Tech Support

Phone: 856-4124
ITG Job Request

Temp Monitors

A202(Server Room) - 67.93F
Wed Apr 16 23:48:01 2014
IUDC(Enterprise) - 78.03F
Wed Apr 16 23:48:01 2014
Temperature History

News and Notices

Heartbleed at IU: What you need to know

By now, you have likely heard about a critical flaw in OpenSSL, an application used for online security on many high profile websites, identified last week. Known as Heartbleed, this serious vulnerability requires your (and your system administrators’) immediate action to protect both personal and institutional information.
When exploited, Heartbleed could give an attacker access to all information -- including your usernames, passphrases, and private keys -- contained in the affected site’s memory. To secure your accounts after sites patch the vulnerability, we recommend that you:

  • If you have not already done so, immediately set new, strong passwords/passphrases for all affected sites and services. Please note: You do not necessarily need to change your IU passphrase. In most cases, Heartbleed does not affect your IU Central Authentication Services (CAS) login. Affected IU users will receive a separate communication with instructions to set a new passphrase
  • Avoid reusing the same passwords/passphrases for multiple services.
  • Use a password manager [1] to store passwords/passphrases.
  • Stay alert to phishing (fraudulent email messages appearing to come from legitimate enterprises)[2], and social engineering [3] attempts related to Heartbleed vulnerability.
  • Report suspicious activity to

Inside IU, we have taken several steps to address Heartbleed and inform system administrators. The University Information Security Office (UISO) posted a security bulletin [4] last week. The UISO has also implemented techniques to identify all vulnerable services on the IU network and block attempts to exploit services on the IU Network. None of the major IU services (e.g., Central Authentication Service, Oncourse, OneStart, IU Secure) were vulnerable to the OpenSSL Heartbleed bug.
Outside IU, CNET has created a helpful list of affected sites [5]. It includes popular services like Dropbox, Etsy, Facebook, Flickr, GoDaddy, Google/Gmail, Instagram, Netflix, OKCupid, Pinterest, Tumblr, Wikipedia, Yahoo, and YouTube. If you have logged on to any of these sites over the past two years, change your password immediately. See the list of resources below for further guidance and help protecting your critical information.
Indiana University is committed to maintaining a robust and secure technology environment. Thank you for your assistance in addressing this serious security matter.

3D Printer Time-lapse Video

Watch a structure come to life in under 2 minutes with ITG's 3D printer.

About using One, the "OneStart restart"

Check out One, the new OneStart replacement.

Although original OneStart will be available until spring 2015, you can now use the new One, with simple search and app store features. Rather than the multiple steps required in the current OneStart portal, One allows you to get directly to your task with substantially less clicking. Read more about One...

Windows XP SP3 and Office 2003 will go out of support on April 8, 2014

In 2002 Microsoft introduced its Support Lifecycle policy based on customer feedback to have more transparency and predictability of support for Microsoft products. As per this policy, Microsoft Business and Developer products, including Windows and Office products, receive a minimum of 10 years of support (5 years Mainstream Support and 5 years Extended Support), at the supported service pack level.

What does end of support mean to customers? It means you should take action. After April 8, 2014, there will be no new security updates, non-security hotfixes, free or paid assisted support options or online technical content updates. Running Windows XP SP3 and Office 2003 in your environment after their end of support date may expose your company to potential risks.

IT-28: Cyber Risk Mitigation Responsibilities


Collaboration Technologies

Videoconferencing, web conferencing, and video streaming services are availble to satisfy all your digital collaboration and distance education needs. Learn More...


IU wireless upgrades: Network engineers completed wireless upgrades on Feb. 1, so you now have improved access to the IU Secure wireless network. You’ll get the best connection if your device supports 802.11n protocol in both the 2.4 and the 5Ghz bands. Learn more and give feedback

IUWare changed their links for wireless configuration downloads.

