IT Handbook - UC Directory

IT Handbook - UC Directory
IT Handbook
UC Information Technologies (UCIT)
Services at a Glance......................................74
Security Basics................................................76
Blackboard.......................................................81
Getting Online................................................84
Safeconnect..............................................84
Wireless................................................... 109
UCIT is pleased to offer you diverse, cutting edge
technology services.
From wireless to mobile app development and informatin security to
Blackboard, we are here to provide the technology you need. We have
staff dedicated to helping you with whatever technology
questions or issues you may have. We also work with vendors
to offer you significant discounts on all the software and
hardware you need.
73
Services at a Glance
Help Desk/ResNet: When you have a question or need support, the UCIT Help Desk is a quick phone
call away! Just dial 556-HELP. Our Help Desk Technicians will get you the answer you need, or point
you in the right direction. Having an issue with your device? Stop by ResNet, located on MainStreet,
and let one of our technicians troubleshoot it for free!
Visit uc.edu/ucit/helpdesk for more information.
UC Mobile App: No Bearcat should be
without the UC Mobile App – your mobile
connection to campus maps, shuttle tracker,
Blackboard, athletics and more! You can
download the UC Mobile App for your
Android (on.uc.edu/WLPsm8) or Apple (on.
uc.edu/VtqRTV ) device.
Have a passion for development or an
idea for the next big app? Stop by the UC
App Lab on MainStreet to learn how you
can collaborate with UC students, faculty
and developers to gain experience in the
exciting world of mobile app development.
Need help with technology?
Our Help Desk is here for you!
513-556-HELP(4357)
[email protected]
Or visit ResNet, our student walk-in
help desk, on MainStreet across from
Tangeman University Center (TUC)
Blackboard: Blackboard is how you’ll end
up communicating with most of your professors on the Internet. Blackboard hosts your class syllabus,
podcasts, links, videos and grades posted by your professor. It is also a great way to connect with news
and events at UC! To log on, use your UC-issued username and password at blackboard.uc.edu
Email: That username and password you used on Blackboard also logs you onto your UC email
account. Microsoft Office 365 is your official school email. Make sure you check it often, so you don’t
miss out on anything important. But it is a lot more than just that! Students can access calendars, web
conferencing and Sky Drive Pro – your personal
web storage cloud! Just go to mail.uc.edu and use
your log on credentials. Learn more at uc.edu/
GENERAL POLICY ON THE
ucit/email/office365.
USE OF INFORMATION TECHNOLOGY
www.uc.edu/ucit/policies.html
Secure Wireless: UC’s campus is 100% wireless.
That means you can access our secured wireless
As an institution of higher learning, the
network from every building and select green
university both uses information technology
spaces on campus. Whether you have a smart
and supplies it to the members of the university
phone, tablet or laptop, you never have to worry
community. This policy sets forth the general
about staying connected to what matters to you!
rights and responsibilities common to all uses of
You can even print from your dorm room with
information technology.
wireless printing in residence halls!
To learn how to connect to our secured wireless
network, contact the Help Desk or stop by ResNet on MainStreet.
Computer Labs and File Storage: If you don’t have a computer, don’t worry! We do! We’ve got over
400 computers or kiosks all over campus. And when it’s late, you can head over to [email protected] —
our 24 hour computer lab on the fifth floor of Langsam Library. You’ll find 100 computers, quiet study
areas and breakout rooms with SMART Boards. You’ve got access on your time, anytime!
And with UC File Space, you even have a place to store your files, host your website or update your
blog!
74
uc.edu/ucit/students
GoCharge Charging Stations: A long day on campus doesn’t have to mean the death of your phone
or tablet’s battery! GoCharge, UC’s free mobile device charging stations, allow you to securely lock
your device and leave it so it can charge while you’re away. Check out our GoCharge stations located
at the Tangeman University Center’s food court and [email protected], the 24-hour computer lab in
Langsam Library.
Information Security: UCIT’s Office of Information Security is here to help the UC community
maintain a secure computing environment. But safety is everyone’s responsibility! Visit our website,
uc.edu/infosec, or connect with Information Security @UC_OIS on Twitter for tips on how to keep your
computer and information safe – like learning how to protect your personal information from being
stolen with an email phishing scam.
Free and Discounted Software: Did you know that students can download McAfee anti-virus
software for free? As a matter of fact, students can take advantage of more than 15 free or discounted
software programs, like Microsoft Office Suite! Before you make a software purchase, be sure to check
out all the discounts available by visiting uc.edu/ucit/ware/software.
Lynda.com: Lynda.com is an online video-training library with more than 1,400 software, careerdevelopment, and technology training titles that is FREE to access anywhere using your UC username
and password. Lynda’s video courses are taught by industry experts, teachers and professionals AND
allow you to earn certificates of completion! Learn more or check out an online training video at
uc.edu/ucit/learningtechnologies/lynda.
Order services: Student GetIT is the system you use to order IT items and services.
Password Reset: Password Self-Service allows you to reset your password to any connected
application without having to call Help Desk. You simply answer a few questions and, if you later
forget your password, you can reset your password instantly using PSS. You will be prompted with
your questions and then allowed to reset your password yourself!
Printing: Each student recieves 150 free black and white prints per semester free of charge. After that,
copies are 7 cents per page. Large page sizes and color printing are available in some locations.
VPN: VPN stands for Virtual Private Network. It’s how to access UC systems when you aren’t on
campus. Most of the time, you won’t need it because only restricted information and systems access
requires VPN. But sometimes, you may need to access something from the library website that is only
available to staff, students or faculty, and you’ll need to log into the VPN.
UCIT @ Langsam
Computer Lab located on West Campus • 540 Langsam Library • 513-556-0168
Open 24 hours a day, 7 days a week!
