|
|
|
| VOLUME 7, ISSUE 6 |
January, 2007 |
|
If you wish to unsubscribe from this newsletter, send an email to
catprints@listserv.oneonta.edu with the phrase set catprints
nomail
in the body of the message. Click here to see an
Adobe Acrobat PDF version of this newsletter, suitable for printing.
|
|
Useful Voicemail InformationThere are some internal settings to your voicemailbox that may come in handy when you consider how to handle your voicemail: Storage Limits There is a storage limit total of 6 minutes of recorded messages. However, we have set the system to never block call answering when your mailbox is full. In other words, a caller can always leave a message in your mailbox. When you are over your limit, you cannot compose a message, forward a message, or send to a distribution list. Also, you will hear the “Your mailbox is full” message every time you log into your mailbox. Message Length and Age The maximum message length anybody can leave you is 90 seconds. At the end of that time, a recording will tell you that your time is up, but by pressing 5 you can get another sixty seconds of recording time.* A message you have listened to will be deleted 14 days from the date it was originally left in your mailbox. If you haven't actually listened to it, it won't be deleted until after you have logged off from that session. It's complicated, but here's an example of how it could work out in real life: You leave for a vacation after work on Friday, June 8th, 2007. You don't return to work until Wednesday, June 27th. Any messages in your voicemail you listened to before you went on vacation will be gone when you get back. Any new messages you haven't listened to that were left before the 13th will still be there to listen to, but once you do listen to them and then hang up the phone, they will disappear as well. And so on. Greetings
|
|
Managing the Home Wireless NetworkMany people with broadband Internet connections such as RoadRunner,
have set up wireless access points on their home networks. This
provides a convenient way to connect computers, The downside? Unless you take some steps to secure the wireless network, it is a wide open connection and your network traffic can be easily captured. If your wireless router is configured with default settings, anyone who can pick up the radio signals can probably use your network. That may be fine with you – you may not mind sharing your connection with your neighbors. You may mind, however, sharing your connection with strangers who are in range of the signal. They may be just surfing the Internet or reading their e-mail but they may also be doing something illegal via your network. For instance, they could be computer hackers, attempting to break into some other computer or they may be trying to capture Social Security or credit card numbers. Not only is your own data at risk of being compromised, but it will be your door the police knock on when they are investigating the crime. You should take some basic measures to secure your wireless network and prevent unauthorized users from gaining access. The actual steps you need to take will vary according to the make and model of your wireless router, so consult the documentation that came with the hardware. Many vendors now include directions on securing a home network in their documentation or at their websites. In general, though, here are the things you should do to help secure your wireless router:
Be sure to make these configuration changes to ensure that your
wireless network has the basic level of security needed to protect
your data and restrict unauthorized use of your Internet connection.
For further information see
http://www.microsoft.com/windowsxp/using/networking/setup/wireless.mspx
for a comprehensive guide to configuring and securing a home
wireless router. |
|
Identity Theft and the Value of InformationWe have all heard about the plague of identity theft, but have you wondered about the motivation for the person who steals it? Obviously
if someone gets your debit card and the PIN is written on the back of
it, they can drain your account if you don't cancel the card.
|
|
Personal Call PolicyThis is a reminder of the policy regarding personal use of college telephones by faculty and staff. This policy was established in 1992. Telephones are provided by the campus and the State of New York for professional use in order to accomplish our work. As such, inappropriate and unreasonable usage of the telephone for personal business is discouraged. The full text of the College's Personal Call Policy is available at http://www.oneonta.edu/admin/telecomm/personal_use_phone.asp.
|
|
|
If you have a question for Computer and Telecommunication Services about: Computer Problems or Related Issues - Call the
Information Technology Help Desk
at 436-4567 |
|