.4 Other email

More information

UH Mail Server Retirement

UH Mail Server Retirement University Information Technology UH Mail Server Retirement Technology Services and Support Davis, Ivey S!" Table of Contents The University of Houston s Mail.Uh.edu Server Retirement... 2 Introduction...

More information

Email Start to Finish: Set up a New Account or Use Your Own

Email Start to Finish: Set up a New Account or Use Your Own Better Technology, Onsite and Personal Connecting NIOGA s Communities www.btopexpress.org [Type www.nioga.org Email Start to Finish: Set up a New Account or Use Your Own Overview: Set up a free email account

More information

Hosted Email Managed by Email Specialists

Hosted Email Managed by Email Specialists Hosted Email Managed by Email Specialists The Mailtrust email system is the premium hosted email platform that provides your business with powerful, secure, and reliable email with absolutely no maintenance

More information

Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging

Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Overview The University of Pittsburgh is removing the

More information

MailEnable Web Mail End User Manual V 2.x

MailEnable Web Mail End User Manual V 2.x MailEnable Web Mail End User Manual V 2.x MailEnable Messaging Services for Microsoft Windows NT/2000/2003 MailEnable Pty. Ltd. 486 Neerim Road Murrumbeena VIC 3163 Australia t: +61 3 9569 0772 f: +61

More information

Good Practice use of Outlook, Thunderbird and HORDE Webmail

Good Practice use of Outlook, Thunderbird and HORDE Webmail Midwest Data, Inc. Good Practice use of Outlook, Thunderbird and HORDE Webmail This document is merely suggested setups and usage that in MDI s experience works best. For any questions please e-mail mdisupport@midwestdatainc.com.

More information

Connecting to the Remote Desktop Service

Connecting to the Remote Desktop Service Connecting to the Remote Desktop Service What is the Remote Desktop Service? Connecting to a University of Greenwich Remote Desktop allows you to work securely on documents and files held on the University's

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.

More information

Yale Secure File Transfer User Guide

Yale Secure File Transfer User Guide Yale Secure File Transfer For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Yale Secure File Transfer User Guide This document provides information and detailed steps for using Yale's

More information

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106 UCLH VPN User Guide January 2009 VPN User Guide v1.3 20090106 1. What is the VPN? The VPN (Virtual Private Network) provides users with secure access, using a web browser, to a standard terminal screen

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide

FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide Exchange ControlPanel Administration Guide Table of Contents Top Level Portal Administration... 4 Signing In to Control Panel... 4 Restoring Account Password... 5 Change Account Details... 7 Viewing Account

More information

Firewall, Mail and File server solution

Firewall, Mail and File server solution Firewall, Mail and File server solution Table of Contents Introduction......2 Overview......3 Detailed description....4 Firewall......4 Other services offered by IPCop:......4 Mail and File Server......5

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

Security Awareness. ITS Security Training. Fall 2015

Security Awareness. ITS Security Training. Fall 2015 Security Awareness ITS Security Training Fall 2015 Why am I here? Isn t security an IT problem? Technology can address only a fraction of security risks. You are a primary target, or rather, your data

More information

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 User Guide SWDT653811-793266-0827104650-001 Contents Getting started... 3 About messaging service plans for BlackBerry

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Computer and Information Security End User Questionnaire

Computer and Information Security End User Questionnaire Computer and Information Security End User Questionnaire Human Factors Issues in Computer and Information Security Funded by the National Science Foundation: EIA-0120092 Project http://cis.engr.wisc.edu/

More information

Patented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S.

Patented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S. Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd. All rights reserved

More information

New Employee Technology Orientation

New Employee Technology Orientation New Employee Technology Orientation Policies Division of Information Technology Services Policies IT@Sam has several policies with which you should familiarize yourself. Those policies can be found online

More information

Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow

Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces

More information

Configuring an Android device to access Staff Wi-Fi and Email.