Equipped with macs, PCs & a sweet suite of software.
Plus, quiet study rooms with smart boards.
More information about all our labs at labs.uc.edu/.
75
Security Basics and Virus Information
www.uc.edu/nfosec
http://www.uc.edu/infosec/, 513-558-ISEC (4732)
Information Security
UCIT’s Office of Information Security offers a wide variety of services. These include:
• Links to FREE anti-virus/anti-spyware software.
• Education and awareness training
• Tips and How-To pages on fighting spam & identity theft, protecting your laptop and more!
• These offerings and many more can be found at http://www.uc.edu/infosec.
• If you suspect that you have been a victim of a computer crime or abuse while at UC, please report
the incident to [email protected] Give as much detail as possible: Who, What, When and Where.
The NEVERS of password security
The NEVERS of computer security
Never disclose your password to others, either in
person, by phone, or by e-mail. UC staff will never
ask you for your password via e-mail or telephone.
If you must write down your password, keep it in a
locked location.
Never leave your desktop computer unlocked
when you walk away, and turn it off at the end of
the day.
Never download or install a screensaver; use what
is preinstalled.
Never leave your password at the default. Change
it immediately.
Never install software received from another user.
Never make your password less that eight
characters if possible.
Never download copyrighted materials such as
music or movies illegally.
Never use all numbers or all letters. Use a
combination of upper and lower case letters,
numbers, and special characters like @! & * [ ].
Never leave your laptop unattended, even in the
cab of your car. Protect it like your purse or wallet.
Put location finding software (such as lo-jac) on
your laptop.
Never use personal information that someone
could easily guess or discover: your pet,
hometown, sports team or really any word found
in a dictionary. Make your password from a phrase
(i.e., use the first letter of every word from a
simple quote).
Never check your laptop while flying.
Never leave sensitive information vulnerable.
Password protect or encrypt any sensitive
information on laptop. Use security cables.
Never keep the same pasword for longer than 90
days.
Password Security
• Never disclose your password to others, either in person, by phone, or by e-mail.
• Never leave your password at the default. Change it immediately.
• Make your password eight or more characters where possible.
• Do not reuse passwords. That way if your password is compromised at one site it won’t allow anyone
access to all sites
• Make your password from a phrase (i.e., use the first letter of every word from a simple quote).
• Use a combination of upper and lower case letters, numbers, and special characters like @ ! & * [ ].
• Never use all numbers or all letters.
• Never use personal information that someone could easily guess or discover: your pet or hometown, etc.
• Never use any word found in a dictionary or the name of a sports team.
• If you must write down your password, keep it in a locked location.
• Change your password frequently, at least every 90 days.
• UC staff will never ask for your password via e-mail or telephone.
• See http://www.uc.edu/infosec/password/choosepassword.html for more ideas!
76
Desktop Security
• When you need to walk away from your computer, either logoff OR
lock your workstation by pressing Windows Key+L or set an automatic
screensaver then require a password to wake up.
• When finished using computer, logoff. This is especially true of lab
computers!
• Install the latest updates for any security patches.
• Do not install software—commercial, shareware, or freeware—
borrowed or purchased from another user.
• Use of peer-to-peer applications to share copyrighted materials, such
as music or movies, is a direct violation of copyright laws. Do not do it!
Be careful with QR
codes!
Some QR codes are
dirty, meaning they can
download viruses to your
device. Only scan codes
from trusted sources!
Laptop Security
• Your laptop is a gold mine for Identify Thieves. Protect it like you would your purse or wallet.
• Use a laptop security cable to secure it to a desk when in an open work space.
• Always keep a backup of your work, whether to an external hard drive or a secure cloud service.
• Password protect or encrypt any sensitive information stored on the laptop.
• When you are away, lock it in a drawer, overhead bin, cabinet or take it with you.
• Never leave your laptop unattended in a public place, even for “just a minute”.
• Never check your laptop as luggage when you travel.
• Never leave your laptop in a car in plain view on the seat or the floor.
• Never leave your laptop in a car over night.
• Encrypt your hard drive if it is possible to do so.
Spyware
Spyware is used by the advertising industry and by crackers. Spyware and Adware are software that when
installed on your computer, may send you pop-up ads, redirect your browser to certain web sites, or monitor
web sites you visit. Extremely invasive versions of spyware may track exactly what keys you type to steal
username and password information.
• Fight Spyware and other malicious software by installing an anti-spyware/anti-virus package.
• McAfee anti-virus/anti-spyware is available for FREE to UC students! http://www.uc.edu/infosec/ > Free
Antivirus (in the top navigation bar).
• Other tips to fight malicious software: do not click on links with pop-up windows, chose “no” when you are
asked unexpected questions; be wary of free, downloadable software, and never follow e-mail links.
• If you believe you have spyware on your system, please contact the UCIT Integrated Help Desk at 513-556HELP (4357) for assistance in having it removed.
Viruses, Worms and Trojans, Malware
Viruses are computer programs designed to cause trouble to your computer. Worms are programs that
replicate themselves and look for holes in networks or send themselves via e-mail to infect as many other
computers as they can. Trojans are programs that carry hidden, malicious programs.
• Fight malicious software by installing an anti-spyware/anti-virus package.
• McAfee anti-virus/anti-spyware is available for FREE to UC students! http://www.uc.edu/infosec/ > Free
Antivirus (in the top navigation bar).
• Do not open e-mail files from anyone you do not know.
• Do not open e-mail attachments containing executables or movie files.
• Some file extensions to avoid include: .EXE .COM .CMD .PIF .SCR .VBS .WMF .ASF .PDF .DOCX
E-mails and Spam
• Always password protect your e-mail account.
• Do not use your personal e-mail account to send or receive sensitive information (credit card numbers,
bank account info, SSNs, etc.).
