Your search for "policy/dmca.html" returned 130 results
  1. DMCA Takedown Procedures at UH
    A Digital Millennium Copyright Act (DMCA) infringement notice (also known as a DMCA takedown notice) is sent to the University when unauthorized copyrighted materials are found by copyright owners and/or their agents.  The takedown notice includ
  2. UH Account Privacy Policy
    Under normal circumstances, email is considered private and is not subject to audit or review except as stated in UH Executive Policy E2.210: “Use and Management of Information Technology Resources”. UH Systemwide Policies and Procedures
  3. Spaces for Google@UH Chat
    Spaces in Google@UH Chat can be used to communicate with a group of people or an organization about a topic, project, or shared interest. For example, you can create a space to discuss timelines for a future marketing campaign. With spaces you can:
  4. Information Security Policy (E2.214)
    Prepared by Office of Vice President for Information Technology & CIO and the Office of Vice President for Legal Affairs and University General Counsel Please click the following URL for the most recent version of the University of Hawai‘i
  5. Securing your Computer & Protecting your Information
    [Print Friendly Version]   Use of all University of Hawaii information Technology Resources are governed by UH Executive Policy: E2.210 — Use and Management of Information Technology Resources.  Continued use of your UH Use
  6. Policies
    Use and Management of Information Technology Resource Policy (E2.210): Please Read and understand the responsibility of owning and using an account here at UH. Student Conduct Code
  7. Basic Online Services for Students, Faculty, and Staff
    Your UH Username is valid for the duration of your affiliation with the University of Hawaii. Students must be currently enrolled in good standing; faculty and staff must be current employees of UH. For eligibility requirements and procedures for obt
  8. Copyright in the Digital Age
    Intellectual property is the lifeblood of a university, and all members of the university community should respect the work of others inside and outside the academy. University of Hawaii Executive Policy E2.210: "Use and Management of Informatio
  9. IT Security @ UH
    General Information Getting your PC unblocked on the UH Network Password Guidelines Securely Deleting Electronic Information Securing Your Desktop Compute
  10. How do I request a new LISTSERV list?
    Login to the LISTSERV request page with your UH username and password. Follow the instructions on the page. You will need to supply a name for the new list (must include a hyphen), provide a description, and select one of the configur
  11. Basic Guidelines for University of Hawaii Webpages
    Though ITS does not wish to stifle creativity for any departmental webpage, there needs to be a concerted effort to adhere to at least some minimal set of standards. Here are some guidelines (in no particular order) which you may consider: Dep
  12. UH Account Closure
    Students, Non-retiring Faculty/Staff, and UH Affiliates Retiring Faculty/Staff, and Emeriti Deceased Student or Employee/Affiliate UH Account Termination Student, Non-retiring Faculty/Staff, and UH Affiliate Students who ar
  13. DMCA Sample Takedown Notice
    From: RIAAInfringementNotification <antipiracy2@riaa.com>Date: January 18, 2007 4:02:40 PM HSTTo: David Lassner <dmca-agent@hawaii.edu>Subject: Case ID 226401097 - RIAA Infringement NotificationVIA EMAILJanuary 18, 2007David LassnerUniver
  14. UH POLICY: Official Campus Domain Names
    The chancellors of the 10 University of Hawaii campuses decided in 2002 and subsequently reaffirmed standardization of campus domain names as follows:manoa.hawaii.eduhilo.hawaii.eduwestoahu.hawaii.eduhawaii.hawaii.eduhonolulu.hawaii.edukapiola
  15. List Owner's Responsibilities
    A list owner is entrusted with its members’ personal information (email address and name), and this carries certain responsibilities with regards to ensuring privacy and security. You must determine what level of security is most appropriate fo
  16. How to Turn on Google Consumer Apps for Your Google@UH Account
    Open your web browser to https://www.hawaii.edu/google/extra Figure 1. Google@UH Consumer Apps Click the Login button. Login with your UH Username and password, for which you want to turn on Consumer Apps.
