Your search for "policy/dmca.html" returned 183 results
  1. DMCA Takedown Procedures at UH
    A Digital Millennium Copyright Act (DMCA) infringement notice (also known as a DMCA takedown notice) is sent to the University when unauthorized copyrighted materials are found by copyright owners and/or their agents.  The takedown notice includ
  2. Policies
    Use and Management of Information Technology Resource Policy (E2.210): Please Read and understand the responsibility of owning and using an account here at UH. Student Conduct Code ref: http://www.hawaii.edu/help/accounts/poli
  3. Information Security Policy (E2.214)
    Prepared by Office of Vice President for Information Technology & CIO and the Office of Vice President for Legal Affairs and University General Counsel Please click the following URL for the most recent version of the University of Hawai‘i
  4. IT Security @ UH
    General Information Getting your PC unblocked on the UH Network Password Guidelines Securely Deleting Electronic Information How to Securely Delete Electr
  5. Securing your Computer & Protecting your Information
    [Print Friendly Version]   Use of all University of Hawaii information Technology Resources are governed by UH Executive Policy: E2.210 — Use and Management of Information Technology Resources.  Continued use of your UH Use
  6. How is email handled for a faculty or staff member that is unexpectedly out for various reasons, e.g. medical leave?
    If a UH faculty or staff member unexpectedly goes out on leave and it is necessary to access their account for UH work the University has the right to authorize an email agent to access the person's account under emergency situations. With due author
  7. What are the privacy policies for my UH Email Account?
    Under normal circumstances, email is considered private and is not subject to audit or review except as stated in UH Executive Policy E2.210: "Use and Management of Information Technology Resources" Section V: "Ownership and Disclosure
  8. Sample Copyright Notification Letter
    (Click here for PDF version of this form.) @font-face { font-family: "Arial"; }@font-face { font-family: "Times"; }@font-face { font-family: "ArialMT"; }p.MsoNormal, li.MsoNormal, div.MsoNormal { margin: 0in 0in 0.0001pt; font-size: 12
  9. Copyright in the Digital Age
    Intellectual property is the lifeblood of a university, and all members of the university community should respect the work of others inside and outside the academy. University of Hawaii Executive Policy E2.210: "Use and Management of Informatio
  10. Basic Online Services for Students, Faculty, and Staff
    Your UH Username is valid for the duration of your affiliation with the University of Hawaii. Students must be currently enrolled in good standing; faculty and staff must be current employees of UH. For eligibility requirements and procedures for obt
  11. UH ITS Interactive Video (ITV) Classrooms
    The ITS Interactive Video (ITV) Classrooms are located in the Kuykendall Hall and Webster Hall at UH Mānoa. These classrooms are used to support distance learning courses. If time permits, classrooms are available to support standards-based video c
  12. IT Center Video Conference Rooms
    The IT Center Video Conference rooms are located on the UH Manoa campus, and managed by Information Technology Services.  Priority use is for videoconferencing activities.  Upon availability, these rooms may be scheduled for "room use
  13. UH POLICY: Official Campus Domain Names
    The chancellors of the 10 University of Hawaii campuses decided in 2002 and subsequently reaffirmed standardization of campus domain names as follows:manoa.hawaii.eduhilo.hawaii.eduwestoahu.hawaii.eduhawaii.hawaii.eduhonolulu.hawaii.edukapiola
  14. Can you recommend a good computer shop?
    Unfortunately, Information Technology Services can not endorse any computer shop.  
  15. DMCA Sample Takedown Notice
    From: RIAAInfringementNotification <antipiracy2@riaa.com>Date: January 18, 2007 4:02:40 PM HSTTo: David Lassner <dmca-agent@hawaii.edu>Subject: Case ID 226401097 - RIAA Infringement NotificationVIA EMAILJanuary 18, 2007David LassnerUniver
  16. Basic Guidelines for University of Hawaii Webpages
    Though ITS does not wish to stifle creativity for any departmental webpage, there needs to be a concerted effort to adhere to at least some minimal set of standards. Here are some guidelines (in no particular order) which you may consider: Dep
  17. How to Turn on Google Consumer Apps for Your Google@UH Account
    Open your web browser to http://www.hawaii.edu/google/extra Figure 1. Google@UH Consumer Apps Click the Login button. Login with your UH Username and password, for which you want to turn on Consumer Apps.
  18. VirusScan Enterprise detects legitimate Outlook attachments with multiple extensions as infected
    For McAfee VirusScan Enterprise 8.5 or 8.7 Symptoms: User receives email with subject line beginning with "McAfee Email Alert" and message similar to following: Attachment file : Spreadsheet 1.25.07.xls\1.OLE Scanner Detected: Su
  19. How is email handled for deceased employees and UH affiliates?
    In the unfortunate event that an employee or UH affiliated person should pass away, the following procedure will be used by ITS: As of the date of death, the account enters the grace period. Dean/Director notifies ITS of the event and ITS
  20. List Owner's Responsibilities
    A list owner is entrusted with its members’ personal information (email address and name), and this carries certain responsibilities with regards to ensuring privacy and security. You must determine what level of security is most appropriate fo
  21. Google@UH Consumer Apps FAQ
    Under an agreement with Google, the University of Hawaii (UH) offers two types of Google applications through Google@UH: Core applications (Core Apps) and Consumer applications (Consumer Apps). To use the Consumer Apps with your Google@UH account, yo