• Do not send or forward e-mail messages such as chain letters, jokes, and messages containing lewd,
harassing, or offensive information.
• Visit http://www.uc.edu/infosec/info/fightspam.html to learn how to set up rules and filters to help manage
Spam.
• Be wary of unsolicited attachments, even from people you know. Viruses travel incognito using legitimate
e-mail addresses to trick their way into users’ machines.
• Do not click a link in an e-mail. Even if the link says one thing it may send you somewhere else.
77
• Send Spam to [email protected] and then delete it.
• Report other e-mail abuses to [email protected]
A thorough review of “How To Fight Spam” will help to understand the world of spam and how you can help
control it: http://www.uc.edu/infosec/info/fightspam.html
Social Engineering and Phishing Attacks
Social engineering is used by criminals to gain unauthorized access to a computer or secure building. This
is a non-technical intrusion that relies on people’s complacency regarding the value of the information
they possess and their responsibility to protect it. Social engineers’ ploys often involve tricking people into
breaking normal security procedures. Examples of social engineering behavior include the following:
• Someone calling on the phone asking for information such as a user ID and password.
• Someone “dumpster diving” to find memos, system manuals, and printouts of sensitive information.
• Someone pretending to be an outside consultant or temporary worker.
• Someone “piggy-backing” entrance to a building by following in an authorized person, thus avoiding
presenting ID. If you permit someone access, make sure you know who he or she is.
• Someone creating a persona that makes him or her appear to be a person in authority, so people ask the
hacker questions, rather than vice-versa. This is “reverse social engineering.”
• Phishing uses e-mail or web sites to solicit personal (often financial) information. Attackers send e-mail,
seemingly from a reputable credit card company or bank that requests account information. Often, the
message suggests that there is a problem that needs their attention.
• Learn more about phishing by watching this video: http://www.uc.edu/infosec/info/videos.html
Phone / PDA / Mobile Device Security Tips
• Set a password, lock pattern, or PIN on your phone to prevent unauthorized use and make it more difficult
to hack if stolen or lost.
• If your phone has Bluetooth functions, disable them until they’re needed, and then set visibility settings to
“hidden” so that your device cannot be scanned by other Bluetooth devices.
• Limit the amount of sensitive or personal information such as passwords and account information stored
on your mobile device.
• Consider purchasing anti-virus software for your phone and make sure it is frequently updated.
• Only download apps from trusted sources.
• Do not jailbreak your mobile device as this can open up security holes
• Treat mobile devices as you would your wallet, keys, or laptop; don’t leave them in plain sight and keep
them close to you at all times.
USB Drives / Thumb Drives / Jump Drives and other Mass Storage Devices
These drives are a very convenient and commonly used method to hold personal files and school work.
Unfortunately, the small physical size of these devices makes them easy to lose or to steal.
• If you use a mass storage device to store any important or sensitive data—class work, research data, clinical
information, personal files, etc.—make sure that the data is protected by encrypting the device.
• Many modern mass storage devices come with a security utility that can encrypt sensitive files.
• If you do not have encryption on your mass storage device, don’t keep sensitive information on it.
Social Media Safety
What is social media?
Social media refers to the means of interactions among people in which they create, share, and exchange
information and ideas in virtual communities and networks.
What are some examples of social media web sites?
Several social media sites have become extremely popular in the last few years for internet users of all ages.
Some examples include: Facebook, Twitter, LinkdIn, Instagram, and Tumblr.
What are some advantages of using social media web sites?
• Easy Information Exchange Facebook and similar sites allow users to gain access to personal information
very quickly, including home and cell phone numbers, addresses, photos, videos, and events.
78
• Ability to Share Information Users of social media web sites can stay in contact with hundreds
of people they have met (or not) and communicate with them by posting interesting things
about themselves such as: Statuses, Images, Videos, Events, Locations, and so forth.
What are some disadvantages of using social media web sites?
• Easy Access If privacy settings are not set potential thieves, stalkers, or harassers can potentially
find personal information through social media web sites very quickly, easily, and anonymously.
Overly available personal information can also lead to issues when potential employers try to
research you. By posting too much inappropriate information on social media sites, you put
yourself to risk of not being hired, or possibly incriminating yourself.
• Too Much Information Vast amounts of information coming from a large number of sources is
constantly fed through social media sites to their users. Often this information can be biased,
incorrect, or altered. This leads to many misinformed consumers.
• Tool for Procrastinating or Wasting Time Surfing social media web sites can easily take up
hours of time that could have been used for tasks such as studying, working, or anything else that may be
productive.
Your Personal Settings/What You Post
The following questions are designed to help you make smart choices about your privacy settings, as well as
what you decide to post on your site:
• Would I want someone I don’t know to show up unannounced at my class, residence hall, or workplace?
• Am I comfortable getting phone calls, e-mails, or other forms of attention from strangers?
• Am I posting information about myself or my whereabouts that would leave me vulnerable to crime?
• Would I be comfortable if a potential or current employer, parent, or close friend read what I posted?
• What would my profile say about me to future roommates or neighbors? Would they form negative
preconceptions about me?
• Am I posting information or photos portraying me engaging in illegal activities that are against the law or
Student Code of Conduct?
• Online photos can be easily copied, downloaded, or manipulated. Am I posting photos that would
embarrass or incriminate me if they were shown in other venues? Am I willing to take the risk that someone
may use my photo in a way in which I would not approve?
Manage Your Privacy
Having secure privacy settings on your social media site accounts is extremely important. All major social
media sites have settings that allow the user to choose who can see what on their profile. Consider how you
should implement the following options:
• Make your contact information private (Address, Phones Numbers, E-mail Addresses).
• Limit who can search your profile in search engines.
