Information Technology A to Z Index IT Service Support Request

IT Support

Wired: Linux PC

Connecting a Linux PC to wired/ethernet in residence halls.

Password Security Checklist

Change Your Password if it is at Risk

If your password is at risk, you may need to change it more often.  Ask yourself the questions below to see if you need to change your password now.  Balance your answers with the need to have a password that you can remember without having to write it down.  If you have a strong, secure password that is easy for you to remember and you can use it with care, you may not need to change it as often as someone whose password is more vulnerable. 

Blackboard Ally Score Indicators

What is Ally?

Your class is full of diverse students with unique learning abilities.  Ally automatically scans your original content, and performs a series of steps to make them more accessible:

  • Generates alternative formats for students to download
  • Provides accessibility scores
  • Gives instructor feedback on how to improve your accessibility score

Accessibility Scores

The score indicators are only shown to the instructor as a way to help them improve their accessibility score for their course documents.

Checking Email Rules - Outlook/OWA

Issue: I need to check my email rules to see if someone had hacked me or I need to edit/delete those I have set.

Product: EKU faculty Outlook/OWA system

Resolution:

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

Browser Security

Web browser default settings are secure but you can do more to protect your privacy and enhance security. 

Identity Theft

Identity theft is a crime where the criminal uses personally identifying information such as a credit card number or Social Security number to assume someone else’s identity to commit fraud or other crimes.  Often the victim is left with bills for items not purchased, poor credit records, and sometimes arrests for crimes committed by someone else.  It can take months of work and thousands of dollars to repair the damage caused

Blackboard Collaborate Etiquette

Best Practices for a Good Session

Managing Blackboard Course Tile Images

ISSUE: Blackboard course tile image and course banner image resizing issues

RESOLUTION:

Require two-factor verification (2FA) again on a device you've marked as trusted

ISSUE: You want to restore two-factor authentication on all your devices because your device is lost or you think your account is compromised

Mac: Screenshot

Learn how to take pictures of the screen (screenshots) on a Mac. These screenshots are saved as files on the desktop.

Windows: Screenshot

How to take a screenshot on a Windows computer.

Google Vault

1. Install Google Drive App on a computer
2. Log in to Google Drive with personal account
3. Tell app to  sync data to a folder on your computer; this might take a while
4. Disconnect personal account from Google Drive
5. Relaunch Google Drive and log in with EKU account
6. Tell app to sync data with same folder as in Step 3; this might take a while

So basic flow is  (down and up) is personal cloud storage ---> local computer drive ----> EKU cloud storage:

Student Computing Fee Information

Original Proposal
Submitted by the Director of Academic Computing & Telecommunications Services
to the Student Government Association
Spring, 1998

STUDENT COMPUTING FEE PROPOSAL

PURPOSE

            The purpose of the student computing fee is to produce funding in order to provide EKU students with accessible, reliable, and appropriate computing resources that will enhance their educational experience.

ADMINISTRATION

Cyberbullying

We have all seen bullying in real life.  But bullying can happen online too.  Electronic or cyberbullying is when harm is inflicted through electronic media (e.g., text messages, cell phone pictures & videos, email, chat rooms, etc.) to threaten, harass, embarrass, socially exclude, or damage reputations and friendships.

Copyright Compliance

EKU encourages all students, faculty, and staff to engage in safe and legally compliant sharing of copyrighted materials. Downloading or sharing copyrighted materials (such as music and videos) can be illegal if done without the permission of the copyright owner whether you profit from it or not.

Disable clutter folder (How To)

Issue: I would like to disable the clutter folder in my EKU myMail account

Cause: The clutter folder in your myMail account is a new mailbox management feature of Office 365.  It can be turned on or off depending on your preferences.    Clutter analyzes how you process your email and moves the 'unimportant stuff' out of your inbox folder and places that into the clutter folder.  In theory it should leave you with an emptier and distraction-free inbox.  

Whitelabel Error

ISSUE: When trying to use EKU Direct/DegreeWorks receive a 'Whitelabel Error Page' error
Whitelabel Error

RESOLUTIONS:

ISSUE: Your account information is not available

ISSUE: While trying to activate my EKU student email account, I receive the error 'Your account information is not available'

RESOLUTION:   This means you have been accepted by the university but your email account is still not created in our system.  Generally if you give IT 2-3 days (not including weekends/breaks) it will fix itself.

If, however, you still get the same error after waiting 2-3 days (not including weekends/breaks) then you should call the IT Service Desk: 859-622-3000

 

Office365 Email Migration - iOS Instructions for Native Mail App

This will show you how to set up your new Office365 email on the native iOS email app

Mobile Device Security Tips

Like most people, you've probably accumulated a lot of personal information on your mobile device.  The valuable data makes these devices a target for thieves and cybercriminals.  These tips are especially important if university data is on the mobile device:

Pages