  17. Sensitive Information Paper Document Disposal
    Sensitive information is defined in UH Policy E2.214 and includes information like social security number, student records, health information, personal financial information, drivers license numbers, etc. If sensitive UH information is disclosed it
  18. 'Ohana Google@UH Storage Policy and Quotas
    This AskUs article applies specifically to Google@UH Storage Limitations and Quotas for our 'Ohana users (users who are no longer active students, staff, faculty, or other affiliates). If you are an active student, staff, faculty, or affiliate, pleas
  19. Getting setup for Multi-Factor Authentication (MFA)
    Step 1: Decide which method of authentication you wish to use Step 2: Decide which two devices you want to use ITS strongly recommends that you setup at least two devices for MFA. This is so that if one of your devices becomes unavailabl
  20. ITS Template Guide
    1. Save the template that you want to use from the index page onto your computer For Macs: go to “File” and then to “Download Linked File.” For Windows: right click and go to “Save Target As.” Imm
  21. Where can I find documentation for SAS software?
    Documentation for SAS software is available in many formats including an HTML-based online library, a PDF version and SAS books. For the latest information, go to http://support.sas.com/documentation/onlinedoc/index.html.
  22. ITS Computer Support Policy
    The Information Technology Services (ITS) Client Service and Operations Center section provides technical support to Supported Users systemwide through the ITS Help Desk. Contact the ITS Help Desk for support by calling 808-956-8883 (Oahu) or toll fr
  23. Emailing a Form from the hosted web servers
    Previously, we offered a perl script, pipeline.pl, to email a form. But, for security reasons, that script has been removed from our servers. Instead, we suggest you use the "mailto:" action of an HTML form: The "mailto:" action
  24. UH Student Account Information
    Creating Your UH Account You may request your UH Username online from the UH Username Management page by clicking on the "Get a UH Username!" link. Your UH Username should be ready within six minutes. Most services, such as MyUH, will be a
  25. Digitally Signing PDFs using Acrobat DC
    Electronic or digital signing must adhere to University policies, including EP 2.218. Using a Digital ID to sign a PDF What is a Digital ID? A digital ID is like an electronic driver’s license or passport that proves your identity. A digital
  26. UH Staff/Faculty Account Information
    Creating Your UH Account You may request your UH Username online from the UH Username Management page by clicking on the "Get a UH Username!" link. Your UH Username should be ready within six minutes. Most services, such as MyUH, will be a
  27. Google@UH Storage Limitations and Quotas
    In 2021, Google announced a new storage policy which will move our Google domain from unlimited storage to pooled storage across all Google@UH accounts by July 2024. This means that each Google@UH account’s use of Gmail, Drive, and Photos, in a
  28. Google@UH Documentation
    Google@UH Services and Terms Google@UH is the University of Hawaii's implementation of Google Workspace for Education. Google@UH Services are provided to UH users for instituational use and by using Google@UH Services, users agree to abide by&n
  29. UH Account Requirements
    Account Eligibility Username Rules and Guidlines Account Eligibility You must be a faculty, staff, or registered student with University of Hawai'i to obtain a UH Username. Emerti faculty and UH affiliates are also allowed. Your UH U
  30. UH Affiliate Account Information
    Creating Your UH Account Before you can get your UH Username from the online request system, ITS requires a memo from your sponsoring UH department or office on departmental letterhead identifying you and officially requesting that you have access t
  31. Safari Information (Mac)
    General Information "The best browser for your Mac is the one that comes with your Mac. Safari is faster and more energy efficient than other browsers, so sites are more responsive and your notebook battery lasts longer between charges. Built-i
  32. Online Services for 'Ohana
    ‘Ohana is Hawaiian for "extended family" and is very inclusive. At the University of Hawaii, ‘Ohana refers to the group of individuals consisting of alumni, former faculty or staff, and former University department affiliates wh