• Manage who can view the photos you post.
• Manage who can view your posted statuses.
• Do not post locations and or times as this opens up many opportunities for crimes against you.
What Others Post
Facebook and similar web sites do not have mechanisms in place to verify information posted in individual
profiles. What you see is not always true information. Consider these questions before divulging additional
information about yourself or deciding if you want to meet an online acquaintance in person:
• Is the information I am reading from a reliable, verifiable source?
• Am I considering meeting someone for the first time in a public setting with a way to get myself out of a
situation if it is unsafe?
• Would I be aiding/abetting a crime or policy violation if I follow instructions found on someone’s profile?
• What are the possible advantages of getting to know this person better? Are there risks that I can reduce or
eliminate before we proceed in deepening our involvement with each other?
If you suspect that you have been a victim of a computer crime or abuse while at UC, please report the
incident to [email protected] Give as much detail as possible: who, what, when and where.
79
Who Can Help?
You can get help from one of these offices or departments if you become a victim through affiliation with a
social web site.
Counseling Center.................................................... 513-556-0648
Office of Student Life...............................................513-556-5250
Resident Education and Development..............513-556-6476
UC 24-Hour Sexual Violence Crisis Line.............513-218-9531
UC Ombuds Office.....................................................513-556-5956
UC Police Department.............................................513-556-1111 or 911 (Emergencies)
UC Women’s Center...................................................513-556-4401
UCit Information Security........................................513-558-4732
University Judicial Affairs........................................513-556-6814
Peer-To-Peer (P2P) File Sharing
Unauthorized peer-to-peer (P2P) file sharing on college and university campuses is receiving increasing
attention from the entertainment industry, the media, and the United States Congress. Although P2P file
sharing on university networks is not unlawful, such activity could be harmful especially as it can lead to
a violation of the federal copyright law. Indeed, many students using popular software such as Limewire,
Frostwire, uTorrent, and Gnutella, intentionally or advertently infringe on copyrighted works relating to
music, movies, computer software, video games, and photographs. Lawsuit filings indicate copyright
owners are taking the offensive against infringements on their protected works. Students need to know
their rights and responsibilities, and their potential liability for unlawful P2P activities.
The basis for copyright law is found in Article 1 of the United States Constitution and codified in Title
17 (the “Copyright Act”) of the United States Code. The Copyright Act lists exclusive rights of copyright
holders, including reproduction and distribution of the copyrighted work, both of which are implicated in
P2P file sharing. There are three types of infringement: direct, contributory, and vicarious. Under direct
infringement, a person is liable for his or her own infringing conduct; under contributory infringement,
a person may be liable if he or she knows of the infringing activity, and induces, causes, or materially
contributes to the infringing conduct of another; under vicarious infringement, a person may be liable if he
or she has the right and ability to supervise the infringing activity and also has a direct financial interest in
the activity. Most users of P2P networks fall under the direct infringement category. However, even without
directly infringing conduct, students who operate or encourage the use of such networks may be open to
contributory or vicarious claims.
Downloading, possessing or distributing copyrighted material without the owners’ permission is also a
violation of the University’s General Policy on the Use of Information Technology (http://www.uc.edu/ucit/).
The University of Cincinnati does not actively monitor illicit or inappropriate activities, nor is it under any
obligation to defend or accept responsibility for its students’ illegal actions in the P2P context.
The University of Cincinnati expects our user community to act in a proper and responsible computing
manner. If illegal or inappropriate activities are brought to our attention, the University will take all
reasonable and appropriate actions. Copyright violations will generate a report to the office of Student LifeUniversity Judicial Affairs as part of the University’s disciplinary action process. This can result in a variety of
actions including removal of computer privileges and probation. Additionally, the copyright holder of the
material found on your system may take legal action against violators.
What can you do to be part of the solution? Avoid downloading, distributing, or possessing copyrighted
material over the Internet and the UC internal network unless you have received explicit permission from
the owner, their official representative, or have paid an access or license fee to obtain the material. If you
are using a peer-to-peer application you should consider removing it from your system prior to connecting
to the University’s network. If you do not remove the application, you should ensure your system is set to
prevent the application from acting as a provider of unlicensed materials to other users. Failure to restrict
the application, whether you are aware of the violation or not, will result in the University’s Information
Technology department (UCIT) removing your machine from the network until the copyright violation is
rectified.
80
Blackboard Learning System
http://blackboard.uc.edu/
Blackboard offers you easy access to course materials, University resources, and personal tools from any
computer connected to the Internet. Listed below is some introductory information that can help you
successfully use the Blackboard Learning System at UC.
Please note that all users must adhere to UC’s General Policy on the use of Information Technology located
at http://www.uc.edu/ucit/policies/infotechuse.html .
For detailed instructions on how to use the application, click on the “Help” tab in your Blackboard account or
go directly to the documentation page at: http://blackboard.uc.edu/help. If you still have questions about
Blackboard or your account, or if you need technical assistance, please call or e-mail the Blackboard Support
Team at: 513-556-1602, [email protected]
Password or Login Problems?
If you have forgotten your password, click on the “Password Reset Tool” link in the middle of the login
box. Fill in your username and click on the “Submit” button. You will be taken to the Password Self-Service
website. When using the “Forgot Password?” on this website, you will need to answer your security questions
before you are allowed to change your password.
If you have not established your security questions or you cannot remember your answers, you will need to
contact the UCit Help Desk at 513-556-4357 for assistance with having your password reset.
Using Blackboard
Once you log into your Blackboard account, you will see the “My UC” page in your browser window. You can
always return to this page by clicking the “My UC” tab at the top of your screen. This screen lists all of the
courses you are taking, announcements posted by the University or your instructors, and other information
in boxes called “modules” that can be changed or customized by each user.