  22. How is a UH Username handled for deceased employees and UH affiliates?
    In the unfortunate event that an employee or UH affiliated person should pass away, the following procedure will be used by ITS: As of the date of death, the account enters the grace period. Dean/Director notifies the ITS Help Desk of the
  23. UH staff: How do I get my UH Username?
    You may request your UH Username online from the UH Account Management page by clicking on the "Get a UH Username!" link. Your account should be ready within six (6) minutes. Most services, such as the SECE, will be available to you once yo
  24. Faculty: How do I get my UH Username?
    You may request your UH Username online from the UH Username Management page by clicking on the "Get a UH Username!" link. Your UH Username should be ready within six minutes. Most services, such as MyUH, will be available to you once your
  25. Student: How do I get my UH Username?
    You may request your UH Username online from the UH Username Management page by clicking on the "Get a UH Username!" link. Your UH Username should be ready within six minutes. Most services, such as MyUH, will be available to you once your
  26. Getting setup for Multi-Factor Authentication (MFA)
    Step 1: Decide which method of authentication you wish to use Step 2: Decide which two devices you want to use ITS strongly recommends that you setup at least two devices for MFA. This is so that if one of your devices becomes unavailabl
  27. Faculty: I forgot my password. What should I do?
    Please remember that your password is case-sensitive (i.e. this password Pa$sT3!E is not the same as pa$st3!e). Online If you do not remember your password or it is not working, you may be able to set a new password over the Web. When your UH Usern
  28. Virtual Server: How to Request and Install an SSL Certificate
    Summary If you are a valid UH ITS VMware Hosted Customer, you are entitled to a 1-year SSL Certificate at no cost. (Limited to (1) SSL Certificate per department/project per year.) Procedure Information for purchasing an InCommon SSL certificate
  29. ITS Data Backup Policy
      The following information is provided to help users of Information Technology Services (ITS) systems understand the nature of the ITS backup procedures and the availability of information beyond the date on which it is deleted by the users.
  30. ITS Template Guide
    1. Save the template that you want to use from the index page onto your computer For Macs: go to “File” and then to “Download Linked File.” For Windows: right click and go to “Save Target As.” Imm
  31. Where can I find documentation for SAS software?
    Documentation for SAS software is available in many formats including an HTML-based online library, a PDF version and SAS books. For the latest information, go to http://support.sas.com/documentation/onlinedoc/index.html.
  32. Virtual Server: How to Install and Configure Backups (Bacula) on a RHEL Server
    SUMMARY The Bacula Enterprise Edition (BEE) backup service is the optional daily backup service listed in the ITS VMware Hosted Solutions page. Backups are file level only. If you are a virtual server customer and have purchased the daily
  33. Purchasing Personal Computers for UH Departments
    This article Askus 1264 is intended for UH departmental computer purchases. UH departments may use either the NASPO ValuePoint (formerly NASPO-WSCA) Contract Price List 15-05 or follow UH Small Purchasing procedures (APM A8.250). The State Procureme
  34. UH affiliate: How do I get my UH Username?
    Before you can get your UH Username from the online request system, ITS requires a memo from your sponsoring UH department or office on departmental letterhead identifying you and officially requesting that you have access to UH services and resource
  35. Protecting Sensitive Information at UH
    The University of Hawaii (UH) is committed to protecting the personal, confidential information that it is entrusted with.  Beginning in 2004, UH has implemented the UH Number as a unique, personal identifier as a replacement for Social Security
  36. ITS Templates
    For your convenience, these templates have been designed as a simple means by which you may create webpages that are consistent in look and feel with either a UH Manoa or a UH systemwide identity, while at the same time providing several format choic
  37. Personal Home Page Policies
    The server that the UH Personal Home Pages resides on is administered by Information Technology Services (ITS) and is intended to allow faculty, staff, and students space to create personal home pages. We wish to retain the ability to publish pages f
  38. I am a student on another island (still in Hawai'i) and I need password reset. Where can I go?
    There is a list of campus representatives for different campuses available on the web at http://myuhinfo.hawaii.edu/page/campusreps.html.
  39. UH ITS SurveyShare
    UH SurveyShare √ SurveyShare Features √ Request a SurveyShare Account √ Institutional Review Board √ Broadcasting √ Frequently Asked Questions (FAQ's) √ Resources √ Contact Information The Universit
  40. Safari Information (Mac)
    General Information "The best browser for your Mac is the one that comes with your Mac. Safari is faster and more energy efficient than other browsers, so sites are more responsive and your notebook battery lasts longer between charges. Built-i
  41. Sensitive Information Paper Document Disposal
    Sensitive information is defined in UH Policy E2.214 and includes information like social security number, student records, health information, personal financial information, drivers license numbers, etc. www.hawaii.edu/apis/ep/e2/e2214.pdf. &n
  42. Which web browsers are supported for Google@UH Gmail?
    Web browsers supported by Google includes, but is not limited to: FireFox 2.0 and higher Internet Explorer 6.0 and higher Safari 3.0 and higher Other supported browsers Please note that even though Google's brow
  43. Open Source Software Alternatives
    This is a brief list of open source software alternatives for paid consumer software suites and applications. The information is provided for convenience and does not implicitly or explicitly constitute an endorsement or recommendation for any of the
  44. I installed SAS recently, and went to the Help option, but it does not seem to work. Is there something that I need to set up in order to utilize Help? I did a complete installation, so I am not sure why it does not work. Any suggestions?
