TECH TALK 2015. IT Services Resources Include: WKU Email/TopperMail TopNet myWKU Blackboard Helpdesk Phone & Chat Support WKU myStuff (Network Storage)

Slides:



Advertisements
Similar presentations
FLCC Instructional Computing Student Orientation Rick Evans, Director, Institutional Computing Services Kay Carlisi, Coordinator, Academic Computing Services.
Advertisements

WKU Information Technology Division ResNet 2012 Join ResNet on Facebook!
WKU Information Technology Division ResNet What is ResNet? ResNet is a network and computer support service available to all Western Kentucky University.
Orientation 2012 Longwood University: Where Technology Meets Tradition.
Information and Technology Services Customer Services.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
24/7/365 Remote Computer Support. Program Overview.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
UNIVERSITY OF GEORGIA Presented by: EITS Staff Summer 2015 Orientation: Parent Session.
KSU Faculty Orientation 2010 Presented by Information Technology Services.
Information about the computer By Sophia and Christina C.
Information Security Information Technology and Computing Services Information Technology and Computing Services
SWU Technology and Services for enrolled students Mike Preusz Information Technology.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
Division of Information Technology IT Support Resources and Retail Services on Campus Division of IT University of Maryland
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Learning In A Techno World How Safe is Your Cyberspace?
Student Orientation. Provides Technical Support and Services Password resets Telephone and voice mail issues CourseDen, Multimedia Services, SITS contact.
Using SWHS: The AUP [Acceptable Use Policy]
Division of Information Technology What You Need To Know About Technology On Campus Welcome!
Essential CCHS Computing Information Computer Applications September 2009.
WiFi Haiku Missing Apps Google Docs Missing Equipment Broken iPad Printer Issue.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computing at HSSOE Lisa Preble Instructional Lab Manager & Faculty computer support contact
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Introduction to ICT Chemical Engineering Duncan McLachlan and Nam Ly – ICT Support.
BroncoFusion September 25, 2013 Instructional & Information Technology (I&IT) Carol Gonzales, Assoc. CIO, Projects & Support Candie McDougall, Lead,
Internet Safety Internet Safety LPM
Division of Information Technology Information Technology at the University of Maryland Welcome!
Computing at HSSOE Lisa Preble Instructional Lab Manager.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction TO Network Administration
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
BYOD Programs Southeast Technical Institute JumpStart Days January 7, 2013.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
UNIVERSITY OF GEORGIA Presented by: EITS Staff Summer 2016 Orientation: Parent Presentation.
McAfee Antivirus Support By PCCare247 PCCare247 – Caring For Your PCs 24x7.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Kaliegh Belda – Knowledge Coordinator
IRT: Your Student’s Technology Partner at Rowan University
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Technology and You!.
Information Technology
Welcome to iSolutions – your IT support service
Unit 4 IT Security.
IT Services for Students
Technology Resources for Students
Technology Resources Welcome to Texas State!.
Technology Resources for Students
Discovering Technology
24/7/365 Remote Computer Support
Technology Resources for Students
Presentation transcript:

TECH TALK 2015

IT Services Resources Include: WKU /TopperMail TopNet myWKU Blackboard Helpdesk Phone & Chat Support WKU myStuff (Network Storage) WKU Libraries Online Database More info at

IT Services TopperTech- Student IT Support Location: 3 rd Floor of Mass Media & Technology Hall (MMTH) Hours Monday-Friday: 8am-5pm Saturday and Sunday: Closed Web: Facebook: WKU TopperTech IT Helpdesk Hours Monday-Friday: 7am-10pm Saturday: 8am-8pm Sunday: 12pm-8pm Phone: Chat: Web:

TopperTech 101 Network and Computer Service Available to all registered WKU students in Good Academic Standing Contact Info Phone: Online: 3 rd Floor of MMTH

TopperTech Services Virus and Spyware Removal Hardware Diagnostics & Replacement Operating System Refreshes Game Console Registration Data Backup & Recovery Dell Warranty Service Lenovo Warranty Service

Operating System Support TopperTech’s computer repair division provides support for the following operating systems: Windows Support Windows Vista (Basic, Home Premium, Business and Ultimate) Windows 7 (Starter, Basic, Home Premium and Ultimate) Windows 8 (Windows 8 “basic”, Professional, Enterprise and Windows RT) Windows 8.1 (Windows 8.1, Windows 8.1 RT, Professional and Enterprise) Windows 10 Mac Support Snow Leopard 10.6 Lion 10.7 Mountain Lion 10.8 Maverick 10.9 Yosemite 10.10

Costs There are no charges for TopperTech’s current services. Students are responsible for the costs associated with any hardware replacements. Example: TopperTech determines that the hard drive in your computer has gone bad. The technicians will provide a quote for a new hard drive, but it is the responsibility of the student to make this purchase.

WKU Wireless Coverage

WKU Wireless Wireless Access Points are not allowed in the residence halls. This includes, but is not limited to: Non-IT Sanctioned Hubs NAT routers Switches Wireless Access Points These devices are prohibited and can result in service termination.