To enter your courses, simply click on the name of the course you wish to enter in the “My Courses” box.
From there, navigate through the course by clicking the buttons or text labels on the left side of the screen.
Customizing Your Account
Blackboard allows you to customize the way your “My UC” page appears by changing the color scheme and
which “modules” (or boxes) display when you first log in. To customize the look of the modules, click the “Add
Module” or “Personalize Page” buttons in the upper corners of the My UC page. You can change features of
an individual module by clicking on the “wheel” icon in the upper right corner of the module title bar.
You can also edit your user profile by clicking the Personal Information link in the Tools section of the “My
UC” page on the left side of the screen. From here you can:
• Edit Personal Information – change your name, e-mail address, and other information that appears in
your user profile.
• Turn the Visual Text Box editor on and off under the “Change Personal Settings” link.
• Set Privacy Options - specify what personal profile information appears in the User Directory. (By
default, settings exclude the user profile from the User Directory.)
Courses Don’t Appear on Blackboard?
Your courses should appear in the “My Courses” module on your main My UC page when you first log in. If
none of your courses appear, or if some courses are missing, then you are not yet registered for the course. It
takes at least 24 to 48 hours after registering for a course before it will appear in your Blackboard account.
If the course is listed as “unavailable”, then you will need to contact your instructor directly and ask that they
make the course available.
E-mail Not Received Through Blackboard?
This problem could happen for several reasons:
1. Your “Personal Information” may have an incorrect e-mail address in Blackboard.
2. You may be over your quota for the e-mail address that you have chosen to use in Blackboard.
3. Your e-mail provider may have anti-spam filters in place that would affect the delivery of mail.
81
If you have an invalid e-mail address in your “Personal Information” within Blackboard, any e-mail that is sent
to you through Blackboard will be returned to the sender with an undeliverable message.
To Verify Your E-mail Information Within Blackboard:
1. Click the Personal Information link in the Blackboard Tools section of the “My UC” page on the left side of
the screen.
2. Click on Edit Personal Information.
3. Scroll down to the field labeled “e-mail” and enter your e-mail address.
All e-mail providers have a limit (quota) on the amount of mail that you can store on their system at one
time. If you reach or exceed this limit, they will no longer accept mail for your account and they will return an
undeliverable message to the sender. It is important that you monitor your quota to ensure that your mail
will be delivered.
To see the current size of your UConnect mailbox and its quota, navigate to your inbox and place the cursor
over your name at the top of the folder list. If you are using a commercial e-mail provider, please contact
their technical support for more information about their storage limits.
Filters intended to block unwanted e-mail may mistake e-mail messages sent through Blackboard as “spam.”
If you are using an e-mail system other than UConnect, be sure to add @uc.edu to your e-mail system’s
“whitelist” or “safe list” and check your “Junk” or “Spam” folder regularly.
Assignments - How to Send to an Instructor
Students complete the assignment in a separate file and send it back to the instructor through their
Blackboard course menu. To send an assignment to your instructor:
1. Click on the link for the assignment file within your course.
2. Enter any comments for the instructor in the Comments box under Assignment Materials.
3. Click “Browse My Computer” and locate the file to attach.
4. Double-click the file to attach it to your assignment. You can add more files by repeating this process.
5. Click “Save as Draft” to submit your assignment later, or
6. Click “Submit” to send your assignment immediately.
NOTE: Once an assignment is submitted to your instructor, it is no longer available for editing.
Discussion Board - How to Use
The Discussion Board allows students and instructors to post messages and participate in online discussions.
To post a message:
1. Click the “Tools” course menu link and then, in the next screen, choose the “Discussion Board” link.
2. Click on the forum title (link) where you want to post a message.
3. Click the “Create Thread” button in the upper left-hand side of the screen.
4. Enter a subject for your post and then type your message in the text box. If you want to attach a file or
post a paper with your message, click the “Browse My Computer” link under the Attachments section and
select the file you wish to attach. (Please note that your instructor must allow this setting.)
5. Click the “Save Draft” button at the bottom of the screen to save the changes to Blackboard, or
6. Click “Submit” to post your message to the board immediately.
Student Organization on Blackboard - How to Request
Requests for student organizations on Blackboard must be submitted to Student Activities and Leadership
Development. Approval for a student organization on Blackboard is based on the same criteria required for
approval of any official university student group. It must be registered in that office to receive the full rights
and privileges of a campus based club or organization.
218
Troubleshooting Tips - Using the Blackboard Software
• Use only a supported browser. Click on the Help tab in Blackboard and locate the list of supported
browsers under the Resources section.
• Check the browser settings to ensure that cookies and Java are enabled.
• Make sure that you have “pop-up” blockers turned off or add “uc.edu” to any popup blocker’s “whitelist” or
“safe list.”
• Clear your recent browsing history before beginning your session.
82
Blackboard Help Center
For detailed instructions on how to use the application, click on the “Help” tab within Blackboard, or go
directly to the documentation page at: http://blackboard.uc.edu/help. Or contact us.
Phone: (513) 556-1602
Email: [email protected]
Blackboard support during the term:
Monday -Friday: 8 a.m. to 11 p.m. EST
Saturday: Closed
Sunday: 4 p.m. to 11 p.m. EST
Getting answers couldn’t be easier.
Send us an email!
During term breaks:
Monday -Thursday: 8 a.m. to 6 p.m. EST
Friday: 8 a.m. to 5 p.m. EST
Taking Tests in Blackboard - Important Tips to Follow
The most common problem that students encounter when taking an online test is when their computer
loses connectivity with the Blackboard server. To help minimize the likelihood of this problem occurring
during an online assessment, we recommend using the following checklist:
• DO use a reliable and, if possible, fast internet connection (DSL, cable, broadband).
