-
Frequently Asked Questions
- Adding a Profile Picture
- Aruba 503H Wireless Access Point
- Classroom Technology – Frequently Asked Questions
- Controlling Camera in a Partially Upgraded Classroom
- Controlling Cameras in a Fully Upgraded Classroom
- New Updates to Mac AirPlay now Screen Mirroring on macOS Big
- Online Learning/Streaming Classroom Remote
- Partial and Full Classroom Upgrade Media Setup for Microsoft Teams
- Portable Classroom Media Setup for Microsoft Teams
- Use Apple TV in a Classroom
- Using Teams in the Streaming Classrooms
- Video Conferencing Classroom Technology
- What is Apple TV
-
Policies and Procedures
- Acceptable Use of Electronic Content
- Access to electronic content of deceased or incapacitated students, employees, and retirees
- Administrative Data Access Policy
- Administrative ERP Program Change Procedures
- Administrative ERP User Access Policy
- Affiliate Member Access & Services Request
- College of Wooster Privacy Statement: General Statement of our practices and policies
- College Technology Purchases
- Copyright Infringement Policies Procedures Sanctions
- Disposition of Used Computer Equipment
- Email Distribution List Use ("ZWD lists")
- GDPR Privacy Statement
- Guest Wireless Acceptable Use Policy
- Higher Education Opportunity Act of 2008 Compliance Plan
- InCommon Federation Participant Operational Practices
- Information Technology Policies and Procedures
- Investigations Requesting Information from IT Systems & Applications
- IT Maintenance Window
- Repair Policy Change Proposal – April 2016
- Requests for Student Information
- Safeguarding Individual Information (GLBA "Safeguards Rule")
- Technology equipment and software: how to get/fix/replace and your responsibilities for it
- The California Consumer Privacy Act
- The College of Wooster ERP Data Stewardship
- User Responsibilities and Appropriate Use Principles
- Wireless Handheld Device Allowance
- Wireless Handheld Device Allowance Request
- Wireless Networking Policy
- Show all articles ( 13 ) Collapse Articles
-
Students
-
Employees
-
Connecting to the Network
-
Software
-
- Access Your College of Wooster LinkedIn Learning Account and Connect a LinkedIn Profile
- ArcGIS Access
- Available Software
- Downloads
- Evernote
- Google Cardboard
- Google Earth and Other GIS Programs
- iMovie for Students
- Installing Maple for OS X
- Installing Maple for Windows
- Installing SALT Windows
- Keynote for Students
- Matlab
- Microsoft 365 Licensing and Email after Graduation
- Navigate the LinkedIn Learning Interface
- Omeka
- Open Source Video Editing Software
- Pages for Students
- PDF Creation for Students
- Photos
- Photoshop for Students
- Qualtrics
- RAVE Guardian
- RAWGraphs
- Remote Desktop Access Mac
- Remote Desktop Access PC
- Screen Recording
- SPSS
- Stata
- Tagging and Bookmarking
- Trint
- Video Project Workshop Outline
- Voyant Tools – Free Textual Analysis
- What Technology Do I Need at Wooster?
