IAB Computer Resources - PowerPoint PPT Presentation

1 / 50
About This Presentation
Title:

IAB Computer Resources

Description:

Workstation PW: Windows password used to log into your computer. ... Windows Defender: automatic spyware scanner. Free, from Microsoft. ... – PowerPoint PPT presentation

Number of Views:86
Avg rating:3.0/5.0
Slides: 51
Provided by: jocki
Category:

less

Transcript and Presenter's Notes

Title: IAB Computer Resources


1
IAB Computer Resources
  • An Introduction for
  • IAB Office Staff

2
Overview
  • Computer security
  • Mercury
  • IAB web site

3
Computer Security
  • The only truly secure computer is not connected
    to a network, and has no removable storage, such
    as
  • A floppy disk drive
  • USB ports for jump drives
  • A Zip drive
  • This is not an option, so security and
    functionality are always going to be a trade-off.

4
Security Overview what can I do?
  • Computer Security
  • ALWAYS password protect ALL accounts on your
    computer with strong passwords.
  • Keep Windows XP up to date.
  • Install AntiVirus and keep it up to date.
  • Install AntiSpyware and keep it up to date.
  • Use a Software Firewall.
  • Computer Hygiene
  • Use Disk Cleaner program.
  • Use Disk Defragmenter program.

5
Accounts and Passwords
  • Windows has a hidden Administrator account
  • Check your Administrator account to see if it has
    a password. If it doesnt, call Jock to set it.
  • Make sure that all other accounts have passwords.
  • Use strong passwords!

6
Accounts and Passwords 2
  • Workstation PW Windows password used to log into
    your computer.
  • Mercury PW used to log into Mercury.
  • IAB Web Utilities PW used to log into IAB web
    edit pages, the Faculty Restricted page, or IAB
    User Utilities.
  • UAF email PW maintained by OIT, must be changed
    every 4 months.
  • Radius PW used to connect from off campus via
    VPN, must be changed every 4 months.

7
Strong passwords
  • Many viruses and worms use an internal dictionary
    lookup table.
  • A strong password is one that cannot be guessed
  • No words or names
  • Include capitals, numbers and punctuation
  • Examples
  • F_at_1rB_at_nk not OK (for UAF email)
  • Mrci7yo! (My rusty car is 7 years old!)
  • PurpleLobster21 (2 unrelated words with a number
    and a symbol)

8
Password Safe
  • One of the problems with strong passwords is
    remembering them.
  • Use Password Safe to store passwords in an
    encrypted database.
  • Download from P\programs\ drive or
    http//passwordsafe.sourceforge.net
  • Password Safe can also create strong passwords
    for you, if you wish.

9
Password Safe screenshots
10
Keep Windows up to date
  • Use Automatic Update
  • Desktop computers set to automatically install
  • If you use this option, always save any work
    before leaving, as it will likely reboot your
    computer.
  • Laptop computers set to Tell me when updates
    are available
  • Use this option so that you dont shut off the
    computer in the middle of a download.
  • If updates are available, please install them.

11
Keep Mac OS X up to date
  • There have been many more exploits for Macs in
    the recent past.
  • Keeping your OS up to date will help protect your
    computer.
  • Turn on Software Update in the System
    Preferences.
  • I suggest running Symantec Antivirus as well.

12
Malware Viruses and Worms
  • Viruses are pieces of malicious software that
    require a user to do something in order to
    spread.
  • Worms are pieces of malicious software that can
    spread on their own, without user intervention.
    These are more dangerous than viruses.
  • Both types are used to make money for their
    writers by taking control of your computer.

13
Malware Viruses and Worms 2
  • Antivirus Protection
  • Symantec Antivirus (SAV) Corporate Edition
  • UAF has a site license, so it is free and
    supported.
  • Version 10.1.4 is the latest you should have
    that version.
  • Can be downloaded from www.uaf.edu/oit/ftp and
    installed over an older version.
  • Install as Unmanaged and schedule updates.
  • Never install more than one AV program they
    dont play well together.

14
Malware Viruses and Worms 3
  • Set Live Update to update daily
  • File Schedule Updates
  • Set update to Daily and the time to a time that
    the computer is likely to be turned on.
  • Create a Scheduled Scan
  • Scheduled Scans New Scheduled Scan
  • Set it for a time that the computer will likely
    be turned on.
  • I suggest either daily or weekly scheduled scans.

15
Malware Spyware and Adware
  • Spyware and Adware are basically the same thing
  • They are programs that monitor what you do and
    report back to the mother ship.
  • Some spyware is benign, others are truly
    malicious and can steal passwords, credit card
    numbers, social security numbers, etc.

16
Malware Spyware and Adware 2 security programs
  • AdAware manual spyware scanner
  • Spybot Search and Destroy manual spyware scanner
    and protector.
  • SpywareBlaster protects your browser from going
    to malicious web sites inadvertantly.
  • SpywareGuard protects your registry from
    unwanted changes.
  • Windows Defender automatic spyware scanner.
    Free, from Microsoft.

17
Malware Spyware and Adware 3
  • All anti-spyware programs should be updated
    regularly (e.g. weekly).
  • Scanners should be run every time you update.

18
Software Firewall
  • A firewall blocks network traffic to and/or from
    your computer. Important to have installed.
  • Windows Firewall
  • Installed by default in XP Service Pack 2.
  • Only blocks incoming, not outgoing
  • Other options (also block outgoing)
  • ZoneAlarm
  • Sygate
  • R-Firewall

19
Computer Hygiene 1
  • Disk Cleanup program
  • Programs, installers and browsers leave many
    temporary files on your computer
  • Disk Cleanup will delete most of them.
  • Start All Programs Accessories System Tools
    Disk Cleanup.