• DO use a current release of Mozilla Firefox or another certified browser.
• DO log out and back into Blackboard just before beginning a test. For security reasons, Blackboard sessions
only last three hours so this will help insure you have ample time to complete your test.
• DO periodically click the “Save” button during the test to record your answers.
• Do NOT resize or minimize the browser window.
• Do NOT use the Back button on your browser.
• Do NOT double click on the link to begin the test or on any buttons or links inside the test.
• Do NOT leave the test window open and unattended for any period of time.
If you do experience technical difficulties during your exam, e-mail your instructor immediately to alert them
of the problem. Be as descriptive as possible in your e-mail about what you were doing when the problem
occurred, including the date and time in your description.
Blackboard Mobile Learn:
Mobile Learn can help users stay connected with push updates and the ability to check announcements,
grades or course content wherever they are. Students can publish to journals and blogs, participate in
discussion boards and e-mail their instructor or classmates. Mobile Learn is currently `available for Android™,
BlackBerry®, HP webOS devices, iPhone®, iPod touch®, and iPad™.
NOTE: Some course content may not be available on mobile devices.
83
Getting Online: SafeConnect
To improve service to our students, the University of Cincinnati Information Technologies department (UCit)
utilizes SafeConnect to access the UC Network (UCnet) and the Internet from the dormitory environment.
Students will be able to access the network from the dorms once they have gone through the SafeConnect
logon procedure. Follow the SafeConnect logon procedure for your corresponding Operating System
to access the UCnet. Your computer must have TCP/IP set to DHCP. Game box devices such as the Xbox,
Playstation, Wii, etc. will not be required to perform the SafeConnect logon procedure.
To access the UCNet:
Your computer must be equipped with either a Network Interface Card (NIC) or Wireless NIC which supports
a/b/g/N connectivity and enabled for a LAN connection.
You must have a valid Central Login Service (CLS) username and password.
Game box devices such as the XBox, Play Station, or Wii connect directly into a data jack with a Category 5e
(or above) ethernet cable.
***Personal Hubs, routers or wireless access points are not allowed on the UCNet.***
For a user to access the UCNet, your computer must be authenticated and verified as having the appropriate
security software in place to minimize the vulnerabilities to pass viruses throughout the network. UC uses
SafeConnect to provide this service. Please refer to “UCNet and SafeConnect” section of this manual for
instructions and additional information on SafeConnect.
SafeConnect Policy Key System Requirements
Component
Minimum Requirement
OS Support
Windows: XP, Vista and Windows 7 and 8
(Other versions of Windows are not supported.)
Linux: All versions with a GUI Desktop
Mac: OSX 10.4 and above
Supported OS Locales
Any language supported by the OS
Hard Drive Space
4MB
Recommended
McAfee VirusScan Enterprise V8.8 for Windows 2000, XP, 2003, Vista, 7 and 8.
Download from http://www.uc.edu/ucit/ (if no anti-virus is installed during the SafeConnect Policy Key
installation, the notification presented will provide a link to this site):
Each room is equipped with a number of data jacks equal to the maximum capacity for that room (e.g.,
double rooms have two jacks). Each Student Resident is allowed one active computer connection as
a condition of his/her residence hall/apartment lease agreement. If additional connectivity is desired,
the student may submit a request by completing the Online Data Jack Connectivity form. Information
concerning this service is available through the reception area of each residence hall. Housing and Food
Services Office must approve all service requests before service will be provided. If the request is approved,
there will be an activation fee per school term for each additional data connection that is activated. This fee
must be paid before activation.
Requests for Changes or Moves
https://www.uc.edu/ucit/studentgetit/login.aspx
Requests are not accepted during the first two weeks of school. Changes in your network data jack to
another jack within the same room or moving your network connection to another room may be requested
by submitting the Data Jack Connectivity Form. To order dormitory connectivity, enter the website shown
above. To report dormitory connectivity problems, call the Help Desk at 513-556-HELP (4357).
See below for Ethernet card and cable instructions.
84
If you have trouble connecting, call our Help Desk or visit our
ResNet support desk for personal assistance.
Help Desk: 556-HELP(4357), Monday - Friday: 6 a.m. – 9 p.m. or
Saturday and Sunday: 8 a.m. – 9 p.m.
Visit the ResNet support desk on MainStreet across from the
Tangeman University Center (TUC). Hours may vary.
SafeConnect for Windows Vista, Windows 7 and Windows 8
This example configuration is using a new install of Windows Vista. Based on your computer’s current status
and installed software, some of these steps may not apply to you or some additional steps may need to be
taken. You must have Administrator right to the machine for the installation of the SafeConnect client to be
installed.
1. Connect your machine to the university’s network via a wireless or wired network connection within an
on-campus resident facility.
2. Open a web browser and attempt to connect to a website hosted outside of the university (ex. http://
www.google.com, http://www.yahoo.com, http://www.cnn.com)
3. You will be redirected to a sign-on page. Use your Central Login Service username and password.
85
4. Once you log in for the first time, you will be asked to review the Network Usage Policy. If you accept
the terms of this policy click on the link that says “Yes, I will install the Policy Key and accept the terms and
conditions for Internet use”. If you chose not to accept the policy, you will not be granted internet access.
5. You will now download the key and be prompted to install it.
6. Select “Run” to continue with the installation.
86
7. You may be presented with a Security Warning asking if you want to run the application titled
ServiceInstaller.exe. Click “Run” to continue with the installation.
8. You will now be prompted with the SafeConnect Installation window. Click “Install” to continue.
9. Once the installation is complete, you will receive a prompt stating the installation was successful.
10. The SafeConnect client will automatically start a compliancy check on the machine. If at any time the
machine becomes noncompliant, follow the onscreen directions to remedy the issue. A warning message
will appear notifying you that an anti-virus application was not found and provides links where you can
obtain proper software. It is recommended you install the free, University provided McAfee Anti-Virus
software.
