Beruflich Dokumente
Kultur Dokumente
13 – Antivirus 38
14 – Disabling filesharing 42
15 – Firewall 49
16 – Spyware 53
17 – Windows updates 60
1
About this guide
Welcome to QMU.
This guide has been created to help distance and part-time learners get
started with IT and technology @ QMU.
You will find information on how to access and use key QMU systems
remotely, as well as how to get support when you require it.
Avril A Brown
IS Systems & Training Manager
August 2009
2
1 Getting started – all about your QMU IT accounts
Password:
Email address:
Your student username and password (usually called your user account)
enables you to access essential QMU resources like your email inbox, your
home directory area, WebCT, ePortfolio and the student portal (called QM:u).
Your username and password are unique and should not be passed to anyone
else.
NB: You are responsible for all the actions and activities carried out with your
username, even if they were done by someone else.
3
You must be a matriculated QMU student in order to get a student username
and password. You can matriculate online, and you should have received
information from the Registry department with details of how to do this. Once
you have matriculated, your user account will be activated and you will
receive a temporary password.
When you first login using the temporary password, you will be prompted to
change it.
You will be asked to change your password again every 60 days. To change
your password at this time, just follow the on-screen instructions.
• Press the <CTRL>, <ALT> and <DELETE> keys together and choose
the Change Password option.
4
2 IT requirements for distance and part-time learning
• The LRC Service Desk will provide telephone and email-based IT support
for distance learning working at home during LRC opening hours.
o LRC opening hours are:
• Monday – Friday 0900 – 2100
• Saturday & Sunday 0900 - 1700
o LRC staff cannot undertake repairs on your own IT equipment.
• If you are working at home, you need to be aware of the health and
safety considerations that might affect you. You can get more
information about this in the next section.
If you are based in a QMU partner institution, you should have access to
IT equipment suitable to support your studies. See the sections on QMU
webmail, WebCT and the QMU remote desktop for details on how to access
your QMU accounts.
5
3 Basic health & safety advice for computer users
If you regularly use a computer for your studies, there are several things you
can do to avoid hurting your neck, back, hands, wrists and eyes:
• Put the equipment in a comfortable place for you to use it. Rearrange the
desk if necessary.
• Make sure you can see the screen clearly without having to squint or
strain your eyes. Wear your glasses if you have them and if you are
having problems, get your eyes tested.
• If you are based in the UK, your status as student means that you should
be able to get a free eye test.
• Sit up straight with your feet flat on the floor. Do not hunch up or cross
your legs.
• Do not use the computer for very long periods without taking a break.
Aim to do an hour at a time before you have up to a five-minute break.
• For more information on how to set up and use a computer safely, contact
QMU’s Health & Safety Officer.
6
4 QMU IT regulations & acceptable usage policy
As a distance or part time learner, you may never use QMU computers on
campus. However, any time you access QMU systems remotely, you are still
subject to QMU IT regulations and policies.
It is important that you read the following information carefully and make sure
that you understand the contents. If you are unsure about any part of the
Computing Regulations & Acceptable Usage Policy, then you should contact
the LRC Service Desk. Staff will be pleased to explain the policy to you.
QMU IT systems are provided for your benefit, and we want you to make use
of them to support your studies.
However, all IT systems and services belong to QMU, and there are rules and
regulations about how you can use them.
Your responsibilities
o You are required to treat all QMU IT systems and services with respect.
o You are responsible for everything that is done via your QMU IT user
accounts. As such you must bear the following in mind:
o Do not give out your user account details and password to anyone
else, nor allow anyone else to use your account.
o Do not use QMU computers or systems to offend, harass or
inconvenience others.
o Do not use QMU computers or systems to download or reproduce
materials that may offend or upset others.
o Do not use the facilities for recreational purposes such as games and
chat sites.
o Respect others’ privacy. Avoid sending unsolicited email (inc chain
letters, adverts etc).
