Your search for "policy/dmca.html" returned 236 results
  1. DMCA Takedown Procedures at UH
    A Digital Millennium Copyright Act (DMCA) infringement notice (also known as a DMCA takedown notice) is sent to the University when unauthorized copyrighted materials are found by copyright owners and/or their agents.  The takedown notice includ
  2. What is a first.last email alias?
    It is a professional representation of your email address that uses your first name and last name. For example, John Doe's current email address is jdoe@hawaii.edu. With first.last, John's email alias could be john.doe@hawaii.edu. It is also a more d
  3. Copyright & DMCA Issues at UH
    Are you downloading and/or sharing music, movies, TV shows, or software using P2P software such as BitTorrent, Limewire, eDonkey?  Do you have legal permission to do so?  If the answer is "NO" or  If you're not sure, STOP IMM
  4. Policies
    Use and Management of Information Technology Resource Policy (E2.210): Please Read and understand the responsibility of owning and using an account here at UH. Student Conduct Code ref: http://www.hawaii.edu/help/accounts/poli
  5. University of Hawai'i Information Technology Services Policy on Equal Access to ITS Resources for Persons with Disabilities
    Introduction The University of Hawai‘i Information Technology Services (ITS) department is committed to a policy of equal access to its web content, facilities, and services. These policies and procedures ensure that persons with disabilities
  6. Securing your Computer & Protecting your Information
    [Print Friendly Version]   Use of all University of Hawaii information Technology Resources are governed by UH Executive Policy: E2.210 — Use and Management of Information Technology Resources.  Continued use of your UH Use
  7. How is email handled for a faculty or staff member that is unexpectedly out for various reasons, e.g. medical leave?
    If a UH faculty or staff member unexpectedly goes out on leave and it is necessary to access their account for UH work the University has the right to authorize an email agent to access the person's account under emergency situations. With due author
  8. Sample Copyright Notification Letter
    (Click here for PDF version of this form.) @font-face { font-family: "Arial"; }@font-face { font-family: "Times"; }@font-face { font-family: "ArialMT"; }p.MsoNormal, li.MsoNormal, div.MsoNormal { margin: 0in 0in 0.0001pt; font-size: 12
  9. IT Security @ UH
    General Information Getting your PC unblocked on the UH Network Password Guidelines Securely Deleting Electronic Information How to Securely Delete Electr
  10. What are the privacy policies for my UH Email Account?
    Under normal circumstances, email is considered private and is not subject to audit or review except as stated in UH Executive Policy E2.210: "Use and Management of Information Technology Resources" Section V: "Ownership and Disclosure
  11. Faculty: I forgot my password. What should I do?
    Please remember that your password is case-sensitive (i.e. this password Pa$sT3!E is not the same as pa$st3!e). Online If you do not remember your password or it is not working, you may be able to set a new password over the Web. When your UH Usern
  12. Copyright in the Digital Age
    Intellectual property is the lifeblood of a university, and all members of the university community should respect the work of others inside and outside the academy. University of Hawaii Executive Policy E2.210: "Use and Management of Informatio
  13. Information Security Policy (E2.214)
    Prepared by Office of Vice President for Information Technology & CIO and the Office of Vice President for Legal Affairs and University General Counsel Please click the following URL for the most recent version of the University of Hawai‘i
  14. IT Center Video Conference Rooms
    The IT Center Video Conference rooms are located on the UH Manoa campus, and managed by Information Technology Services.  Priority use is for videoconferencing activities.  Upon availability, these rooms may be scheduled for "room use
  15. UH POLICY: Official Campus Domain Names
    The chancellors of the 10 University of Hawaii campuses decided in 2002 and subsequently reaffirmed standardization of campus domain names as follows:manoa.hawaii.eduhilo.hawaii.eduwestoahu.hawaii.eduhawaii.hawaii.eduhonolulu.hawaii.edukapiola
  16. Phishing Attempt: You Have One New Message from hawaii.edu
    Sample Phishing Message:   "VIEW MESSAGE" <"http://www.disfracescarrousel.com.ar/plugins/user=/authn.hawaii.edu.html"> Copyright © 2012 Unauthorized access is prohibited by law in accordance with Chapter
  17. How do I request a first.last email alias?
    Staff or Faculty may request a first.last by logging into the http://myuh.hawaii.edu site with your UH Username and password. Under the "My Profile" tab, look for the "Your first.last Email Alias" channel and follow the instructio
  18. DMCA Sample Takedown Notice
    From: RIAAInfringementNotification <antipiracy2@riaa.com>Date: January 18, 2007 4:02:40 PM HSTTo: David Lassner <dmca-agent@hawaii.edu>Subject: Case ID 226401097 - RIAA Infringement NotificationVIA EMAILJanuary 18, 2007David LassnerUniver
  19. Safari Information (Mac)
    General Information "Safari is an Internet web browser included with Mac OS X. It includes features to help maximize your online experience. You can use tabbed browsing to cut down on window clutter, block pop-up windows, make widgets out of we
  20. Can you recommend a good computer shop?
    Unfortunately, Information Technology Services can not endorse any computer shop.  
  21. List Owner's Responsibilities
    A list owner is entrusted with its members’ personal information (email address and name), and this carries certain responsibilities with regards to ensuring privacy and security. You must determine what level of security is most appropriate fo
  22. VirusScan Enterprise detects legitimate Outlook attachments with multiple extensions as infected
    For McAfee VirusScan Enterprise 8.5 or 8.7 Symptoms: User receives email with subject line beginning with "McAfee Email Alert" and message similar to following: Attachment file : Spreadsheet 1.25.07.xls\1.OLE Scanner Detected: Su
  23. ITS Security Tip of the Week Archive
        Protecting sensitive data is everyone’s responsibility, to increase awareness of careless online habits and assist in creating good practices ITS offer these security tips. Please contact the ITS security team at infosec@hawaii.e
  24. INFOBITS: Data Backup Do’s & Don’ts
    by Deanna Pasternak Computer Data Backups Whether you’re a Macintosh or Windows user, regularly backing up your data is critical in case of a computer problem. ITS recommends backing up your data regularly to external media, such as a CD,
  25. How is email handled for deceased employees and UH affiliates?
    In the unfortunate event that an employee or UH affiliated person should pass away, the following procedure will be used by ITS: As of the date of death, the account enters the grace period. Dean/Director notifies ITS of the event and ITS
  26. INFOBITS: Personal Webpage = Your Calling Card on the WWW
    by Justin Fung What is a personal webpage? A personal webpage, World Wide Web page, is created by an individual and contains content of a personal nature. Personal webpages can be as simple as plain text, similar to a Word document, or it can b
  27. Firefox Information (Mac)
    General Information Firefox is a web browser which allows you to view webpages on the World Wide Web. Firefox is developed by Mozilla, and is available free of charge. System Requirements Firefox 31 ESR A Macintosh running Mac
  28. About The ITS Computer Training Lab
    Overview The Information Technology Services (ITS) Computer Training Lab, located in the IT Center on University of Hawai‘i (UH) Manoa campus, was designed to provide the UH community with a location for hands-on computer training. It is ful
  29. ITS Documents
    NOTE: Some documents are available in multiple format. Alternate document formats include:        [HTML] - The document is in HTML format and may contain embedded graphics.        [PDF] - The docume
