
|
|
VOLUME 5, ISSUE 3 |
JUNE, 2004 |
CATPrints goes online-only
The CATPrints newsletter first appeared in March 2000. Fifty
issues have reached your mailbox printed on a single sheet of paper since
then, representing some 52,000 sheets, or a hundred reams. This
sixteen foot-high stack of paper has brought you many informative and
interesting articles over the last four years, and we have now decided
that it is time for the newsletter to go paperless. This will give
us the opportunity to give you direct links to other websites, it will
allow us to insert images of very high quality, and most importantly it
will remove the self-imposed restriction of a single sheet of paper for
the content of our newsletter.
This newsletter will come to you each month as a web-formatted email message.
You receive it because you are subscribed to an email listserv -
catprints@listserv.oneonta.edu. You may choose to unsubscribe
from this listserv by clicking on this link and sending the resulting
message to our list server.
|
Student Interns creating virtual campus
Since January, two student interns from the Computer Art major have
been working on a digital model of the Oneonta campus. This model
will allow the web development team to make animated flythroughs of the
campus, create realistic illustrations of campus scenes from any vantage
point, and can be extended to make renditions of proposed changes to the
campus.
Mike Stavrides, who graduated in May, has completed the central
quadrangle of the model. Terry Brosseau is picking up where Mike
left off and plans to rough out the rest of the campus by the end of the
upcoming semester. You can see samples of the model
at this page (QuickTime
is required to view the video animation).

Digital model image of the central quad |
What our staff is up to...
Joe McMullen and George Couse are doing part of the wiring job that
will bring telephone and network access to Higgins Hall in time for its
first residents.
"We
are assembling three hundred pair to supply connections to that building,
in addition to the fiber optic cable that runs through the ground
conduits." Joe explained. The work requires a great attention to detail
and a methodical approach. Each set of four wires must be wrapped
around the correct set of terminals in the campus switchroom to ensure
that signals t ake
the correct path. The work is also being done on a fairly tight
deadline. "We have to have basic service to the residence hall
before a certificate of occupancy can be issued," says Joe, "so we
plan
on finishing the job before the end of July. Coworker George Couse
is handling the splicing of the fiber optic cable that has already been
run in segments from the switchroom to Higgins Hall.
|
If you have a question for Computer and Telecommunication Services
about:
- Computer or network problems - x4567
- Telephone service or problems - x2577
- Directory assistance - x3500
|
College Email Broadcast Policy
An email broadcast is a mass email sent by Computer Services to all
students, all faculty and staff, or both. Messages will be approved using
these criteria:
- Messages must be approved by the President or his designee.
- Broadcasts are made in case of emergencies: urgent messages of
general concern.
- Notification of campus network or other computer related events
that affect many users.
- Last minute cancellation of campus-wide events
See the
entire policy at this link. |
New College Virtual Tour
The Web Development Office has been working away at creating a Virtual
Tour for the College. The tour is online and contains images, text,
video, virtual reality sets and audio recordings.
You can now browse through the
completed sections of the tour. Audio and video requires
QuickTime. Check it out! |
Hardware for the Blind
Researchers at
Wright State
University have developed a system that uses a camera, a headset and
backpack computer to help a blind person navigate their world.
Slightly more far out are
experiments being
done to create implants that will take a video image and transmit it
directly to the optic nerve of the blind person. |
Outlook Mail Tips
Making an advanced graphic signature for your email messages
We all "sign" our email messages - usually with text. Many people
use Outlook's Signature settings to create a custom text block that is
attached to every message they send. Some people go so far as to
use Outlook's Stationery settings (Tools- Options- Mail Format-
Stationery and Fonts) to create colorful messages with different fonts
for the body and the signature. Recently we were asked about the
possibility of appending a "real signature" to an email message; it is
possible, but pretty involved to set up. First you have to sign your
name on a piece of paper, preferably with a fine-tip marker. Then
you scan the piece of paper and save the image as a gif or a jpg image
file. Incidentally, once you have this scanned image you can use it in
word-processed documents like letters - the signature will look just as
good as a real one. If
you create a simple little webpage and insert the image of your scanned
signature (and other imagery or text, for that matter) into the page, you
can then copy and paste the contents of that page into the signature box
in Outlook and/or Outlook Web Access. Then any message you send
will have the contents of the little webpage appended to the end of the
message.