7
QMU is flexible
o QMU does not block or filter the words or terms that you can search on,
nor does it prevent you from accessing any sites.
o That does not mean, however, that you can use QMU systems to access
or download pornographic or other offensive or objectionable material.
Unacceptable activities
The law
o Continued misuse will lead to your accounts being disabled. This means
that you will be unable to access any of QMU’s IT and communications
services.
o In cases of serious misuse, your account will be disabled and all access to
QMU systems denied immediately. This will impact on your studies.
o No matter how careful you are using computers, the unexpected does
sometimes happen.
o If the unexpected does happen to you, do not worry and do not panic.
Contact staff at the LRC Service Desk and they will advise you.
o If you are worried about any aspect of IT at QMU, again please contact
staff at the LRC Service Desk. They will be happy to guide and advise
you.
9
5 Accessing and using Webmail
INTRODUCTION
Outlook Web Access allows you to send and receive emails via a web browser
such as Internet Explorer from any computer in the world with an internet
connection.
LOG IN
¾ You need to make sure that you have a working internet connection.
It is really important that you type in: httpS. This ensures that your
connection to the web-mail pages is encrypted. This will protect the
information that your computer exchanges with the QMU email servers.
Once you have typed in the web address, you will get the following security
alert:
Click on Yes.
10
If you use a dial-up modem connection and you feel that it is slow, you may
wish to select Basic Client. You will have reduced functionality but the speed
will be faster.
11
VIEW AN EMAIL
Once logged in the screen will show the email in a screen similar to that of
the desktop version of Outlook 2003.
You can choose to either view the email in the preview pane on the right hand
side. Alternatively you can double click the email, and it will open in a new
window. It will display as above.
12
CREATE A NEW EMAIL
Click on the New icon (you must have clicked on the inbox first).
Want to use a
spellchecker?
Just click on
this icon
13
Type in the name of the recipient in the To box.
You can type in the first few characters of the persons name as below then
use the check name facility to verify the name:
14
You can also click on the To button to add the addresses.
15
Highlight the name you wish to add then click the To button, add any other
people then click Close.
Should you wish to change the priority or track the email click Options and
choose from the options shown.
Click Close to close the box and return to the new email screen.
16
Write the email then click Send.
17
REPLY TO OR FORWARD AN EMAIL
Just as there are 2 ways to view an email (in the preview pane or in its own
window). There are also 2 ways to respond to an email.
Preview Pane
To respond to an email whilst viewing in the preview pane
y Ensure the email you wish to respond to is highlighted
y Click the appropriate button as below
Reply – Reply to All – Forward
18
Email in its Own Window
To respond to an email whilst viewing in the preview pane
• Double click the email so it is opened in its own window.
• Click the appropriate button as below
19
CALENDAR FUNCTIONS
To access your calendar click on the Calendar icon in the Folder List
To create a Calendar item you can either double click on a blank space within
the middle window or click New.
A blank new calendar item window appears from where you can type in the
Subject and Location as well as adjust the start and end times.
20
You can also invite colleagues to attend a meeting and check their calendar to
determine if each person is busy.
The Availability window opens where you can add a users name in and the
persons availability will be displayed.
21
After a few seconds
the users name will
appear displaying the
person’s availability.
The availability is
displayed on this line.
Blue=busy.
PUBLIC FOLDERS
Outlook Web Access also gives you full access to your Public folders.
The window above appears from where you can access all the Public Folders
you have access to.
22
HOW TO CHANGE YOUR PASSWORD REMOTELY
You can also use the Outlook Web Access service to change your QMU
password remotely.
LOG OFF
It is very important that you log off correctly, especially if you’re using a public
computer on holiday or in an internet café.
The reason we ask you to ensure that you log off correctly is that when you
open an attachment it is saved to a temporary folder on the local computer.
When you log off using the correct procedure the temporary folder is emptied.