  33. Which web browsers are supported for Google@UH Gmail?
    Web browsers supported by Google includes, but is not limited to: FireFox 2.0 and higher Internet Explorer 6.0 and higher Safari 3.0 and higher Other supported browsers Please note that even though Google's brow
  34. UH Account Management and Changes
    You must activate your UH account before you can use your UH Email (Note: This was called an UH Email Account previous to September 2004). After your UH account is activated, your email address is your UH username with @hawaii.edu (e.g. the username
  35. Personal Home Page Policies
    The server that the UH Personal Home Pages resides on is administered by Information Technology Services (ITS) and is intended to allow faculty, staff, and students space to create personal home pages. We wish to retain the ability to publish pages f
  36. What is Offline mode in Google@UH Gmail?
    Offline mode allows users to access their email with no or limited internet access. Any changes you make to your account or emails you send will take effect once you have a good and stable internet connection. In this mode you will not receive any me
  37. UH ITS SurveyShare
    UH SurveyShare √ SurveyShare Features √ Request a SurveyShare Account √ Institutional Review Board √ Broadcasting √ Frequently Asked Questions (FAQ's) √ Resources √ Contact Information The Universit
  38. ITS Data Backup Policy
    The following information is provided to help users of Information Technology Services (ITS) systems understand the nature of the ITS backup procedures and the availability of information beyond the date on which it is deleted by the users. ITS back
  39. Adding a Page Counter to your Personal Homepage
    ITS has installed a simple system for tracking page visits, and for displaying visit counts. There are two steps: Add the string: <!--#exec cgi="/cgi-bin/counter"--> to your page. Set the "executable&quo
  40. Google@UH Consumer Apps FAQ
    Under an agreement with Google, the University of Hawaii (UH) offers two types of Google applications through Google@UH: Core applications (Core Apps) and Consumer applications (Consumer Apps). To use the Consumer Apps with your Google@UH account, yo
  41. Setting up UHM Wireless on Windows 11
      These instructions are for setting up access to the UHM broadcasted wireless SSID at the UH-Manoa campus when using Windows 11. Press Windows key + I key to open the Settings.   Select Network & internet from the ch
  42. Purchasing Computers for UH Departments
    This article Askus 1264 is intended for UH departmental computer purchases. UH departments may use either the NASPO ValuePoint Contract Price List 24-03 or follow UH Small Purchasing procedures (APM A8.250). The State Procurement Office (SPO) issued
  43. Student Conduct Code
    The following is a list of Student Conduct Codes for the various campuses within the University of Hawaii system. UH Mānoa: http://studentaffairs.manoa.hawaii.edu/policies/conduct_code/ UH Hilo: http://www.uhh.hawaii.edu/studentaffairs/conduc
  44. Counter for UH Department Pages (Count.cgi)
    Note: Only University of Hawaii departments with directories on the ITS server (accessible via http://www.hawaii.edu/departmentname) will be able to use this counter. Personal home pages (http://www2.hawaii.edu) and those on other servers will not be
  45. IT Policy and Guidelines: UH Manoa Wireless Networks
    As with all shared resources of the University, policies and guidelines are established to ensure equitable and reliable access to limited resources for all members of the University community. The UH Manoa network infrastructure is considered to be
  46. Could you please point me to some basic steps on how to operate the point and click version of SAS? If not, which book should I buy?
    Here's two resources.1. Start up SAS 8.2. Click at the top of the windows on "Solutions" then "Analysis" then "Analyst". The Analyst Application will open. Now click on "Help" and then "Using this Window". The Analyst Application reference book is l
  47. Be Cyber-Savvy
      Computer technology is continually advancing at an energetic pace, and the Internet can be a dangerous place if you are caught unaware! To help you become Cyber-Savvy, UH Information Technology Services has developed some tips to help keep
  48. Virtual Server: File Level Backup Policy
    The following information is provided to help virtual server customers of Information Technology Services (ITS) Managed Services understand the nature of the backup procedures if they choose the ITS offered backup service. Virtual servers are requi
  49. Creating Personal Homepages
    Welcome to Creating Personal Homepages. One of the privileges of having a UH Username is that you are allowed to create a personal homepage in your account that is viewable to the world. PLEASE READ! Pages which include offensive images or sounds
  50. Kuali Financial System (KFS)
    Please refer to the FMO website for more information on the Kuali Financial System (KFS): http://www.fmo.hawaii.edu/financial_systems/index.html
