Security / Viruses

“The Dark Side of Computing”



Computers can be intimidating, and the more we hear about the “Dark Side” of computing the scarier it gets.There are several types of intrusions into our computers.  Below is a list of a few, including definitions so that they are more easily understood, and hopefully less daunting.

  1. Virus - A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Computer viruses spread from machine to machine on disks or, more commonly, over the Internet.
  2. Malware - "Malware" is short for malicious software and used as a single term to refer to virus, spyware, worm etc. Malware is designed to cause damage to a standalone computer or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan.
  3. Trojan - A program that appears legitimate but performs some illicit activity when ran. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy the user's stored software and data. A Trojan is similar to a virus, except that it does not replicate itself. Often sneaking in attached to a free game or other supposedly worthwhile utility, the Trojan remains in the computer doing damage or allowing someone from a remote location to take control.
  4. Worm - In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks. 
  5. Hacking - to circumvent security and break into (a network, computer, files, etc.), usually with malicious intent: Criminals hacked the bank's servers yesterday.  To modify (a computer program or electronic device) or write (a program) in a skillful or clever way: Developers have hacked the app. 
  6. Browser Hijacking - A browser hijacker (sometimes called hijack ware) is a type of malware program that alters your computer's browser settings so that you are redirected to Web sites that you had no intention of visiting.
  7. Backups – Simply, this is a copy of files.  This offers the best protection against any type of intrusion or malware into your computer.  Your files are the most important piece of that computer.  Everything else is easily replaceable. 

You can back up your files in several ways:

  • External hard drive - some come with backup software, but simply copying from one place to another works also.
  • Cloud
  • Flash drive
  • CD or DVD

Security for Computers

University-Owned computers

Our computers, whether individually assigned or for public use, all have McAfee Anti-virus installed, both PC and Mac.  We also try to take advantage of some free apps like Malwarebytes, Super Anti-Spyware, or Windows-based apps like Windows Defender or Microsoft Essentials.


Personal computers: 

For personal computers where university licensing prevents sharing of certain applications, we find other programs to recommend:

For Mac: McAfee, Norton, AVG, Avast Antivirus
For PC: McAfee, Norton, AVG, Microsoft   Essentials

 

Many internet providers now offer free Anti-virus as part of their suite as well.  We are happy to help with install of any of this above-mentioned software.  These are all antivirus software that install on your computer, and continually scan it (usually automatically), both as you download (called On-Access Scanner) and on scheduled or manual scans.

NOTE*** anytime you download web-based software, please be aware that “riders” can be attached.  On most legitimate software, you can watch the screens during your installation for extras, like Toolbars or Search Engine homepages.  These usually have nothing to do with the software you are installing, and you can safely UN-check these boxes so that the extra “junk” is not installed.

 

Think you have a virus?? Here are some links you can download and install for yourself!!


These are both free programs, downloadable from the internet, that are really good at catching malware on your computer.  We here in the IT department use these the most.  On both of these pages, simply click on the link below, click the big green Download button, and follow the prompts as you install.  Pay close attention to the note below for Malwarebytes.

Malwarebytes-Anti-Malware-Free

NOTE*** - When prompted to install trial edition, please UNcheck that box, as the program will constantly prompt you for payment afterwards.  The FREE Edition will be free, not ask for payment after 30 days.

 

SuperAntiSpyware-Free-Edition

Email Problems

Spam - Spam is the electronic equivalent of junk mail.  The term refers to unsolicited, bulk – and often unwanted – email.

Here are ways to reduce spam:

  • Enable filters on your email programs: Most ISPs (Internet Service Providers) and email providers offer spam filters. However, depending on the level you set, you may wind up blocking emails you want. It’s a good idea to occasionally check your junk folder to ensure the filters are working properly.
  • Report spam: Most email clients offer ways to mark an email as spam or report instances of spam.  Reporting spam will also help to prevent the messages from being directly delivered to your inbox.
  • Own your online presence: Consider hiding your email address from online profiles and social networking sites or only allowing certain people to view your personal information.
  • - See more at: stay-safe-online/keep-a-clean-machine/spam-and-phishing

 

Phishing - Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises (e.g., your university, your Internet service provider, your bank). These messages usually direct you to a spoofed website or otherwise get you to divulge private information (e.g., passphrase, credit card, or other account updates). The perpetrators then use this private information to commit identity theft.

  • One type of phishing attempt is an email message stating that you are receiving it due to fraudulent activity on your account, and asking you to "click here" to verify your information.

 

Phishing scams:  Are crude social engineering tools designed to induce panic in the reader. These scams attempt to trick recipients into responding or clicking immediately, by claiming they will lose something (e.g., email, bank account). Such a claim is always indicative of a phishing scam, as responsible companies and organizations will never take these types of actions via email.