Configuring an Android device to access Staff Wi-Fi and Email. Information Services Revised 15.10.15 ISD Customer Services Configuring an Android device to access Staff Wi-Fi and Email. Screenshots provided from Google Nexus, Android version 4.2.1 Jelly Bean. Important

More information

Persona Backup and OS Migration for insync Private Cloud 5.5. June 16, 15

Persona Backup and OS Migration for insync Private Cloud 5.5. June 16, 15 Persona Backup and OS Migration for insync Private Cloud 5.5 June 16, 15 Copyright Notice Copyright 2007-2015 Druva Inc. All Rights Reserved. Any technical documentation that is made available by Druva

More information

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0 Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:

More information

USER GUIDE WWPass Security for Windows Logon

USER GUIDE WWPass Security for Windows Logon USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey

More information

Office of Information Technology Resources Handbook for NSC Employees

Office of Information Technology Resources Handbook for NSC Employees NEVADA STATE COLLEGE Office of Information Technology Resources Handbook for NSC Employees Becoming Familiar with NSC s IT Resources and Policies Office of Information Technology Summer 2012 Table of Contents

More information

Guide to Enterprise Vault - Email Archiving

Guide to Enterprise Vault - Email Archiving Guide to Enterprise Vault - Email Archiving Version V1.0/2009 This document contains commercially sensitive information and is therefore restricted to University of Melbourne Staff that have operational

More information

VCL Access. VCL provides access to Linux and Windows 7 Virtual Machines. Users will only see those images that they are authorized to access.

VCL Access. VCL provides access to Linux and Windows 7 Virtual Machines. Users will only see those images that they are authorized to access. What is VCL? VCL (Virtual Computer Lab) is a service running on servers in IIT s datacenter that enables users to schedule and connect to virtual desktops running specific academic software applications

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Citrus Valley Health Partners. Web Outlook User Guide. Table of Contents

Citrus Valley Health Partners. Web Outlook User Guide. Table of Contents Citrus Valley Health Partners Web Outlook User Guide Table of Contents Getting Started Page Access to Web Outlook... 1 Log in Instructions... 1 Basic Navigation... 1 The Menu Bar... 1 The Reading Pane...

More information

INTRODUCTION TO VIRTUAL DESKTOP BINGHAMTON UNIVERSITY

INTRODUCTION TO VIRTUAL DESKTOP BINGHAMTON UNIVERSITY INTRODUCTION TO VIRTUAL DESKTOP AT BINGHAMTON UNIVERSITY ACCESS MATLAB, PRO ENGINEER, SPSS, STATA, VIRTUALLY! Presently Virtual Desktop can be accessed via your personal computer, laptop or from home Available

More information

Persona Backup & OS Migration

Persona Backup & OS Migration Persona Backup & OS Migration insync 5.4 Druva Software Table of Contents About this document... 3 Persona backup... 4 About persona backup... 4 Use of persona backup... 4 Availability... 5 Supported system

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

User manual VU-Mail Webmail Outlook Web App februari 2010

User manual VU-Mail Webmail Outlook Web App februari 2010 VU University Amsterdam University Centre IT User manual VU-Mail Webmail Outlook Web App februari 2010 This document describes how to access and configure VU Webmail (Outlook Web App). 1. Index 1. Index

More information

www.wit.tafensw.edu.au

www.wit.tafensw.edu.au CONNECTING TO WIRELESS NETWORK TAFE WESTERN CONNECTING TO WIRELESS NETWORK iphone/ipod Touch, ipad, Internet Explorer, Firefox TAFE Western provides wireless access for staff and students via the TAFE-Guest

More information

Welcome to ECBuzz.com! Please go through this document carefully to make the experience of owning and using a website an enjoyable one.

Welcome to ECBuzz.com! Please go through this document carefully to make the experience of owning and using a website an enjoyable one. Sales call: 90116 90305 Sales email: sales@ecbuzz.com Support email: support@ecbuzz.com Welcome to ECBuzz.com! Please go through this document carefully to make the experience of owning and using a website

More information

BTC STUDENT EMAIL GUIDE

BTC STUDENT EMAIL GUIDE BTC STUDENT EMAIL GUIDE All students have a BTC email account. If you are unable to access your account, please contact your instructor. Student Email Each student has an email account. Your email address

More information