    When you try to open SAS System Help, a browser invokes, and the following error message appears:The page cannot be foundA URL similiar to the following appears in the Address field:"http://:/help/common.hlp/mainpage.htm? Document= ../base.help/
  45. IT Policy and Guidelines: UH Manoa Wireless Networks
    As with all shared resources of the University, policies and guidelines are established to ensure equitable and reliable access to limited resources for all members of the University community. The UH Manoa network infrastructure is considered to be
  46. What is Offline mode in Google@UH Gmail?
    Offline mode allows users to access their email with no or limited internet access. Any changes you make to your account or emails you send will take effect once you have a good and stable internet connection. In this mode you will not receive any me
  47. What are the privacy policies for my UH Username?
    Under normal circumstances, information accessed by your UH Username (i.e. email, grades, etc) is considered private. Access to information will be granted only by a valid subpoena, or by authorization from the account owner or authorized personnel.
  48. How do I change my default printer for FMIS (if I'm connecting to FMIS via HostExplorer, not the Web)?
    You need to submit an FMIS-40 form available online at http://www.fmo.hawaii.edu/fmis/formfair.html and indicate your new default printer in section C.
  49. I have to see a campus representative to reset my password. Where can I find a list of campus representatives?
    A list of campus representatives is available online at http://myuhinfo.hawaii.edu/page/campusreps.html.
  50. Emailing a Form from the hosted web servers
    Previously, we offered a perl script, pipeline.pl, to email a form. But, for security reasons, that script has been removed from our servers.Instead, we suggest you use the "mailto:" action of an HTML form or use PHP. The "mailt
  51. Adding a Page Counter to your Personal Homepage
    ITS has installed a simple system for tracking page visits, and for displaying visit counts. There are two steps: Add the string: <!--#exec cgi="/cgi-bin/counter"--> to your page. Set the "executable&quo
  52. Approval letter template for requesting the use of a non-hawaii.edu domain name on the UH network
    <insert campus/division logo here> <date> TO:        <name>            <Chancellor | Vice President> FROM:    
  53. IT POLICY: UH System Level Domain Names
    UH system level units and programs as well as multi-campus programs and initiatives may request a system level domain name in the form: program.hawaii.edu All other units, programs and initiatives must create their subdomain in their respective c
  54. Installing Java 8 (Windows)
    You will need administrator access to your PC to be able to install Java 8 or uninstall Java 7 and Java 6. Before installing Java 8, you should uninstall all instances of Java 7 and Java 6. Click on the round button in the lower
  55. Be Cyber-Savvy
      Computer technology is continually advancing at an energetic pace, and the Internet can be a dangerous place if you are caught unaware! To help you become Cyber-Savvy, UH Information Technology Services has developed some tips to help keep
  56. Student Conduct Code
    The following is a list of Student Conduct Codes for the various campuses within the University of Hawaii system. UH Mānoa: http://studentaffairs.manoa.hawaii.edu/policies/conduct_code/ UH Hilo: http://www.uhh.hawaii.edu/studentaffairs/conduc
  57. IT POLICY: UH System Level Website Domain Names
    UH system level units and programs as well as multi-campus programs and initiatives may request a system level URL. All UH System URL requests will be categorized within a logical site structure, be it organizational (unit, department, office) or th
  58. What if my UH Username is suspended?
    A UH account is provided to students, faculty, staff and selected affiliates to facilitate teaching, learning, research, service and administration. If it is proven that an account has been misused, the account may be temporarily suspended or permane
  59. Creating Personal Homepages
    Welcome to Creating Personal Homepages. One of the privileges of having a UH Username is that you are allowed to create a personal homepage in your account that is viewable to the world. PLEASE READ! Pages which include offensive images or sounds
  60. What if my UH Email Account is suspended?
    A UH account is provided to students, faculty, staff and selected affiliates to facilitate teaching, learning, research, service and administration. If it is proven that an account has been misused, the account may be temporarily suspended o
  61. Counter for UH Department Pages (Count.cgi)
    Note: Only University of Hawaii departments with directories on the ITS server (accessible via http://www.hawaii.edu/departmentname) will be able to use this counter. Personal home pages (http://www2.hawaii.edu) and those on other servers will not be
  62. Could you please point me to some basic steps on how to operate the point and click version of SAS? If not, which book should I buy?
    Here's two resources.1. Start up SAS 8.2. Click at the top of the windows on "Solutions" then "Analysis" then "Analyst". The Analyst Application will open. Now click on "Help" and then "Using this Window". The Analyst Application reference book is l
  63. What if my UH Email Account is banished?
    In rare circumstances, UH or an affiliate organization may request that an individual be banished. Banishment is permanent, results in account lockdown, and prevents a person from obtaining a new UH Email Account or UH Username and all cooperating af
  64. How do I create an HTML document in Microsoft Word 2002?
    Start Microsoft Word. In the "New Document" task pane, click "Blank Web Page" under "New." On the "File" menu, click "Save." NOTE: The "Save as type" box defaults to Web Page (*.htm; *.html)
  65. As a parent or guardian how do I pay the tuition for my son/daughter online?
    Parents and guardians who have been set up as an Authorized User may logon to: https://epay.hawaii.edu/C24372_tsa/web/login.jsp with their email address and password. Information about being setup as an Authorized User can be found on
  66. Respondus (Quiz creation tool - Windows)
    Respondus is a Microsoft Windows based tool  for the offline creation and management of exams which can then be exported for use in Laulima (as QTI zip) or printed.  ITS has licensed Respondus for University Faculty and Staff use.  M
  67. Virtual Server: How to install and configure backups (Bacula Enterprise) on a Windows Server
    SUMMARY: The Bacula backup service is the optional daily backup service listed in the ITS VMware Hosted Solutions page. Backups are FILE LEVEL only. If you are a VM customer and have purchased this service, a client will need to be configured on yo
  68. What is a UH Username and why would I want one?
    Your UH Username is your electronic key to gaining access to the university's online services such as email, Internet access, and registration for classes. The UH Username is the same account as the ITS Username, UH Email Account, or uhunix account.