If you are interested in doing a customized signature file, or
in learning how to make a website generally, your best bet is to sign up
for a training session in Microsoft FrontPage. Call Phil at the Web
Development Office (x 2710) or Jiang Tan at the Teaching, Learning and
Technology Center (x 3520). |
A discussion of non-legitimate email (spam and virally-generated
messages)
Non-legitimate electronic mail has become a global problem, far
outweighing the total number of legitimate messages sent across the
internet. These unwanted messages fall into two broad categories:
Virally-generated messages and Spam messages. Virally-generated messages
are created by computers that are infected with various examples of
computer viruses, trojans or worms. Spam messages are generated by
entrepreneurs using mass-mailing software.
Costs of bogus messages
There are significant costs associated with both kinds of unwanted email
messages. The person receiving these messages has to spend a fair amount
of time sifting through their inbox, looking for a relatively small
number of legitimate messages. This process is complicated by the ability
of spammers and viruses to masquerade as senders known to the user. It is
also quite common for desired messages to be discarded by mistake among
the many false messages received on a daily basis. In addition to lost
productivity and missed email, there are costs associated with efforts
made at the server level to stop incoming bogus messages. There are also
real costs and lost productivity resulting from infected machines on
campus that require service from desktop support offices.
What we are doing to reduce unwanted email
Virally-generated messages
Computer Services attacks the virally-generated message on two fronts.
First, the Administrative Computer Service’s Secure Desktop Program is a
largely successful effort to make computers invulnerable to infection
from known viruses, trojans and worms. Any new computer, and any computer
brought in for service is automatically converted to a Secure Desktop
configuration, which requires no further user intervention for the
application of patches, updates or other maintenance. The Academic
Computing Service’s ASCI program offers similar protection to Faculty
users. The College also switched to SOPHOS antivirus software, which is
freely available to all faculty, staff and students. This greatly reduces
the incidence of bogus email generated from within the campus.
Secondly, if an infected message arrives at the College’s email server,
McAfee’s GroupShield software strips the viral content from the message
before delivery. Messages that appear to contain viruses are the leftover
husks of messages that have been stopped by GroupShield. More than two
thousand such messages have been stopped in the week ending June 22. In
the near future the College will be upgrading from McAfee’s GroupShield
to Sophos to take advantage of the industry leader in antivirus software.
Unsolicited commercial email (Spam)
Spam requires a different approach. Computer Services uses two additional
methods of reducing the total amount of spam arriving in users’
mailboxes. The College subscribed to a service a year ago that tracks
known spammers around the world. A second list was added about six months
ago. This allows Computer Services to block messages originating from
those senders at the mail server. An average of forty thousand such
messages each day are being blocked from arriving on campus. A second
line of defense that has been successfully tested and is now available
for users is SpamBayes, an application that resides on the user’s
machine. SpamBayes learns what the user considers bogus email and
actively filters every incoming message based on those learned criteria.
These efforts have resulted in a significant reduction in the total
amount of unwanted email arriving in College users’ inboxes. For some
users the net result may be less impressive – we are stopping an
increasing percentage of unwanted messages, but the total volume of bogus
email out there is also increasing at an equal or greater rate.
Communicating with the user community
Computer Services has had a continuing strategy to communicate the nature
of unwanted email and ways to deal with it. New threats posed by viral
messages are frequently announced in broadcasts and posted on Help Desk
web pages. Information about all kinds of bogus email has been
communicated in the Computer and Telecommunication Services Newsletter,
CATPrints (January & July 2002, April & November 2003, March 2004) and
repeatedly in other I.T. newsletters from Academic Computer Services, the
TLTC and even the State Times.
Pursuing New Strategies
There are additional technologies available for further reducing the
amount of unwanted email – but it should be understood that implementing
them invokes an increase in cost and a decrease in privacy.
In-depth scanning
Stopping unwanted email messages is a balancing act between intrusiveness
and privacy. If users are willing to tolerate the automated scanning of
email for specific key content, a much more thorough job of filtering
spam and viral messages. The ultimate fate of messages is also debatable
– they can be automatically deleted, or can be dumped into a special
folder on each users’ account for later review and deletion.
Message signing and encryption
Another possible strategy involves the use of electronic signing of
messages. This technique can guarantee that a message from an individual
is really from them and not spawned by a virus or a mass-mailer. Signing
can also be used for message encryption, greatly enhancing privacy for
internal email communication. |