  30. How do I add LDAP authentication for Mac OS X 10.7?
    It is possible to configure your client Mac OS X computer to authenticate against the UH LDAP server. Follow the steps below to setup LDAP authentication. This document will be limited in scope to just accomplishing the authentication process. It w
  31. UH staff: How do I get my UH Username?
    You may request your UH Username online from the UH Account Management page by clicking on the "Get a UH Username!" link. Your account should be ready within six (6) minutes. Most services, such as the SECE, will be available to you once yo
  32. Firefox Information (PC)
    General Information Firefox is a web browser which allows you to view webpages on the World Wide Web. Firefox is developed by Mozilla, and is available free of charge. System Requirements Firefox 31 ESR A PC running Microsoft Window
  33. Basic Guidelines for University of Hawaii Webpages
    The Minimum Information that Should be on Every Page! Though we do not wish to stifle creativity for any departmental webpage, there needs to be a concerted effort to adhere to at least some minimal set of standards. Here are some guidelines (in no
  34. The UH VPN Service
    VPN stands for "Virtual Private Network".  It enables IP traffic to travel securely over a public TCP/IP network by encrypting all traffic from one network to another. VPNs are generally used when a person wants to use a computer from
  35. Faculty: How do I get my UH Username?
    You may request your UH Username online from the UH Account Management page by clicking on the "Get a UH Username!" link. Your account should be ready within six minutes. Most services, such as MyUH, will be available to you once your accou
  36. Student: How do I get my UH Username?
    You may request your UH Username online from the UH Account Management page by clicking on the "Get a UH Username!" link. Your account should be ready within six minutes. Most services, such as MyUH, will be available to you once your accou
  37. What happens to my UH Username when I graduate or leave UH?
    Students, Non-retiring Faculty and Staff, and UH Affiliates Students who are not registered for classes for consecutive (Fall, Spring) semesters, Faculty and Staff who leave UH, but are not retiring, and UH Affiliates whose affiliations expire, tran
  38. Student: I forgot my password. What should I do?
    Please remember that your password is case-sensitive (i.e. this password Pa$sT3!E is not the same as pa$st3!e). Online If you do not remember your password or it is not working, you may be able to set a new password over the Web. When your UH Usern
  39. What happens to my UH Email Account when I graduate or leave UH?
    Students, Non-retiring Faculty and Staff, and UH Affiliates Students who are not registered for classes for consecutive (Fall, Spring) semesters, Faculty and Staff who leave UH, but are not retiring, and UH Affiliates whose affiliations expire, tran
  40. How is a UH Username handled for deceased employees and UH affiliates?
    In the unfortunate event that an employee or UH affiliated person should pass away, the following procedure will be used by ITS: As of the date of death, the account enters the grace period. Dean/Director notifies the ITS Help Desk of the
  41. Basic Online Services for Students, Faculty, and Staff
    Your UH Username is valid for the duration of your affiliation with the University of Hawaii. Students must be currently enrolled in good standing; faculty and staff must be current employees of UH. For eligibility requirements and procedures for obt
  42. ITS Data Backup Policy
      The following information is provided to help users of Information Technology Services (ITS) systems understand the nature of the ITS backup procedures and the availability of information beyond the date on which it is deleted by the users.
  43. UH staff: I forgot my password. What should I do?
    Please remember that your password is case-sensitive (i.e. this password Pa$sT3!E is not the same as pa$st3!e). On-line If you do not remember your password or it is not working, you may be able to set a new password over the web. When your UH User
  44. UH affiliate: I forgot my password. What should I do?
    Please remember that your password is case-sensitive (i.e. this password Pa$sT3!E is not the same as pa$st3!e). On-line If you do not remember your password or it is not working, you may be able to set a new password over the Web. When you
  45. Who can get a UH Username?
    You must be a faculty, staff, or registered student with University of Hawai‘i to obtain a UH Username. Emerti faculty and UH affiliates are also allowed. Your UH Username is your account for the duration of your career at the University of Haw
  46. Audio, Video and Web Conferencing Services
    This webpage includes information on ITS supported audio, video and web conferencing services for the UH community. Audioconferencing Audioconferencing allows three or more people to link up in different locations via a fixed or mobile phone. The I
  47. ITS Computer Support Policy
    The Information Technology Services (ITS) Academic Technologies section provides technical support via email, telephone, and walk-in to UH faculty, staff and students systemwide through the ITS Help Desk. Contact the ITS Help Desk for support by ca
  48. ITS Templates
    For your convenience, these templates have been designed as a simple means by which you may create webpages that are consistent in look and feel with either a UH Manoa or a UH systemwide identity, while at the same time providing several format choic
  49. Where can I find documentation for SAS software?
    Documentation for SAS software is available in many formats including an HTML-based online library, a PDF version and SAS books. For the latest information, go to http://support.sas.com/documentation/onlinedoc/index.html.
  50. UH affiliate: How do I get my UH Username?
    Before you can get your UH Username from the online request system, ITS requires a memo from your sponsoring UH department or office on departmental letterhead identifying you and officially requesting that you have access to UH services and resource
  51. ITS Template Guide
    1. Save the template that you want to use from the index page onto your computer For Macs: go to “File” and then to “Download Linked File.” For Windows: right click and go to “Save Target As.” Imm
  52. Personal Home Page Policies
    The server that the UH Personal Home Pages resides on is administered by Information Technology Services (ITS) and is intended to allow faculty, staff, and students space to create personal home pages. We wish to retain the ability to publish pages f
  53. What is ITS doing about spam?
    Google uses a combination of algorithms and reporting tools to protect against spam, viruses, and phishing attacks. Using the same advanced computing infrastructure as its search engine, along with a vast community of users, Google touts having one o
  54. MyUH Troubleshooting Tips
    In general, many problems with connecting to or using MyUH can be fixed by these things: Clear your web browser's cache Clear your web browser's cookies Allow myuh.hawaii.edu as a trusted site for popups Allow myuh.hawaii.edu
  55. Open Source Software Alternatives
    This is a brief list of open source software alternatives for paid consumer software suites and applications. The information is provided for convenience and does not implicitly or explicitly constitute an endorsement or recommendation for any of the
  56. UH ITS SurveyShare
    UH SurveyShare √ SurveyShare Features √ Request a SurveyShare Account √ Institutional Review Board √ Broadcasting √ Frequently Asked Questions (FAQ's) √ Resources √ Contact Information The Universit
  57. Sensitive Information Paper Document Disposal
    Sensitive information is defined in UH Policy E2.214 and includes information like social security number, student records, health information, personal financial information, drivers license numbers, etc. www.hawaii.edu/apis/ep/e2/e2214.pdf. &n
  58. IT POLICY: UH System Level Website Domain Names
    UH system level units and programs as well as multi-campus programs and initiatives may request a system level URL. All UH System URL requests will be categorized within a logical site structure, be it organizational (unit, department, office) or th
  59. ITS Computer Recommendations
    The following recommendations will meet the needs of the general UH staff and students for email, wordprocessing, spreadsheet and database functions. The systems listed are ITS minimum level recommendations. ITS recommends purchasing the systems list
  60. Dialing Instructions
    ON CAMPUS, to call: 956 and 957 prefix numbers (on-campus):  Enter the last 5 digits of the 7 digit number Campus Operator:  Enter 0 For after hours repair/trouble, enter 65000 and leave a message.