  69. Can I change my UH Username?
    UH Usernames are based on your legal name, as it appears on official UH records. Requests to change your UH Username will only be accepted under the following circumstances: You are an active faculty, staff, or student. There is a misspel
  70. What can I do about spam?
    Look over your Inbox and manually delete messages that seem suspicious before you begin reading your new messages. Examples of suspicious messages include: messages with missing or strange subject lines messages with att
  71. Winmail.dat attachments
    When using Microsoft Outlook to send messages with Rich Text Formatting, the recipient receives an attachment called Winmail.dat which cannot be opened. The Winmail.dat attachment includes formatting instructions specific to Rich Text Formatting. To
  72. How do I get more help for Google@UH Sync?
    If you need further assistance with Google@UH Sync, please contact the ITS Help Desk.
  73. Creating/Importing Quiz Questions in Laulima via copy and paste from a Word document
    The Tests & Quizzes tool allows for the import (copy and paste from a Word document) of test questions.  Types of questions that can be imported include multiple-choice, true-false, fill-in-the-blank, short essay, and multiple-choice with mo
  74. Thunderbird Information (PC)
    General Information Thunderbird, a free email application, allows you to receive, send, and read your electronic mail on your computer. Minimum System Requirements A PC running Windows Vista, Windows 7, or Windows 8 An Intel Pentium 4 o
  75. Eduroam Wireless for UH Manoa
    The University of Hawai‘i is a member of the eduroam community of research and education institutions who share network resources among its users by allowing visitors access to its campus Wi-Fi. UH faculty, staff, and students who visi
  76. UH and the NASPO ValuePoint (WSCA) contract
    The State Procurement Office (SPO) issued a new SPO Price List Contract No. 15-05 named "NASPO ValuePoint Computer Equipment including Related Peripherals and Services", effective Oct. 1, 2015 through March 31, 2017. SPO contract 15-05 repl
  77. UH POLICY: Non-EDU Domain Names on UH Network
    University of Hawaii units are expected to use a hawaii.edu domain name for all services provided through the UH network.  This makes it clear that the University is providing the resources to support the service.  Non-University activities
  78. What is new in LISTSERV 16.x?
    LISTSERV 16.0 introduces several new features. Unicode (UTF-8) Support Includes the first phase of UTF-8 support in LISTSERV for message encoding, subscriber names, list titles and list descriptions, facilitating lists and
  79. Virtual Server: File Level Backup Policy
    The following information is provided to help virtual server customers of Information Technology Services (ITS) Contract Services understand the nature of the  backup procedures and the availability of information beyond the date on which it i
  80. Can I change my UH Email Account's name?
    Your UH Email Account name is based on your UH Username. UH Usernames are automatically assigned based on your legal name, as it appears on official UH records. Please read about UH Username changes http://www.hawaii.edu/its/email/emailpractices.html
  81. Student: I forgot my password. What should I do?
    Please remember that your password is case-sensitive (i.e. this password Pa$sT3!E is not the same as pa$st3!e), and must meet the following requirements: at least 8 characters in length (up to a maximum of 32) at least one lowercase chara
  82. POODLE: SSLv3 Vulnerability
    (This information is being updated as necessary.  Please check back for any new updates.  Last update: 10/22/2014) POODLE (Padding Oracle On Downgraded Legacy Encryption): This SSL version 3 vulnerability allows decryption of web sessio
  83. Heartbleed OpenSSL Vulnerability Information for System Administrators
    On April 7, 2014, a serious vulnerability in the OpenSSL cryptographic software library was exposed. This weakness, dubbed The Heartbleed Bug, allows a remote attacker to access system memory which may contain encryption keys, user credentials or
  84. Thunderbird Information (Mac)
    General Information Thunderbird, a free email application, allows you to receive, send, and read your electronic mail on your computer. Minimum System Requirements A Macintosh running macOS 10.9* or later An Intel x86 processor
  85. Web Hosting and Publishing
    Welcome to the Web Publishing page. You can create a personal homepage or if you represent an official university entity, you can request Web space on our server for a departmental Web page. Follow the resources below to get started or to enhance yo
  86. Budgeting for Departmental Computers
    Departments should expect to spend between $800-$1200 per CPU. Plan on upgrading CPU's every three to four years. Departments should annually budget enough to upgrade a third or fourth of existing computers. By upgrading a fraction of departmental co
  87. How are undeliverable email messages handled?
    If the UH email server cannot deliver a message, the server queues the message, waits, and tries again to deliver the message. If the message cannot be delivered after several attempts, the original sender is notified that the message cannot be sent
  88. ITS Documents
    NOTE: Some documents are available in multiple format. Alternate document formats include:        [HTML] - The document is in HTML format and may contain embedded graphics.        [PDF] - The docume
  89. Secure Logins using SSH/SSL
    Overview The University of Hawaii Information Technology Services (ITS) has implemented Secure Shell (SSH) and Secure Sockets Layer (SSL) logins to the University's hawaii.edu servers. Using these protocols will encrypt information being passed
  90. Getting Help for Google@UH Gmail
    Google has very good online help articles. Click on the Help button in the upper right corner of the screen, then click on the topic in which you have interest. Or browse directly to http://mail.google.com/support/  You may also contact the ITS