87
11. Click on the McAfee link to start the download.
12. Click save.
13. Save the zip file to a location of your choice.
14. Once the download is complete, using Windows Explorer, navigate to the directory you downloaded the
file.
15. Right click on the zip file and select Extract All...
88
16. The Extraction Wizard will appear. Select Next to continue.
17. Select a location to extract the files to. The default location is the same as the location of the zip file you
are extracting. Select ‘Show extracted files when complete’. Click Next to continue.
18. From the list of extracted files, locate the Setupvse.exe file. This is the file you will need to execute to
install the application.
89
19. Execute the application by double clicking the file.
20. You may receive a security warning when trying to execute the file. To continue with the installation, click
Run.
21. Click Next
22. The default EULA window appears.
90
23. You have to make some changes before you accept the Network Associates License Agreement. Change
the License expiry type to ‘Perpetual’ and select the country where you bought the laptop (default is ‘United
States’). If you chose to accept the license agreement, select accept and click OK.
24. Select ‘Typical’ and click Next
91
25. Select ‘Standard Protection’ and click Next.
26. Click Install.
92
27. During your anti-virus installation, you may receive a warning that your anti-virus is not running or your
definitions are out of date. This is due to SafeConnect noticing the changes in compliancy. Do not attempt to
resolve these issues until the anti-virus software installation is complete. If you are installing McAfee, you will
be prompted to update at the end of the installation. If you are using another Anti-Virus application, follow
their procedures for updating the software once the installation has finished.
28. To finish the McAfee installation, be sure to select ‘Update Now’ and click Finish.
29. McAfee will now check for updates. The updates will be installed if needed and when completed, click
Close.
93
30. The Windows Update setting will automatically be set for you as part of using SafeConnect. The setting
will automatically download and install recommended updates for your computer from our on-site Windows
Update server.
31. This completes instructions on how to get a computer with Windows Vista compliant for the University’s
Network. If for any reason you are still receiving warnings of an item that does not pass the compliancy
check, please read the screen fully and follow the directions that it provides. If you need further assistance,
you may contact the UCit Helpdesk by phone at 513-556-HELP (513-556-4357).
94
SafeConnect for Windows XP
Need help?
This example configuration is using a new install of Windows
XP Professional. Based on your computers current status and
installed software some of these steps may not apply to you
or some additional steps may need to be taken. You must have
Administrator right to the machine for the installation of the
SafeConnect client to be installed.
Call the Help Desk 556-HELP(4357)
Monday - Friday: 6 a.m. - 9 p.m.
Saturday and Sunday: 8 a.m. - 9 p.m.
Visit ResNet on MainStreet across from
the Tangeman University Center (TUC).
Hours may vary.
1. Connect your machine to the University’s network via an ethernet cable or with a wireless connection.
2. Open a web browser and attempt to connect to a web site hosted outside of the university (ex. http://
www.google.com, http://www.yahoo.com, http://www.cnn.com)
3. You will be redirected to a sign-on page. Login with your Central Login Service username and password.
95
4. Once you login for the first time, you will be asked to review the Network Usage Policy. If you accept the
terms of these policies click on the link that says “Yes, I will install the Policy Key and accept the terms and
conditions for Internet Use”. If you chose not to accept the policy, you will not be granted internet access.
5. You will now download the key and be prompted to install it.
6. Select Run to continue with the installation.
96
7. You may be presented with a Security Warning asking if you want to run the application titled
ServiceInstaller.exe. Click Run to continue with the installation
8. You will now be prompted with the SafeConnect Installation window. Click Install to continue.
9. Once the installation is complete, you will receive a prompt stating the installation was successful.
10. The SafeConnect client will automatically start a compliancy check. In this example, an anti-virus
application is not installed. A warning message will appear notifying you that an anti-virus application was
not found and provides links where you can obtain proper software. It is recommended you install the free,
University provided McAfee Anti-Virus software.
97
11. Click on the McAfee link to start the download. Save the zip file to a location of your choice.
12. Once the download is complete, using Windows Explorer, navigate to the directory where you downloaded
the file.
13. Right click on the zip file and select Extract All...
14. The Extraction Wizard will appear. Select Next to continue.
15. Select a location to extract the files to. The default location is the same as the location of the zip file you are
extracting. Click Next to continue.
98
16. Once extraction is complete, open the location of the extracted files. Select “Show extracted files” and
click Finish to continue.
17. From the list of extracted files, locate the Setupvse.exe file. This is the file you will need to execute to
install the application.
99
18. Execute the application by double clicking the file.
19. You may receive a security warning when trying to execute the file. To continue with the installation, click
Run.
20. Click Next.
21. The default EULA window appears.
100
22. You have to make some changes before you accept the Network Associates License Agreement. Change
the License expiry type to ‘Perpetual’ and select the country where you bought the laptop (default is ‘United
States’). If you chose to accept the license agreement, select accept and click OK.
23. Select ‘Typical’ and click Next.
101
24. Select ‘Standard Protection’ and click Next.
25. Click Install.
102
26. During your anti-virus installation, you may receive a warning that your anti-virus is not running or your
definitions are out of date. This is due to SafeConnect noticing the changes in compliancy. Do not attempt to
resolve these issues until the anti-virus software installation is complete. If you are installing McAfee, you will
be prompted to update at the end if the installation. If you are using another Anti-Virus application, follow
their procedures for updating the software once the installation has finished.
27. To finish the McAfee installation, be sure to select ‘Update Now’ and click Finish.
103
28. McAfee will now check for updates. The needed updates will be installed and when completed, click Close.
29. The Windows Update setting will automatically be set for you as part of using SafeConnect. The setting will
automatically download and install recommended updates for your computer from our on-site Windows Update
server.
