The Purdue iPad and Tablet User’s Group:
Author: Robert Evans
IT Director for the Purdue University College of Education
A free 14-page Facebook security guide, co-authored by Purdue Information Assurance research engineer Keith Watson, offers tips to help users avoid cyber risks posed by the social networking service:
Direct PDF download:
Guide to Facebook Security
More social media tips from Purdue:
Follow these tips to keep your Facebook account secure…
Be safe out there!
If you need to stream video to your students for instructional purposes, you can use the Purdue Kaltura Streaming Media Server. Information about the server can be found here:
Dear College of Eduaction,
Email scammers are targeting Purdue again at the beginning of the semester! If you receive an email message such as the one below asking you to provide account information or log into questionable web sites, please DO NOT click links or respond. Simply delete the email. If you have any questions, please feel free to contact the Education IT team. Thank you and happy computing!!! 🙂
–Education IT, firstname.lastname@example.org
From: aaaa @ bbb.com
Sent: 8/15/11 4:25 AM
Subject: Virus Detected
A virus has been detected in your mail account and in other for
you not to loose your account, you are to click on the link below.
Failure to do this will loose his/her mail account.
http :// purdue-edu2.com/contactus.htm
— or —
From: Dinh Sy Hien [mailto:a @ b . c]
Sent: Tuesday, August 16, 2011 5:45 AM
Subject: URGENCY NEEDED
DEAR NETVIGATOR MAIL USER
WE ARE CURRENTLY UPGRADING ALL OUR NETVIGATOR MAIL ACCOUNTS,IN OTHER TO PROVIDE SPACE FOR NEW ACCOUNTS,YOU ARE REQUIRED TO LOG IN THE LINK BELOW TO UPGRADE YOURS:
http : // _________.com/contact-form-valisibor1-207194.html
— or —
From: Microsoft Exchange [mailto:email@example.com]
Sent: Monday, August 22, 2011 4:53 PM
Subject: OWA: Your [firstname.lastname@example.org] is on Restriction.
We detected irregular action on your e-mail system on August 22, 2011.
As the Primary owner, you must verify your account activity before you
can continue using your account, and upon verification, we will remove any
restrictions placed on your account.
click on the link below:
You can also forward your mail from any other e-mail accounts such as
Yahoo, Hotmail, etc. to your Webmail account so that your contacts won’t
have to memorize a new e-mail address and you can access all of your mail
in one place. You can find forwarding instructions for your other e-mail
accounts in their online documentation.
Webmail service has reserved a system maintenance window of Saturdays from 4:00 a.m.
to 8:00 a.m. that will be used only if Webmail service needs to perform any work that
will take the system off-line. Otherwise, the e-mail system will
be available around the clock.
For those who are web editors in the Purdue Cascade web content management system, here is our:
Cascade Web CMS Quick Start Guide
An interesting article from Computerworld:
Dear College of Education,
Ceiling mounted projectors have been installed in BRNG 4180, BRNG 5180 and BRNG 6115. The three projectors are now fully operational. We have placed a laminated instruction sheet in each room to assist those who need help getting started with the projectors. Here is a link to the PDF version of the instruction sheet:
Also, the “snake” that contains all the wiring includes the following connectors:
- 15-pin VGA video connector
- Ethernet network
- Grounded power
- 1/8” audio plug (plays through the projector)
If anyone has questions about or problems with the projectors, please have them contact the Education IT team.
Onward and upward!
–Education IT (email@example.com)
The Purdue Libraries has a license for “EndNote Web – Cite While You Write” which is an online bibliographic database that interfaces with Microsoft Word via a downloadable plug-in.
For more information see:
Libraries web site:
Dear Graduate Students,
The College of Education Graduate Studies Office is currently collecting research information from graduate students via the Graduate Activity Reporting Tool:
Graduate Activity Reporting Tool
When you save an item in GART you should be able to see the item right away in a list just below the form to add the item. If you scroll down, you should see the list of all the items you have saved. If your item does not seem to be saving correctly, there could be a couple of things happening:
1. The system may not allow an item to be saved if some fields are not completed, or if some fields have an invalid value. For example, if text is entered where a dollar amount is expected; or if a date field has the default “MM/DD/YYYY” text in it. If this is the case, red text should appear next to the field indicating invalid field data when the “Save Record” button is clicked.
2. If the vertical resolution of your browser or computer/laptop is small you may not see the list of items at the bottom. If you scroll down, they should be there. The items in the list are sorted by date.
If you have any problems with the system, please contact us at firstname.lastname@example.org
Did you know that Electronic media with University data on it must be physically destroyed? This means that not only must the data be destroyed beyond any ability to recover that data, but the physical media device (such as a jump drive, CD or DVD, or tape, etc.) must also be destroyed. Electronic media that has had University data on it may not be sold or given to anyone outside of the University. For more info see:
The Air Force Research Laboratory (AFRL) has connected 1,760 PlayStation 3 systems together to create what the organization is calling the fastest interactive computer in the entire Defense Department.
Dear College of Education,
As millions of shoppers begin looking for great deals this holiday season, the Education IT team wants to remind everyone to be on the lookout for scams, phishing schemes, and malware. Below are a couple of articles that touch on the subject. Be alert and have a restful and enjoyable holiday season!
Cyber Monday: Beware the malware
Scammers are ready for unsuspecting online shoppers to be hunting for holiday bargains that hit on what has become known as Cyber Monday (given that more than 40 percent of you will be buying holiday gifts online, according to this survey). There will no doubt be malware hiding on retail sites, fake sites created just for distributing viruses and Trojans, and e-mails with malware-laden attachments and links leading to nastiness…
Holiday Season Phishing Scams and Malware Campaigns
added to us-cert.gov on November 18, 2010 at 02:17 pm
In the past, US-CERT has received reports of an increased number of phishing scams and malware campaigns that take advantage of the winter holiday and holiday shopping season. US-CERT reminds users to remain cautious when receiving unsolicited email messages that could be part of a potential phishing scam or malware campaign.
These phishing scams and malware campaigns may include but are not limited to the following:
- electronic greeting cards that may contain malware
- requests for charitable contributions that may be phishing scams and may originate from illegitimate sources claiming to be charities
- screensavers or other forms of media that may contain malware
- credit card applications that may be phishing scams or identity theft attempts
- online shopping advertisements that may be phishing scams or identity theft attempts from bogus retailers
US-CERT encourages users and administrators to use caution when encountering these types of email messages and take the following preventative measures to protect themselves from phishing scams and malware campaigns:
- Do not follow unsolicited web links in email messages.
- Use caution when opening email attachments. Refer to the Using Caution with Email Attachments Cyber Security Tip for more information on safely handling email attachments.
- Maintain up-to-date antivirus software.
- Review the Federal Trade Commission’s Charity Checklist.
- Verify charity authenticity through a trusted contact number. Trusted contact information can be found on the Better Business Bureau National Charity Report Index.
- Refer to the Recognizing and Avoiding Email Scams (pdf) document for more information on avoiding email scams.
- Refer to the Avoiding Social Engineering and Phishing Attacks Cyber Security Tip for more information on social engineering attacks.
- Refer to the Shopping Safely Online Cyber Security Tip for more information on online shopping safety.