  91. How Do I Set a Mail Template in LISTSERV?
      In LISTSERV 16.x, you can create or select a HTML template that applies to informational messages from the LISTSERV processor. This template does not modify the content or create a theme for mail sent to a list nor the newsletter feature that
  92. How to disable SSLv3 in Browsers (Macintosh)
    SSL version 3.0 (SSLv3) is not secure and should be disabled in your web browser. Once you've followed the instructions for disabling SSLv3, you can visit https://www.ssllabs.com/ssltest/viewMyClient.html to test that your browser is secure. Disabl
  93. Frequently Asked Questions about the UH Server Registration & Scanning Requirements
    Q.  Why am I required to register and scan my servers? A.  As a result of the recent data breaches, the University of Hawaii is implementing a new, systemwide Information Security Program to better protect the university's sensitive inform
  94. How do I get a UH Email Account?
    If you meet any one of the requirements in the eligibility table, you should proceed in activating your UH Username. You will need to activate your UH Username before you can use your UH Email Account. Please select one of the following links to fin
  95. What is spam?
    Spam is unsolicited email messages sent to your account. Spam is also referred to as "unsolicited commercial email" and "unsolicited bulk email". They range from harmless advertising to potentially offensive (complete with picture
  96. Getting Started with Departmental Pages
    As a UH Department, your staff can have access to the Information Technology Services (ITS) Web servers for putting departmental information online. Getting Space The recommended method for doing this is to have someone in the department who is alr
  97. ITS Documents Archive
    NOTE: The documents on this page are provided for historical and referential purposes only, and users should be aware that some of the information contained within these documents may no longer be accurate. ITS is not maintaining any of these documen
  98. How do I change my UH Username's settings?
    There are a number of options that you may change for your UH Username at the UH Username Management page. Options include: changing your password changing your secret questions and answers used to change passwords online checking ho
  99. How to Disable SSLv3 in Browsers (Windows)
    SSL version 3.0 (SSLv3) is not secure and should be disabled in vulnerable web browsers. To test for the POODLE vulnerability: open browser to https://www.ssllabs.com/ssltest/viewMyClient.html. Internet Explorer 11 Open Internet Explorer.
  100. How do I get more help for Google@UH Calendar?
    Google has extensive documentation on their calendar here: http://www.google.com/support/calendar If you need further assistance with Google@UH Calendar, please contact the ITS Help Desk.
  101. UH Username Practices
    Online services are being offered by UH to make your university experience more convenient. A user account (username and password) is required for you to use any online service. For UH, this user account is called your UH Username. The terms ITS User
  102. Getting Help for Google@UH Sites
    Google has very good online help articles.  In Google Sites, click on the Help button in the upper right corner of the screen, then click on the topic in which you have interest.  You can browse directly to http://www.google.com/support/sit
  103. What is ITS doing about spam?
    Google uses a combination of algorithms and reporting tools to protect against spam, viruses, and phishing attacks. Using the same advanced computing infrastructure as its search engine, along with a vast community of users, Google touts having one o
  104. How does the Meridian Integrated Conference Bridge Work?
    To use the Meridian Integrated Conference Bridge, the participants dial a pre-assigned phone number, enter a password, and are prompted to "speak their name". A conference can begin two minutes before the specified time and an individual ma
  105. UH affiliate: I forgot my password. What should I do?
    Please remember that your password is case-sensitive (i.e. this password Pa$sT3!E is not the same as pa$st3!e). On-line If you do not remember your password or it is not working, you may be able to set a new password over the Web. When you
  106. Recycling Electronic Devices SECURELY!
    To promote sustainability and conservation of our resources, UH Information Technology Services is coordinating periodic recycling drives for electronic devices for the University of Hawaii System (http://manoa.hawaii.edu/chancellor/sustainability/re
  107. Downloading and Installing the Google File Stream/Google Backup and Sync Applications
    ** The "legacy" Google Drive desktop client will be shut down on May 12, 2018 and user's will have to migrate to one of the other two clients, https://gsuiteupdates.googleblog.com/2018/01/legacy-google-drive-desktop-sync-client.html&nb
  108. Installing and Using Find_SSNs on Linux and Solaris
    This article is intended for Facutly/Staff who may have certain types of PI (personal information) located on a computer, running the Linux or Solaris operating systems. Overview: Find_SSNs is a piece of software written in python at VirginiaTech t
  109. I am faculty, but don't know how to get a class list into an Excel spreadsheet. How do I do that?
    Go to the web address http://myuhinfo.hawaii.edu/page/faculty for information and tutorials geared for faculty. At that page, click on Check Class Lists and Waitlists to find out how to copy and paste the class list into an Excel spreadsheet.
  110. Spam at the University of Hawaii
    Spam on the Google@UH email service is managed by Google. Email messages that Google deems highly likely to be spam will not be delivered to your mailbox and are instead placed in the folder labeled "Spam" (or "Gmail/Spam" if usin
  111. Even with all this, I still receive spam!
    Spammers are very aggressive in finding new ways to get their spam through any protective measures. ITS is making a concerted effort to isolate spam email before you receive it. But given differences in perception, there will never be a way to automa
  112. UH Computer Virus and Threat Information
    University of Hawaii (UH) Information Technology Services (ITS) provides software, services, and technical support to protect the UH community against computer viruses and security threats: Anti-virus software provided for UH faculty, staff an