  61. Which version of Internet Explorer does ITS support?
    Please view our Web Browser recommendation webpage at http://www.hawaii.edu/help/support/webapplication.html.
  62. Which version of Netscape does ITS Support?
    Please view our Web Browser recommendation webpage at http://www.hawaii.edu/help/support/webapplication.html.
  63. I installed SAS recently, and went to the Help option, but it does not seem to work. Is there something that I need to set up in order to utilize Help? I did a complete installation, so I am not sure why it does not work. Any suggestions?
    When you try to open SAS System Help, a browser invokes, and the following error message appears:The page cannot be foundA URL similiar to the following appears in the Address field:"http://:/help/common.hlp/mainpage.htm? Document= ../base.help/
  64. UH and the WSCA contract
    According to OPRPM Circular 13-001 (dated Oct. 22, 2012), UH departments have been reinstated to utilize certain State Procurement Office (SPO) price and vendor list contracts, including the WSCA contracts. Note: SPO vendor list contract no. 10-01 (
  65. I am a student on another island (still in Hawai'i) and I need password reset. Where can I go?
    There is a list of campus representatives for different campuses available on the web at http://myuhinfo.hawaii.edu/page/campusreps.html.
  66. IT Policy and Guidelines: UH Manoa Wireless Networks
    As with all shared resources of the University, policies and guidelines are established to ensure equitable and reliable access to limited resources for all members of the University community. The UH Manoa network infrastructure is considered to
  67. Thunderbird Information (Mac)
    General Information Thunderbird, a free email application, allows you to receive, send, and read your electronic mail on your computer. Minimum System Requirements A Macintosh running Mac OS X 10.6, 10.7, 10.8 or 10.9 An Intel x86 proce
  68. Securely Deleting Electronic Information
    In today's digital age, we routinely store personal and sensitive information such as our banking and tax information, addresses and phone numbers, and photos on a variety of magnetic storage media. Traditional media includes computer hard drives, US
  69. Counter for UH Department Pages (Count.cgi)
    Note: Only University of Hawaii departments with directories on the ITS server (accessible via http://www.hawaii.edu/departmentname) will be able to use this counter. Personal home pages (http://www2.hawaii.edu) and those on other servers will not be
  70. Which web browsers are supported for Google@UH Gmail?
    Web browsers supported by Google includes, but is not limited to: FireFox 2.0 and higher Internet Explorer 6.0 and higher Safari 3.0 and higher Other supported browsers Please note that even though Google's brow
  71. IT POLICY: UH System Level Domain Names
    UH system level units and programs as well as multi-campus programs and initiatives may request a system level domain name in the form: program.hawaii.edu All other units, programs and initiatives must create their subdomain in their respective c
  72. Emailing a Form from the hosted web servers
    Previously, we offered a perl script, pipeline.pl, to email a form. But, for security reasons, that script has been removed from our servers.Instead, we suggest you use the "mailto:" action of an HTML form or use PHP. The "mailt
  73. Adding a Page Counter to your Personal Homepage
    ITS has installed a simple system for tracking page visits, and for displaying visit counts. There are two steps: Add the string: <!--#exec cgi="/cgi-bin/counter"--> to your page. Set the "executable&quo
  74. How do I change my default printer for FMIS (if I'm connecting to FMIS via HostExplorer, not the Web)?
    You need to submit an FMIS-40 form available online at http://www.fmo.hawaii.edu/fmis/formfair.html and indicate your new default printer in section C.
  75. What are the privacy policies for my UH Username?
    Under normal circumstances, information accessed by your UH Username (i.e. email, grades, etc) is considered private. Access to information will be granted only by a valid subpoena, or by authorization from the account owner or authorized personnel.
  76. Be Cyber-Savvy
      Computer technology is continually advancing at an energetic pace, and the Internet can be a dangerous place if you are caught unaware! To help you become Cyber-Savvy, UH Information Technology Services has developed some tips to help keep
  77. Creating Personal Homepages
    Welcome to Creating Personal Homepages. One of the privileges of having a UH Username is that you are allowed to create a personal homepage in your account that is viewable to the world. PLEASE READ! Pages which include offensive images or sounds
  78. What is Offline mode in Google@UH Gmail?
    Offline mode allows users to access their email with no or limited internet access. Any changes you make to your account or emails you send will take effect once you have a good and stable internet connection. In this mode you will not receive any me
  79. Student Conduct Code
    The following is a list of Student Conduct Codes for the various campuses within the University of Hawaii system. UH Mānoa: http://studentaffairs.manoa.hawaii.edu/policies/conduct_code/ UH Hilo: http://www.uhh.hawaii.edu/studentaffairs/conduc
  80. Internet Explorer 6 Information (PC)
    General Information Internet Explorer (IE) is a program, produced by Microsoft, that allows you to explore and browse the Internet through the World Wide Web. IE is a commercial software package, and is available without charge. Please read the Lice
  81. I have to see a campus representative to reset my password. Where can I find a list of campus representatives?
    A list of campus representatives is available online at http://myuhinfo.hawaii.edu/page/campusreps.html.
  82. WSCA Vendors
    This is a list of WSCA Vendors from SPO Vendor List Contract 10-01 (dated August 22, 2014), which expires December 31, 2014. Product Categories Personal Computers (PC) Printers (PR) Servers and Storage (SS)
  83. Could you please point me to some basic steps on how to operate the point and click version of SAS? If not, which book should I buy?
    Here's two resources.1. Start up SAS 8.2. Click at the top of the windows on "Solutions" then "Analysis" then "Analyst". The Analyst Application will open. Now click on "Help" and then "Using this Window". The Analyst Application reference book is l
  84. What is a UH Username and why would I want one?
    Your UH Username is your electronic key to gaining access to the university's online services such as email, Internet access, and registration for classes. The UH Username is the same account as the ITS Username, UH Email Account, or uhunix account.
  85. What is a Personal Certificate?
    A personal certificate is a mechanism used to verify an identity of a person and computer over a computer network. A personal certificate is issued to a specific person and is installed on the computer that the person uses. A personal certificate is
  86. Telecommunication Services Rate Schedule July 1, 2014
    For more information contact the Information Technology Services  - Telecom User Services  Office at 956-6033 or email telecom@hawaii.edu. Telephone Services Service Package
  87. Web Hosting and Publishing
    Welcome to the Web Publishing page. You can create a personal homepage or if you represent an official university entity, you can request Web space on our server for a departmental Web page. Follow the resources below to get started or to enhance yo
  88. Is there a list of Macintosh OS X keyboard shortcuts?
    To view a list of Mac OS X keyboard shortcuts, please visit http://docs.info.apple.com/article.html?artnum=75459.