If you don’t log off correctly there is the possibility that someone could find
this temporary folder and gain access to any attachments viewed.
When you
have finished
please
ensure you
click Log Off
23
6 About WebCT – QMU’s virtual learning environment
Once logged into WebCT, select Your Learning Resource Centre from the list
of modules available to you.
Click on the Essential Directions link to access the LRC induction material.
24
7 Software for use at home
¾ SPSS
¾ Reference Manager
¾ PinPoint
Reference Manager
Contact the LRC Service Desk to request the Reference Manager Personal
Purchase form. Follow the instructions on the form to obtain a copy of
Reference Manager directly from the supplier at a reduced price.
PinPoint
Rarely used now, however disk sets obtainable at a cost of £1 per set.
Contact the LRC Service Desk for more information.
Alternatively, you can access all QMU applications from home by using the
Citrix Access Gateway.
25
8 Remote access with the Citrix Access Gateway
The service replicates the thin-client desktop that is available on any campus
based terminal. It is aimed at users who have a broadband connection to the
internet and who need access to QMU applications and files.
Getting started
One of the benefits of this method of remote access is the very limited
configuration that is required to access the system. However, there are a few
steps that must be followed to initiate a stable connection.
• After a short pause where the system checks the configuration of the
computer on which you are working, the login screen will be
displayed. It is important that you read any messages displayed in the
Message Center area of the screen. Click on the link contained in this
area to download and install the client software for your operating
system.
26
Once the file has
been downloaded,
click on Run to install
the software. Click
Run again when
prompted.
27
Click Yes on the licence
agreement window.
When installation is
complete, you will be
presented by a confirmation
window. Click OK to
continue.
Close and reopen your browser. This completes the setup phase of the
process and will not need to be completed again on this computer.
28
Making a connection
Once the configuration stage is complete all future connections can be
initiated from this point in the documentation.
Go to:
https://access.qmu.ac.uk/.
29
The QM Desktop application will
launch and the Citrix connection
splash screen will display the
connection progress. You will be
logged into the thin-client
environment automatically using
the username and password
entered earlier in the process.
Finishing up
When you have completed using the service, log out of the remote desktop by
clicking on Start, Log Off.
Click Log Off in the browser window. This stage is particularly important if you
share a computer as others who come along later may be able to run a
connection using your credentials.
Printing
Please note – if you use the Citrix Remote Access gateway, then it’s
unfortunately not possible to print documents to any ‘local’ printer you might
have. All printing is configured to be sent to the corporate MFDs on campus.
The only workaround for this is to email your files to yourself. Log out of the
Citrix Remote Access Gateway. Use Webmail to access your email. Save the
files to your local PC. Then print locally. This workaround assumes that you
have appropriate software loaded on your PC.
Sound
The Citrix Remote Access Gateway has been configured so that sound is not
broadcast over the connection. If you need to work from home with any kind
of audio files, then please contact the LRC Service Desk for more information.
30
9 Changing your QMU password remotely
INTRODUCTION
Passwords for QMU staff and students expire every 60 days. You will be
notified up to 14 days in advance of your password expiring. If you fail to
change your password before the expiry date, your account will be locked and
you will be unable to login.
If this happens, you will need to contact QMU and request that your password
be reset.
For details of how to contact QMU for assistance please see section 10 Getting
Help with QMU IT and technology on page 36.
PASSWORD REQUIREMENTS
• Your password must be at least 7 characters long.
o This is to make it much more difficult for the password to be
‘cracked’ or guessed.
• Your password cannot contain your full name or part of your name.
• QMU systems will prompt you to change your password every 60 days.
31
CHANGING YOUR PASSWORD REMOTELY
There are 3 main ways to change your QMU password remotely.
Once you have logged in to the Remote Desktop service, press the [CTRL]
[ALT] and [DELETE] keys together. This will bring up the Windows Security
dialog box.
Enter your new password again in the Confirm new password box.