Need Assistance? Experiencing Technology Problems? Contact the IT Helpdesk at or chat in at Stop by the TopperTech Service Window in MMTH Checking In at TopperTech You must bring the following to check in your device with TopperTech for service: Your WKU ID Your Device Charger Your Device

Service Catalog Experiencing Technology Problems? Visit the IT Service Catalog at td.wku.edu/tdclient Log in via your NetID and password Search for your issue via the search bar Can’t find your issue? Contact the IT Helpdesk at or chat in at

Gaming Consoles You must register your game console* to play online. Call the IT Helpdesk with the following info: Your WKU ID Username (ex. James.Smith or smithjc) Residence Hall & Room Number (ex. Barnes Campbell, Rm. 123) Contact Phone Number Console MAC Address (12 characters in this format: xx:xx:xx:xx:xx:xx) *Nintendo Wii systems can only connect to the network with an official Nintendo Wii Lan Adapter. For more information visit

iWKU iWKU is your easy mobile guide to information about WKU. iWKU is a suite of apps that gives you instant access to campus maps, contact information, the course catalog, libraries, news, events, grades, and more. Search the Directory app Store contacts, send , or call directly Search the course catalog for current and future semesters Find your way with the Maps app Search the WKU Libraries collection catalog Get up-to-the-minute campus information Check out campus photos and multimedia Accessible from iTunes at: Accessible from Google Play at: droid.central.WKU&hl=en droid.central.WKU&hl=en Other web-enabled mobile devices can visit

What Tech Should I Bring to Campus? Every student’s needs are different! Most computers will be supported on our network, including PCs and Macs. You must provide your own Ethernet cable for a wired connection in your residence hall.

Microsoft Office 365 Microsoft Office is available to registered WKU students at no charge. Students can download Office by visiting the Software Center at The download includes Microsoft Office 2013.

Purchasing Programs Western Kentucky University has Educational Purchase Pricing with both Apple and Dell available for WKU faculty, staff, and students. Special discounts and offers that are made available to an employee or student of Western Kentucky University are not available to the general public. More information can be found at

Apple Educational Purchase Program Western Kentucky University and Apple have teamed up to offer faculty, staff, and students the benefit of participating in the Apple Educational Purchase Program. In addition, the discounts are not limited to computers. Most Apple products are available at a discount, with the actual discount percentage averaging around 10%. WKU’s Apple Store

Dell Educational Purchase Program Western Kentucky University and Dell have teamed up to offer faculty, staff, and students the benefit of participating in the Dell Educational Purchase Program. One can purchase LCD TVs, handheld devices, and printers as well as choose from over thousands of electronics and accessories at discount prices.

Looking to Make a Purchase? Looking to purchase a PC? Consider the following: Your Major The requirement for the computer is different, depending on your major. Your advisor can discuss software you will be using in your courses to help you decide on the appropriate hardware. Portability Having a computer that can easily be transported is important when classes are heavily note dependent. Extended Warranty Consider extended warranty for duration of time in school. Extended warranties are highly advisable for any computer system. Anti-Virus Software This is a must-have. Fortunately, WKU provides Symantec Endpoint Anti-Virus software for all WKU students. Make sure to uninstall your existing anti-virus software before you install Symantec. It can be downloaded at

File Sharing What is file sharing? File sharing is the practice of making files available for other users to download over the Internet and smaller networks. Peer-to-peer (P2P) programs are often the preferred method of user that want to download and share files. Is file sharing allowed at WKU? While P2P programs have legitimate uses, using P2P, ftp, irc, or other applications to download or distribute copyrighted materials is against the law and against University Policy. WKU takes copyright violations very seriously and responds accordingly to each incident and violation.

NetIDs Once you have been admitted to WKU, your NetID will be created. This NetID and password will be your universal login to myWKU, TopNet, Blackboard, myStuff, computer labs, WKU wireless network and other IT services. You may look your NetID and set your password at

Accounts New WKU students will be issued a WKU account called TopperMail. Your TopperMail account will be accessible hours after you have registered for classes. You will receive official WKU communications through your TopperMail account. Check this account regularly! Access your TopperMail at

Safe Computing Create Strong Passwords Choose passwords that are difficult to guess, using uppercase letters, numbers, and special characters. Try to pick phrases that are easy to remember, but hard for others to know. Install Anti-Virus Software Anytime you open an attachment or download a file from the Internet, you are in danger of getting a virus on your computer. Viruses could potentially send themselves to all your contacts, damage/delete files on your computer, or install hidden programs that allow your computer to be accessed remotely. Once you install anti-virus software, keep it up to date. WKU offers Symantec Endpoint Anti-Virus software to all registered students. You can download it at Back Up Your Critical Files Saving your files on your hard drive, portable media (such as flash drives), AND external hard drives is encouraged to prevent data loss. Run Windows Updates Use Windows Updates to keep your operating system software and hardware working smoothly.

Safe Computing Never open an attachment from someone you do not know. Be sure your anti-virus scans your s. Never forward letters, or virus warnings, as they may not be legitimate. Never use the “unsubscribe” feature of Spam s or reply to Spam s. Doing so confirms the validity of your address. This can allows the spammer to keep sending you s. The proper way to deal with Spam is to delete it. You can also forward spam to your TopperMail account to Downloading Files Be very careful about the software files that you download. Only download from trusted sources. Files from un-trusted sources may contain viruses or have adverse affects on your computer. Some downloaded software may also contain spyware. Spyware collects personal data about your web surfing and other habits, and then sends that info to other third parties. Do not download or share copyrighted files such as music or movies without permission from the copyright owners. Copyright infringement is against University Policy and federal law. The No Electronic Theft (NET) Act of 1997 allows for criminal prosecution of individuals who electronically copy and distribute copyrighted work, even if there is no commercial gain from doing so.