20
Computer Hygiene 2
  • Disk Defragmenter program
  • As Windows saves, copies, and deletes files, your
    hard drive becomes fragmented files are split
    into many chunks.
  • Defrag will re-assemble them into a single chunk.
  • Start All Programs Accessories System Tools
    Disk Defragmenter.

21
Computer Maintenance Folder
  • I create a folder on the desktop called Computer
    Maintenance on new computers.
  • Shortcuts to all the Security and Hygiene
    programs.
  • Reserve 30 minutes per week to update and run
    each manual program.
  • If you want this on your computer, call me.

22
Questions on Computer Hygiene?
23
Mercury Overview
  • Mercury runs on the Novell Netware operating
    system (rather than Windows or Mac OSX).
  • What does it do? Mercury is the IAB/BW server
  • File server (most important to you!)
  • Web server
  • FTP server
  • Application server

24
The Novell Login Screen 1
25
The Novell Login Screen 2
26
The Novell Login Screen 3
27
After you log in
  • When you log in to Mercury, you will see a couple
    of windows pop up.
  • The first window shows the results of your login
    script. If it closes on its own, there were no
    errors. Call Jock if there were errors.
  • The second window is the Novell Application
    Launcher. This can be closed if you dont need
    any of the apps in that window.

28
Login Script Results
29
Novell Application Launcher
30
Mercury Functions for IAB Staff
  • Networked Drives when you log onto Mercury, you
    will see a number of network drives under My
    Computer. These are directories on Mercury.
  • M\ is your personal space
  • Store individual or non-shared stuff on your M\
    drive.
  • P\ is a public drive, accessible to anyone with
    a Mercury account
  • Shared Folders will show up as mapped drives,
    depending on your group (e.g. Directors Office,
    Business Office, Faculty).
  • Store most of your work here, as Mercury is
    backed up weekly.
  • Others have access to all of the Shared Folders.

31
Mercury Networked Drives
32
Mercury Shared Folders 1
  • Be careful when using the Shared Folders
  • If you drag and drop a file into the wrong
    folder, it may appear lost. Use Search to find
    it.
  • If you rename or move a file or folder, another
    user that needs access may not be able to find
    it.
  • Any changes to the file and folder structure may
    break another users ability to connect.
  • The shared folders are used by many staff
    members, so please think before making changes.

33
Mercury Shared Folders 2
  • We have a lot of flexibility on Mercury to
  • Give access to only certain folders
  • Mount individual folders as networked drives
  • Huh?
  • This means that if a staff member only needs
    access to one subfolder, we can set it up so that
    is the only folder he or she sees.
  • For example, DNA Core Lab staff may only need
    access to their folder, not the whole Shared
    Folder.

34
Shared Folders
35
Mercury Personal Web Sites
  • Anyone with a Mercury account can have a personal
    web site.
  • Create a folder called public.www on your M\
    drive.
  • Anything in this folder is automatically posted
    to the web.
  • The URL is www.iab.uaf.edu/firstname_lastname.
  • Detailed instructions are at http//www.iab.uaf.ed
    u/comp/instructions.html

36
Mercury salvage deleted files
  • Right-click on the red N in your system tray.
  • Choose Netware utilities, then Salvage
  • UAF_MERCURY
  • USER
  • Users
  • firstname_lastname (your user account)
  • Find the deleted file and select Salvage
  • Files are periodically purged, so do this as soon
    as you can.

37
Mercury salvage deleted files
38
Mercury Disk Full and User limits
  • You may get an error message saying that the disk
    is full when you try to save a file.
  • This does not mean that disk is full, but that
    you have filled up your Mercury disk quota.
  • Please first delete unneeded files and folders.
  • Call Jock to increase your quota size, if needed.

39
Questions about Mercury?
40
The IAB Web Site
  • Database driven
  • Maintained by Jock Irons, and Marie Gilbert
  • Please, please, please send us updates regularly!
  • New or leaving staff, updated office or phone
    numbers Marta, Chandra
  • New or graduated students Carol, Jobie, Shannon
  • Seminars, social events, etc. Faculty host, LSS
    coordinator, etc.

41
The IAB Web Site contents
  • About IAB
  • Administration
  • Computer Resources
  • Events and Seminars
  • Facilities
  • Faculty, Staff and Student directory
  • Human Resources
  • News and Fact Sheets
  • Programs and Initiatives
  • Publications
  • User Utilities

42
Administration Pages
  • Many useful pages under this link
  • IAB Contact information
  • Forms
  • Mail/Shipping
  • Safety courses, contacts and forms
  • Travel information and forms
  • Vehicle info and reservations

43
Computer Resources page
  • Getting started (e.g. for new faculty, staff)
  • Safe Computing
  • Faculty, Staff and Student links
  • How-tos and FAQs
  • Report computer problems

44
Faculty, Staff, Student Directory
  • All IAB, BW, AKCFWRU personnel should be in this
    database.
  • Can search by category, first or last name, email
    address, or phone number.
  • Please help us keep this database up to date if
    your personal information changes.
  • Send email to fyiab_at_uaf.edu

45
Faculty, Staff, Student Directory
46
Human Resources page
  • Currently open IAB jobs are posted here.
  • HR-related forms are posted here (also posted on
    the Forms page under Administration).
  • Maintained by Marta and Chandra.

47
User Utilities and Restricted Pages
  • Password protected
  • NOT the same password as Mercury, unless you set
    it that way (recommended).
  • Change Password utility
  • Send group email
  • Generate phone lists

48
Login to User Utilities
49
User Utilities
50
User Utilities 2
Write a Comment
User Comments (0)
About PowerShow.com