 

Note*** This University will never ask for any information regarding your name, username, password or SSN in an email!!!  If you do receive an email asking for this information please contact the Help Desk immediately!


Wireless Network Access

Students, Faculty, and Staff

On your wireless devices connect to the Eduroam network using the instructions below

Configure your wireless device once - and you will be connected to Wi-Fi here at Sewanee and around the world!

Follow these instructions on each of your wireless devices.

  1. Access the Eduroam Configuration Assistant Tool on each of your wireless devices.
  2. Click the Download Your Eduroam Installer box.
  3. Search for "Sewanee - The University of the South" in the list of home organizations.
  4. Click the Sewanee box.
  5. The tool will automatically detect your device and display the correct installer.
  6. Click the installer button.
  7. If the installer does not lauch automatically go to your downloads folder and run the installer manually.
  8. Follow the installer directions which will vary depending on your wireless device.
  9. When prompted enter your username which will be your entire email address including @sewanee.edu
  10. When prompted enter your Sewanee/Banner password.

 

Eduroam is a global Wi-Fi service that enables all of our students, faculty, and staff to obtain secure and fast internet connectivity both here on campus and when visiting other participating institutions. The username and password you use to access the Eduroam Wi-Fi network here at Sewanee will automatically connect you at other participating institutions by simply opening your wireless device. There are more than 600 Eduroam campuses in the U.S. alone and access points in 100 other countries across the globe. This benefits faculty traveling for scholarly and collaborative work, students studying abroad and visiting other campuses, and anyone traveling to another participating institution. 

 

If you need assistance contact the Help Desk or visit them in the ATC Lab on the lower level of duPont Library (staffed hours vary).

Gaming Consoles, Smart TV's, Etc.

  1. Go to the Sewanee-Register URL
  2. Enter your username and password
  3. Click Log In
  4. Click on Create Device
  5. Enter a name of your choice for the device
  6. Enter the MAC address obtained from the device
  7. Click on Register Device
  8. You should receive a message that the device was successfully created.
  9. Click on the menu to sign out.

If you need assistance contact the Help Desk or visit them in the ATC Lab on the lower level of duPont Library (staffed hours vary).

Guests

Most Wi-Fi enabled devices (phone, laptop, tablet) take just a few steps to connect

  1. From the device's wireless settings make sure Wi-Fi is turned on.
  2. Select Sewanee-Guest from the list of available networks.
  3. On the Guest Registration Info page, enter your full name and email address.
  4. Review the University Policy on Appropriate Use of Information Technology.
  5. Click Accept.

If you need assistance contact the Help Desk or visit them in the ATC Lab on the lower level of duPont Library (staffed hours vary).



New Computer Recommendations

 

The three most important features to look for in a new computer are (1) RAM, (2) CPU speed, and (3) disk storage speeds. Please consult the table below for our recommended optimal specifications for a new computer purchase (we encourage you to meet or exceed these specifications):

Platform

Windows Apple

Processor Speed

3 ghz or Faster Intel® i5 or i7 Processor

Operating System

Windows 10

El Capitan 10.11

RAM

8 GB (with ability to upgrade if possible)

Hard Disk (storage)

250 GB or larger recommended (SSD is fastest)

Internet & Network

Wireless highly recommended
along with Gigabit Ethernet

Productivity Software

Microsoft Office 2016 or Live

Virus & Malware Protection

Microsoft Security Essentials

Sophos Anti-Virus for Mac Home Edition

last updated on 08.11.2016

HP Online Store
Apple Online Store

Suggestions:

We highly recommend purchasing an extended warranty with your computer. Depending on the system, this may be a 3-year or 4-year warranty.

All computers should have some type of removable media drive for data backups and storage. We recommend an external USB hard drive.

Wireless computing is currently supported in many University buildings. We currently have wireless access that supports 802.11g/n and newer equipment.

Most Macintosh and Windows based PCs also come with Gigabit Ethernet which is compatible with our network. You must supply your own Ethernet cable if you wish to plug in. (It is easier to bring one than purchase it locally. We recommend a 25' cable.)

With any new computer purchase we strongly suggest that you also purchase a UPS (uninterruptible power supply). Power sags, spikes, and brownouts are sometimes responsible for loss of equipment and data. The power supply to residential halls is often less stable than you would find in your home or in an office.

You do not need to bring your own printer, but you may do so if you like. Every computer lab on campus has at least one printer in it and so do many of the classrooms and other areas. Most of them are accessible 24/7 and you can print directly to many of these from your own computer or from any of the lab computers.