  51. As a parent or guardian how do I pay the tuition for my son/daughter online?
    Parents and guardians who have been set up as an Authorized User may logon to: https://epay.hawaii.edu/C24372_tsa/web/login.jsp with their email address and password. Information about being setup as an Authorized User can be found on
  52. Respondus (Quiz creation tool - Windows)
    Respondus is a Microsoft Windows based tool  for the offline creation and management of exams which can then be exported for use in Laulima (as QTI zip) or printed.  ITS has licensed Respondus for University Faculty and Staff use.  M
  53. Approval letter template for requesting the use of a non-hawaii.edu domain name on the UH network
    <insert campus/division logo here> <date> TO:        <name>            <Chancellor | Vice President> FROM:    
  54. IT POLICY: UH System Level Domain Names
    UH system level units and programs as well as multi-campus programs and initiatives may request a system level domain name in the form: program.hawaii.edu All other units, programs and initiatives must create their subdomain in their respective c
  55. Open Source Software Alternatives
    This is a brief list of open source software alternatives for paid consumer software suites and applications. The information is provided for convenience and does not implicitly or explicitly constitute an endorsement or recommendation for any of the
  56. Virtual Server: ITS Customer Backup Policy (non-ITS Backup Solution)
    This is a summary of the ITS Customer Backup Policy if customers choose NOT to have their servers backed up by ITS and have their own backup solution. ITS now requires backups for all Virtual Servers. For customers seeking a backup solution outside
  57. Thunderbird Information (PC)
    General Information Thunderbird, a free email application, allows you to receive, send, and read your electronic mail on your computer. Minimum System Requirements A PC running Windows 10 or later An Intel Pentium 4 or newer (Core i5, 3
  58. What can I do about spam?
    Look over your Inbox and manually delete messages that seem suspicious before you begin reading your new messages. Examples of suspicious messages include: messages with missing or strange subject lines messages with att
  59. Winmail.dat attachments
    When using Microsoft Outlook to send messages with Rich Text Formatting, the recipient receives an attachment called Winmail.dat which cannot be opened. The Winmail.dat attachment includes formatting instructions specific to Rich Text Formatting. To
  60. The UH Identity Management System
    The University of Hawai'i Identity Management System (UHIMS) collects and consolidates information concerning people associated with the University so that UH may better establish and manage a single, permanent identity for each person. This unique i
  61. IT POLICY: UH System Level Website Domain Names
    UH system level units and programs as well as multi-campus programs and initiatives may request a system level URL. All UH System URL requests will be categorized within a logical site structure, be it organizational (unit, department, office) or th
  62. Creating/Importing Quiz Questions in Laulima via copy and paste from a Word document
    The Tests & Quizzes tool allows for the import (copy and paste from a Word document) of test questions.  Types of questions that can be imported include multiple-choice, true-false, fill-in-the-blank, short essay, and multiple-choice with mo
  63. Securing Network Printers and Multi-Function Devices
    Network Printers and Multi-Function Devices (MFD) are common in offices because they provide the ability to copy, print, scan, and fax from one central machine that is shared by many. The MFD's typically store information and are connected to the ne
  64. Eduroam Wireless for UH Manoa
    The University of Hawai‘i is a member of the eduroam community of research and education institutions who share network resources among its users by allowing visitors access to its campus Wi-Fi. UH faculty, staff, and students who visi
  65. Adobe Reader Information (PC)
    General Information Adobe Reader, available free from Adobe, allows you to view and print files saved in Adobe Portable Document Format (pdf). To create PDFs, including form-fillable PDFs, use Adobe Acrobat or another PDF creator software of your c
  66. Network Etiquette
    Certain situations call for proper protocol to be observed. In bowling, one does not interrupt the person bowling in adjacent lanes by throwing the ball while they are already in the process of doing so. In tennis, returning a ball that is obviously