30. This completes instructions on how to get a computer with Windows XP compliant for the University’s
network. If for any reason you are still receiving warnings of an item that does not pass the compliancy check,
please read the screen fully and follow the directions that it provides. If you need further assistance, you may
contact the UCit Helpdesk by phone at 513-556-HELP (513-556-4357).
104
SafeConnect Directions for Macintosh
This example configuration is using an Apple Computer.
1. Connect your machine to the University’s’ network via an
ethernet cable or with a wireless connection.
Need help?
Call the Help Desk 556-HELP(4357)
Monday - Friday: 6 a.m. - 9 p.m.
Saturday and Sunday: 8 a.m. - 9 p.m.
Visit ResNet on MainStreet across from
the Tangeman University Center (TUC).
Hours may vary.
2. Open a web browser and attempt to connect to a web site
hosted outside of the university (ex. http:// www.google.com,
http://www.yahoo.com, http://www.cnn.com)
3. You will be redirected to a sign-on page. Use your Central Login Service username and password
105
4. Once you login for the first time, you will be asked to review the Network Usage Policy. If you accept the
terms of these policies click on the link that says “Yes, I will install the Policy Key and accept the terms and
conditions for Internet Use”. If you chose not to accept the policy, you will not be granted internet access.
5. The policy key will prompt for download action. Select Open with Archive Utility, and click OK.
106
6. When the download is complete, double click on MacPolicyKeyInstaller.zip.
7. The installation will begin. Click Continue.
8. Select Install for all users of this computer. Click Continue.
107
9. Leave the installation location as default, click Install to continue.’
10. The installation is now complete. Click Close to continue
108
Getting online: Securewireless
Securewireless is the Internet connection for students, staff and faculty.
The wireless network at the University of Cincinnati consists of more than 4000 access points that provide
coverage in all dorm spaces, buildings and green spaces. Security on the wireless network is incorporated
with WPA2 enterprise, which encrypts the data with the Advanced Encryption Standard (AES). Access onto
the wireless network requires authentication with your Central Login Credentials.
Instructions for configuring WPA2 on your wireless begin on page 110 or at http://www.uc.edu/ucit/internet/
oncampus/wireless_instructions_scripts.html.
UC’s main campus is 100%
wireless! That means you
can stay connected in every
building on campus, and even
many green spaces!
Smartphones & Tablets
Visitors
UCIT offers a UCGuest internet
connection for visitors to campus,
such as parents and friends.
Instructions for attaching your
smartphones and tablets to
Securewireless and your UConnect
e-mail account are available on our
website.
But note, students should always
use the Securewireless connection
because it is faster and safer.
www.uc.edu/ucit
Wireless Cards
Need help?
All new external, internal and USB
wireless cards must have WPA2
Enterprise certification. It is also
recommended that all new wireless
cards support a/g/N. Wireless cards
designated b/g/n will only connect
at g speeds on the UC wireless
network due to the physical
limitations of the b/g band.
Call the Help Desk 556-HELP(4357)
Monday - Friday: 6 a.m. - 9 p.m.
Saturday and Sunday: 8 a.m. - 9
p.m.
Visit ResNet on MainStreet across
from the Tangeman University
Center (TUC). Hours may vary.
109
Configuring Securewireless for Windows 8
1. Move the mouse to the top right corner of your screen to activate the charm bar. Left Click on the
settings button.
2. Click on the networks “Available” icon in the charm bar.
110
3. Securewireless should be displayed in the list of Wi-Fi networks. Select Securewireless.
4. Check the “Connect automatically” box. Then select the “Connect” box.
111
5. Enter your Central Login username and password when the
Network Authentication box appears.
6. Click Connect to accept certificate.
7. You are online when “Connected” is displayed next to Securewireless.
112
Configuring Securewireless for Windows 7
113
114
115
116
117
118
118
119
120
121
Need help?
Call the Help Desk 556-HELP(4357)
Monday - Friday: 6 a.m. - 9 p.m.
Saturday and Sunday: 8 a.m. - 9 p.m.
Visit ResNet on MainStreet across from
the Tangeman University Center (TUC).
Hours may vary.
122
Configuring Securewireless for Vista
123
124
125
126
127
128
129
130
131
Configuring Securewireless for the Macintosh
To setup your AirPort or Airport Extreme for use with WPA2.
1. In the
menu bar, click on the AirPort
icon and choose “Open Internet Connect.”
2. In the menu, select “AirPort” under Configuration. Next click on “Turn AirPort On.”
3. Under Network, choose “Other.”
4. Enter Securewireless and select WPA2 Enterprise. Enter username (6+2) and password (this is the same as
your Central Login username and password). Click “OK” to proceed.
5. If your connection is successful, your AirPort icon in the menu bar will become bold and show the signal
strength (based on how many bars are bold – like this
). Once you have configured this, your computer
should recognize when it is in a wireless area at UC and should automatically connect. If you are in a wireless
areas and can’t connect, turn AirPort off and then on again (through the AirPort Status Icon). This will usually
fix the problem.
132
Configuring Securewireless for Linux
Before beginning, please note that this was tested on a laptop with Ubuntu 7.04 with Atheros chipset.
Please make sure your flavor of Linux and wireless chipset will run WPA2-Enterprise. After any necessary
changes are made to your machine, click the “Network Manager” icon in the upper right-hand corner of the
window (by default) and the following drop down menu appears. Select “Securewireless” and the Wireless
Network Key Required window will appear.
In the dropdown boxes listed, please select the following. Where it states <username><password> enter
username (6+2) and password (this is the same as your Central Login username and password). Once done,
click the Login to Network button and you will be connected.
133
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement