Tech Techniques

From Hofstra Student Computing Services
Jump to: navigation, search

Contents

Online Security

  • Use the HU Preferred wireless network!
    • It's more secure!
    • You don't need to create a username and password every 24 hours!
    • Ability to use PridePrint!
    • Full access to all web sites, applications, and email clients!

Top Three Things You Should Know About Online Security!

  • Always browse using HTTPS if you are on a sensitive site (e.g.: banking site, facebook, shopping site) or submitting sensitive information (e.g.: birth date, social security number, credit card number)!
  • Create secure passwords!
  • Don't give out your personal information!

On February 27, 2013, Dr. Joel Evans presented: "How to be Even Smarter Online, Especially with Social Media." Dr. Joel Evans, RMI Distinguished Professor in Business at Hofstra University, talks about protecting your privacy, learning how to have strong passwords, reducing your chances of getting hacked, being careful what you say online, and knowing how you are being tracked. Lots of tips! This event was sponsored by Student Computing Services and was held in the Calkins Learning Lab. Watch the session:

Check more on Online Security!

Mobile Security

  • Malicious QR Codes
    • QR (or Quick Response) codes are images that can be scanned by a mobile device in order to direct the device to a website. They can take you to an untrusted site! Be careful when choosing which ones to use!
  • SMiShing
    • The mobile version of phishing has been dubbed "SMiShing" (because Short Message Service (SMS) is the protocol behind text messaging). Don't put in your personal or login information unless you initiate going to a site!
  • Premium SMS Fraud
    • This is a variant of phishing, in which a user is invited to respond to a scam text message in the same way that they would respond to the Red Cross. Go to main website first and navigate from there.
  • Jailbreaking/Rooting
    • "Jailbreaking" or "rooting" is a practice in which a user disables restrictions on their mobile device in order to increase their control and their ability to customize the features on the device. They are much more vulnerable than devices that are consistently updated.
  • Lost Phones
    • A lost and unprotected mobile device can offer a gateway to many kinds of personal information.

Traveling with Technology: Tips

Make sure you travel safely!

Cloud Computing

Cloud Computing is a general term for anything that involves delivering hosted services over the Internet. In a sense, it allows you save any files or important documents to a large database that is accessible from any device you own.

Interested? Learn more about Cloud Computing!

How to Search Effectively and Efficiently

Searching the Internet can be a daunting task. With so many ways to search, it is difficult to narrow down what you are looking for. Luckily, Google Search Engine offers an advanced search option to find what you are looking for. By following these steps on How To Search, searching for a topic on the Internet will be much more successful.

PCs and Macs

Changing from Mac OSX to Windows 7 can be an intimidating thing, but it doesn't need to be. They both do essentially the same job, just in slightly different ways. This tutorial will give you some basic information that can help to make this transition a lot less stressful. There are only a few subtle differences that you're going to need to keep track of but it's all basically the same. Click on the image of the operating system you would like to learn more about:

Professional iDesktop small.jpg Professional Desktop small.jpg


PCs for Mac Users

Macs for PC Users

Professional Social Networking

It is never too early to start networking! check out more on LinkedIn.

PowerPoint 101

Some basic tips on how to create a great PowerPoint presentation.

Slow Computer? Clean it up!

Is your PC slowing down? There are ways to clean it up.


Back to Main Page

Personal tools
Namespaces
Variants
Actions
Navigation
Toolbox