Green Book 2010

From ITwiki

(Difference between revisions)
Jump to: navigation, search
(Put up green book text, further formatting and interlinks to come)
m (Let the formatting begin)
Line 1: Line 1:
   
   
-
Information Technology is the department that provides technology services to the campus. Services include the Help Desk, network services, UniPrint printing, a computer lab, computer sales and repairs, training, Stevens Pipeline, Windows Campus Domain accounts, etc. Student user services are available at the Computer Center, which is accessed through the doors to the left of the main Library entrance, in the basement of the Library building. Systems and servers are normally available via the network 24 hours a day, as well as dial-up access.  
+
== [[Information Technology]]==
 +
 
 +
[[Information Technology]] is the department that provides technology services to the campus. Services include the [[Help Desk]], network services, [[UniPrint printing]], a computer lab, [[computer sales and repairs]], training, Stevens [[Pipeline]], Windows Campus Domain [[accounts]], etc. Student user services are available at the [[Computer Center]], which is accessed through the doors to the left of the main Library entrance, in the basement of the Library building. Systems and servers are normally available via the network 24 hours a day, as well as dial-up access.  
   
   
Contact Information Technology if you have:  
Contact Information Technology if you have:  
Line 10: Line 12:
• Any other IT related question.  
• Any other IT related question.  
   
   
-
See next page for details on the specific area to contact for help with your problem.
+
• Alternatively you may visit our IT Wiki for help with your IT related questions.
   
   
-
Important Computer Operating  
+
Important Computer Operating Servers Type System  
-
 
+
-
Servers Type System  
+
Cpipe Sun V480 Solaris   
Cpipe Sun V480 Solaris   
Line 32: Line 32:
storage01 network appliance   
storage01 network appliance   
-
Information Technology Service Hours
+
'''Information Technology Service Hours'''
User Services, Monday through Friday   
User Services, Monday through Friday   
Line 40: Line 40:
Saturday 9:00AM to 8.30PM   
Saturday 9:00AM to 8.30PM   
-
  Sunday 12:00PM to 8:30PM   
+
Sunday 12:00PM to 8:30PM   
Administrative Offices  Monday through Friday   
Administrative Offices  Monday through Friday   
9:00AM to 5:00PM   
9:00AM to 5:00PM   
-
Computer Monday through Friday   
+
Computer Service Center  Monday through Friday   
-
Service Center 9:00 AM to 5:00 PM   
+
9:00 AM to 5:00 PM   
Information Technology is closed on school holidays and some Saturdays and Sundays following “Friday closings” and before "Monday closings". See  
Information Technology is closed on school holidays and some Saturdays and Sundays following “Friday closings” and before "Monday closings". See  
Line 56: Line 56:
==Information Technology Administration ==
==Information Technology Administration ==
-
Email
 
Eric Rosenberg Associate Vice President erosenbe   
Eric Rosenberg Associate Vice President erosenbe   
Line 114: Line 113:
Scott Churchson Evening Operator schurchs   
Scott Churchson Evening Operator schurchs   
-
Consultants at the Help Desk (x5500)  
+
'''Consultants at the Help Desk (x5500)'''
-
Consultants are available to assist you with questions related to software on your notebook and most Stevens systems including Pipeline. Consultant coverage is scheduled so that you can reach a consultant most days (including weekends and evenings). The current consulting schedule is posted on the Information Technology department website at http://www.stevens.edu/it. Consultants will create a problem ticket for your question/request and help track your problem/resolution. Please ask for and refer to your ticket number when contacting the Help Desk, if you know it.  
+
Consultants are available to assist you with questions related to software on your notebook and most Stevens systems including [[Pipeline]]. Consultant coverage is scheduled so that you can reach a consultant most days (including weekends and evenings). The current consulting schedule is posted on the Information Technology department website at http://www.stevens.edu/it. Consultants will create a problem ticket for your question/request and help track your problem/resolution. Please ask for and refer to your ticket number when contacting the Help Desk, if you know it.  
-
Computer Service Center (CSC) (x5108)  
+
 
 +
'''[[Computer Service Center]] (CSC) (x5108)'''
http://www.stevens.edu/csc/   
http://www.stevens.edu/csc/   
   
   
Line 127: Line 127:
   
   
The Computer Service Center is located in the basement of the Library.   
The Computer Service Center is located in the basement of the Library.   
-
Managing your Notebook  
+
 
-
You are responsible for your notebook, its data, and its operation on the network. It is your responsibility to keep your notebook in an operational condition at all times. Replacement or repairs of most parts are covered under warranty. Limited accidental damage coverage is provided on Class of 2009 notebooks until May 31, 2009. The cost of repairs or damages not covered by warranty or the accidental damage coverage is your responsibility. Please take care of your notebook. Having it in working condition is an academic requirement.  
+
'''Managing your Notebook '''
 +
 
 +
You are responsible for your notebook, its data, and its operation on the network. It is your responsibility to keep your notebook in an operational condition at all times. Replacement or repairs of most parts are covered under warranty. Limited accidental damage coverage is provided on Class of 2010 notebooks until May 31, 2010. The cost of repairs or damages not covered by warranty or the accidental damage coverage is your responsibility. Please take care of your notebook. Having it in working condition is an academic requirement.  
   
   
You must back up your data (anything stored on the D: drive), be responsible as an “Administrator” of Windows XP on your notebook, install new software releases, and apply software patches/updates. While doing all of this, you must make sure your computer does not become infected with computer viruses and spyware, that your other applications do not conflict with what you are about to install, and that network configuration settings and Windows registry data are not corrupted or changed adversely. Be aware of and document all changes made to your notebook, especially if you are not the one making them.  
You must back up your data (anything stored on the D: drive), be responsible as an “Administrator” of Windows XP on your notebook, install new software releases, and apply software patches/updates. While doing all of this, you must make sure your computer does not become infected with computer viruses and spyware, that your other applications do not conflict with what you are about to install, and that network configuration settings and Windows registry data are not corrupted or changed adversely. Be aware of and document all changes made to your notebook, especially if you are not the one making them.  
   
   
-
Virus Protection  
+
'''Virus Protection'''
 +
Make sure your virus protection software is running and Auto Updates and Scans are scheduled. For information on use of McAfee VirusScan at Stevens, contact the Help Desk at 201-216-5500 or visit the Information Technology website at http://www.stevens.edu/it/documentation/.  
Make sure your virus protection software is running and Auto Updates and Scans are scheduled. For information on use of McAfee VirusScan at Stevens, contact the Help Desk at 201-216-5500 or visit the Information Technology website at http://www.stevens.edu/it/documentation/.  
   
   
-
Connecting to the Campus Network  
+
==Connecting to the Campus Network==
-
Wired Connections  
+
'''Wired Connections'''
 +
Every dorm room is wired with one computer network outlet per resident. The network is referred to as “twisted pair Ethernet” and will automatically sense your network card’s capabilities and communicate at either 10Mbits/sec or 100Mbits/sec in a half or full duplex mode. It is very important to keep your card in the auto sense mode for it to operate correctly. All switches are set to automatically sense the mode of operation; the switch will become confused and may not operate correctly if both the switch and your PC are not set on automatic.   
Every dorm room is wired with one computer network outlet per resident. The network is referred to as “twisted pair Ethernet” and will automatically sense your network card’s capabilities and communicate at either 10Mbits/sec or 100Mbits/sec in a half or full duplex mode. It is very important to keep your card in the auto sense mode for it to operate correctly. All switches are set to automatically sense the mode of operation; the switch will become confused and may not operate correctly if both the switch and your PC are not set on automatic.   
   
   
-
If your computer is not compliant with the 802.1x standard, you will have to register the physical address.  
+
If your computer is not compliant with the [[802.1x]] standard, you will have to register the physical address.  
   
   
-
Laptops distributed to incoming students are both 802.1x compliant and have their Network Interface Cards (NIC) registered [see Network Interface Card registration information below] to work on the campus network.  In order to connect, simply plug the network cable provided with the RJ-45 connectors in your room.  
+
Laptops distributed to incoming students are both [[802.1x]] compliant and have their Network Interface Cards (NIC) registered [see Network Interface Card registration information below] to work on the campus network.  In order to connect, simply plug the network cable provided with the RJ-45 connectors in your room.  
   
   
-
If you have brought a machine that is not 802.1x compliant, you will need to register its MAC physical address.  Depending on the type of network equipment you are using to connect multiple machines, you may need to register it to connect to the network.  
+
If you have brought a machine that is not [[802.1x]] compliant, you will need to register its MAC physical address.  Depending on the type of network equipment you are using to connect multiple machines, you may need to register it to connect to the network.  
   
   
In addition, all machines must be DHCP enabled.  A machine that is not DHCP enabled will not be allowed on the network and may result in your port becoming deactivated.  
In addition, all machines must be DHCP enabled.  A machine that is not DHCP enabled will not be allowed on the network and may result in your port becoming deactivated.  
Line 152: Line 156:
   
   
If you do not get a network connection, first unplug and replug all network cables, both into the wall and into your PC. If you still do not get a network connection, try swapping ports with your roommate, if he or she has a working connection. If this does not help, call the Help Desk at x5500. You may be asked to bring your notebook and the RJ-45 cable to the Help Desk to try it in a working network outlet.  
If you do not get a network connection, first unplug and replug all network cables, both into the wall and into your PC. If you still do not get a network connection, try swapping ports with your roommate, if he or she has a working connection. If this does not help, call the Help Desk at x5500. You may be asked to bring your notebook and the RJ-45 cable to the Help Desk to try it in a working network outlet.  
-
Wireless Connections  
+
 
 +
==[[Wireless Connections]]==
Wireless access is provided in the dorms, however, connectivity is not guaranteed due to interference from other appliances such as microwaves, cordless phones, Bluetooth and other devices using that unregulated frequency spectrum  
Wireless access is provided in the dorms, however, connectivity is not guaranteed due to interference from other appliances such as microwaves, cordless phones, Bluetooth and other devices using that unregulated frequency spectrum  
   
   
Line 159: Line 164:
Your Stevens notebook is preconfigured to use “Stevens” in most campus locations where network ports are not available.  Instructions for configuring 802.1x are also available on the Information Technology website http://www.stevens.edu/it.  
Your Stevens notebook is preconfigured to use “Stevens” in most campus locations where network ports are not available.  Instructions for configuring 802.1x are also available on the Information Technology website http://www.stevens.edu/it.  
   