  67. What is new in LISTSERV 17.x?
    LISTSERV 17.0 is the latest major release of L-Soft's email list management software. The main new features include: Brand New Web Interface [Tips on new interface] The web interface has been completely redesigned for dramatically improved user-fri
  68. UH Computer Anti-Virus and Threat Prevention Information
    University of Hawaii (UH) Information Technology Services (ITS) provides software, services, and technical support to protect the UH community against computer viruses and security threats: Anti-virus software provided for UH faculty, staff an
  69. Protecting Sensitive Information at UH
    The University of Hawai?i (UH) is an extensive and multifaceted organization dedicated to the highest standards of scholarship and service, which requires an open flow of information and communication. Unfortunately, over the last decade, the emergen
  70. UH POLICY: Non-EDU Domain Names on UH Network
    University of Hawaii units are expected to use a hawaii.edu domain name for all services provided by the University.  This makes it clear that the University is providing the resources to support the service.  Non-university activities shou
  71. Heartbleed OpenSSL Vulnerability Information for System Administrators
    On April 7, 2014, a serious vulnerability in the OpenSSL cryptographic software library was exposed. This weakness, dubbed The Heartbleed Bug, allows a remote attacker to access system memory which may contain encryption keys, user credentials or
  72. Thunderbird Information (Mac)
    General Information Thunderbird, a free email application, allows you to receive, send, and read your electronic mail on your computer. Minimum System Requirements A Macintosh running macOS 10.9* or later An Intel x86 processor
  73. Web Hosting and Publishing
    Welcome to the Web Publishing page. You can create a personal homepage or if you represent an official university entity, you can request Web space on our server for a departmental Web page. Follow the resources below to get started or to enhance yo
  74. Budgeting for Departmental Computers
    Departments should expect to spend between $800-$1200 per CPU. Plan on upgrading CPU's every three to four years. Departments should annually budget enough to upgrade a third or fourth of existing computers. By upgrading a fraction of departmental co
  75. Secure Logins using SSH/SSL
    Overview The University of Hawaii Information Technology Services (ITS) has implemented Secure Shell (SSH) and Secure Sockets Layer (SSL) logins to the University's hawaii.edu servers. Using these protocols will encrypt information being passed
  76. Getting Help for Google@UH Gmail
    Google has very good online help articles. Click on the Help button in the upper right corner of the screen, then click on the topic in which you have interest. Or browse directly to http://mail.google.com/support/  You may also contact the ITS
  77. I have to see a campus representative to reset my password. Where can I find a list of campus representatives?
    A list of campus representatives is available online at http://myuhinfo.hawaii.edu/page/campusreps.html.
  78. Getting Started with Departmental Pages
    As a UH Department, your staff can have access to the Information Technology Services (ITS) Web servers for putting departmental information online. Getting Space The recommended method for doing this is to have someone in the department who is alr
  79. Virtual Server: How to Request and Install an SSL Certificate
    Summary If you are a valid UH ITS VMware Hosted Customer, you are entitled to a 1-year SSL Certificate at no cost. Procedure Information about the InCommon SSL certificate can be found at InCommon Certificate Program:UH ITS VMWare Hosted Customer
  80. What is spam?
    Spam is unsolicited email messages sent to your account. Spam is also referred to as "unsolicited commercial email" and "unsolicited bulk email". They range from harmless advertising to potentially offensive (complete with picture
  81. How do I get more help for Google@UH Calendar?
    Google has extensive documentation on their calendar here: http://www.google.com/support/calendar If you need further assistance with Google@UH Calendar, please contact the ITS Help Desk.