Click Ok.
32
Alternative method via the Citrix Remote Desktop service
Depending on your computer setup the [CTRL] [ALT] and [DELETE] option
may not work correctly within the Citrix Remote Desktop environment, and
may fail to bring up the Windows Security dialog box.
Instead, you can launch this dialog box when you are logged into the Citrix
environment by following these steps:
Click on Start.
Outlook Web Access allows you to send and receive emails via a web browser
such as Internet Explorer from any computer in the world with an Internet
connection.
Once you have logged into the QMU Webmail service, you
will see the following on the left hand side of the screen:
Click on Options.
33
Scroll down until you reach the Password area.
34
10 Frequently asked questions about QMU IT and technology
You may also be able to borrow relevant learning packs from the LRC.
Contact the LRC Service Desk to find out more.
35
11 Getting help with QMU IT and technology
By telephone
Dial +44 (0)131 474 0000 and ask for LRC or Learning Resource Centre.
Phones are staffed during opening hours.
By email
In person
Face to face services are provided by staff at the LRC Service desk.
If LRC staff are unable to resolve an issue, then it will be logged and
investigated further.
36
12 APPENDIX - Computer security for ‘home’ users
The tips contained in this section are intended to help students using their
own computers for QMU-related work protect themselves from viruses,
spyware and other threats.
• Anti-virus
• Disabling filesharing
• Firewall
• Spyware
• Windows updates
37
13 Computer security - Antivirus
Virus is a ‘catch-all’ term for any kind of software program, the sole intention
of which is to damage or disrupt computer systems. Virus infections can
affect computer systems in a number of ways, such as causing the computer
to reboot constantly, destroying or deleting data and removing access to key
applications.
38
Avoid data loss from virus infections
Information Services recommends that you regularly backup all your
important documents and files. You can use any kind of removable storage
media, such as CDs, DVDs or USB ‘flash’ disks. Information Services do not
recommend the use of floppy disks, as these are prone to data loss and
corruption. It is also highly recommended that staff important University work
to their networked home directory, which is stored and backed up on the QMU
network.
39
Different kinds of virus
There are a number of different kinds of virus found in the ‘wild’. Each
exhibits a number of different characteristics and infection vectors. Those
most commonly found are:
1. Trojan Horse
2. Worm
3. Bomb
4. Port Scanner
40
Which are the most dangerous viruses?
How dangerous a virus is depends on two main factors - the damage it causes
and its ability to spread. Therefore, a virus that deletes information and
spreads rapidly over the internet is more dangerous that a virus that can
delete information but does not have the ability to spread.
Further information
The following internet links will take you to various sites that have more
information on viruses and virus outbreaks:
1. http://uk.mcafee.com/virusInfo/default.asp?cid=10474
2. http://www.sophos.com/virusinfo/
3. http://www.sophos.com/support/
4. http://securityresponse.symantec.com/avcenter/vinfodb.html
5. http://www.f-secure.com/virus-info/
6. http://www.trendmicro.com/vinfo/
7. http://www3.ca.com/securityadvisor/virusinfo/default.aspx
8. http://secunia.com/virus_information/
9. http://www.stiller.com/
41
14 Computer security – Disabling file sharing
The Microsoft Windows family of operating systems offers users the ability to
share files and folders over the network. Whilst this functionality has its uses,
users should consider it with caution, as unsecured file sharing may leave the
computer vulnerable to external threats via the internet.
There are a variety of ‘worms’ and hacker tools circulating, which are used to
scan the internet for computers running Windows operating systems. These
tools will then attempt to break into, or to infect these computers using the
Windows file sharing protocols.
If your computer runs a Windows operating system, and you don’t need to
share your files and folders, then Information Services recommends that you
completely disable file sharing on your computer.
If you must share files and folders, then you should increase your security.
42
How to disable file and print sharing – Windows Vista
43
Expand the File Sharing option, select Turn off file sharing, and click
Apply.
44
How to disable file and print sharing – Windows XP
45
Right-click on your Local Area Network connection and select Properties.
The Local Area Connection Properties window displays all of the protocols
and services currently installed for your network adapter.
46
How to disable file and print sharing – Windows 95 / 98
Select Network.
47
Choose File and printer sharing for Microsoft Networks.
Click Remove.
48
15 Computer security – Firewall
A firewall will help protect your computer, but it is a limited resource. When a
firewall is properly configured, it will block illicit and unauthorised access to
your computer. However, your computer security package should include not
only a firewall, but also antivirus and anti-spyware software as well.
Failure to protect your computer properly means that your files and personal
and confidential information may be accessible via the internet. This may
make you vulnerable to identity theft.
49
How does a firewall work?
A firewall can be modified to offer user specific protection. The higher the
level of security the less will get through. When modifying a firewall its best to
initially block everything and then select what to accept and what block. (this
is often tedious but will offer a more personalised security blanket).
Packet filtering
Information transmitted by computers is split up into small chunks, called
packets. A firewall inspects all the information packets received from the
internet, and compares them to the configured filters before forwarding them
to the appropriate systems. Filters can be defined in many ways, including the
blocking of certain words, websites, types of file etc. Any information packs
which do not get through the firewall are discarded.
Stateful inspections
This is similar to packet filtering, but it is a more thorough process. This time
the firewall checks the contents of the packet, and additionally tries to identify
the source of the packet.
Outbound filtering
Many firewalls only operate in one direction. That is, they only filter
information which is received, and not that which is sent. Outbound filtering
is used to prevent malicious activity from within. For example, it is possible
for a computer to be ‘hijacked’ by an external source, and used to send junk
mail or to attack other systems.
Installing a firewall
Windows XP, for example, is supplied with built-in firewall software. However,
this is rather basic and cannot be modified by users. Service Pack 2, which is
the current update for Windows XP contains Microsoft’s new Security Centre,
which has a more fully featured firewall. The additional functionality includes
the ability to modify the firewall to tailor the protection levels.
Some antivirus software (eg Norton, Zone Alarm etc) also contain built-in
firewalls.
50
Hardware firewalls for home users are supplied as routers. Routers are
devices which connect your computer to the internet.
Firewall configuration
Ports - Any server machine which makes its services available to the internet
uses numbered ports. There is one port for each service which is available
on the server. For example, if a server machine is running a web (or HTTP
server) and an FTP server, then the web server would be available on port 80
and the FTP server on port 21. You can choose to block any port number.
Word filters - Word filters can consist of single words or phrases. The firewall
will sniff, or search through each packet of information for an exact match of
the text listed in the filter. You can include as many words, phrases and
variations of them as you need.
Home uses are likely to be most concerned with domain name, port and word
filters.
51
Additional steps to protect your computer
• Do not set your internet security and privacy levels to low. Lowered
securitylevels may be convenient, but they can make your computer
vulnerable to attack.
• Maintain current up-to-date antivirus and anti-spyware software.
• Install pop-up blocker software.
• Keep your operating system up-to-date, and regularly check for ‘patches’,
fixes and updates.
Further information
www.firewallguide.com
www.howstuffworks.com/firewall.htm
www.microsoft.com/athome/security/protect/default.mspx
52
16 Computer security – Spyware
What is spyware?
Pop-up banners such as the one illustrated above may conceal spyware.
53
There are other kinds of “Ware” software lurking on the internet:
Spyware usually gets onto computers through the actions of users. Clicking a
button on a pop-up window, installing a software package or agreeing to add
functionality to internet browser software, are known invitations to spyware.
These applications encourage users to install them by using simply trickery
including fake system alert messages to buttons labelled “Cancel”, which
actually do the opposite.
54
Beware of Kazaa, as it
has been known to
include spyware in its
download package,
despite claims to the
contrary.