  113. Why am I getting all this spam?
    Spammers (the people who send spam) "harvest" email addresses from various places. If you have done anything on the Internet at all (register a software product, participated in a online discussion board), your address could potentially be
  114. Network Etiquette
    Certain situations call for proper protocol to be observed. In bowling, one does not interrupt the person bowling in adjacent lanes by throwing the ball while they are already in the process of doing so. In tennis, returning a ball that is obviously
  115. Security (or lack of it) on the Internet
    The modern age of surfing the internet has produced many ways for unwanted email (spam) to get to you. Some are annoying by sending you unwanted information about a product being sold, but others more recently are highly invasive with potential of id
  116. How do I add LDAP authentication for Mac OS X 10.11 & newer?
    It is possible to configure your client Mac OS X computer to authenticate against the UH LDAP server. Follow the steps below to setup LDAP authentication. This document will be limited in scope to just accomplishing the authentication process. It wil
  117. Why would email not be deliverable?
    Email will be undeliverable when the recipient does not have an email account on the mail server, the recipient is over his or her email quota, the email is greater than the maximum message size (25MB), or there is a problem with the sender's or reci
  118. I am an instructor; can I set up an account for my students to send email to?
    There are times when a shared instructional UH Email Account is necessary to keep email organized and to help identify the department or organization to the world. ITS normally discourages the sharing of UH Email Accounts because of security risks an
  119. SSH Information
    General Information "SSH Secure Shell for Workstations is the client-side application for the workstation of the SSH Secure Shell end-users. SSH Secure Shell for Workstations brings the transparent strong authentication and encryption to the de
  120. Password Guidelines
    The days of using simple words, a single character, or a blank password are gone. Today, easy passwords can be cracked or guessed within hours or even minutes. Since the information on your computer is precious and potentially confidential, you need
  121. Adobe Reader Information (Mac)
    General Information Adobe Reader, available free from Adobe, allows you to view and print files saved in Adobe Portable Document Format (pdf). To create PDFs, including form-fillable PDFs, use Adobe Acrobat or another PDF creator software of your ch
  122. If your computer has been infected by a computer virus or possibly compromised
    How can I tell If my computer has a virus? (These examples refer to McAfee VirusScan Enterprise running on Windows.) If anti-virus software is installed on your computer (and it should be), a virus alert warning similar to the following may be
  123. Best Practices for Laptop Users
    Laptop computers are smaller, lighter, and more competitively priced than ever before.  More people are selecting laptops as their primary computer enabling them to be more mobile using wireless networks wherever they happen to be.  While a
  124. The UH Identity Management System
    The University of Hawai'i Identity Management System (UHIMS) collects and consolidates information concerning people associated with the University so that UH may better establish and manage a single, permanent identity for each person. This unique i
  125. Getting Help for Google@UH Drive
    Google has very detailed online help articles.  In Google Drive, click on Settings  in the upper right corner of the screen, then select Help. Alternatively, you can browse directly to https://support.google.com/drive/?hl=en&p=mktg_home
  126. Server Side Includes (SSI)
    Server Side Includes (SSI) is a simple interpreted server-side scripting language used for webpages. The most common use of SSI is to include the contents of one or more files that are hosted on a web server into a single webpage. To include the con
  127. Catching a Phish in Smartphone Email Apps
    Using a mobile device email app to check your hawaii.edu emails is a really quick and easy way to keep connected and up to date. But did you know that it's harder to spot a phishing email? To keep the interface clean and simple, many email appli
  128. Hitman Email - a Variation of Phishing Emails
    ITS has received a few reports of people receiving a threatening email in which the sender claims to have received a contract to kill the recipient.This type of message is a phishing email - and yes, it's very scary to receive some thing of that natu
  129. How do I get an increase in my UHUNIX disk quota?
    Faculty and staff may request a quota increase by logging in with their UH Username and password at the Managing Your UH Username site, then clicking on the "Check Quota/Request More Space" link under the "Mail, Antispam, & Quota O
  130. Trouble connecting an email client to Google@UH Gmail
    If experiencing problems connecting your email client to Google@UH Gmail, please attempt the following: Ensure that IMAP/POP is enabled for your Google@UH Gmail account. Refer to Ask Us 1147 for instructions on doing this. Verify that you
  131. Frequently Asked Questions About Adding Information to UHINFO
    Information on the Web becomes part of UHINFO when it's stored or linked into the central information servers on campus. Many colleges, schools, and departments run servers and the Information Technology Services (ITS) office also maintains several c
  132. Pop-up Blockers
    Various web browsers (e.g. Microsoft Edge, Chrome, or Firefox) have tools to turn on or off text windows called "Pop-ups". When visiting unfamiliar web pages, it is precautionary to block these pop-up windows as they could be used to displa
  133. UH affiliate: I had trouble with getting my UH Username. Where do I get help?
    While the online request system should be able to activate your UH Username, there are special situations in which the system cannot fulfill your request. The two most common issues are: the UH Username is already activated or UH Number Not Found. U
  134. How do I terminate an employee's UH Username?
    A department head or administrative officer can request a UH Username termination for an employee by making a formal request on departmental letterhead. The Dean, Director, or administrative officer's signature is required. Requests should be sent to
  135. UH Dell Information
    The UH Dell store is available for UH departments to order computers and computer related equipment.  Please request access to the UH Dell site from the UH Dell representative: Heather Welch Phone: (512) 513-8397 Fax: (512) 283
  136. Secure Document Destruction
    When disposing of paper documents that contain sensitive information, it is best to ensure that they are securely destroyed by shredding. When storing and transporting documents to be shredded, there are some important steps you can take to ensure th