  89. What if my UH Username is suspended?
    A UH account is provided to students, faculty, staff and selected affiliates to facilitate teaching, learning, research, service and administration. If it is proven that an account has been misused, the account may be temporarily suspended or permane
  90. What if my UH Email Account is suspended?
    A UH account is provided to students, faculty, staff and selected affiliates to facilitate teaching, learning, research, service and administration. If it is proven that an account has been misused, the account may be temporarily suspended o
  91. UH ITS Interactive Video (ITV) Classrooms
    The ITS Interactive Video (ITV) Classrooms are located in the Kuykendall Hall and Webster Hall at UH Mānoa. These classrooms are used to support distance learning courses. If time permits, classrooms are available to support standards-based vid
  92. What if my UH Email Account is banished?
    In rare circumstances, UH or an affiliate organization may request that an individual be banished. Banishment is permanent, results in account lockdown, and prevents a person from obtaining a new UH Email Account or UH Username and all cooperating af
  93. Windows 2000 Information
    General Information "Windows 2000 Professional is the Windows operating system for business desktop and laptop systems. It is used to run software applications, connect to Internet and intranet sites, and access files, printers, and network res
  94. How do I change my UH Email Account's settings?
    Some things cannot be changed on your UH Email Account such as your UH Email Account's name. However, there are a number of options that you may change for your UH Email Account at the UH Username Management page . Options include: changing yo
  95. Frequently Asked Questions
    Q: What is HITS? A: HITS stands for Hawaii Interactive Video Service. It is managed by Information Technology Services, Academic Technologies division.  HITS primary purpose is to provide 2-way audio and video delivery of ITV classes within
  96. How do I create an HTML document in Microsoft Word 2002?
    Start Microsoft Word. In the "New Document" task pane, click "Blank Web Page" under "New." On the "File" menu, click "Save." NOTE: The "Save as type" box defaults to Web Page (*.htm; *.html)
  97. As a parent or guardian how do I pay the tuition for my son/daughter online?
    Parents and guardians who have been set up as an Authorized User may logon to: https://epay.hawaii.edu/C24372_tsa/web/login.jsp with their email address and password. Information about being setup as an Authorized User can be found on
  98. Can I change my UH Username?
    UH Usernames are based on your legal name, as it appears on official UH records. Requests to change your UH Username will only be accepted under the following circumstances: There is a misspelling in your name. Your legal name has changed
  99. Thunderbird Information (PC)
    General Information Thunderbird, a free email application, allows you to receive, send, and read your electronic mail on your computer. Minimum System Requirements A PC running Windows Vista, Windows 7, or Windows 8 An Intel Pentium 4 o
  100. UH POLICY: Non-EDU Domain Names on UH Network
    University of Hawaii units are expected to use a hawaii.edu domain name for all services provided through the UH network.  This makes it clear that the University is providing the resources to support the service.  Non-University activities
  101. Outlook Express Information (PC)
    General Information Outlook Express allows you to receive, send, and read your electronic mail on your computer. Minimum System Requirements A PC running Windows XP SP3 or later An Intel Pentium processor or higher 32 MB of RAM
  102. What can I do about spam?
    Look over your Inbox and manually delete messages that seem suspicious before you begin reading your new messages. Examples of suspicious messages include: messages with missing or strange subject lines messages with att
  103. Creating/Importing Quiz Questions in Laulima via copy and paste from a Word document
    The Tests & Quizzes tool allows for the import (copy and paste from a Word document) of test questions.  Types of questions that can be imported include multiple-choice, true-false, fill-in-the-blank, short essay, and multiple-choice with mo
  104. Internet Explorer 8 Information PC
    General Information Internet Explorer (IE) is a program, produced by Microsoft, that allows you to explore and browse the Internet through the World Wide Web. IE is a commercial software package, and is available without charge. Please read the Lice
  105. Winmail.dat attachments
    When using Microsoft Outlook to send messages with Rich Text Formatting, the recipient receives an attachment called Winmail.dat which cannot be opened. The Winmail.dat attachment includes formatting instructions specific to Rich Text Formatting. To
  106. Are mailing lists available?
    Mailing Lists are used to redirect mail to one or more addresses. LISTSERV allows list moderation, user-requested subscriptions, multiple list owners, and many more features. Owners of LISTSERV lists have more control of the list, but must take
  107. Eduroam Wireless for UH Manoa
    The University of Hawai‘i is a member of the eduroam community of research and education institutions who share network resources among its users by allowing visitors access to its campus Wi-Fi. UH faculty, staff, and students who visi
  108. Budgeting for Departmental Computers
    Departments should expect to spend between $800-$1200 per CPU. Plan on upgrading CPU's every three to four years. Departments should annually budget enough to upgrade a third or fourth of existing computers. By upgrading a fraction of departmental co
  109. My Mac OS X computer starts up with a smiley face, but it just stays there for 20 minutes, and seems to be frozen. I can't get the CD tray to open to start from my OS disk. (Holding down the mouse doesn't open the CD tray.) How can I get it to start up from my CD?
    To start up from your CD:1. Turn on or restart your Mac. 2. Immediately hold down the Option key if using Mac OS X. 3. After a few seconds, the Startup Manger screen appears. The Startup Manager scans for available volumes. (To rescan, click on the
  110. How do I get more help for Google@UH Sync?
    If you need further assistance with Google@UH Sync, please contact the ITS Help Desk.
  111. Internet Explorer 7 Information (PC)
    General Information Internet Explorer (IE) is a program, produced by Microsoft, that allows you to explore and browse the Internet through the World Wide Web. IE is a commercial software package, and is available without charge. Please read the Lice
  112. Internet Explorer 9 Information (PC)
    General Information Internet Explorer (IE) is a program, produced by Microsoft, that allows you to explore and browse the Internet through the World Wide Web. IE is a commercial software package, and is available without charge. Please read the Lice
  113. Protecting Sensitive Information at UH
    The University of Hawaii (UH) is committed to protecting the personal, confidential information that it is entrusted with.  Beginning in 2004, UH has implemented the UH Number as a unique, personal identifier as a replacement for Social Security
  114. What is new in LISTSERV 16.x?
    LISTSERV 16.0 introduces several new features. Unicode (UTF-8) Support Includes the first phase of UTF-8 support in LISTSERV for message encoding, subscriber names, list titles and list descriptions, facilitating lists and
  115. Frequently Asked Questions About Adding Information to UHINFO
    Information on the Web becomes part of UHINFO when it's stored or linked into the central information servers on campus. Many colleges, schools, and departments run servers and the Information Technology Services (ITS) office also maintains several c
  116. Frequently Asked Questions about the UH Server Registration & Scanning Requirements
    Q.  Why am I required to register and scan my servers? A.  As a result of the recent data breaches, the University of Hawaii is implementing a new, systemwide Information Security Program to better protect the university's sensitive inform