  82. Getting Help for Google@UH Sites
    Google has very good online help articles.  In Google Sites, click on the Help button in the upper right corner of the screen, then click on the topic in which you have interest.  You can browse directly to http://www.google.com/support/sit
  83. What is ITS doing about spam?
    Google uses a combination of algorithms and reporting tools to protect against spam, viruses, and phishing attacks. Using the same advanced computing infrastructure as its search engine, along with a vast community of users, Google touts having one o
  84. How does the Meridian Integrated Conference Bridge Work?
    To use the Meridian Integrated Conference Bridge, the participants dial a pre-assigned phone number, enter a password, and are prompted to "speak their name". A conference can begin two minutes before the specified time and an individual ma
  85. Recycling Electronic Devices SECURELY!
    To promote sustainability and conservation of our resources, UH Information Technology Services is coordinating periodic recycling drives for electronic devices for the University of Hawaii System (http://manoa.hawaii.edu/chancellor/sustainability/re
  86. ITS Documents Archive
    NOTE: The documents on this page are provided for historical and referential purposes only, and users should be aware that some of the information contained within these documents may no longer be accurate. ITS is not maintaining any of these documen
  87. ITS Documents
    NOTE: Some documents are available in multiple format. Alternate document formats include:        [HTML] - The document is in HTML format and may contain embedded graphics.        [PDF] - The docume
  88. Installing and Using Find_SSNs on Linux and Solaris
    This article is intended for Facutly/Staff who may have certain types of PI (personal information) located on a computer, running the Linux or Solaris operating systems. Overview: Find_SSNs is a piece of software written in python at VirginiaTech t
  89. Spam at the University of Hawaii
    Spam on the Google@UH email service is managed by Google. Email messages that Google deems highly likely to be spam will not be delivered to your mailbox and are instead placed in the folder labeled "Spam" (or "Gmail/Spam" if usin
  90. Even with all this, I still receive spam!
    Spammers are very aggressive in finding new ways to get their spam through any protective measures. ITS is making a concerted effort to isolate spam email before you receive it. But given differences in perception, there will never be a way to automa
  91. Why am I getting all this spam?
    Spammers (the people who send spam) "harvest" email addresses from various places. If you have done anything on the Internet at all (register a software product, participated in a online discussion board), your address could potentially be
  92. Google@UH Add-on Storage
    Information Technology Services (ITS) has established a program to provide add-on storage for Google@UH (Google Drive, Gmail) for a fee. This add-on storage is in addition to the allotted storage quotas provided to all Google@UH accounts. Active UH f
  93. UH and the NASPO ValuePoint contract
    The State Procurement Office (SPO) issued a new SPO Price List Contract No. 24-03 named "NASPO ValuePoint Computer Equipment (Desktops, Laptops, Tablets, Servers, Storage, Including Related Peripherals & Services)". The most current re
  94. McAfee compatibility on macOS Mojave 10.14 and later
    How has the installation procedure for new installs changed with newer versions of macOS? Starting with macOS 10.13 (High Sierra) and extending to macOS 10.15 (Catalina), when an application tries to enable a system extension during installati
  95. Getting Help for Google@UH Drive
    Google has very detailed online help articles.  In Google Drive, click on Settings  in the upper right corner of the screen, then select Help. Alternatively, you can browse directly to https://support.google.com/drive/?hl=en&p=mktg_home
  96. Adobe Reader Information (Mac)
    General Information Adobe Reader, available free from Adobe, allows you to view and print files saved in Adobe Portable Document Format (pdf). To create PDFs, including form-fillable PDFs, use Adobe Acrobat or another PDF creator software of your ch
  97. Server Side Includes (SSI)
    Server Side Includes (SSI) is a simple interpreted server-side scripting language used for webpages. The most common use of SSI is to include the contents of one or more files that are hosted on a web server into a single webpage. To include the con
  98. UH Device Registration Program
    Annual Device Registration Requirements All servers (such as email, web, FTP, or other file services) operating on the University of Hawaiʻi network must be: Reported in the Device Registration database Continually scanned and remed
  99. Hitman Email - a Variation of Phishing Emails