Alert - DHCP Registration Hostname Change
Software - SSL VPN downloadable installers
Reminder - Re-configure your wireless for IU Secure
Security - Information and IT Policies

Tech Monitor

IU Secure: The faster, safer wireless connection
April 10, 2014

The next time you connect to Wi-Fi on campus, choose IU Secure as your network instead of "attwifi" for a faster, safer connection. IU Secure also gets you more bandwidth, less buffering on Netflix movies, fewer interruptions on Skype calls, and no lag time when you're gaming.

The speed and safety you gain are worth the few extra seconds of effort it takes to log on.

Learn more:

How it's done: How to use Big Red II
March 13, 2014

Big Red II is IU's biggest, fastest supercomputer to date. Not quite a year old and among the world's fastest, Big Red II is designed to help researchers in a wide variety of fields process their big data. The supercomputer is available to IU graduate students, faculty, and staff. Undergraduates and non-IU collaborators need IU faculty sponsors.

The Knowledge Base has all the details:

Beware fake Help Desk scams
March 13, 2014

Cyber criminals are masquerading as help desk support to compromise and take control of your computer. They trick you into thinking your computer is malfunctioning, then try to get you to download software or let the "technician" remotely access your computer to "repair" it.
Always be suspicious of any email that asks you to divulge personal or financial information, is urgent, or contains a link to a website that does not match the organization sending the email. Never give control of your computer to a third party unless you can confirm that the third party is legitimate.

If you think you've received a fake request, report it to the Support Center immediately:

Upgrade to virtual servers, storage, and backups
March 13, 2014

Departments: Did you know IU offers access to the same high-performance and high-availability hardware used for important university apps and services? Plus, data security and physical protections add extra layers of IT-28 policy compliance. The upshot: You no longer need to maintain your own servers, storage, or backups -- IU Intelligent Infrastructure can do that for you.
Need more convincing? A spring upgrade will increase CPU speeds by over 30%, improve performance via faster cache and system bus speeds, and double the amount of memory per server. These gains ensure smooth transitions from physical hardware, and plenty of room for growth.

To learn more about the upgrade, see:

Switch to IU Intelligent Infrastructure today:

How it's done: Safeguarding your computer from viruses and hackers
March 12, 2014

A few simple precautions can help protect your computer from the bad guys. The Knowledge Base has all the details.

Learn more:

Keeping IU's digital information safe
March 12, 2014

Cyber criminals look for easy pickings and prey upon weakness. IU's IT-28 policy is designed to reduce vulnerabilities and exposure as much as possible to protect IU's digital information.

Departments are required to submit comprehensive evaluations of their IT environments by this May -- and UITS IT Community Partnerships is here to help, offering to visit and answer questions about the comprehensive evaluation.

If you manage servers or IT systems at IU and would like more information, email:

Learn more about IT-28 here:

Declutter by repurposing or recycling IT
September 3, 2013

Is old computer equipment cluttering your house or office? Keep it out of the landfill -- consider repurposing or responsible recycling instead; it's the law. (Read more about Indiana e-waste laws: Keep your data secure, though, by "wiping" your hard drives before you recycle.

Have a question about sustainable computing?

Learn more about protecting your data:

How to dispose of IU-owned electronics:

How to dispose of personal electronics:

Take IU's secure network with you - anywhere, anytime
May 26, 2013

IUís web-based SSL VPN gives you secure access to the universityís network for an authenticated and encrypted session from anywhere in the world. You can remotely access restricted university resources and network file servers, such as library databases and certain IUware and IUanyWare software, even when youíre using your home internet service.

Learn more about connecting to SSL VPN at:

Access SSL VPN from off campus at:

Questions? Contact the Support Center:

Check out UniCom's advanced voicemail options
Oct 8, 2012

UniCom is IUís unified communications tool that brings voice, video, and data together on your desktop.

Did you know it also offers a variety of voicemail options? UniComís voicemail function lets you create rules, set different greetings, and reset your PIN for checking your messages from a phone.

To learn more, read the UITS IT Training blog here: