Internet course: Part 1 Facilities at UiO User account Applications on the computers in the PC room Access to printers Computer Viruses Using the Web Email Part 2 Office applications (Word, Excel, PowerPoint) Saving files Computer Orientation User account: Your useraccount is your key to the University resources. With it you get: Personal email account Personal disk space on the network Access to high speed internet. Access to a wide number of computers on campus Access to the World Wide Web Access to make personal web pages Access to databases (medline cinahl ) Do not allow others access to your account. Changing you password Start IE and enter http:\\passord.uio.no on the location field and press enter. Choose "English" read instructions. Enter Username, old password, and new password (twice) click change and READ message. The program will report that the password is accepted or not. Password program only accepts passwords that have a combination of digits and letters and special characters like +, %, or &. Try again, if not accepted, with a more complex password by clicking on the back button. PC room 15 komputers in room 50 by the library. Storing on disk. Store documents on either A: (diskettes) or M: (network disk, your private user area) Disk quota (about 25 MB) Printout Printer queue name for PC room is ut_isam12 contact Morten Ariansen or Peder Nielsen on tlf 50 665 ROM 117 to report errors: Printer quota is for students. Printer problems: When printing, the computer sends the printout to a printer queue located on a server (not directly to the printer). This server queues printouts received from any PC and prints each document out in turn (sorted By size) This "printer queue server" may stall without the computer giving any error message. Any subsequent printout will be placed in the queue and be printed out when the printer queue is fixed. Therefore there is use in repeating a printouts if the PC doesn’t give any error messages, check the printer or call Morten Ariansen for help. You may check the following points, and if that doesn’t help you may call Ariansen (tlf 50 665) and leave a message. Check the following points before calling: Check if the printer is connected to the mains, printer display says ready. Check if the printer is connected to the network, cable falls out on occasions Check the display for error messages IF "paper jam" is on display, open the printer and carefully remove any paper that might be stuck in the printer. Call for help if the printer prints out an error message in stead of your document. Restrictions set on the student computers. We have tried to restrict access on the computer to limit the following Change the system settings Install new programs Delete existing programs, and menus Store documents on the computers local disk The restrictions aren’t foolproof, but we hope that the existing restrictions will keep the system stable and unchanged over time. Programs available on the computers Office xp Word Excel Powerpoint Spss 11.0 Email Statistical program We sugest using webmail (webmail.uio.no) Messages to students are often sent only through the email, keep up to date and read email. The system administrator sends messages though the email to report on any errors or .problems with the system, these messages may only come in Norwegian (get some help to translate or ask sender to write you in English. Internet Explorer F-secure ssh Encrypted Terminal emulator; can be used to connect to a unix server, (f.eks studmed). You may not have use for this program. Literature databases: Medline Literature search in World Wide Web http://www.uio.no/usit/bss/bibliotek.html Antivirus program F-prot, automatic scanning against viruses on disks M: and A: Internet a short description. The computers in the PC room are connected to the Internet. The Internet can be described as a collection of services located on computers worldwide communicating through standard protocols(languages). The Internet communications has changed dramatically as new services and protocols have been introduced over the years. The transport of this data is provided by communication highways built up of, optical cabling, satellite communication, radio signals, telephone lines all connected in much the same way as roads and highways. Some examples of services are: World Wide Web Email Search engines, and databases on the net. Network disks Conference systems Music, film, distribution There are no direct costs involved in the use of the Internet at UiO. The costs lie in the investments in the infrastructure built up over the years in the cabling. Email (electronic mail) All students and employees at the UiO have an email address. There at 2 emailapplications available webmail.uio.no and Eudora. We suggest using Webmail. unwanted mail/ junk mail (SPAM) Spam filtering though webmail. World Wide Web WWW is a standardized Internet service for distributing electronic information (text, pictures, sound, video, and Computer programs) UiO uses the web to distribute a wide variety of information like student, course, and staff information as well as a means of student registration, database connections, and computer program installations. Some WWW examples: Literature databases on the web ->http://www.uio.no/usit/bss/bibliotek.html University’s WWW home page http://www.uio.no/ A homepage for Africa http://www.afrika.com/ Search engine on the web http://www.yahoo.com/ BCC Britain http://www.bbc.co.uk/home/today/index.shtml BBC world Wide http://www.bbcworldwide.com/ Africa online http://www.africaonline.com/ CNN side in America http://www.cnn.com/ Computer worms. Worms on infected computers search out and infect other computers through the internet by exploiting weaknesses in the computer system. To prevent worms from infecting our computers through these weakneses our computers are regularly patched. This is done automatically on all UiO computers at night. This is one reason why we want all computers to be on at all times. Logg off your computer but do not turn them off. Computer Viruses. A program is a document that contain set of instructions that when read by its appropriate system are executed. Computer systems (like Windows) and applications (like MS Word) are built up of thousands of small programs all integrated together to give the functionality you see in a computer today. Systems and applications are often upgraded by adding more or replacing of some of these small programs. One or more of these programs may be deleted or corrupted but the computer will not be affected until that actual program is used. A computer virus is a program that once opened searches for other programs it can infect by copying itself into it. A virus may also do a variety of damage to the system by ether deleting files or attempting to open the system to access from other computers. Some viruses may even damage specific electronic components. (f.ex BIOS.) People make these viruses. The threat of virus infections to computer have increased dramatically over the years due to the ease of communication through the Internet. The most common way a user infects his computer is through opening infected attachments sent through the email. The most contagious viruses around are viruses that infect the computer's local mail and starts sending out copies of itself as an attachment through your account. It searches through the computer for addresses to send to and often generates an innocent text designed to trick the receiver into opening the attachment. How to avoid viruses: Do not open infected documents. An infected document is harmless so long as it is not opened. Familiarize yourself with file types you use and do not open file types you are unfamiliar with. Not all documents are programs. Some documents only contain data and are safe to open. Other types of documents may contain both data and program instructions. (Word documents may for example contain MACROS which are instructions that the word application execute on behalf of the document) A document type in Windows is defined by the three-lettered suffix in the filename, f.ex: TELEPHONELIST.DOC Microsoft word document TELEPHONELIST.EXE A program TELEPHONELIST.TXT A text (content is not read as instructions) TELEPHONELIST.BAT A text file that is read by the system as instructions. One can to some extent avoid being infected by treating documents that can contain instructions with great care. Scan these files with an up-to-date anti virus program when you receive them from others. Read letters you receive critically. It may have been sent by a virus infected computer. The "SIRCAM" virus which lately has infected many UiO computer send out letters asking you for your advice on the attached document. You should ask yourself if you are expecting such a letter from this person. The attached document of the SIRCAM virus has to suffixes (which is common for many viruses sent through the email for example: TELEPHONELIST.DOC.PIF This is an other indication of it being a virus. If you EVER receive a letter with double suffixes in the filename it is most probably a virus. This is an attempt to fool you into thinking it is (in the case of this example) a word document. Do not open it. Scan your hard disc (C:) and home area (M:) often. (Especially on student PCs, these may have been infected by others before you) All the UiO computers are installed with “F-secure anti virus” from http://www.datafellows.com/ This program allows you to scan your hard disks, diskettes and networks disks for viruses and disinfects most known viruses. Keep informed of viruses that are common by Checking anti virus websites: There are various anti virus sites that keep up-to-date information on viruses and disinfections programs for some specific viruses. http://www.antivirus.com http://www.datafellows.com/virus-info/ http://www.us.sophos.com/virusinfo/