    ITS has received a few reports of people receiving a threatening email in which the sender claims to have received a contract to kill the recipient.This type of message is a phishing email - and yes, it's very scary to receive some thing of that natu
  100. Security (or lack of it) on the Internet
    The modern age of surfing the internet has produced many ways for unwanted email (spam) to get to you. Some are annoying by sending you unwanted information about a product being sold, but others more recently are highly invasive with potential of id
  101. Trouble connecting an email client to Google@UH Gmail
    If experiencing problems connecting your email client to Google@UH Gmail, please attempt the following: Ensure that IMAP/POP is enabled for your Google@UH Gmail account. Refer to Ask Us 1147 for instructions on doing this. Verify that you
  102. Frequently Asked Questions About Adding Information to UHINFO
    Information on the Web becomes part of UHINFO when it's stored or linked into the central information servers on campus. Many colleges, schools, and departments run servers and the Information Technology Services (ITS) office also maintains several c
  103. Secure Document Destruction
    When disposing of paper documents that contain sensitive information, it is best to ensure that they are securely destroyed by shredding. When storing and transporting documents to be shredded, there are some important steps you can take to ensure th
  104. How do I enable my personal webpage?
    If you do not already have a webpage on UHUNIX, you can login with your UH Username and password to the Managing Your UH Username page and click on Create Home Page under the Personal Home Page Options section. If you already have a webpage on UHUNI
  105. If you suspect that your account has been compromised...
    With the recent increase of phishing scams and a few instances of people replying to these scams, please follow these basic instructions to secure your UH Username. Call our ITS Help Desk to report the possible compromise and to get further assistanc
  106. Physical Device Security
    The security of your data is only as good as the amount of physical access someone has to it. Most common security measures such as firewalls and passwords will be rendered useless if someone gains physical access to your device. With laptops getting
  107. PC Energy Savings Guideline
    UH has over 10,000 networked personal computers to support teaching, research and administration. PCs and other electronic office equipment, such as printers and scanners, collectively consume significant amounts of energy. Fortunately, there are way
  108. Virtual Server: How to Install and Configure Backups (Bacula) on a RHEL Server
    SUMMARY The Bacula Enterprise Edition (BEE) backup service is the optional daily backup service listed in the ITS VMware Hosted Solutions page. Backups are file level only. If you are a virtual server customer and have purchased the daily
  109. Anti-Spyware Solution for Your PC
    The following anti-spyware solutions are for PCs running the Windows operating system. ITS recommends the following anti-spyware solutions for your PC depending on where and who owns the computer. Unlike anti-virus software, you may install more then
  110. UH File Drop
    What is UH File Drop? UH File Drop is a service for the UH community for allowing transfer of large files (up to 999MB) to others in UH and/or people unaffiliated with the University. It is recognized that there is a growing need within the
  111. ITS Service Level Agreement - Virtual Server Hosting Service
    Description The Virtual Server Hosting Service provides the UH community with access to virtual servers running a Red Hat Enterprise Linux (RHEL) or a Microsoft Windows operating system. ITS utilizes a VMware cluster for the provisioning of the virt
  112. How Do I Set a Footer(Bottom Banner) in LISTSERV?
    Bottom banner templates allow you to include a footer on each message sent to a list. The DEFAULT_BOTTOM_BANNER and DEFAULT_BOTTOM_BANNER_HTML templates provided include a link that subscribers can click on to easily unsubscribe f
  113. NIH "login.gov" account signup required by Sep 15 to use services
    The Federal Government is rolling out a centralized portal, login.gov, to provide secure access to all government agencies through a single username/password with two-factor authentication. Users of eRA Commons, ASSIST, and other NIH services
  114. Using Attachments in Google@UH Gmail
    It is possible to send files to another person by attaching them to email messages. These files are referred to as attachments . Any kind of computer file can be an attachment: a word processing file, a spreadsheet, a database, an audio or video file
  115. Dialing Instructions
    ON CAMPUS, to call: 956 and 957 prefix numbers (on-campus):  Enter the last 5 digits of the 7 digit number Campus Operator:  Enter 0 For after hours repair/trouble, enter 65000 and leave a message.
