2009 Chrysalis Microcomputer Seminar


  1. Using the ISU "People Finder" to contact people on campus

    1. Two easy ways to access the "People Finder:"

      1. Go to the ISU home page at http://www.ilstu.edu/ and click on the "People Finder" link on the left.

      2. Go directly to the "People Finder" page at http://www.ilstu.edu/home/find/index.shtml

    2. Search Tips:

      1. When specifying names, provide enough information to sufficiently narrow the results, but not so much that you unintentionally "screen out" the desired individual.  As an example, a person might adopt a first name for everyday use that is different from the "official" one that ISU has in its records.

      2. Remember that some married women adopt a hyphenated last name, while others simply use that of their husband.

    3. Performing a "reverse" look-up:  finding someone's name if you know their ULID

  2. Using  the ISU "Campus Map" to find your way around campus

    1. Two easy ways to access the "Campus Map:"

      1. Go to the ISU home page at http://www.ilstu.edu/ and click on the "Campus Map" link at the top.

      2. Go directly to the campus map at http://maps.illinoisstate.edu/

    2. Accessing the ISU "Tree Map" at: http://www.facilities.ilstu.edu/grounds/treemap.html

  1. Accessing timely information about virus/phishing threats and network maintenance/outages at ISU's "Outages and Alerts" page at: http://www.alerts.ilstu.edu/

    1. Two things to remember about network outages

      1. Planned network outages are often scheduled for "off times" such as late at night, Sundays, and holidays.  (Keep this in mind when deciding when to work on assignments that require network access.)

      2. Obviously, unplanned outages can happen at any time, but often seen to occur at the worst possible time--such as at the end of the semester when student projects are due.  (Please keep this in mind if you tend to wait until the last minute to work on your assignments.)

    2. Since one of the main ways in which computer viruses spread from machine-to-machine is through e-mail, be very cautious about opening attachments (even if they "appear" to be from someone you know).  Ask yourself whether it is reasonable for that individual to send such a message/attachment to you.  It is better to ask than to risk an infection.

    3. Ask yourself these questions to help determine whether an e-mail message is part of a phishing scam:

      1. Does the message contain excessive warnings about dire consequences if you fail to take immediate action?

      2. Does the message "appear" to be from a source that would not normally correspond with you via e-mail?

      3. Are there numerous spelling, grammar, or punctuation errors in the message?

    4. Never send password-related information via e-mail, even if the person requesting it "appears" to be from an official source.  ISU will never ask for such information in an e-mail message.

    5. If you suspect that someone has gotten ahold of your ULID password, change it immediately by going to the following address: http://www.ilstu.edu/ulid/ and click on the "ULID Password Changes" link.

  2. Working with E-mail Attachments

    1. Why you might need/want to edit e-mail attachments

    2. The importance of not editing a "cached" version of an e-mail attachment

    3. Initial attachment of files to e-mail messages

    4. Downloading e-mail attachments to your desktop

    5. Re-attaching (edited) files to e-mail messages

  1. Using the "H" (Home) drive on ISU's "Datastore" server to back up your important files

    1. Accessing the "H" drive from an on-campus location:

      1. using the "Map Network Drive Utility" available at: http://www.helpdesk.ilstu.edu/downloads/

      2. using the "Map Network Drive" feature of Windows, and specifying the drive's address as \\datastore\Home in the "Folder" field

    2. Accessing the "H" drive from an off-campus location:

      1. using the web-based VPN (Virtual Private Networking) client at: https://webvpn.ilstu.edu/

      2. by downloading, installing, and running the "Cisco VPN Client" and the "Map Network Drive Utility" available at: http://www.helpdesk.ilstu.edu/downloads/

    3. Obtaining usage statistics for the "H" drive at the "Datastore Quota Information" page at: https://secure.ilstu.edu/ulid/quotas/

  2. Downloading software from ISU's Helpdesk "Downloads" page at: http://www.helpdesk.ilstu.edu/downloads/

    1. Two different mechanisms that ISU uses for distributing software to students, faculty, and staff:

      1. "Password-protected" downloads

      2. "Non-password-protected" downloads

    2. The importance of saving downloaded files to a known location on your computer (like the desktop)

    3. Two different ways of distributing computer software:

      1. as a single "executable" (.exe) file

      2. as a "zipped" (.zip) archive file

    4. Two different approaches for downloading files from the web:

      1. an example of the "left-click" technique

      2. an example of the "right-click" technique

    5. The procedure for "unzipping" downloaded .zip archive files

    6. An excellent place to find free software is the  "Snapfiles" web site at:  http://www.snapfiles.com/freeware


                                                                                                                                 B.F.  7/24/09