Student Computing Support Center
(walk in support for students)

Room 009 Stalker Hall

M-Th 7:30am to 7:00pm
Friday 7:30am to 4:30pm
Saturday Closed
Sunday 3:00pm to 9:00pm


Help Desk Call Center
237-2910
888-818-5465

M-Th 7:30am to 7:00pm
Friday 7:30am to 4:30pm
Saturday Closed
Sunday 3:00pm to 9:00pm


Instructional Tools Support Center
237-7000

Fall and Spring
M-Th 7:30 A.M. to 9:00 P.M.
Friday 7:30 A.M. to 6:00 P.M.
Saturday & Sunday 12:00 P.M. to 9:00 P.M.



Telecommunications
For business: 812-237-4183
To report a problem: 812-237-8000
Voice Mail Help: 237-3038

Business Hours: 8am-4:30pm M-F
Operator Services:
(while school is in session)
8am-9pm Mon-Fri
10am-9pm Sat and Sunday
(when school is not in session)
8am-4:30pm Mon-Fri

Classroom and Event Technology Support
812-237-2690
M-F 8:00am to 4:30pm
Classroom Support Hotline:
(Black Phone connected to podium)
M-Th 7:30am to 9:00pm
Friday 7:30am to 4:30pm
Saturday and Sunday: Closed


Security

AntiVirus Distribution

For Windows
The Office of Information Technology has virus scanning solutions available for ISU students, faculty and staff to download. Symantec Endpoint Protection, SEP, is Symantec AntiVirus® combined with anti-spyware, firewall, intrusion prevention system, application control, device control, and proactive threat scanning into a single client, all managed by a single piece of management software. The combination allows instant upgrades without deploying specific software for each security technology. It protects from both known threats and from threats that have not been seen before. Symantec Endpoint Protection protects against malware such as viruses, worms, Trojan horses, spyware, and adware.

Symantec Endpoint Protection is available for Windows and Macintosh and can be obtained from download.indstate.edu. Your Sycamore login and password are required in order to download.

Installation instructions for Symantec Endpoint Protection for Windows can be found at http://www.indstate.edu/oit/students/symantec-install.php.

Installation instructions for Symantec Endpoint Protection for Mac can be found at http://www.indstate.edu/oit/students/symantec-installmac.php.

For ISU students, faculty, and staff home use we recommend that they download Microsoft Security Essentials from:

http://windows.microsoft.com/en-us/windows/security-essentials-download



Fighting Malware

Protecting your computer from Spyware, Adware and Viruses
Malware (short for malicious software) is a term coined to describe programs which are ultimately detrimental to the computing experience. Viruses are the most visible and publicized malware but there are other types, specifically adware and spyware, which are less obviously a threat but perhaps even more of a nuisance. This page will describe the various types of malware and what steps should be taken to remove them or, if possible, prevent their installation.

Viruses and Worms
A virus is a computer program designed to install itself on a computer without the user's knowledge and then perform some task. Most commonly viruses will try to infect other machines, open up the infected machine to outside access or cause damage to files. A worm typically is installed when a user launches an infected e-mail attachment. The worm then uses the mail system (and address books) of the infected computer to send infected e-mails to other users.

Using a virus-scan product and keeping current with Windows Updates are the best methods available to prevent infections. Users should also be wary of unexpected e-mail attachments, even if they come from someone they know.

Adware and Spyware
Adware is software which is free to the user or available at a reduced cost because it displays advertisements either in the software window itself or in separate pop-up windows. By itself adware is merely irritating as the user must contend with unwanted pop-up windows while running the ad-supported software.

Spyware is any software which utilizes the bandwidth of the machine on which it is installed to communicate with the parent company. Statistics about one's browsing habits, installed software and other information are collected by these companies and then either sold as market research or used by the company itself to target ads at the user.

Together (often a program works as both adware and spyware) they represent a serious invasion of the user's privacy and could use up considerable bandwidth and processor resources communicating with the developer and downloading ad content.

It is often difficult to identify this software without a thorough reading of the end user license agreement. Companies which distribute this software use many tricks to entice users to install their programs. Two common channels by which malware is installed are pop-ups which look like a security warning and opt-out installers. Users should familiarize themselves with these methods and use discretion when agreeing to anything on the web.

Spoofed Security Warnings - Some malware installation requests are designed to look like a typical security request from the browser. The tendency is for people to accept anything that pops up which they feel is restricting them from viewing a particular page. When a user clicks yes, thinking they are accepting a security certificate, they actually are giving permission to install whatever software the distributor wishes to push to their computer. To prevent these installations one only has to read carefully any requests that pop-up while browsing and make sure they are indeed required. If you are unsure, answer no and then if you have problems with that particular web page, go back and answer yes when the request appears.

Opt-out Installers – Some web-sites which require a user registration include opt-out installers for various pieces of adware and spyware. An opt-out installer is one such that if you do not explicitly decline whatever software they are offering, it will be installed by default once you complete your registration for the site. The tools to decline the installation are often deliberately inconspicuous and typically the installation happens without the user's knowledge. Opt-out installers are also seen quite often in the installation packages for "free" software such as screen-savers, download managers, games, shopping assistants and web accelerators.

Prevention/Removal
Users are not often aware that their machine is host to malware until it begins to affect performance. Excessive pop-ups or slow network access may be the only indication that the computer has been "infected".

As the old saying goes, an ounce of prevention is worth a pound of cure. Users should take the following steps to be sure their machines are as secure as possible:

  • Keep Windows up to date - Use the Windows Update feature of your operating system to be sure you have all of the most recent security and functionality updates.
  • Keep anti-virus software current - Users should be running an anti-virus package such which continually scans the computer for viruses and other threats. It is vital that the virus information be kept up to date; otherwise its effectiveness will be greatly diminished.
  • Install and configure a firewall - Enable Internet Connection Firewall under Windows to monitor and block internet traffic.

For the removal of spyware, OIT recommends and uses a program called SpyBot Search and Destroy. Freely available from http://security.kolla.de, users may install and run this software which scans their machine for known spyware, adware and tracking information. It works similarly to a virus scanner and will recognize and eliminate the vast majority of spyware programs.

Other Resources
New malware threats appear almost daily so it is important that users take the time to become familiar with the information and tools which are available to combat the problem. Below is a list of links to many resources related to the problem of malware.

www.malwarebytes.org
At this site, you can obtain a free version of a malware removal tool.

www.nai.com
The official website for McAfee VirusScan carries alerts about current threats, a virus information library and many other tools and articles which will assist one in fighting viruses.

<< Back



Printer Alerts

moderate alertcampus
Paper Size Mistmatch Errors While Printing Multiple Copies of Documents

high alertCromwell Hall lobby
Printer is Out of Order

Show All >>

Security News and Issues

OIT Security Home Page

Events & Training

Computer-based self-paced training for students, faculty and staff >>

Faculty workshop schedules >>


Main Contact

Gillum Hall 103
Indiana State University
Terre Haute, IN 47809

Help Desk:
(812) 237-2910
(888) 818-5465

Offices:
(812) 237-8439

E-mail:
it-help@indstate.edu