  137. How do I terminate an employee's UH Email Account?
    A department head or administrative officer can request a UH Email Account termination for an employee by making a formal request on departmental letterhead. The Dean, Director, or administrative officer's signature is required. Requests should be se
  138. UH Server Registration Program
    As directed by the senior administration of the University of Hawaii and all campuses, UH is implementing a Systemwide Information Security Program to better protect sensitive information at UH. Some key elements of the Information Security Program
  139. Windows 8.1 Information
    General Information Windows 8.1 is an upgrade for Windows 8, a version of Microsoft Windows operating systems for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. Windows 8.1 was
  140. How do I enable my personal webpage?
    If you do not already have a webpage on UHUNIX, you can login with your UH Username and password to the Managing Your UH Username page and click on Create Home Page under the Personal Home Page Options section. If you already have a webpage on UHUNI
  141. I do not like my current password. How do I change it?
    ITS recommends that you change your password periodically to ensure the security of your UH Username. Your password should not be easily guessed or associated with you like your name written backwards, your name, birth date or your telephone number.
  142. Mac OS X Information
    General Information "Mac OS X is a super-modern operating system that combines the power and stability of UNIX with the legendary elegance of the Macintosh." - Apple website Minimum System Requirements A Mac with an Intel-based pro
  143. If you suspect that your account has been compromised...
    With the recent increase of phishing scams and a few instances of people replying to these scams, please follow these basic instructions to secure your UH Username. Call our ITS Help Desk to report the possible compromise and to get further assistanc
  144. Windows 10 Information
    General Information Windows 10 is the latest version of the Microsoft Windows operating system for use on personal computers, including desktops, laptops, tablet PCs, and Windows phones. Windows 10 comes with the new Edge browser, Cortana (Microsoft
  145. How much disk space am I allocated with my UH account?
    Students, Faculty, and staff  have a limit of 25 Gigabytes (GB) of disk space for email and 20 MB of disk space for files.  When you exceed this limit for you email and if you do not reduce the size of your account within a few days, all ma
  146. Windows 8 Information
    General Information Windows 8 is a version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. Windows 8
  147. What are the email server settings and how do I use Web Mail, POP, or IMAP client software?
    Google@UH Gmail To access Google@UH Gmail, point your web browser to http://gmail.hawaii.edu. You will be prompted to enter your UH Username and Password. (To apply for a UH Username, visit this site: www.hawaii.edu/username.) If the UH Username
  148. Faculty: I had trouble with getting my UH Username. Where do I get help?
    While the online request system should be able to activate your UH Username, there are special situations in which the system cannot fulfill your request. The two most common issues are: the UH Username is already activated or UH Number Not Found. U
  149. UH staff: I had trouble with getting my UH Username. Where do I get help?
    While the online request system should be able to activate your UH Username, there are special situations in which the system cannot fulfill your request. The two most common issues are: the UH Username is already activated or UH Number Not Found. U
  150. Physical Device Security
    The security of your data is only as good as the amount of physical access someone has to it. Most common security measures such as firewalls and passwords will be rendered useless if someone gains physical access to your device. With laptops getting
  151. Adobe Reader Information (PC)
    General Information Adobe Reader, available free from Adobe, allows you to view and print files saved in Adobe Portable Document Format (pdf). To create PDFs, including form-fillable PDFs, use Adobe Acrobat or another PDF creator software of your c
  152. PC Energy Savings Guideline
    UH has over 10,000 networked personal computers to support teaching, research and administration. PCs and other electronic office equipment, such as printers and scanners, collectively consume significant amounts of energy. Fortunately, there are way
  153. Conficker Worm Information
    3/31/09   The Conficker/Downadup worm is spread via unpatched Windows computers with the MS08-067 vulnerability, removable devices such USB thumb drives and external hard drives, or network fileshares with weak passwords (or not password-prote
  154. Securing Network Printers and Multi-Function Devices
    Network Printers and Multi-Function Devices (MFD) are common in offices because they provide the ability to copy, print, scan, and fax from one central machine that is shared by many. The MFD's typically store information and are connected to the ne
  155. Anti-Spyware Solution for Your PC
    The following anti-spyware solutions are for PCs running the Windows operating system. ITS recommends the following anti-spyware solutions for your PC depending on where and who owns the computer. Unlike anti-virus software, you may install more then
  156. Flashback Mac Malware Infection Information
    A new variant of the Java based malware named Flashback has been spreading rapidly on OSX making it possibly the most significant malware to hit the Mac community to this point. A key thing to remember is that this is a Trojan. Unlike viruses, Troja
  157. UH Email Account Practices
    Online services are being offered by UH to make your university experience more convenient. A user account (username and password) is required for you to use any online service (such as registering for courses or checking email.) For UH, this user ac
  158. Disposal Guidelines For Unused UH-Owned Computer Equipment
    This document is intended to assist University of Hawai‘i departments who wish to dispose of computer equipment that may still be useful to others. These guidelines are not intended to replace any Administrative Procedures, so be sure to consul
  159. Windows 7 Information
    General Information "We (Microsoft) designed Windows 7 to simplify the things you do every day, work the way you want, and make some exciting new things possible." - Microsoft website Windows 7 is a version of Microsoft Windows, a series
  160. Windows 10 Application Compatibility
    Microsoft released Windows 10 for PC desktops, laptops, and tablets on July 29, 2015. ITS currently provides full support for Windows 10. ITS will assist with Windows 10 installation, setup, troubleshooting, and general support issues for this operat
  161. SSH/SSL FAQ
    SSH Questions General What are SSH/SSL secured connections? I usually telnet from one unix system into another. Can I telnet to uhunix.hawaii.edu? Which encryption protocol will ITS use for the hawaii.edu serv