   
-
Network Interface Card (NIC) Address Registration  
+
'''Network Interface Card (NIC) Address Registration'''
The wired and wireless adapter (NIC) addresses for Stevens-provided notebooks are registered as they are distributed to new undergraduate students. Your notebook will obtain a network address in your dorm (or Greek house); will get a “roaming” network address in other campus wired locations; on wireless when near an access point, and will be able to use a wireless (e.g. “Stevens Hayden”, “Stevens Humphreys” or “Stevens Davis”) address in these residence halls. In addition, you may register one desktop computer’s NIC address to obtain an IP address in your dorm (or Greek house) room, and one additional wireless adapter.  
The wired and wireless adapter (NIC) addresses for Stevens-provided notebooks are registered as they are distributed to new undergraduate students. Your notebook will obtain a network address in your dorm (or Greek house); will get a “roaming” network address in other campus wired locations; on wireless when near an access point, and will be able to use a wireless (e.g. “Stevens Hayden”, “Stevens Humphreys” or “Stevens Davis”) address in these residence halls. In addition, you may register one desktop computer’s NIC address to obtain an IP address in your dorm (or Greek house) room, and one additional wireless adapter.  
   
   
Unauthorized use of the network and systems is not allowed; connection logging and network sniffing by authorized personnel may be in effect when system security or integrity is in question. By using the network, you expressly consent to such logging and monitoring and any resultant legal actions. Use of the network implies consent with all Stevens network policies.  
Unauthorized use of the network and systems is not allowed; connection logging and network sniffing by authorized personnel may be in effect when system security or integrity is in question. By using the network, you expressly consent to such logging and monitoring and any resultant legal actions. Use of the network implies consent with all Stevens network policies.  
-
Acceptable Use Policy  
+
 
 +
 
 +
==[[Acceptable Use Policy]]==
Stevens Institute of Technology expects that all persons who make any use of computing hardware, software, networking services, or any property related or ancillary to the use of these facilities will abide by the following policy statement:   
Stevens Institute of Technology expects that all persons who make any use of computing hardware, software, networking services, or any property related or ancillary to the use of these facilities will abide by the following policy statement:   
 +
Information Technology resources are provided in the hope that the community will use them in a spirit of mutual cooperation. Resources are limited and must be shared. Everyone will benefit if all computer users avoid any activities which cause problems for others who use the same systems.  
Information Technology resources are provided in the hope that the community will use them in a spirit of mutual cooperation. Resources are limited and must be shared. Everyone will benefit if all computer users avoid any activities which cause problems for others who use the same systems.  
All hardware, software, and related services supplied by Stevens are for the sole purpose of supplementing and reinforcing the institution’s goals as set forth in the student and faculty handbooks and mission statement. We expect that no one will use hardware, software or services without authorization to do so. There has also been increasing concern over legal issues when using electronic communications. There are already laws that prohibit the following:  
All hardware, software, and related services supplied by Stevens are for the sole purpose of supplementing and reinforcing the institution’s goals as set forth in the student and faculty handbooks and mission statement. We expect that no one will use hardware, software or services without authorization to do so. There has also been increasing concern over legal issues when using electronic communications. There are already laws that prohibit the following:  
 +
• Electronic libeling or defaming another person  
• Electronic libeling or defaming another person  
 +
• Sending/Posting messages that incites hate or discontent  
• Sending/Posting messages that incites hate or discontent  
 +
• Transmitting repeated unwanted sexual advances  
• Transmitting repeated unwanted sexual advances  
 +
• Falsifying information via impersonation  
• Falsifying information via impersonation  
 +
• Unauthorized use, providing, or copying protected intellectual property.  
• Unauthorized use, providing, or copying protected intellectual property.  
While the Internet is considered a public electronic highway, the Stevens network is a private resource. As such, access and use of the network must be in accordance with Stevens' rules and policies as well as all legal regulations. Therefore, the following actions are strictly prohibited:  
While the Internet is considered a public electronic highway, the Stevens network is a private resource. As such, access and use of the network must be in accordance with Stevens' rules and policies as well as all legal regulations. Therefore, the following actions are strictly prohibited:  
 +
• Posting or transmission of confidential or classified information.  
• Posting or transmission of confidential or classified information.  
 +
• Use of offensive or discriminatory language.  
• Use of offensive or discriminatory language.  
 +
• Transmission of any graphic image, sound or text that is sexual in nature.  
• Transmission of any graphic image, sound or text that is sexual in nature.  
 +
• Giving account passwords to individuals who are not the owners of such accounts.  
• Giving account passwords to individuals who are not the owners of such accounts.  
 +
• Obtain passwords to or use of accounts other than one's own.  
• Obtain passwords to or use of accounts other than one's own.  
 +
• Use of resources for personal profit or gain.  
• Use of resources for personal profit or gain.  
 +
• Harass, threaten, or otherwise invade the privacy of others.  
• Harass, threaten, or otherwise invade the privacy of others.  
 +
• Initiate or forward e-mail chain letters.  
• Initiate or forward e-mail chain letters.  
 +
• Cause breaches of computer, network or telecommunications security systems.  
• Cause breaches of computer, network or telecommunications security systems.  
 +
• Initiate activities which unduly consume computing or network resources.  
• Initiate activities which unduly consume computing or network resources.  
In order to access the Stevens network, the following actions are required:  
In order to access the Stevens network, the following actions are required:  
 +
• The NIC (physical address) of network devices must be registered with the Computer Service Center or the user must authenticate with a valid username and password.  
• The NIC (physical address) of network devices must be registered with the Computer Service Center or the user must authenticate with a valid username and password.  
 +
• Members of the campus community must maintain their computers with virus-protection software, spyware protection, and operating system updates.  
• Members of the campus community must maintain their computers with virus-protection software, spyware protection, and operating system updates.  
Line 193: Line 218:
Note: This policy is subject to change.
Note: This policy is subject to change.
-
FAQ (General Frequently Asked Questions)  
+
 
 +
==FAQ (General Frequently Asked Questions)==
   
   
-
Who does what?  
+
'''Who does what?'''
   
   
Q: What are the functions of Information Technology?   
Q: What are the functions of Information Technology?   
Line 234: Line 260:
8:00AM to 10:30PM  
8:00AM to 10:30PM  
Saturday 9:00AM to 8.30PM  
Saturday 9:00AM to 8.30PM  
-
Sunday 12:00PM to 8:30PM  
+
Sunday 12:00PM to 8:30PM
 +
The Schacht Lab (in the Kidde Building 3rd floor, Room 350)  
The Schacht Lab (in the Kidde Building 3rd floor, Room 350)  
 +
The Humanities Resource Center, (2nd floor Morton Building, Room 210)   
The Humanities Resource Center, (2nd floor Morton Building, Room 210)   
 +
The Unix Lab, (1st floor of Burchard Building, Room 127).   
The Unix Lab, (1st floor of Burchard Building, Room 127).   
 +
Each department sets hours of operation for its own lab.   
Each department sets hours of operation for its own lab.   
   
   
Line 252: Line 282:
A: The campus-wide network provides access to a variety of resources both on and off campus. On campus, these include systems and services within the Library and academic departments, the Humanities Resource Center (HRC), etc. Most academic departments have facilities intended to meet specific needs. Since the dorms are firewall protected from portions of the campus and the Internet, you must have proxies configured to use a web browser. Stevens’ main web homepage is http://www.stevens.edu/. It has links to other web sites at Stevens.  The Computer Science (CS) department manages systems dedicated to computer science students and faculty who require use for research and course work.  
A: The campus-wide network provides access to a variety of resources both on and off campus. On campus, these include systems and services within the Library and academic departments, the Humanities Resource Center (HRC), etc. Most academic departments have facilities intended to meet specific needs. Since the dorms are firewall protected from portions of the campus and the Internet, you must have proxies configured to use a web browser. Stevens’ main web homepage is http://www.stevens.edu/. It has links to other web sites at Stevens.  The Computer Science (CS) department manages systems dedicated to computer science students and faculty who require use for research and course work.  
   
   
-
How do I …?  
+
'''How do I …?'''
   
   
Q: How do I avoid getting viruses?  
Q: How do I avoid getting viruses?  
Line 259: Line 289:
   
   
DO NOT CLICK on any pop up ads indicating you have a virus or believe any emails allegedly coming from Stevens asking you to click on a link (or *.exe or *.zip file) in order to maintain your account status.  
DO NOT CLICK on any pop up ads indicating you have a virus or believe any emails allegedly coming from Stevens asking you to click on a link (or *.exe or *.zip file) in order to maintain your account status.  
 +
Information Technology will not send attached files via e-mail.  If required, users would be redirected to either the Pipeline portal or the IT webpage.  
Information Technology will not send attached files via e-mail.  If required, users would be redirected to either the Pipeline portal or the IT webpage.  
 +
Do not click on links provided in email.  
Do not click on links provided in email.  
 +
You must schedule daily updates of anti-virus and Counter Spy along with frequent virus scans to minimize the risk of virus infection.  
You must schedule daily updates of anti-virus and Counter Spy along with frequent virus scans to minimize the risk of virus infection.  
   
   
Line 334: Line 367:
A: Yes.  
A: Yes.  
   
   
-
Q: Who can use my Pipeline account?   
+
Q: Who can use my [[Pipeline]] account?   
A: You, and only you, are permitted to use your Pipeline account. Please consider your Pipeline account the same as you would a driver’s license (others know how to drive, but they cannot use your license). All usage should be your own, and all usage and fees associated with use of your account will be your responsibility. Your password should always be kept secret. It should be protected because it gives access to your student grades, financial data, and your online courses. If you think someone knows your Pipeline password, log into Pipeline. Click on “Options” and change your Pipeline password to a new one ASAP or contact the Help Desk.
A: You, and only you, are permitted to use your Pipeline account. Please consider your Pipeline account the same as you would a driver’s license (others know how to drive, but they cannot use your license). All usage should be your own, and all usage and fees associated with use of your account will be your responsibility. Your password should always be kept secret. It should be protected because it gives access to your student grades, financial data, and your online courses. If you think someone knows your Pipeline password, log into Pipeline. Click on “Options” and change your Pipeline password to a new one ASAP or contact the Help Desk.
Line 340: Line 373:
Q: How can I get help?   
Q: How can I get help?   
-
A: For notebook hardware problems call the Computer Service Center at x5108 or via e-mail at csc@stevens.edu. All network or software problems and questions should be referred to the Help Desk, x5500. Consultants can be contacted via e-mail at  helpdesk@stevens.edu. Be prepared to describe your problem fully and to provide the exact error message, if any.  
+
A: For notebook hardware problems call the [[Computer Service Center]] at x5108 or via e-mail at csc@stevens.edu. All network or software problems and questions should be referred to the Help Desk, x5500. Consultants can be contacted via e-mail at  helpdesk@stevens.edu. Be prepared to describe your problem fully and to provide the exact error message, if any.  
   
   
   
   
Line 353: Line 386:
Q: How can I print?   
Q: How can I print?   
-
A: Incoming undergraduate students are provided with a personal Epson Stylus C66 color printers to use in their rooms or at home. Students may also print using UniPrint and their Stevens Campus Card at the Pharos Release Station computers located at the Computer Center and in the Library. Documentation is available at http://www.stevens.edu/uniprint.
+
A: Incoming undergraduate students are provided with a personal color printers to use in their rooms or at home. Students may also print using [[UniPrint]] and their Stevens Campus Card at the Pharos Release Station computers located at the Computer Center and in the Library. Documentation is available at http://www.stevens.edu/uniprint.
   
   
Q: How can I learn more?   
Q: How can I learn more?   
Line 360: Line 393:
What do I do when?   
What do I do when?   
   
   
-
Q: I lost my Pipeline or Windows domain password. How can I get a new one?  
+
Q: I lost my [[Pipeline]] or Windows domain password. How can I get a new one?  
   
   
A: You may call or e-mail the Help Desk and upon verification of your identity, a new password will be given to you. You may also go to the Help Desk at the Information Technology department to request a new password.
A: You may call or e-mail the Help Desk and upon verification of your identity, a new password will be given to you. You may also go to the Help Desk at the Information Technology department to request a new password.
Line 388: Line 421:
Q: May I send mail to everyone on the system?   
Q: May I send mail to everyone on the system?   
-
A: Do not attempt to send e-mail to everyone on Pipeline or to everyone in your class year. This is known as a ”mass mailing” and it is not allowed. Instead you may request an announcement in Pipeline. To request an announcement, submit it to the Student Life Office (student_life@stevens.edu). Another way to communicate with several people at the same time is with a Pipeline group. Use the “Groups” link in Pipeline to request a new Pipeline “group”. A third way to communicate with many people is to use the local (stevens.*) newsgroups to post messages for everyone. The Stevens newsgroup server is “news.stevens.edu”.  
+
A: Do not attempt to send e-mail to everyone on [[Pipeline]] or to everyone in your class year. This is known as a ”mass mailing” and it is not allowed. Instead you may request an announcement in Pipeline. To request an announcement, submit it to the Student Life Office (student_life@stevens.edu). Another way to communicate with several people at the same time is with a Pipeline group. Use the “Groups” link in Pipeline to request a new Pipeline “group”. A third way to communicate with many people is to use the local (stevens.*) newsgroups to post messages for everyone. The Stevens newsgroup server is “news.stevens.edu”.  
   
   
Q: May I register a domain name that refers to a Stevens system?   
Q: May I register a domain name that refers to a Stevens system?   
Line 400: Line 433:
Q: May I make a web page on a Stevens server for my private enterprise or for business use?   
Q: May I make a web page on a Stevens server for my private enterprise or for business use?   
-
A: Do not use Stevens servers to develop commercial web content or for any commercial use. Personal web pages are permitted as long as they abide by the Acceptable Use Policy.
+
A: Do not use Stevens servers to develop commercial web content or for any commercial use. Personal web pages are permitted as long as they abide by the [[Acceptable Use Policy]].
   
   
Q: May I permanently relocate my own notebook or desktop PC to any location on campus?   
Q: May I permanently relocate my own notebook or desktop PC to any location on campus?   
Line 406: Line 439:
A: Student machines are to remain in the dorms, except when being used in areas with public notebook ports such as classrooms, Sam’s Place, the Cyber Café, Hayden Lounge, and near wireless access points for example. They are not to be relocated in any academic or administration building!
A: Student machines are to remain in the dorms, except when being used in areas with public notebook ports such as classrooms, Sam’s Place, the Cyber Café, Hayden Lounge, and near wireless access points for example. They are not to be relocated in any academic or administration building!
   
   
-
What is…?  
+
'''What is…?'''
   
   
Q: What is my email address?   
Q: What is my email address?   
-
A: Your username associated with your Stevens Pipeline account is also your name for e-mail purposes. When using the Internet, it is username@stevens.edu, where username means your personal username. By default, e-mail sent to this address goes to nexus and is available via Stevens Pipeline.
+
A: Your username associated with your Stevens [[Pipeline]] account is also your name for e-mail purposes. When using the Internet, it is username@stevens.edu, where username means your personal username. By default, e-mail sent to this address goes to nexus and is available via Stevens [[Pipeline]].
   
   
Q: What is a firewall?   
Q: What is a firewall?   
Line 449: Line 482:
A: Keep in mind that no account is ever 100% secure.  That said, there are precautions you can take to keep your account as secure as possible.  Be mindful of where you put files on your personal space.  All files in the public_html directory will be visible to everyone by default.  Also when changing permissions on your “filer” area be aware that you can inadvertently give access to anyone.  If you are unsure of what to do, contact the Help Desk at x5500. Make sure you use a complex password and don’t tell anyone the password.
A: Keep in mind that no account is ever 100% secure.  That said, there are precautions you can take to keep your account as secure as possible.  Be mindful of where you put files on your personal space.  All files in the public_html directory will be visible to everyone by default.  Also when changing permissions on your “filer” area be aware that you can inadvertently give access to anyone.  If you are unsure of what to do, contact the Help Desk at x5500. Make sure you use a complex password and don’t tell anyone the password.
-
FAQ (Notebook Program and Printers)   
+
 
 +
'''FAQ (Notebook Program and Printers)'''  
The following section covers questions and policy answers to Frequently Asked Questions about Stevens Institute of Technology’s Mobile Computing (Notebook Computer) Program, which includes details on personal printers for this year’s incoming undergraduates.  
The following section covers questions and policy answers to Frequently Asked Questions about Stevens Institute of Technology’s Mobile Computing (Notebook Computer) Program, which includes details on personal printers for this year’s incoming undergraduates.  
   
   
Line 466: Line 500:
A: No. The notebook uses the latest technology on the market and has the required undergraduate software for your class year already pre-loaded.  
A: No. The notebook uses the latest technology on the market and has the required undergraduate software for your class year already pre-loaded.  
   
   
-
Purchase of Additional Items for Notebooks  
+
'''Purchase of Additional Items for Notebooks'''
   
   
Q: Are there notebook carrying cases such as laptop backpacks, shoulder bags or sleeves available for purchase?   
Q: Are there notebook carrying cases such as laptop backpacks, shoulder bags or sleeves available for purchase?   
Line 476: Line 510:
A: Yes, through the Computer Service Center (CSC), http://www.stevens.edu/csc. If you purchase through the CSC and you require warranty repair, it will be provided on campus by the Computer Service Center.
A: Yes, through the Computer Service Center (CSC), http://www.stevens.edu/csc. If you purchase through the CSC and you require warranty repair, it will be provided on campus by the Computer Service Center.
   
   
-
Repair of Notebooks and Printers  
+
'''Repair of Notebooks and Printers'''
   
   
Q: If my notebook doesn’t work, will there be loaners?   
Q: If my notebook doesn’t work, will there be loaners?   
Line 494: Line 528:
A: The Phone number for printer repair is 1-800-HP-INVENT (47-468368).
A: The Phone number for printer repair is 1-800-HP-INVENT (47-468368).
   
   
-
Insurance  
+
'''Insurance'''
Q: Is there theft insurance covering my Stevens notebook?   
Q: Is there theft insurance covering my Stevens notebook?   
Line 504: Line 538:
A: Coverage is not provided by Stevens Institute of Technology. Your parents’ or your personal homeowners’ or renters’ insurance may cover peripherals. You should check with your insurance broker or company.
A: Coverage is not provided by Stevens Institute of Technology. Your parents’ or your personal homeowners’ or renters’ insurance may cover peripherals. You should check with your insurance broker or company.
   