  116. Setting up Dreamweaver with secure FTP (sFTP)
    Contents Notes on departmental websites under UH Hosted Website Service Creating a new website profile Managing an existing website profile   Notes on departmental websites under UH Hosted Website Service This
  117. Creating a Custom Search Engine (CSE) / Create a Search Box for Your Department
    Method A:  To create a search that will display the results on the same page, use a Custom Search Engine (CSE). There are many options for a CSE. These instructions will get you started with a basic CSE. Login to http://www.google.
  118. How Do I Set a Mail Template in LISTSERV?
    You can create or modify templates to customize informational messages from the LISTSERV processor. Mail templates do not modify the contents or style of mail sent to a list or through the newsletter feature. Note: The following sections make use of
  119. What are the available options in Google@UH Calendar?
    To access the Google@UH Calendar options, click on the "Settings" link in the upper right corner of the calendar window, then select "Calendar settings".  Be sure to click on the "Save" button to save any changes yo
  120. Securing your Computer
    If your computer has been compromised, Information Technology Services (ITS) reserves the right to block your IP/MAC Address from connecting to the network in order to protect the integrity of the University of Hawaii network. Information on getting
  121. UH Username End of Life - Saving Email and Personal Webpages (Windows)
    This document is for users who are no longer affiliated with UH, and who have received a notice that they have 180 day grace period before their email and personal webpage data are removed from the UH servers. The following instructions show you
  122. Getting Your PC Unblocked on the UH Network
    The following information pertains only to computers utilizing a Windows-based operating system that have become infected with a virus and that are on the UH Network. Detecting and Removing Viruses Virus infection is a common reason a computer c
  123. ITS Service Level Agreement - Co-Location Service
    What is “Co-Location?” “Co-Location” is an ITS service that allows departments and researchers at the University of Hawaii to locate and operate their computing hardware inside professionally maintained data centers on the Ma
  124. Phishing at UH
    What is phishing (pronounced "fishing")? From Wikipedia: phishing is "the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustwort
  125. Browser Recommendations for ITS-Supported Web Applications
    Browser Recommendations The following browser recommendations are for ITS-supported web applications and are based on coordinated testing efforts between the ITS Help Desk and the developers for various ITS-supported web applications. Because of the
  126. Virtual Server: How to Connect Your ITS-Hosted RHEL 7 Virtual Server to an ITS Private Network
    OVERVIEW Sometimes in order to access certain services offered by UH Information Technology Services (ITS) from your ITS-hosted virtual server, you will need to have access to an ITS private network. The instructions in this article give you ins
  127. Accessing LISTSERV via the Web
    This article provides a quick tour of the list management areas of the web interface. For more information about each page, refer to the online documentation by clicking on the question mark in the top-right corner. Some common tasks have been includ
  128. Disposal Guidelines For Unused UH-Owned Computer Equipment
    This document is intended to assist University of Hawai‘i departments who wish to dispose of computer equipment that may still be useful to others. These guidelines are not intended to replace any Administrative Procedures, so be sure to consul
  129. Telecommunication Services Rate Schedule July 1, 2014
    For more information contact the Information Technology Services  - Telecom User Services  Office at 956-6033 or email telecom@hawaii.edu. Telephone Services Service Package
  130. Virtual Server: How to install and configure backups (Bacula Enterprise) on a Windows Server
    SUMMARY: The Bacula backup service is the optional daily backup service listed in the ITS VMware Hosted Solutions page. Backups are FILE LEVEL only. If you are a VM customer and have purchased this service, a client will need to be configured on y