Information Technology

Guide to Facebook Security

A free 14-page Facebook security guide, co-authored by Purdue Information Assurance research engineer Keith Watson, offers tips to help users avoid cyber risks posed by the social networking service:

Security Research Engineer’s Guide Urges Facebook Users to be Cautious

Direct PDF download:

Guide to Facebook Security

More social media tips from Purdue:

Follow these tips to keep your Facebook account secure…

Be safe out there!

–Education IT

Interactive Whiteboards

The College of Education has acquired two additional interactive whiteboards to go along with the one that was installed last year (summer 2010) in BRNG 3295.  We now have eInstruction interactive whiteboards permanently installed in BRNG 3288 and BRNG 3295.  In addition to these, we also have a portable SMART Board mobile cart system (currently located in BRNG 3295).  Please see below for more detailed information related to the manufacturers of these systems as well as pictures of our current hardware.


BRNG 3288 eInstruction Interactive Whiteboard
BRNG 3288 eInstruction Interactive Whiteboard
BRNG 3295 eInstruction Interactive Whiteboard
BRNG 3295 eInstruction Interactive Whiteboard

SMART Technologies

Portable SMART Board System
Portable SMART Board System
 If you are interested in seeing one of these systems in action or scheduling their use, please contact the Education IT team at

 -Education IT

Spider 3.0 How-To

Spider 3.0 is a tool that runs locally on your computer to scan for certain types of restricted data. By default, Spider looks for Social Security and Credit Card numbers. Spider scans the contents of all of the files on your computer to see if there are any numbers which might resemble restricted data. It then creates a log (list) of those files to be manually checked by the user. One of the challenges of using a program such as Spider is that it uses “pattern matching” and typically finds patterns in some files that are not actually restricted data. So you’ll need to carefully go through the list of files that Spider returns to see if actual restricted data exists in them.  Below are instructions for running Spider 3.0 once it is installed on your computer.

Please click below for the reference document (PDF):

⇒ Beware of email scams!!!

Dear College of Eduaction,

Email scammers are targeting Purdue again at the beginning of the semester!  If you receive an email message such as the one below asking you to provide account information or log into questionable web sites, please DO NOT click links or respond.  Simply delete the email.  If you have any questions, please feel free to contact the Education IT team.  Thank you and happy computing!!!  🙂

–Education IT,

—–Original Message—–
From: aaaa @
Sent: 8/15/11 4:25 AM
Subject: Virus Detected

Virus Detected

A virus has been detected in your mail account and in other for
you not to loose your account, you are to click on the link below.
Failure to do this will loose his/her mail account.

http ://


— or —

—–Original Message—–
From: Dinh Sy Hien [mailto:a @ b . c]
Sent: Tuesday, August 16, 2011 5:45 AM



http : //


— or —

—–Original Message—–
From: Microsoft Exchange []
Sent: Monday, August 22, 2011 4:53 PM
To: ———-
Subject: OWA: Your [] is on Restriction.

Purdue University
We detected irregular action on your e-mail system on August 22, 2011.

As the Primary owner, you must verify your account activity before you
can continue using your account, and upon verification, we will remove any
restrictions placed on your account.

click on the link below:

You can also forward your mail from any other e-mail accounts such as
Yahoo, Hotmail, etc. to your Webmail account so that your contacts won’t
have to memorize a new e-mail address and you can access all of your mail
in one place.  You can find forwarding instructions for your other e-mail
accounts in their online documentation.

Webmail service has reserved a system maintenance window of Saturdays from 4:00 a.m.
to 8:00 a.m. that will be used only if Webmail service needs to perform any work that
will take the system off-line. Otherwise, the e-mail system will
be available around the clock.
Thank You,
Microsoft Exchange

How To Use The LCD Projectors In BRNG Conference Rooms

Dear College of Education,

Ceiling mounted projectors have been installed in BRNG 4180, BRNG 5180 and BRNG 6115.  The three projectors are now fully operational.  We have placed a laminated instruction sheet in each room to assist those who need help getting started with the projectors.  Here is a link to the PDF version of the instruction sheet:

Also, the “snake” that contains all the wiring includes the following connectors:   

  • 15-pin VGA video connector
  • Ethernet network
  • Grounded power
  • 1/8” audio plug (plays through the projector)

If anyone has questions about or problems with the projectors, please have them contact the Education IT team. 

Onward and upward!

–Education IT (

EndNote Web – Cite While You Write

The Purdue Libraries has a license for “EndNote Web – Cite While You Write” which is an online bibliographic database that interfaces with Microsoft Word via a downloadable plug-in. 

For more information see:

Video overview:

Libraries web site:

–Education IT