   
-
Loss/Theft of Notebooks  
+
'''Loss/Theft of Notebooks'''
   
   
Q: If my computer is lost or stolen, what happens?   
Q: If my computer is lost or stolen, what happens?   
Line 515: Line 549:
A: If the computer is lost or stolen more than once, the student is required to purchase a unit that is the same as the missing unit at a price to be determined by the Computer Service Center. Insurance only applies to the first unit distributed to a student.   
A: If the computer is lost or stolen more than once, the student is required to purchase a unit that is the same as the missing unit at a price to be determined by the Computer Service Center. Insurance only applies to the first unit distributed to a student.   
   
   
-
Co-op Program, Leave of Absence or Vacation   
+
'''Co-op Program, Leave of Absence or Vacation'''  
   
   
Q: If I go off-campus on a Co-op program, Leave of Absence or Vacation, can I take the notebook?   
Q: If I go off-campus on a Co-op program, Leave of Absence or Vacation, can I take the notebook?   
Line 521: Line 555:
A: If you are on a co-op assignment or vacation, you have the same access to the notebook as if you were on campus. A Leave of Absence must be approved by the Dean of Undergraduate Academics. A future charge, based on the buyout price, will be placed on your Stevens account. When you return to campus, the charge will be reversed. If you do not continue studies after the leave of absence, the notebook must be returned in good working order to the Computer Service Center or the buyout charge must be paid.   
A: If you are on a co-op assignment or vacation, you have the same access to the notebook as if you were on campus. A Leave of Absence must be approved by the Dean of Undergraduate Academics. A future charge, based on the buyout price, will be placed on your Stevens account. When you return to campus, the charge will be reversed. If you do not continue studies after the leave of absence, the notebook must be returned in good working order to the Computer Service Center or the buyout charge must be paid.   
   
   
-
Graduation from Stevens  
+
'''Graduation from Stevens'''
   
   
Q: When I graduate from Stevens with my undergraduate degree, is the computer mine?   
Q: When I graduate from Stevens with my undergraduate degree, is the computer mine?   
Line 527: Line 561:
A: Yes, even if graduation occurs sooner than the payment of eight semesters of full-time tuition.  
A: Yes, even if graduation occurs sooner than the payment of eight semesters of full-time tuition.  
   
   
-
Disposition of Notebooks in event of Separation from Stevens.  
+
'''Disposition of Notebooks in event of Separation from Stevens.'''
   
   
Q: If I separate from Stevens prior to graduation, what happens to the notebook?
Q: If I separate from Stevens prior to graduation, what happens to the notebook?
Line 533: Line 567:
A: You have the option of returning the notebook and accessories or purchasing them. If you decide not to purchase the notebook and peripherals devices, they must be returned during the semester of separation from Stevens in good condition as defined by the Computer Service Center. Should you decide to purchase the equipment, the price will be based on the number of semesters you attended Stevens Institute of Technology as a full-time undergraduate. Before the end of the first year, the purchase price is $2,000. After one-full year, the purchase price is $1,500; after the second full year, it is $1,000, $500 after the third full year. There is no charge after the fourth full year. This charge does not reflect the market value of the notebook and peripheral devices but rather a portion of the cost of this program. The Dean of Undergraduate Academics will make the determination of the number of years as a full-time student at the time of separation from Stevens Institute of Technology.
A: You have the option of returning the notebook and accessories or purchasing them. If you decide not to purchase the notebook and peripherals devices, they must be returned during the semester of separation from Stevens in good condition as defined by the Computer Service Center. Should you decide to purchase the equipment, the price will be based on the number of semesters you attended Stevens Institute of Technology as a full-time undergraduate. Before the end of the first year, the purchase price is $2,000. After one-full year, the purchase price is $1,500; after the second full year, it is $1,000, $500 after the third full year. There is no charge after the fourth full year. This charge does not reflect the market value of the notebook and peripheral devices but rather a portion of the cost of this program. The Dean of Undergraduate Academics will make the determination of the number of years as a full-time student at the time of separation from Stevens Institute of Technology.
   
   
-
Tuition Discount   
+
'''Tuition Discount'''  
   
   
Q: My family just bought me a notebook. Do I get a tuition discount?   
Q: My family just bought me a notebook. Do I get a tuition discount?   
Line 539: Line 573:
A: No. You should use the notebook provided to you by Stevens for your Stevens work.
A: No. You should use the notebook provided to you by Stevens for your Stevens work.
   
   
-
Using Additional Computers  
+
'''Using Additional Computers'''
   
   
Q: If I have a computer that I want to use in addition to my notebook, will I be able to?   
Q: If I have a computer that I want to use in addition to my notebook, will I be able to?   
Line 552: Line 586:
Q: Are there special places on campus that commuting students can use to connect?   
Q: Are there special places on campus that commuting students can use to connect?   
-
A: Yes, Jacobus Lounge, the PC Room (near User Service Help Desk at the Computer Center), Stevens’ Cyber Café (aka Café on Hudson), Sam’s Place (in the Library), and Hayden Lounge are wired. There are additional wired and wireless sites. For current wireless locations, check the Information Technology web site, http://www.stevens.edu/Wirelessmap  
+
A: Yes, Jacobus Lounge, the PC Room (near User Service Help Desk at the Computer Center), Stevens’ Cyber Café (aka Café on Hudson), Sam’s Place (in the Library), and Hayden Lounge are wired. There are additional wired and wireless sites. For current wireless locations, check the Information Technology web site, http://www.stevens.edu/Wirelessmap
-
Tips for Class 2009 Notebook Users:
+
-
Network Connection Guide   
+
==Tips for Class 2010 Notebook Users:==
 +
 
 +
'''Network Connection Guide'''  
   
   
TIPS: Keep your notebook battery charged and in your notebook. It takes about two hours to charge your notebook’s battery.  DO NOT COMPLETELY DISCHARGE YOUR BATTERY.   
TIPS: Keep your notebook battery charged and in your notebook. It takes about two hours to charge your notebook’s battery.  DO NOT COMPLETELY DISCHARGE YOUR BATTERY.   
Line 583: Line 619:
MORE TIPS: Remember to be security conscious about your notebook. Do not leave it unattended. Lock it down. Carry the security cable, locking device, and key to lock your notebook down where possible. Always lock your notebook down in your residence hall room.  
MORE TIPS: Remember to be security conscious about your notebook. Do not leave it unattended. Lock it down. Carry the security cable, locking device, and key to lock your notebook down where possible. Always lock your notebook down in your residence hall room.  
   
   
-
Your network card addresses are on file in the SIS (Student Information System) database. If you replace a network card for any reason (e.g., repair, theft, or system upgrade) you will need to contact the Computer Service Center to have your new network card registered.   
+
Your network card addresses are on file in the SIS (Student Information System) database. If you replace a network card for any reason (e.g., repair, theft, or system upgrade) you will need to contact the Help Desk to have your new network card registered.   
   
   
-
Definitions of Terms  
+
'''Definitions of Terms'''
   
   
Network Registered - A computer that has its network address recorded in the Student Information System by the Computer Service Center.   
Network Registered - A computer that has its network address recorded in the Student Information System by the Computer Service Center.   
Line 594: Line 630:
   
   
   
   
-
Policy  
+
'''Policy'''
   
   
Users not running DHCP (for any reason), will not be allowed on the network.  It is their responsibility to understand these conditions and be aware of any network authorization changes. Users must maintain their systems accordingly. Users whose authorized addresses have changed, but whose systems are not running DHCP, and therefore have not reflected the change will be considered to be in violation of the network policy.   
Users not running DHCP (for any reason), will not be allowed on the network.  It is their responsibility to understand these conditions and be aware of any network authorization changes. Users must maintain their systems accordingly. Users whose authorized addresses have changed, but whose systems are not running DHCP, and therefore have not reflected the change will be considered to be in violation of the network policy.   
Line 608: Line 644:
Systems may have and use more than one TCP/IP network address on the campus network. Stevens-provided notebooks have registered wired and wireless network cards and are authorized for two network addresses. In addition, you may register one additional desktop network card for use in your dorm room and one additional wireless MAC address.  
Systems may have and use more than one TCP/IP network address on the campus network. Stevens-provided notebooks have registered wired and wireless network cards and are authorized for two network addresses. In addition, you may register one additional desktop network card for use in your dorm room and one additional wireless MAC address.  
-
General Trouble Shooting Guidelines  
+
'''General Trouble Shooting Guidelines '''
   
   
Before calling the Help Desk…  
Before calling the Help Desk…  

Revision as of 16:09, 13 July 2006

Contents

Information Technology

Information Technology is the department that provides technology services to the campus. Services include the Help Desk, network services, UniPrint printing, a computer lab, computer sales and repairs, training, Stevens Pipeline, Windows Campus Domain accounts, etc. Student user services are available at the Computer Center, which is accessed through the doors to the left of the main Library entrance, in the basement of the Library building. Systems and servers are normally available via the network 24 hours a day, as well as dial-up access.

Contact Information Technology if you have:

• Questions about your notebook’s ability to connect to the network (UniPrint printing, downloading files, www, wireless, etc.).

• Questions regarding email or webspace.

• Any other IT related question.

• Alternatively you may visit our IT Wiki for help with your IT related questions.

Important Computer Operating Servers Type System

Cpipe Sun V480 Solaris

Nexus Sunfire V880 Solaris

netcache1 Sun Cobalt RaQ Linux

netcache2 Sun Cobalt RaQ Linux

netcache3 Sun Cobalt RaQ Linux

www Sun 120 Solaris

webct Sun 280R Solaris

storage01 network appliance

Information Technology Service Hours

User Services, Monday through Friday

HelpDesk & PC Lab 8:00AM to 10:30PM

Saturday 9:00AM to 8.30PM

Sunday 12:00PM to 8:30PM

Administrative Offices Monday through Friday 9:00AM to 5:00PM

Computer Service Center Monday through Friday 9:00 AM to 5:00 PM

Information Technology is closed on school holidays and some Saturdays and Sundays following “Friday closings” and before "Monday closings". See http://www.stevens.edu/it/about/sched.php for actual closings.

In case of inclement weather, please check the Stevens main web site for closings and delays. (http://www.stevens.edu)


Information Technology Administration

Eric Rosenberg Associate Vice President erosenbe

Eleanor Gerken Administrative Assistant egerken

Michael Scalero Administrative Assistant mscalero

Networking

Christopher Hose Dir. of Networking, Tel, & Video chose

Alban Dani Network Engineer adani

Sharon Kelley Network Technician skelley

System Administration

Byron Dolan Systems Manager bdolan

Kurt Hockenbury Network Security Specialist khockenb

Joe Formoso Senior Sys. Admin. jformoso

Sergio Palacios Windows Sys. Admin. spalacio

Mike Singer Systems Administrator msinger1

Computer Services

Frank Cataruozolo Director of Computer Services fcataruo

User Services

Young Kwon Accting/Tech Support Specialist ykwon

Luis Nunez Help Desk Manager lnunez

Frank Filogamo Help Desk Specialist ffilogam

Nejal Doshi Distance Ed. Support Coord. ndoshi

Computer Service Center

Lionel Cruz Service Supervisor lcruz

Patrizia Cioce PC Resource Assistant pcioce

Brad Patrick Hardware Technician bpatrick

Operations

Ronald DeMello Operations Supervisor rdemello

Ertugrul Abaci Operator (Weekends) eabaci

Scott Churchson Evening Operator schurchs

Consultants at the Help Desk (x5500)

Consultants are available to assist you with questions related to software on your notebook and most Stevens systems including Pipeline. Consultant coverage is scheduled so that you can reach a consultant most days (including weekends and evenings). The current consulting schedule is posted on the Information Technology department website at http://www.stevens.edu/it. Consultants will create a problem ticket for your question/request and help track your problem/resolution. Please ask for and refer to your ticket number when contacting the Help Desk, if you know it.

Computer Service Center (CSC) (x5108) http://www.stevens.edu/csc/

The CSC handles sales and service of Stevens issued notebooks and desktop PCs, including system upgrades, and the sales of peripherals, accessories, and printer supplies.

Before bringing your notebook for repair to the CSC remember to back up your hard drive. The CSC is not responsible for data losses or data that can not be retrieved due to hard drive failure.

The Computer Service Center handles service of notebooks and desktop PCs, including system upgrades, peripherals, accessories, and printer supplies.

The Computer Service Center is located in the basement of the Library.

Managing your Notebook

You are responsible for your notebook, its data, and its operation on the network. It is your responsibility to keep your notebook in an operational condition at all times. Replacement or repairs of most parts are covered under warranty. Limited accidental damage coverage is provided on Class of 2010 notebooks until May 31, 2010. The cost of repairs or damages not covered by warranty or the accidental damage coverage is your responsibility. Please take care of your notebook. Having it in working condition is an academic requirement.

You must back up your data (anything stored on the D: drive), be responsible as an “Administrator” of Windows XP on your notebook, install new software releases, and apply software patches/updates. While doing all of this, you must make sure your computer does not become infected with computer viruses and spyware, that your other applications do not conflict with what you are about to install, and that network configuration settings and Windows registry data are not corrupted or changed adversely. Be aware of and document all changes made to your notebook, especially if you are not the one making them.

Virus Protection

Make sure your virus protection software is running and Auto Updates and Scans are scheduled. For information on use of McAfee VirusScan at Stevens, contact the Help Desk at 201-216-5500 or visit the Information Technology website at http://www.stevens.edu/it/documentation/.

Connecting to the Campus Network

Wired Connections

Every dorm room is wired with one computer network outlet per resident. The network is referred to as “twisted pair Ethernet” and will automatically sense your network card’s capabilities and communicate at either 10Mbits/sec or 100Mbits/sec in a half or full duplex mode. It is very important to keep your card in the auto sense mode for it to operate correctly. All switches are set to automatically sense the mode of operation; the switch will become confused and may not operate correctly if both the switch and your PC are not set on automatic.

If your computer is not compliant with the 802.1x standard, you will have to register the physical address.

Laptops distributed to incoming students are both 802.1x compliant and have their Network Interface Cards (NIC) registered [see Network Interface Card registration information below] to work on the campus network. In order to connect, simply plug the network cable provided with the RJ-45 connectors in your room.

If you have brought a machine that is not 802.1x compliant, you will need to register its MAC physical address. Depending on the type of network equipment you are using to connect multiple machines, you may need to register it to connect to the network.

In addition, all machines must be DHCP enabled. A machine that is not DHCP enabled will not be allowed on the network and may result in your port becoming deactivated.

Finally, you may not connect more than five (5) machines concurrently to one network port in campus residences.

To connect your notebook to the campus network in the dorms, locate the twisted pair cable that came with your notebook. The twisted pair cable is about 15’ long with telephone “like” connectors called RJ-45s on the ends. Plug either end of the twisted pair cable into the PC. Plug the other end into the wall outlet. Do not use a telephone cord to replace this cable. A telephone cord will not work and may damage the electrical contacts of your network connector. Treat the network cable with care. Pinching it, bending it tightly, continually walking on it or rolling over it with a chair will permanently damage the cable.

If you do not get a network connection, first unplug and replug all network cables, both into the wall and into your PC. If you still do not get a network connection, try swapping ports with your roommate, if he or she has a working connection. If this does not help, call the Help Desk at x5500. You may be asked to bring your notebook and the RJ-45 cable to the Help Desk to try it in a working network outlet.

Wireless Connections

Wireless access is provided in the dorms, however, connectivity is not guaranteed due to interference from other appliances such as microwaves, cordless phones, Bluetooth and other devices using that unregulated frequency spectrum

The network names all begin with Stevens followed by the residence hall name, “Stevens Davis”, “Stevens Hayden”, and “Stevens Humphreys”. These wireless networks are 802.11b/g where the maximum speed is 54Mb/s (for users close to the access point). These wireless networks require the 802.1x authentication protocol in order to get connected. There is also a general wireless network named “Stevens”, but has the same features as the 802.11b/g networks found in the dorms. Similar network names “Stevens ___” have been added and will continue to be added and we will be able to connect.

Your Stevens notebook is preconfigured to use “Stevens” in most campus locations where network ports are not available. Instructions for configuring 802.1x are also available on the Information Technology website http://www.stevens.edu/it.

Network Interface Card (NIC) Address Registration The wired and wireless adapter (NIC) addresses for Stevens-provided notebooks are registered as they are distributed to new undergraduate students. Your notebook will obtain a network address in your dorm (or Greek house); will get a “roaming” network address in other campus wired locations; on wireless when near an access point, and will be able to use a wireless (e.g. “Stevens Hayden”, “Stevens Humphreys” or “Stevens Davis”) address in these residence halls. In addition, you may register one desktop computer’s NIC address to obtain an IP address in your dorm (or Greek house) room, and one additional wireless adapter.

Unauthorized use of the network and systems is not allowed; connection logging and network sniffing by authorized personnel may be in effect when system security or integrity is in question. By using the network, you expressly consent to such logging and monitoring and any resultant legal actions. Use of the network implies consent with all Stevens network policies.


Acceptable Use Policy

Stevens Institute of Technology expects that all persons who make any use of computing hardware, software, networking services, or any property related or ancillary to the use of these facilities will abide by the following policy statement:

Information Technology resources are provided in the hope that the community will use them in a spirit of mutual cooperation. Resources are limited and must be shared. Everyone will benefit if all computer users avoid any activities which cause problems for others who use the same systems. All hardware, software, and related services supplied by Stevens are for the sole purpose of supplementing and reinforcing the institution’s goals as set forth in the student and faculty handbooks and mission statement. We expect that no one will use hardware, software or services without authorization to do so. There has also been increasing concern over legal issues when using electronic communications. There are already laws that prohibit the following:

• Electronic libeling or defaming another person

• Sending/Posting messages that incites hate or discontent

• Transmitting repeated unwanted sexual advances

• Falsifying information via impersonation

• Unauthorized use, providing, or copying protected intellectual property.

While the Internet is considered a public electronic highway, the Stevens network is a private resource. As such, access and use of the network must be in accordance with Stevens' rules and policies as well as all legal regulations. Therefore, the following actions are strictly prohibited:

• Posting or transmission of confidential or classified information.

• Use of offensive or discriminatory language.

• Transmission of any graphic image, sound or text that is sexual in nature.

• Giving account passwords to individuals who are not the owners of such accounts.

• Obtain passwords to or use of accounts other than one's own.

• Use of resources for personal profit or gain.

• Harass, threaten, or otherwise invade the privacy of others.

• Initiate or forward e-mail chain letters.

• Cause breaches of computer, network or telecommunications security systems.

• Initiate activities which unduly consume computing or network resources.

In order to access the Stevens network, the following actions are required:

• The NIC (physical address) of network devices must be registered with the Computer Service Center or the user must authenticate with a valid username and password.