  117. UH affiliate: I had trouble with getting my UH Username. Where do I get help?
    While the online request system should be able to activate your UH Username, there are special situations in which the system cannot fulfill your request. The two most common issues are: the account is already activated or No ID Found. Account is Al
  118. How to Update McAfee VirusScan Enterprise
    Look in the system tray in the bottom right corner of your Windows screen. If you have McAfee VirusScan Enterprise installed, you will see a red, white, and blue shield. Point the cursor at the shield icon and single
  119. Heartbleed OpenSSL Vulnerability Information for System Administrators
    On April 7, 2014, a serious vulnerability in the OpenSSL cryptographic software library was exposed. This weakness, dubbed The Heartbleed Bug, allows a remote attacker to access system memory which may contain encryption keys, user credentials or
  120. Faculty: I had trouble with getting my UH Username. Where do I get help?
    While the online request system should be able to activate your UH Username, there are special situations in which the system cannot fulfill your request. The two most common issues are: the account is already activated or UH Username Not Found. Acc
  121. UH staff: I had trouble with getting my UH Username. Where do I get help?
    While the online request system should be able to activate your UH Username, there are special situations in which the system cannot fulfill your request. The two most common issues are: the account is already activated or ID Not Found. Account is A
  122. I keep getting email from McAfee that my McAfee subscription is expiring in xx days. What should I do?
    You are receiving the email from McAfee because at one time, you registered a McAfee VirusScan Home Edition product under your email account.If you have VirusScan Home Edition 10 installed and cannot get VirusScan Enterprise, download and install Vir
  123. Can I change my UH Email Account's name?
    Your UH Email Account name is based on your UH Username. UH Usernames are automatically assigned based on your legal name, as it appears on official UH records. Please read about UH Username changes http://www.hawaii.edu/its/email/emailpractices.htm
  124. Student: I had trouble with getting my UH Username. Where do I get help?
    While the online request system should be able to activate your UH Username, there are special situations in which the system cannot fulfill your request. The two most common issues are: the account is already activated or UH Username Not Found. Acc
  125. Unable to send email using Windows Live Mail
    Problem: Unable to send email using Windows Live Mail after installing McAfee VirusScan Enterprise 8.8 from the Software Download site. Soution: add Windows Live Mail as an approved email program in McAfee. Right click the vshield icon in the
  126. How Do I Set a Mail Template in LISTSERV?
      In LISTSERV 16.x, you can create or select a HTML template that applies to informational messages from the LISTSERV processor. This template does not modify the content or create a theme for mail sent to a list nor the newsletter feature that
  127. UH Dell Information
    The UH Dell store is available for UH departments to order computers and computer related equipment.  Please request access to the UH Dell site from the UH Dell representative: Jessica Johnson Phone: (800) 274-7799 Ext 51-39375
  128. UH Username Practices
    Online services are being offered by UH to make your university experience more convenient. A user account (username and password) is required for you to use any online service. For UH, this user account is called your UH Username. The terms ITS User
  129. INFOBITS: ITS Site Licensing Office Offers Discounted Software
    by Sandra Ann Matsumoto Software acquisition can sometimes be costly and cumbersome for the University community. The ITS Site License Office eases this task by negotiating contracts directly with software vendors, obtaining volume and/or higher e
  130. Security (or lack of it) on the Internet
    The modern age of surfing the internet has produced many ways for unwanted email (spam) to get to you. Some are annoying by sending you unwanted information about a product being sold, but others more recently are highly invasive with potential of id
  131. Downloading and Installing the Google Drive Application
    Google provides an installable Google Drive application that can sync your Google@UH Drive files to a local folder on your computer.  In addition to syncing files from Drive, the application also uploads any new files you place in the synced loc
  132. How are undeliverable email messages handled?
    If the UH email server cannot deliver a message, the server queues the message, waits, and tries again to deliver the message. If the message cannot be delivered after several attempts, the original sender is notified that the message cannot be sent
  133. Getting Started with Departmental Pages
    As a UH Department, your staff can have access to the Information Technology Services (ITS) Web servers for putting departmental information online. Getting Space The recommended method for doing this is to have someone in the department who is alr
  134. Windows Vista Information
    General Information "If you own or run a small business, you'll want Windows Vista Business, the first Windows operating system designed specifically to meet your needs." - Microsoft website Minimum System Requirements A PC with a
  135. How do I get a UH Email Account?
    If you meet any one of the requirements in the eligibility table, you should proceed in activating your UH Username. You will need to activate your UH Username before you can use your UH Email Account. Please select one of the following links to fin
  136. Getting Help for Google@UH Gmail
    Google has very good online help articles. Click on the Help button in the upper right corner of the screen, then click on the topic in which you have interest. Or browse directly to http://mail.google.com/support/  You may also contact the ITS
  137. What is spam?
    Spam is unsolicited email messages sent to your account. Spam is also referred to as "unsolicited commercial email" and "unsolicited bulk email". They range from harmless advertising to potentially offensive (complete with picture
  138. Anti-Spyware Solution for Your PC
    The following anti-spyware solutions are for PCs running the Windows operating system. ITS recommends the following anti-spyware solutions for your PC depending on where and who owns the computer. Unlike anti-virus software, you may install more th
  139. How do I change my UH Username's settings?
    There are a number of options that you may change for your UH Username at the UH Username Management page. Options include: changing your password changing your secret questions and answers used to change passwords online checking ho
  140. How to Disable WebGL in Chrome and Firefox 4
    US-CERT has advised users to turn off WebGL, a new web standard for browsers which brings 3D graphics to webpages. It is enabled by default in Firefox 4 and Google Chrome and can be turned on in the latest builds of Safari. Context Information Secur
  141. Who can get a UH Email Account?
    You must be a faculty, staff, or registered student with University of Hawai‘i to obtain a UH Email Account. Emerti faculty and staff affiliates are also allowed. Your UH Email Account is your account for the duration of your career at the Univ
  142. How do I get more help for Google@UH Calendar?
    Google has extensive documentation on their calendar here: http://www.google.com/support/calendar If you need further assistance with Google@UH Calendar, please contact the ITS Help Desk.