  162. How Do I Set a Footer(Bottom Banner) in LISTSERV?
    Bottom Banner Templates allow you to include a footer on each message sent to a list. The DEFAULT_BOTTOM_BANNER and  DEFAULT_BOTTOM_BANNER_HTML templates provided in LISTSERV 16.x include a SIGNOFF link that subscribers can click on in orde
  163. Using Attachments in Google@UH Gmail
    It is possible to send files to another person by attaching them to email messages. These files are referred to as attachments . Any kind of computer file can be an attachment: a word processing file, a spreadsheet, a database, an audio or video file
  164. Firewall Recommendations for Windows Server 2003 SP1 and Windows Server 2008
    /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; m
  165. Securing your Computer
    If your computer has been compromised, Information Technology Services (ITS) reserves the right to block your IP/MAC Address from connecting to the network in order to protect the integrity of the University of Hawaii network. Information on getting
  166. ITS Computer Support Policy
    The Information Technology Services (ITS) Academic Technologies section provides technical support via email, telephone, and walk-in to UH faculty, staff and students systemwide through the ITS Help Desk. Contact the ITS Help Desk for support by ca
  167. UH staff: I forgot my password. What should I do?
    Please remember that your password is case-sensitive (i.e. this password Pa$sT3!E is not the same as pa$st3!e). On-line If you do not remember your password or it is not working, you may be able to set a new password over the web. When your UH User
  168. Departmental Website Linux Server Upgrade
    In our efforts to provide a better webhosting experience, we have moved our webservers to a new and improved Enterprise Linux environment.  This new environment is running Red Hat Enterprise Linux 7, Apache 2.4, and PHP 5.6. Notes for appli
  169. ITS Computer Recommendations
    The following recommendations will meet the needs of the general UH staff and students for email, web browsing, word processing, spreadsheet and other office productivity software. The systems listed are ITS minimum level recommendations. ITS recomme
  170. Creating a Custom Search Engine (CSE) / Create a Search Box for Your Department
    Method A:  To create a search that will display the results on the same page, use a Custom Search Engine (CSE). There are many options for a CSE. These instructions will get you started with a basic CSE. Login to http://www.google.
  171. What is new in LISTSERV 15.x?
    LISTSERV 15.x incorporates a dashboard which centralizes the most commonly used functions for all of the lists you manage. The dashboard provides list owners with quick access to settings for multiple lists and the ability to display customized
  172. Dialing Instructions
    ON CAMPUS, to call: 956 and 957 prefix numbers (on-campus):  Enter the last 5 digits of the 7 digit number Campus Operator:  Enter 0 For after hours repair/trouble, enter 65000 and leave a message.
  173. Setting up Dreamweaver with secure FTP (sFTP)
    Contents Notes on departmental websites under UH Hosted Website Service Creating a new website profile Managing an existing website profile   Notes on departmental websites under UH Hosted Website Service This
  174. Student: I had trouble with getting my UH Username. Where do I get help?
    While the online request system should be able to activate your UH Username, there are special situations in which the system cannot fulfill your request. The two most common issues are: the UH Username is already activated or UH Number Not Found. U
  175. What are the available options in Google@UH Calendar?
    To access the Google@UH Calendar options, click on the "Settings" link in the upper right corner of the calendar window, then select "Calendar settings".  Be sure to click on the "Save" button to save any changes yo
  176. Getting Your PC Unblocked on the UH Network
    The following information pertains only to computers utilizing a Windows-based operating system that have become infected with a virus and that are on the UH Network. Detecting and Removing Viruses Virus infection is a common reason a computer c
  177. UH Username End of Life - Saving Email and Personal Webpages (Windows)
    This document is for users who are no longer affiliated with UH, and who have received a notice that they have 180 day grace period before their email and personal webpage data are removed from the UH servers. The following instructions show you
  178. Phishing at UH
    What is phishing (pronounced "fishing")? From Wikipedia: phishing is "the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustwort
  179. Browser Recommendations for ITS-Supported Web Applications
    Browser Recommendations The following browser recommendations are for ITS-supported web applications and are based on coordinated testing efforts between the ITS Help Desk and the developers for various ITS-supported web applications. Because of the
  180. Virtual Server: How to Connect Your ITS-Hosted RHEL 6 Virtual Server to an ITS Private Network
    OVERVIEW Sometimes in order to access certain services offered by UH Information Technology Services (ITS) from your ITS-hosted virtual server, you will need to have access to an ITS private network. The instructions in this article give you ins
  181. Virtual Server: How to Connect Your ITS-Hosted RHEL 7 Virtual Server to an ITS Private Network
    OVERVIEW Sometimes in order to access certain services offered by UH Information Technology Services (ITS) from your ITS-hosted virtual server, you will need to have access to an ITS private network. The instructions in this article give you ins
  182. Virtual Server: How to Change Your ITS-Hosted RHEL 6 Virtual Server's Package Subscription Service from RHN to RHSM
    OVERVIEW On July 31st, 2017, Red Hat is scheduled to disable the Red Hat Network (RHN) package repository service that they have offered for much of the history of Red Hat Linux. RHN is being replaced by a new package repository service run by Red H
  183. Telecommunication Services Rate Schedule July 1, 2014
    For more information contact the Information Technology Services  - Telecom User Services  Office at 956-6033 or email telecom@hawaii.edu. Telephone Services Service Package