• Members of the campus community must maintain their computers with virus-protection software, spyware protection, and operating system updates.

To ensure the lawful and ethical use of electronic communications, rights to privacy when using electronic communications at Stevens Institute of Technology are limited. Stevens reserves the right to monitor electronic messages and information stored on computers owned by Stevens. For example; email, web pages, conference contents, voice mail, are subject to archiving, monitoring or review and/or disclosure by others than intended recipients. Failure to comply with the terms of this policy will be met with disciplinary and/or legal action.

Note: This policy is subject to change.

FAQ (General Frequently Asked Questions)

Who does what?

Q: What are the functions of Information Technology?

A: Information Technology has six main functions that students will generally see: User Services, Networking, Systems Administration, Operations, Computer Purchases, and Repairs.

Q: What is User Services?

A: User Services includes Help Desk staff who answers questions about your access to computing services, software, and network applications. Complaints or concerns about Information Technology services and misuse of computing resources by campus users may be reported to User Services in person or by sending e-mail to abuse@stevens.edu. User Services staff also plan and schedule short seminars, do "office visits" to faculty, staff and students in on-campus residence halls and Greek houses, and provide user documentation. Contact them at x5500 or come to the Help Desk at the Computer Center.

Q: What is the Networking group?

A: The Networking group is responsible for the campus network throughout the campus. When there is a problem with access to the Internet, firewall and routing equipment, the network, or dial-up modems, this group gets involved. When your computer, your roommate’s computer or all the computers in your dorm have a network problem, this group will also be involved. Please report network problems to the Help Desk at x5500.

Q: What is Operations?

A: Operations handles all of the day-to-day computer operating issues and maintains the PC Room (computer lab).

Q: What do the System Administrators/Programmers do?

A: They maintain the operating systems and server applications along with implementing and maintaining applications including the Stevens Pipeline portal.

What Systems are Available?

Q: What is Stevens Pipeline?

A: Known as “Pipeline”, it is a portal through which you can access Information Technology resources including email, Web for Students, course communication tools or access any course which your instructors support with a WebCT Virtual Classroom. The URL for Stevens Pipeline is http://www.stevens.edu/pipeline.

Q: What is Nexus?

A: Nexus is the Stevens email server. (nexus.stevens.edu should always be used as your incoming mail server for Stevens email.)

Q: What labs are available and what are their hours?

A: Main labs are;

The PC Room at the Computer Center; 

Monday through Friday 8:00AM to 10:30PM Saturday 9:00AM to 8.30PM Sunday 12:00PM to 8:30PM

The Schacht Lab (in the Kidde Building 3rd floor, Room 350)

The Humanities Resource Center, (2nd floor Morton Building, Room 210)

The Unix Lab, (1st floor of Burchard Building, Room 127).

Each department sets hours of operation for its own lab.

Q: Who may use the PC Room and other computing facilities?

A: Enrolled students with valid ID cards, all faculty, all staff, and authorized alumni will be admitted.

Q: What Information Technology services and facilities are available?

A: Stevens Pipeline provides convenient access to communication tools such as email, chat, calendars, groups, online voicemail retrieval, academic services, and information customized for each Stevens user. Information Technology has a variety of personal computers in the PC Room running Windows XP. Each system has its own associated variety of application software. Five systems have a color scanner attached. Nine systems are equipped with CD-RW drives. UniPrint laser and color printers are available as well. Headphones may be borrowed by presenting a valid Stevens ID. Network ports and wireless access are also available in the PC lab at the Computer Center.

Q: What facilities are available on campus and the network?

A: The campus-wide network provides access to a variety of resources both on and off campus. On campus, these include systems and services within the Library and academic departments, the Humanities Resource Center (HRC), etc. Most academic departments have facilities intended to meet specific needs. Since the dorms are firewall protected from portions of the campus and the Internet, you must have proxies configured to use a web browser. Stevens’ main web homepage is http://www.stevens.edu/. It has links to other web sites at Stevens. The Computer Science (CS) department manages systems dedicated to computer science students and faculty who require use for research and course work.

How do I …?

Q: How do I avoid getting viruses?

A: In general if you don’t want a virus, don’t accept files you are not expecting or run *.exe files sent to you in e-mail unless you trust and verify the source. The best practice is to know where your software and e-mail comes from so your chances of getting a virus are reduced.

DO NOT CLICK on any pop up ads indicating you have a virus or believe any emails allegedly coming from Stevens asking you to click on a link (or *.exe or *.zip file) in order to maintain your account status.

Information Technology will not send attached files via e-mail. If required, users would be redirected to either the Pipeline portal or the IT webpage.

Do not click on links provided in email.

You must schedule daily updates of anti-virus and Counter Spy along with frequent virus scans to minimize the risk of virus infection.

Q: How do I configure my PC to use the proxy servers?

A: Refer to http://www.stevens.edu/configure_proxies for the latest information.

Q: How do I create my own personal web page?

A: Instructions for setting up a personal web page on the “filer” called “storage01” are available at http://www.stevens.edu/personal_webspace


Q: How much disk space do I have for my email and files?

A: 100MB for email, 250MB for files and web pages.

Q: How large a file can I attach to an email message?

A: The maximum size of an attached file is 20 MB. The total size of a single email message and all attached files is 25 MB. You can attach up to 10 files per email message, as long as the entire message size does not exceed the 25 MB maximum.

Q: How do I get more (disk) space?

A: Request space from the Consultants at the Help Desk, either in person, via email (helpdesk@stevens.edu) or phone (x5500)

Q: How can I access Stevens facilities from off-campus locations?

A: Internet and dial-up access are supported. If you have access to the Internet, you can log into Pipeline using a web browser. If you are off campus, configure your email client for authenticated SMTP through nexus.stevens.edu (or you may use your ISP’s outgoing SMTP mail server), if you use Outlook or any client other than Pipeline. The incoming SMTP mail server is nexus.stevens.edu. Access to the library database is best accomplished through Pipeline or VPN depending on your off campus configuration.

Q: What is the modem phone number?

A: (201) 356-0032.

Q: How do I dial-up with PPP?

A: The Information Technology department’s dial-up lines support PPP connections. Your notebook is preconfigured for dial-up access to Stevens. To reconfigure your dial-up settings, or to configure another system, use PPP with PAP authentication. See http://www.stevens.edu/PPPconnect for more info or request assistance from the Help Desk.

Q: How do I read my E-mail?

A: There are many ways to read your e-mail. The easiest is to use e-mail within Pipeline. It is secure and convenient when traveling or using a PC that does not belong to you, and/or going home. You can also use Outlook on your notebook to read your mail and keep a copy of your messages on the e-mail server using “IMAP”. Outlook comes pre-installed on your notebook to work on or off campus with authenticated SMTP. Q: How do I print using UniPrint from my Windows XP Notebook?

A: See the document http://www.stevens.edu/uniprint.

Q: How do I get a TCP/IP address?

A: If your NIC address is registered or you are authenticated to use 802.1x, a TCP/IP address is automatically generated. Make sure your computer is set up for DHCP. Freshmen and transfer student notebooks are pre-configured for DHCP and registered.

Q: How can I get a Stevens Pipeline account?

A: Access is available to all Stevens students and employees. Computer accounts are generated for all students based on registration data. Undergraduates should have received their Pipeline login information during the summer. Students are responsible for reading this booklet, as well as the policies documented on the web at http://www.stevens.edu/networkpolicy. Also be sure to read the policy regarding network use later in this document. Use of the network and its connected systems implies agreement with these policies. For accounts on other department systems, all Information Technology policies apply, in addition to any policies of the department that owns the system.

Q: Can I use my handheld device with Pipeline?

A: You may sync a Palm, Pocket PC or Windows CE handheld with your personal calendar in Pipeline. Instructions are on the Information Technology website. For PocketPC or Windows CE handhelds: http//www.stevens.edu/WindowsCE For Palm handhelds: http://www.stevens.edu/PalmOS

Q: What other accounts do I have?

A: You also have a Windows Campus Domain account for accessing your personal file space on the filer, a Web for Students account for direct access to Web for Students, and a Duck-Bills account at www.stevens.edu/olco.

Q: How long will my Pipeline account exist?

A: Undergraduate accounts will continue to exist as long as the individual student is enrolled at Stevens. You must continue to be enrolled for continuous access to your Pipeline account. Regardless of expiration date, graduating student accounts are closed and deleted from the system shortly after graduation. Stevens alumni may establish email forwarding for life through the Alumni Online Community at http://www.stevens.edu/alumni.

Q: If I do not enroll for summer classes, will my Pipeline account remain open during the summer?

A: Yes.

Q: If I am a Co-Op Student on assignment will my Pipeline account remain open?

A: Yes.

Q: Who can use my Pipeline account?

A: You, and only you, are permitted to use your Pipeline account. Please consider your Pipeline account the same as you would a driver’s license (others know how to drive, but they cannot use your license). All usage should be your own, and all usage and fees associated with use of your account will be your responsibility. Your password should always be kept secret. It should be protected because it gives access to your student grades, financial data, and your online courses. If you think someone knows your Pipeline password, log into Pipeline. Click on “Options” and change your Pipeline password to a new one ASAP or contact the Help Desk.

Q: How can I get help?

A: For notebook hardware problems call the Computer Service Center at x5108 or via e-mail at csc@stevens.edu. All network or software problems and questions should be referred to the Help Desk, x5500. Consultants can be contacted via e-mail at helpdesk@stevens.edu. Be prepared to describe your problem fully and to provide the exact error message, if any.


Q: What other sources of technical help are available?

A: Information Technology provides documentation and software guides on its website.{http://www.stevens.edu/it} You can also find technical information using web-based search engines, such as http://www.google.com. Ask the Help Desk staff about these options if you have questions.

Q: How can I obtain software?

A: Software can generally be categorized as public domain, free software, and shareware or commercially licensed. Public domain software and free software can be shared at no cost to the recipients. Shareware software requires a modest fee for using it; see the licensing information for the software. Commercially licensed software may not be copied or used, except as stipulated in the license agreement for the particular software. Copying of licensed software, also known as “pirating”, is prohibited both by the terms of the agreements and federal copyright law. Connect to storage01 to view the available software.

Q: How can I print?

A: Incoming undergraduate students are provided with a personal color printers to use in their rooms or at home. Students may also print using UniPrint and their Stevens Campus Card at the Pharos Release Station computers located at the Computer Center and in the Library. Documentation is available at http://www.stevens.edu/uniprint.

Q: How can I learn more?

A: Information Technology provides seminars on a variety of topics throughout the academic year. These seminars are open to members of the campus community. They are an opportunity for individuals to learn about new facilities and services. For more information, visit http://www.stevens.edu/it/. What do I do when?

Q: I lost my Pipeline or Windows domain password. How can I get a new one?

A: You may call or e-mail the Help Desk and upon verification of your identity, a new password will be given to you. You may also go to the Help Desk at the Information Technology department to request a new password.

Q: My anti-virus software said I have a virus. What do I do now?

A McAfee VirusScan 8.0 + AntiSpyware were preinstalled and configured on your Class 2010 notebook. Using your copy of McAfee VirusScan software, you can try to repair or clean a virus-infected file and see what happens. Whatever you do, realize that getting a virus means you may lose data. You must maintain your licensed copy of McAfee VirusScan by scheduling automatic updates. Contact the Consultants at the Help Desk for assistance, x5500.

Q: I disconnected my machine from the network and took it home. Now when I try to send email using Outlook via my ISP, it does not work. What is wrong?

A: Your e-mail client (Outlook) is probably trying to use the mail server (nexus) on campus without using authenticated SMTP. Instructions for configuring Outlook for authenticated SMTP are on the Information Technology website {http://www.stevens.edu/it}. Also, not all ISPs allow authenticated SMTP. Note: The simplest way to read and send your e-mail is to use Stevens Pipeline from home. No special configuration settings are necessary.

Q: I received many identical e-mail messages from the same user today. What do I do?

A: This is considered a "mail bombing” . Report this to Information Technology at abuse@stevens.edu so the sender can be dealt with. Please do not retaliate by "bombing" the sender. Some things you can’t do

Q: May I play computer games in the labs?

A: No, absolutely not. The labs are limited resources. Please refrain from playing games and consuming a resource that others need for academic or research purposes.

Q: May I pass on chain mail to my friends?

A: Chain mail (mail which claims you must send it to others for good luck, money, etc.) is not permitted on Stevens’ network. If someone sends “chain mail” to you, please report this to Information Technology at abuse@stevens.edu. Whatever you do, don’t pass it along to others.

Q: May I send mail to everyone on the system?

A: Do not attempt to send e-mail to everyone on Pipeline or to everyone in your class year. This is known as a ”mass mailing” and it is not allowed. Instead you may request an announcement in Pipeline. To request an announcement, submit it to the Student Life Office (student_life@stevens.edu). Another way to communicate with several people at the same time is with a Pipeline group. Use the “Groups” link in Pipeline to request a new Pipeline “group”. A third way to communicate with many people is to use the local (stevens.*) newsgroups to post messages for everyone. The Stevens newsgroup server is “news.stevens.edu”.

Q: May I register a domain name that refers to a Stevens system?

A: Do not register domains and have them point at Stevens servers. All Stevens-owned domains must be obtained with Information Technology assistance. Contact the Information Technology Help Desk staff for more details.

Q: May I use or set up my own computer for peer to peer file sharing of music, videos or other popular files?

A: Sharing or downloading copyrighted materials without the permission of the copyright owner violates Copyright Law. This could result in legal or disciplinary action, disconnection of your computer from the Stevens network, or both.

Q: May I make a web page on a Stevens server for my private enterprise or for business use?

A: Do not use Stevens servers to develop commercial web content or for any commercial use. Personal web pages are permitted as long as they abide by the Acceptable Use Policy.

Q: May I permanently relocate my own notebook or desktop PC to any location on campus?

A: Student machines are to remain in the dorms, except when being used in areas with public notebook ports such as classrooms, Sam’s Place, the Cyber Café, Hayden Lounge, and near wireless access points for example. They are not to be relocated in any academic or administration building!

What is…?

Q: What is my email address?

A: Your username associated with your Stevens Pipeline account is also your name for e-mail purposes. When using the Internet, it is username@stevens.edu, where username means your personal username. By default, e-mail sent to this address goes to nexus and is available via Stevens Pipeline.

Q: What is a firewall?

A: A firewall is a network device that restricts network access to or from machines on the network, depending on its configuration. Stevens uses a Pix firewall to protect dorm and dial-up users from the Internet.

Q: What are proxy servers? Do I need to configure my notebook to use a proxy server?

A: Proxy mechanisms allow computers to access the Internet efficiently and conveniently. Use of a file called proxies.pac is required for students connecting from off-campus to access the library databases. See http://www.steven.edu/configure_proxies for further details.

Q: What are Internet Explorer (IE) and Firefox?

A: Internet Explorer and Firefox are popular web browsers. Internet Explorer (IE) has been designated as the default browser. The Firefox browser is provided, not only as an alternative to those who want a browser with tabbed features, but also as a backup/test for potential problems.

Q: What is the campus network?

A: The campus network is an Ethernet Local Area Network (LAN) administered in all aspects by Information Technology. Originally installed in 1985, it has evolved over the years. In 1998, a major upgrade to 100Mb (mega bit) was performed. In 1999, feeds to academic buildings were upgraded to giga bit feeds while the Castle Point Terrace, Greek houses, and Castle Point Apartments were added. In 2004, dorms and Greek house switches were upgraded to the latest Cisco workgroup switch models. Underground fiber optic cables carry the data from each building to the Computer Center where it is switched and/or routed to its destination. All buildings on the contiguous property of Stevens are networked. Wireless access was added in 2001, was expanded with Vivato panels in Spring 2004, and access points in freshman dorms were added for fall 2004. Dialup service was upgraded with a Cisco AS5300 to 48 lines at 56K as of Fall 2001. A Cisco Pix 535R firewall and dual Cisco VPN 3030 concentrators were installed in January 2002. The network core was upgraded in summer 2002 to a Cisco 6509 with SUP2/msfc2 and distributed architecture. Network traffic is shaped using a Packeteer Packet Shaper 4500 to provide a more consistent experience using the network.

Q: For what purposes may I use campus computing and networking resources?

A: Stevens facilities are to be used for academic, administrative and research purposes only. Many of our software license agreements limit or prohibit use for other purposes. Any commercial use (including contents of your web page) could violate these agreements. Stevens servers and your use of them is for your course work. They are not for developing web sites for other commercial entities. You may use your own software to create a web site for some company or organization, but you may not serve that information from a Stevens server or the Stevens network.

Q: What network is in the dorms?

A: The dorm network is wired with twisted pair cable, rated at Category 6. The switches support link speeds of 10Mb and 100Mb in either full or half duplex. Freshman dorms also have wireless service using 802.1x. Things you might not be aware of

Q: I can say and do whatever I want on the Internet. Right?

A: You are using Stevens’ Internet connection, with a Stevens address. The way you conduct yourself reflects on Stevens and ultimately on you. Your usage of the campus systems and network must be consistent with all campus policies as well as legal regulations. Basically, never say anything on the internet you wouldn’t say in person, and even if you would, think twice!

Q: How private is my E-mail?

A: E-mail is not and should not be considered secure or private. Like a post card sent via the U.S. Postal Service, every hand (in this case, system on the network) the mail passes through could potentially read it. In instances where there is an error with the destination address, a copy of the e-mail message will typically be sent to the system administrator to ensure there isn’t a larger problem. Stevens Institute of Technology reserves the right to inspect your e-mail.

Q: Well, how secure is my account then?

A: Keep in mind that no account is ever 100% secure. That said, there are precautions you can take to keep your account as secure as possible. Be mindful of where you put files on your personal space. All files in the public_html directory will be visible to everyone by default. Also when changing permissions on your “filer” area be aware that you can inadvertently give access to anyone. If you are unsure of what to do, contact the Help Desk at x5500. Make sure you use a complex password and don’t tell anyone the password.

FAQ (Notebook Program and Printers) The following section covers questions and policy answers to Frequently Asked Questions about Stevens Institute of Technology’s Mobile Computing (Notebook Computer) Program, which includes details on personal printers for this year’s incoming undergraduates.

Receipt of Notebooks

Q: Who receives the notebook package?

A: All entering undergraduate students receive the notebook package.

Q: How will I keep my notebook safe?

A: Each notebook comes with a locking device. Students are strongly encouraged to keep the units locked, even in the residence halls. Residence hall desks have a board to hook the locks over.

Q: Will I get a new notebook from Stevens prior to graduation?

A: No. The notebook uses the latest technology on the market and has the required undergraduate software for your class year already pre-loaded.

Purchase of Additional Items for Notebooks

Q: Are there notebook carrying cases such as laptop backpacks, shoulder bags or sleeves available for purchase?

A: Yes, at the Computer Service Center and in the Campus Bookstore.

Q: Can I purchase other peripherals, such as additional memory, monitors, keyboards etc.?

A: Yes, through the Computer Service Center (CSC), http://www.stevens.edu/csc. If you purchase through the CSC and you require warranty repair, it will be provided on campus by the Computer Service Center.

Repair of Notebooks and Printers

Q: If my notebook doesn’t work, will there be loaners?

A: Loaners are available, and are distributed according to need. Generally, if your machine needs to go out for repair, you should get a loaner. The loan will be for the duration of the notebook repair. The student will be expected to pick up their repaired unit and return the loaner within one business day of being sent notice of repair completion. Loaners will be as close to the student’s own model as possible. If the loaner is not returned within one business day, a penalty of $25.00/day will be assessed and charged to the student’s bill, since there are a limited number available.

Q: If my notebook doesn’t work, will the Computer Service Center repair it for me?

A: Yes. The Computer Service Center is an authorized repair center. When possible, they will repair notebooks on site. Some notebooks may require shipping to the vendor.

Q: If my Stevens notebook doesn’t work, will there be a charge for repair?

A: Only in the case of neglect, abuse or non-warranty expendable parts as determined by the Computer Service Center based on HP’s warranty policies. Limited accidental damage coverage is provided on Class of 2009 notebooks until July 31, 2009. Contact the Computer Service Center or view their website for warranty and repair questions.

Q: Will the Computer Service Center repair the printer?

A: The Phone number for printer repair is 1-800-HP-INVENT (47-468368).

Insurance

Q: Is there theft insurance covering my Stevens notebook?

A: Stevens has insured your student notebook, with the exception of the deductible, (currently $500). There are limitations. Please make sure you notebook is secured and locked at all times.

Q: If I purchase a set of peripherals, whose insurance covers those?

A: Coverage is not provided by Stevens Institute of Technology. Your parents’ or your personal homeowners’ or renters’ insurance may cover peripherals. You should check with your insurance broker or company.

Loss/Theft of Notebooks

Q: If my computer is lost or stolen, what happens?

A: You must immediately report the loss or theft to the Stevens police, if the loss or theft is on the Stevens Campus. If not you should file the report with the Local Police. There is currently a $500 deductible for which you will be responsible. The Computer Service Center will instruct you on the payment procedures. Upon arranging for the deductible payment and providing the Computer Service Center with the Police Report from the jurisdiction where the loss occurs, the student will receive a replacement notebook unit that is the same, or as close to the same as possible as the missing unit. Replacement terms and conditions are subject to change and based on the insurance requirements in effect at the time of the loss or theft.

Q: If my computer is lost or stolen more than once, what happens?

A: If the computer is lost or stolen more than once, the student is required to purchase a unit that is the same as the missing unit at a price to be determined by the Computer Service Center. Insurance only applies to the first unit distributed to a student.

Co-op Program, Leave of Absence or Vacation

Q: If I go off-campus on a Co-op program, Leave of Absence or Vacation, can I take the notebook?

A: If you are on a co-op assignment or vacation, you have the same access to the notebook as if you were on campus. A Leave of Absence must be approved by the Dean of Undergraduate Academics. A future charge, based on the buyout price, will be placed on your Stevens account. When you return to campus, the charge will be reversed. If you do not continue studies after the leave of absence, the notebook must be returned in good working order to the Computer Service Center or the buyout charge must be paid.

Graduation from Stevens

Q: When I graduate from Stevens with my undergraduate degree, is the computer mine?

A: Yes, even if graduation occurs sooner than the payment of eight semesters of full-time tuition.

Disposition of Notebooks in event of Separation from Stevens.

Q: If I separate from Stevens prior to graduation, what happens to the notebook?

A: You have the option of returning the notebook and accessories or purchasing them. If you decide not to purchase the notebook and peripherals devices, they must be returned during the semester of separation from Stevens in good condition as defined by the Computer Service Center. Should you decide to purchase the equipment, the price will be based on the number of semesters you attended Stevens Institute of Technology as a full-time undergraduate. Before the end of the first year, the purchase price is $2,000. After one-full year, the purchase price is $1,500; after the second full year, it is $1,000, $500 after the third full year. There is no charge after the fourth full year. This charge does not reflect the market value of the notebook and peripheral devices but rather a portion of the cost of this program. The Dean of Undergraduate Academics will make the determination of the number of years as a full-time student at the time of separation from Stevens Institute of Technology.

Tuition Discount

Q: My family just bought me a notebook. Do I get a tuition discount?

A: No. You should use the notebook provided to you by Stevens for your Stevens work.

Using Additional Computers

Q: If I have a computer that I want to use in addition to my notebook, will I be able to?

A: Each student is allowed to register an additional computer for use on the campus network. For more than one computer to be on the wired network in your dorm room at the same time, you must set up a NAT device or connect to your own network router. Instructions on setting up multiple computers in residence hall rooms are available from the Information Technology Website. Commuting Students

Q: Will I be able to dial in to the Stevens network from outside?

A: Yes; however, if you are not in the local dialing area, using an Internet Service Provider (ISP) may be more cost effective.

Q: Are there special places on campus that commuting students can use to connect?

A: Yes, Jacobus Lounge, the PC Room (near User Service Help Desk at the Computer Center), Stevens’ Cyber Café (aka Café on Hudson), Sam’s Place (in the Library), and Hayden Lounge are wired. There are additional wired and wireless sites. For current wireless locations, check the Information Technology web site, http://www.stevens.edu/Wirelessmap

Tips for Class 2010 Notebook Users:

Network Connection Guide

TIPS: Keep your notebook battery charged and in your notebook. It takes about two hours to charge your notebook’s battery. DO NOT COMPLETELY DISCHARGE YOUR BATTERY.

Not all locations on campus have A/C power outlets by network ports. These places are meant for short connections to check e-mail or to browse the web, not for long-term computing sessions.

Whenever you move your notebook from one location to another on campus, here are things to remember. Your new notebook is configured to connect using wireless access or to obtain wired access to the campus network. To switch between wired and wireless, press the key on above the F4 key on your keyboard. Wireless configuration information is available at http://www.stevens.edu/8021x

You should carry your network cable with your notebook. Most areas on campus have limited wireless capability but there are many factors that can affect wireless connectivity. For faster connections, better security, and greater certainty of being able to connect, we recommend using your notebook on the wired network when ports are available.

The following instructions apply to wired access:

When you get to the new location (notebook classroom, lab with notebook ports, Cyber Café, etc.), do the following:

1. Connect the cable to the network port. 2. Power your notebook on. 3. When your notebook boots up, you should be able to get network connection. 4. If you do not get a network connection (cannot run network applications), your computer may need to automatically obtain a new IP address. To do this, go to the Start Menu | Programs | Accessories | Command Prompt.


At the command prompt (C:\>), type in “ipconfig /release”. Type in “ipconfig /renew”. Close the Command Prompt window.

If your notebook still cannot connect, try a different port. Not all ports may be active in every location. If you cannot get a network connection, contact the Help Desk at x5500 for troubleshooting. When using a wired port, disable wireless.


MORE TIPS: Remember to be security conscious about your notebook. Do not leave it unattended. Lock it down. Carry the security cable, locking device, and key to lock your notebook down where possible. Always lock your notebook down in your residence hall room.

Your network card addresses are on file in the SIS (Student Information System) database. If you replace a network card for any reason (e.g., repair, theft, or system upgrade) you will need to contact the Help Desk to have your new network card registered.

Definitions of Terms

Network Registered - A computer that has its network address recorded in the Student Information System by the Computer Service Center.

Network Eligible - A computer system is said to be network eligible if it has been network registered and if the owner is currently enrolled at Stevens. Furthermore, the student must have a Stevens Pipeline username.

Network Authorized - A computer system is said to be network authorized while the owner is in a particular networked dorm room with a network eligible system for a particular semester and the user has not been disciplined in a way that precludes their network access privileges. Systems will automatically obtain their network authorization from the campus’s DHCP servers in the form of a TCP/IP address. Authorization is required for the system to operate any network protocol, not just TCP/IP. Systems are re-authorized whenever the dorm room, network interface, semester or username changes. Addresses may not remain the same between re-authorizations; the DHCP mechanism will reflect the proper address.


Policy

Users not running DHCP (for any reason), will not be allowed on the network. It is their responsibility to understand these conditions and be aware of any network authorization changes. Users must maintain their systems accordingly. Users whose authorized addresses have changed, but whose systems are not running DHCP, and therefore have not reflected the change will be considered to be in violation of the network policy.

Systems with unregistered network cards or not running 802.1x authentication may not be connected to the campus network.

Systems which the owners believe to be authorized and therefore connected to the network, but have not received authorization from the DHCP mechanism must report this to the Information Technology as soon as possible.

Students’ PCs, which for any reason, move permanently to an academic building must be re-registered through the request of an IP address by the academic department before they are connected to the campus network in that academic building.

Systems connected to the campus network that have a modem of any kind must not act as a gateway through which modem connected users or systems of any kind and any protocol can access the campus network or the Internet.

Systems may have and use more than one TCP/IP network address on the campus network. Stevens-provided notebooks have registered wired and wireless network cards and are authorized for two network addresses. In addition, you may register one additional desktop network card for use in your dorm room and one additional wireless MAC address.

General Trouble Shooting Guidelines

Before calling the Help Desk…

1. Always check the online Help within Windows and/or your applications.

2. Please provide the exact error messages, the exact thing that does or does not work.

3. If you think a service is down, it is better to characterize what services or systems can and cannot be reached.


The information in this booklet is subject to change without notice. Copyright 2005 Stevens Institute of Technology, All rights reserved No duplication in whole or part without the permission of Stevens Institute of Technology. Send comments to helpdesk@stevens.edu

Personal tools