  143. Getting Help for Google@UH Sites
    Google has very good online help articles.  In Google Sites, click on the Help button in the upper right corner of the screen, then click on the topic in which you have interest.  You can browse directly to http://www.google.com/support/sit
  144. MyUH Channels - how to add/max/min/delete a channel
    The following videos require Adobe Flash to display.* Add a channel [video]- this will demonstrate adding a channel into the tab 'UH Life' text version: Click on 'Preferences' to add a channel
  145. Installing and Using Find_SSNs on Linux and Solaris
    This article is intended for Facutly/Staff who may have certain types of PI (personal information) located on a computer, running the Linux or Solaris operating systems. Overview: Find_SSNs is a piece of software written in python at VirginiaTe
  146. In Brief: Differences Between a Virus, Worm, and Trojan Horse
    Please keep in mind that these definitions may change as computer viruses become more complex. As of this revision, the computer virus authors are combining two or more viruses together to make one new virus. The new virus combines the features of ea
  147. ITS Documents Archive
    NOTE: The documents on this page are provided for historical and referential purposes only, and users should be aware that some of the information contained within these documents may no longer be accurate. ITS is not maintaining any of these documen
  148. The UH Identity Management System
    The University of Hawai'i Identity Management System (UHIMS) collects and consolidates information concerning people associated with the University so that UH may better establish and manage a single, permanent identity for each person. This unique i
  149. Network Etiquette
    Certain situations call for proper protocol to be observed. In bowling, one does not interrupt the person bowling in adjacent lanes by throwing the ball while they are already in the process of doing so. In tennis, returning a ball that is obviously
  150. How does the Meridian Integrated Conference Bridge Work?
    To use the Meridian Integrated Conference Bridge, the participants dial a pre-assigned phone number, enter a password, and are prompted to "speak their name". A conference can begin two minutes before the specified time and an individual ma
  151. I forgot my password. What should I do?
    If you don't remember your password, you may be able to set a new password over the Web. When your UH Username account was first activated, you were asked to select two questions and to provide the answers those two questions. If you know the answer
  152. UH Computer Virus and Threat Information
    University of Hawaii (UH) Information Technology Services (ITS) provides software, services, and technical support to protect the UH community against computer viruses and security threats: Anti-virus software provided for UH faculty, staff an
  153. Student Organizations
    Information for University of Hawaii Registered Student Organizations can be found on a campus-by-campus basis.  Select your campus from the list below for more information regarding your campus's program and policies. UH Manoa http:
  154. Recycling Electronic Devices SECURELY!
    To promote sustainability and conservation of our resources, UH Information Technology Services is coordinating periodic recycling drives for electronic devices for the University of Hawaii System (http://manoa.hawaii.edu/chancellor/sustainability/re
  155. INFOBITS: Tweeting Safely
      by Jodi Ito, UH ITS Information Security Officer Do You Tweet?  If you use Twitter, here are three things for you to consider: TTMI:  Tweeting Too Much Information Twitter is a social networking tool that’s easy to use t
  156. UH Exchange Service: Activating Your blackberry on the UH Exchange Service
    ATTENTION: UH Exchange account is required for this to work. Please DO NOT perform these steps if you don't have an UH Exchange account. If you are trying to synch a Blackberry device to your UH Google acccount, please refer to this article: 
  157. How do I add an image to an HTML document in Microsoft Word 2002?
    Place your insertion point where you want to place an image in your document. On the "Insert" menu, point to "Picture", and then click "ClipArt". In the "Insert ClipArt" task pane, click "Search". NOT
  158. Spam at the University of Hawaii
    Spam on the Google@UH email service is managed by Google. Email messages that Google deems highly likely to be spam will not be delivered to your mailbox and are instead placed in the folder labeled "Spam" (or "Gmail/Spam" if usin
  159. Even with all this, I still receive spam!
    Spammers are very aggressive in finding new ways to get their spam through any protective measures. ITS is making a concerted effort to isolate spam email before you receive it. But given differences in perception, there will never be a way to automa
  160. Password Guidelines
    The days of using simple words, a single character, or a blank password are gone. Today, easy passwords can be cracked or guessed within hours or even minutes. Since the information on your computer is precious and potentially confidential, you need
  161. SSH Information
    General Information "SSH Secure Shell for Workstations is the client-side application for the workstation of the SSH Secure Shell end-users. SSH Secure Shell for Workstations brings the transparent strong authentication and encryption to the de
  162. Secure Logins using SSH/SSL
    Overview The University of Hawaii Information Technology Services (ITS) has implemented Secure Shell (SSH) and Secure Sockets Layer (SSL) logins to the University's hawaii.edu servers. Using these protocols will encrypt information being passed
  163. I am an instructor; can I set up an account for my students to send email to?
    There are times when a shared instructional UH Email Account is necessary to keep email organized and to help identify the department or organization to the world. ITS normally discourages the sharing of UH Email Accounts because of security risks an
  164. Why am I getting all this spam?
    Spammers (the people who send spam) "harvest" email addresses from various places. If you have done anything on the Internet at all (register a software product, participated in a online discussion board), your address could potentially be
  165. Pop-up Blockers
    Various web browsers (e.g. Internet Explorer (IE), or Firefox) have tools to turn on or off text windows called "Pop-ups". When visiting unfamiliar web pages, it is precautionary to block these pop-up windows as they could be used to d
  166. Why would email not be deliverable?
    Email will be undeliverable when the recipient does not have an email account on the mail server, the recipient is over his or her email quota, the email is greater than the maximum message size (25MB), or there is a problem with the sender's or reci
  167. If your computer has been infected by a computer virus or possibly compromised
    How can I tell If my computer has a virus? (These examples refer to McAfee VirusScan Enterprise running on Windows.) If anti-virus software is installed on your computer (and it should be), a virus alert warning similar to the following may be
  168. RACF Account Request SOP
    This is the standard operating procedure for RACF password resets.  Customer specific information is displayed in a brown font for quick reference.  The entire workflow and related information are also provided in order to help ensure that
  169. Best Practices for Laptop Users
    Laptop computers are smaller, lighter, and more competitively priced than ever before.  More people are selecting laptops as their primary computer enabling them to be more mobile using wireless networks wherever they happen to be.  While a
  170. Hitman Email - a Variation of Phishing Emails
    ITS has received a few reports of people receiving a threatening email in which the sender claims to have received a contract to kill the recipient.This type of message is a phishing email - and yes, it's very scary to receive some thing of that natu
  171. Secure Web Browsing
    Many web sites that require sensitive, personal information to be transmitted (e.g. UH sites that require UH Username and password, banking and credit card sites, etc.) are setup with security in place to protect your data. However, this security onl
  172. Server Side Includes (SSI)
    Server Side Includes (SSI) is a simple interpreted server-side scripting language used for webpages. The most common use of SSI is to include the contents of one or more files that are hosted on a web server into a single webpage. To include the con
  173. SSH/SSL FAQ
    SSH Questions General What are SSH/SSL secured connections? I usually telnet from one unix system into another. Can I telnet to uhunix.hawaii.edu? Which encryption protocol will ITS use for the hawaii.edu serv
  174. How do I delete email messages in Pine?
    There are two ways to delete email messages in Pine: First way: Press the <i> key to display the FOLDER INDEX screen. Use the arrow keys to highlight the message to be deleted. Press the <d> key to mark the message for d
  175. Office X Information
    General Information Microsoft Office helps you complete common business tasks, including word processing, email, presentations, data management and analysis, and more. Minimum System Requirements A Macintosh running Mac OS X 10.1.x or later
  176. How do I get an increase in my UHUNIX disk quota?
    Faculty and staff may request a quota increase by logging in with their UH Username and password at the Managing Your UH Username site, then clicking on the "Check Quota/Request More Space" link under the "Mail, Antispam, & Quota O
  177. Trouble connecting an email client to Google@UH Gmail
    If experiencing problems connecting your email client to Google@UH Gmail, please attempt the following: Ensure that IMAP/POP is enabled for your Google@UH Gmail account. Refer to Ask Us 1147 for instructions on doing this. Verify that you
  178. Windows 8.1 Information
    General Information Windows 8.1 is an upgrade for Windows 8, a version of Microsoft Windows operating systems for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. Windows 8.1 was
  179. RACF Password Reset SOP
    This is the standard operating procedure for RACF password resets.  Customer specific information is displayed in a brown font for quick reference.  The entire workflow and related information are also provided in order to help ensure that
  180. How do I terminate an employee's UH Username?
    A department head or administrative officer can request a UH Username termination for an employee by making a formal request on departmental letterhead. The Dean, Director, or administrative officer's signature is required. Requests should be sent to
  181. Macintosh OS X Information
    General Information "Mac OS X is a super-modern operating system that combines the power and stability of UNIX with the legendary elegance of the Macintosh." - Apple website Minimum System Requirements A Macintosh with an Intel-bas
  182. Secure Document Destruction
    When disposing of paper documents that contain sensitive information, it is best to ensure that they are securely destroyed by shredding. When storing and transporting documents to be shredded, there are some important steps you can take to ensure th
  183. How do I terminate an employee's UH Email Account?
    A department head or administrative officer can request a UH Email Account termination for an employee by making a formal request on departmental letterhead. The Dean, Director, or administrative officer's signature is required. Requests should be se
  184. How do I enable my personal webpage?
    If you do not already have a webpage on UHUNIX, you can login with your UH Username and password to the Managing Your UH Username page and click on Create Home Page under the Personal Home Page Options section. If you already have a webpage on UHUNI
  185. Chrome Information (Mac)
    General Information Chrome is a web browser which allows you to view webpages on the Internet and run web applications. Chrome is developed by Google and is available free of charge. Minimum System Requirements A Mac running OS 10.6 or later
  186. Windows 8 Information
    General Information Windows 8 is a version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. Windows 8
  187. What are the email server settings and how do I use Web Mail, POP, or IMAP client software?
    Google@UH Gmail To access Google@UH Gmail, point your web browser to http://gmail.hawaii.edu. You will be prompted to enter your UH Username and Password. (To apply for a UH Username, visit this site: www.hawaii.edu/username.) If the UH Username
  188. Creating a Custom Search Engine (CSE) / Create a Search Box for Your Department
    To create a search that will display the results on the same page, use a Custom Search Engine (CSE). There are many options for a CSE. These instructions will get you started with a basic CSE. Login to http://www.google.com/cse/ with a
  189. I do not like my current password. How do I change it?
    ITS recommends that you change your password periodically to ensure the security of your UH Username. Your password should not be easily guessed or associated with you like your name written backwards, your name, birth date or your telephone number.
  190. How much disk space am I allocated with my UH account?
    Students, Faculty, and staff  have a limit of 25 Gigabytes (GB) of disk space for email and 20 MB of disk space for files.  When you exceed this limit for you email and if you do not reduce the size of your account within a few days, all ma
  191. Getting Help for Google@UH Drive
    Google has very detailed online help articles.  In Google Drive, click on Settings  in the upper right corner of the screen, then select Help. Alternatively, you can browse directly to https://support.google.com/drive/?hl=en&p=mktg_home
  192. PC Energy Savings Guideline
    UH has over 10,000 networked personal computers to support teaching, research and administration. PCs and other electronic office equipment, such as printers and scanners, collectively consume significant amounts of energy. Fortunately, there are way
  193. Securing Network Printers and Multi-Function Devices
    Network Printers and Multi-Function Devices (MFD) are common in offices because they provide the ability to copy, print, scan, and fax from one central machine that is shared by many. The MFD's typically store information and are connected to the ne
  194. Announcing The Retirement Of “news.hawaii.edu”
    news.hawaii.edu is to be retired on December 31, 2007After nearly two decades the University's Usenet newsgroups service is scheduled to be retired.  Its last day of service will be December 31, 2007. Similar to other academic institutions, we t
  195. Securing your Desktop Computer
    If your computer has been compromised, Information Technology Services (ITS) reserves the right to block your IP/MAC Address from connecting to the network in order to protect the integrity of the University of Hawaii network. Information on getting
  196. Disposal Guidelines For Unused UH Computer Equipment
    This document is intended to assist University of Hawai‘i departments who wish to dispose of computer equipment that may still be useful to others. These guidelines are not intended to replace any Administrative Procedures, so be sure to consul
  197. Physical Device Security
    The security of your data is only as good as the amount of physical access someone has to it. Most common security measures such as firewalls and passwords will be rendered useless if someone gains physical access to your device. With laptops getting
  198. Vista Application Compatibility
    Vista OS Advisory for UH-owned computers: ITS is currently recommending that the UH community continue to use Windows XP, especially if you use any of the UH applications that have not been certified by the software vendor, or thoroughly tested. Ne
  199. Personal File Sharing
    There are a number of ways to share a file online. The most common way, anyone who has used the Internet should have done it in some fashion or another, is emailing the file to whoever you want to share it with. For the most part, users who don&rsquo
  200. Chrome Information (PC)
    General Information Chrome is a web browser which allows you to view webpages on the Internet and run web applications. Chrome is developed by Google and is available free of charge. Minimum System Requirements A PC running Windows Vista, Wi
  201. INFOBITS: New Law Regulates eWaste Recycling In Hawaii
    As of January 1, 2010 Hawaii has a new law regulating the recycling of eWaste, the Hawaii Electronic Waste And Television Recycling and Recovery Act. Consumers are no longer required to search out a me
  202. Conficker Worm Information
    3/31/09   The Conficker/Downadup worm is spread via unpatched Windows computers with the MS08-067 vulnerability, removable devices such USB thumb drives and external hard drives, or network fileshares with weak passwords (or not password-prote
  203. Wireless Priority Service (WPS)
    During an emergency, personnel responsible for public safety and emergency preparedness may find it difficult to coordinate and respond to events using the cellular telephone network because of congestion.  The National Communications Syste
  204. UH Email Account Practices
    Online services are being offered by UH to make your university experience more convenient. A user account (username and password) is required for you to use any online service (such as registering for courses or checking email.) For UH, this user ac
  205. Flashback Mac Malware Infection Information
    A new variant of the Java based malware named Flashback has been spreading rapidly on OSX making it possibly the most significant malware to hit the Mac community to this point. A key thing to remember is that this is a Trojan. Unlike viruses, Troja
  206. UH Exchange Services
    Introduction ITS offers the Microsoft Exchange platform to faculty and staff who desire a feature-rich environment which integrates email, calendar, resource management and group
  207. Anti-Virus Software Download
    Software that can protect your computer against viruses, trojan horses, and worms are commonly referred to as "anti-virus software." ITS has purchased a number of licenses from McAfee, Inc. so that University of Hawaii faculty, staff, and s
  208. Dell WSCA Purchasing Procedures
    This document was written specifically for Fiscal Administrators (or which ever individual approves computer purchases for your UH department). It is assumed that a member of your department has followed ITS's instructions for making an online order
  209. Windows 7 Information
    General Information "We (Microsoft) designed Windows 7 to simplify the things you do every day, work the way you want, and make some exciting new things possible." - Microsoft website Windows 7 is a version of Microsoft Windows, a series
  210. INFOBITS: **NEW** Green Technology Begins With You - Tips On Running A Computer More Efficiently
    Economists, scientists, and environmental advocates agree that one of the positive steps which can be taken to lessen the impact that humans have on Earth’s resources and fragile environment is to conserve the use of energy. A personal greentec
  211. Getting Your PC Unblocked on the UH Network
    The following information pertains only to computers utilizing a Windows-based operating system that have become infected with a virus and that are on the UH Network. Detecting and Removing Viruses Detecting and Removing Spyware Preventing Future
  212. INFOBITS: Upgrading Your Web Browser
      A web browser is a software program that you can use to access the World Wide Web; the primary purpose of a web browser is to bring resources to your computer's monitor and display them in an organized fashion. These resources may include tex
  213. How Do I Set a Footer(Bottom Banner) in LISTSERV?
    Bottom Banner Templates allow you to include a footer on each message sent to a list. The DEFAULT_BOTTOM_BANNER and  DEFAULT_BOTTOM_BANNER_HTML templates provided in LISTSERV 16.x include a SIGNOFF link that subscribers can click on in orde
  214. Firewall Recommendations for Windows Server 2003 SP1 and Windows Server 2008
    /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; m
  215. Using Attachments in Google@UH Gmail
    It is possible to send files to another person by attaching them to email messages. These files are referred to as attachments . Any kind of computer file can be an attachment: a word processing file, a spreadsheet, a database, an audio or video file
  216. Setting up Dreamweaver with secure FTP (sFTP)
    Contents Notes on departmental websites under UH Hosted Website Service Creating a new website profile Managing an existing website profile   Notes on departmental websites under UH Hosted Website Service This
  217. What is new in LISTSERV 15.x?
    LISTSERV 15.x incorporates a dashboard which centralizes the most commonly used functions for all of the lists you manage. The dashboard provides list owners with quick access to settings for multiple lists and the ability to display customized
  218. Anti-Virus Software Download McAfee Security for Macintosh 1.2
    Since you have an Intel Macintosh desktop or laptop with Mac OS X 10.6, 10.7 or 10.8, you will want to download McAfee Security 1.2 for the Macintosh, formerly known as McAfee VirusScan. The system requirements are as follows: Macintosh with
  219. What are the available options in Google@UH Calendar?
    To access the Google@UH Calendar options, click on the "Settings" link in the upper right corner of the calendar window, then select "Calendar settings".  Be sure to click on the "Save" button to save any changes yo
  220. Anti-Virus Software Download McAfee Endpoint Protection for Mac 2.1
    Since you have an Intel Macintosh desktop or laptop with Mac OS X 10.7, 10.8, or 10.9, you will want to download McAfee Endpoint Protection 2.1 for Mac, formerly known as McAfee Security for Mac or McAfee VirusScan. The system requirements are as fo
  221. Anti-Virus Software Download McAfee Endpoint Protection for Mac 2.0
    Since you have an Intel Macintosh desktop or laptop with Mac OS X 10.7 or 10.8, you will want to download McAfee Endpoint Protection 2.0 for Mac, formerly known as McAfee Security for Mac or McAfee VirusScan. The system requirements are as follows:
  222. Anti-Virus Software Download McAfee Security for Macintosh 1.1
    Since you have an Intel Macintosh desktop or laptop with Mac OS X 10.5, you will want to download McAfee Security 1.1 for the Macintosh, formerly known as McAfee VirusScan. The system requirements are as follows: Macintosh with an Intel proce
  223. Connecting to the UH Wireless Networks
    Welcome to the University of Hawai'i Wireless Network homepage. Here you will find instructions on setting up your wireless adapter using the built-in software in the Windows and Mac OS X operating systems. Note: ITS does not support third party wir
  224. UH Alert Troubleshooting
    *** IMPORTANT NOTICE *** The short code for UH Alerts was changed from 32075 to 878787 on Thursday, January 30, 2014 The short code is the number where UH Alerts are sent from. NOTE: The most common problem/solution is number 5 below.  Y
  225. INFOBITS: Strategies In Setting Secure Passwords For Social Networking
    Registrations with social networking sites continue to soar. Wikipedia, the free online encyclopedia, lists over 150 major &ld
  226. UH Username End of Life - Saving Email and Personal Webpages (Windows)
    This document is for users who are no longer affiliated with UH, and who have received a notice that they have 180 day grace period before their email and personal webpage data are removed from the UH servers. The following instructions show you
  227. Browser Recommendations for ITS-Supported Web Applications
    Browser Recommendations The following browser recommendations are for ITS-supported web applications and are based on coordinated testing efforts between the ITS Help Desk and the developers for various ITS-supported web applications. Because of the
  228. Phishing at UH
    What is phishing (pronounced "fishing")? From Wikipedia: phishing is "the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustwort
  229. INFOBITS: The Three Rs of Sustainability
      In our electronic age there are now a few more Rs to add to the traditional rhythmic three Rs of Reading
  230. INFOBITS: Smartphone Security Safeguards
    Normal 0 0 1 679 3871 ITS 32 7 4753 10.260 0 0 0   As Smartphones gain in popularity they are becoming all-in-one devices for e-mailing, instant messaging, texting, Web browsing, and online collaboratio
  231. INFOBITS: Ransomware On The Rise … ITS Offers Anti-Virus Tools
    Attacks of malicious  “ransomware” are increasing according to one of the world’s foremost developers of security, storage and systems management software. Symantec has recently detected three new variations of this type of mal
  232. Windows 7 Application Compatibility
    Windows 7 OS Advisory for UH-owned computers: ITS currently recommends that the UH community use Windows 7 Pro, instead of Windows XP. All ITS-supported applications and web applications work on Windows 7. Microsoft will end support for Windows XP o
  233. Hawaiian Diacritics and MS Word for the PC
    Overview This document describes how to configure Microsoft Word to properly display Hawaiian diacritical marks. On June 12, 1992, Governor Waihe‘e signed a bill relating to the Hawaiian language that essentially authorizes and encourages the
  234. Windows 8.1 Application Compatibility
    Microsoft recently released Windows 8.1, an upgrade to Windows 8, for PC desktops, laptops and tablets. ITS fully supports Windows 8.1 at this time. ITS will assist with Windows 8.1 re-installs, setup, troubleshooting, and general support issues for
  235. Windows 8 Application Compatibility
    Microsoft recently released Windows 8, a new operating system for PC desktops, laptops and tablets. ITS fully supports Windows 8 at this time. ITS will assist with Windows 8 re-installs, setup, troubleshooting, and general support issues for this ope
  236. What is the "OK" Confirmation?
    To increase security, there are a number of actions for which LISTSERV requires confirmation before proceeding. In some cases, LISTSERV will accept a password-based validation. In other cases, email confirmation is require