Overall System Status:
Baker-Berry Library main street. (Photo credit: Joseph Mehling '69)
Dartmouth students, faculty, and staff can get a complete version of Microsoft Office for free to use for as long as they're an active student, faculty, or staff member at Dartmouth. See Microsoft Office for more information.
Eduroam (education roaming) is the secure, world-wide roaming access service developed for the international research and education community. It allows students, researchers and staff from participating institutions to obtain Internet connectivity when visiting other participating institutions by simply opening their laptop and connecting to the Eduroam wireless network that is now available at many institutions. See http://www.dartmouth.edu/comp/internet/wireless/eduroam.html for more information.
There have been recent phishing attempts using email asking for people to confirm usage of Dartmouth Outlook web mail service. These email requests are fraudulent; typical of most phishing attacks, messages will vary slightly when sent to different organizations. DO NOT click on any links provided in the message. Delete the message. If you have questions, please contact firstname.lastname@example.org
By April 6th, most central computing systems will be able to work with Java version 1.7.51. Since this newer version of Java is more secure than earlier versions, we would like everyone to upgrade as soon as possible after April 6th. See Java Upgrade for more information.
Microsoft discontinued support for the Windows XP operating system effective April 8, 2014. As of August 1, 2014, machines running Windows XP were blocked from the Dartmouth network unless they were behind a special segment of the network. See Windows XP Alert for more information.
News and information about Information Technology Services at Dartmouth
Some people have recently started experiencing issues with VPN connections. See Using the Juniper VPN for additional information.
CryptoLocker encrypts user files (Office documents, PDFs, pictures, etc.) using strong public key encryption, and then stores the private key required to decrypt the files on a remote server controlled by the attacker. Learn how to protect yourself from this malware.
Click here for information about recent outages.
Last Updated: 8/15/14