Drive-by download
This is when a website or pop-up window automatically tries to download and
install spyware on your computer. The only warning you might receive is a
standard browser message naming the software and asking if it is okay to
install.
55
Browser add-ons
These are software which claim to add enhancements to your internet
browser. The most common kinds are toolbars, animated pals or additional
search boxes. Sometimes these do actually do what they claim, but most do
also include some element of spyware as part of the downloand. Other times,
the add-on is simply very thinly disguised spyware.
Browser hijackers
These are particularly nasty add-ons, which embed themselves deeply into
your computer’s operating system, and can be very difficult to get rid of.
Masquerading as anti-spyware
This is not uncommon. This cruel type of software attempts to convince you
that it is a tool to detect and remove spyware.
56
Snitches and sneaks
There are computer programs that really do spy on you. These applications
are designed to hide silently on your computer and intercept such personal
information as your usernames and passwords. These programs include
Bugdrop, Back Orifice and VX2. These applications are more like viruses or
hacker tools, than spyware.
At the least, most spyware will run as a background application as soon as the
computer is started up. This means that it can hog memory and processor
power. It might also generate endless pop-up adverts, rendering your
internet browser so slow that it becomes unusable. It might also reset your
browser home page.
Other spyware might redirect your internet searches, and control any search
results. This renders your search engine practically useless. Spyware can
also modify the program files which your computer uses to connect the
internet, causing connectivity problems that can be hard to diagnose.
Some spyware types have the ability to modify your internet connection
settings, redirecting your modem dialup to expensive telephone numbers.
Other types modify your firewall settings to permit otherwise unauthorised
traffic through to your computer. Still more spyware has been written in such
a way that it ‘knows’ when you try to remove them from the Windows registry
and can intercept your attempts to do so.
57
Unfortunately, spyware is not actually illegal in many parts of the world.
Where there is existing legislation, it can be difficult to enforce, and it can also
be hard to find sufficient evidence to link the creators of spyware to their
products.
• Ad-aware http://www.lavasoftusa.com/software/adaware/
• Spybot http://www.safer-networking.org/en/spybotsd/index.html
• Microsoft http://www.microsoft.com/athome/security/spyware/software/default.mspx
All of these offer free personal editions for home users. They work quite
similarly to antivirus software, in that they provide on-going ‘active’ protection
as well as detection. In addition, they can detect internet ‘cookies’ and advise
you which sites these refer back to.
NB: You may require specific removal instructions for certain types of
spyware. Additional information is available from:
There are a number of different ways to block spyware from your computer:
58
Use a pop-up blocker
Many of the current internet browsers, including Internet Explorer 6.0 and
Mozilla Firefox 1.0, have tools which stop websites from serving you pop-up
windows. You can configure this function either to be ‘always on’ or
alternatively to alert you each time a website is trying to deliver a pop-up
window. In addition, the function can tell you where the pop-up originates
from, and it lets you selectively allow pop-up windows from trusted sources.
Disable Active-X
Most internet browsers have security settings in their preferences which allow
you to specify what action websites are permitted to perform on your
computer. As many spyware applications make use of Windows Active-X
coding, it can be helpful to disable Active-X on your browser. It is worth
noting, however, that this will also disallow any legitimate use of Active-X, and
thus interfere with the functionality of some websites.
59
17 Computer security – Windows updates
Microsoft Windows updates are crucial for any Microsoft operating system.
They take the form of an online resource, provided by Microsoft and which is
accessible to any user for download.
The downloads update your Windows operating system, resolving any known
issues and problems, and thus helping it to run smoothly and more efficiently.
Microsoft publish numerous updates for hardware and software, such as:
• Critical Updates
• Recommended Downloads
• Window Tools
• Internet and Multimedia Updates
• Additional Window Downloads
• Multi-Language Features
You can also check for Windows updates via the Internet Explorer browser:
60
Notes
61