- What to expect as a class observer
- Wolfram Mathematica @ The College of Wooster
- Zap Works Designer
- Zotero
- Show all articles ( 24 ) Collapse Articles
-
- Access Your College of Wooster LinkedIn Learning Account and Connect a LinkedIn Profile
- Adobe Premiere Pro
- ArcGIS Access
- ARTstor
- Available Software
- BrightLink Projectors for Teaching
- Changing your Apple ID
- Connect to Network Storage and Services from OFF Campus
- Creating Informer Reports
- Downloads
- Google Cardboard
- Google Earth and Other GIS Programs
- iMovie for Teaching
- Informer Reporting
- Installing Maple for Windows
- Installing SALT Windows
- Keynote for Teaching
- Keynote Toolbar Items
- Matlab
- Navigate the LinkedIn Learning Interface
- Omeka
- Open Source Video Editing Software
- Pages for Teaching
- Photos
- Qualtrics
- Qualtrics
- Quantitative Literacy Resources
- RAVE Guardian
- RAWGraphs
- Remote Desktop Access Mac
- Remote Desktop Access PC
- Resources for Class Projects
- Room Assignments File Format
- Screen Recording
- Select Survey Training Manual
- Select Survey User Manual
- Software & Applications Requiring VPN
- SPSS
- Stata
- Tagging and Bookmarking
- Trint
- Video Project Workshop Outline
- Voyant Tools – Free Textual Analysis
- What to expect as a class observer
- Wolfram Mathematica @ The College of Wooster
- Zap Works Designer
- Zotero
- Show all articles ( 33 ) Collapse Articles
-
- Access Your College of Wooster LinkedIn Learning Account and Connect a LinkedIn Profile
- Adobe Premiere Pro
- Available Software
- BrightLink Projectors for Teaching
- Changing your Apple ID
- Connect to Network Storage and Services from OFF Campus
- Creating Informer Reports
- Downloads
- iMovie for Teaching
- Informer Reporting
- Installing Maple for OS X
- Keynote for Teaching
- Navigate the LinkedIn Learning Interface
- Pages for Teaching
- Qualtrics
- Qualtrics
- Quantitative Literacy Resources
- RAVE Guardian
- Room Assignments File Format
- Select Survey Training Manual
- Select Survey User Manual
- Software & Applications Requiring VPN
- Tagging and Bookmarking
- Zotero
- Show all articles ( 9 ) Collapse Articles
-
- ARTstor
- Audacity
- Breaking Language Barriers with Google Translate and AR
- Clipchamp video editor
- Concept Mapping
- Coolors.co
- GarageBand
- Garageband
- Google Cardboard
- iMovie
- Machinima
- Photos
- Photoshop
- Pixabay royalty free photos and videos
- Podcasting Tools
- QuickTime Player
- Screen Recording
- SketchUp
- Storyboarding
- Timeline tools
- Video Project Resources
- Windows Story Remix
- Zap Works Designer
- Show all articles ( 8 ) Collapse Articles
-
- Administrative ERP Program Change Procedures
- Administrative ERP User Access Policy
- Colleague Access Request Form
- Colleague Detailed User Guide
- Colleague UI 5 – Differences from the old version UI 4
- Creating Informer Reports
- Datatel Colleague Learning Guide Basic Navigation – Purchasing
- Datatel Colleague Navigation Keyboard Shortcuts
- Ellucian (Colleague)
- Ellucian (Datatel)
- Informer Reporting
- Name Computed Columns
- Other Datatel related forms
- Purchasing Documentation
- Room Assignments File Format
- The College of Wooster ERP Data Stewardship
- Using Select / Returning Criteria
- Show all articles ( 2 ) Collapse Articles
-
-
Printing
-
Loanable Technology
-
- Canon E05 Rebel DSLR
- Canon Vixia HF R800 HD Camcorder
- Canon Vixia Video Camera
- Conference Kit
- GoPro as a Webcam
- GoPro Hero 8 Black
- GoPro Kit
- Logitech ConferenceCam
- Logitech Webcam C930e
- Mi Sphere Camera Kit
- Overhead Document Cameras
- Portable Classroom
- Rylo 360 Camera
- Tabletop Document Cameras
- Video Adapters
- Video Chat Kit
- Show all articles ( 1 ) Collapse Articles
-
-
Microsoft 365
-
- Calendar Sharing
- Check Junk Mail
- Creating an Inbox Folder and a Rule within Outlook
- Email Distribution List Use ("ZWD lists")
- Email Setup on a Mobile Device
- Email Troubleshooting
- Forward/Redirecting your email
- Installing FindTime
- Make Outlook your default email client
- Managing Junk E-Mail
- Managing your Office 365 Quarantine
- Microsoft 365 Licensing and Email after Graduation
- Microsoft Outlook
- Missing an Email?
- New Email Accounts
- Outlook Basics
- Outlook open another mailbox
- Set up an email account in Outlook
- Using Office 365 Groups
- Using Quick Steps
- Wooster Email
- Wooster’s External Email Alert Indicators
- Show all articles ( 8 ) Collapse Articles
-
- Conducting class if you or some of your students are participating remotely
- Conducting interviews and campus talks/teaching demos with remote candidates
- Getting to know Microsoft Teams
- GoPro as a Webcam
- Making Meetings with Microsoft Teams
- Microsoft Teams Information
- Microsoft Teams Live Events
- New Recording Storage Location on Teams WITHOUT Recording Ready Email
- Online Learning/Streaming Classroom Remote
- Online Meeting
- Partial and Full Classroom Upgrade Media Setup for Microsoft Teams
- Participating in a meeting as a Guest
- Portable Classroom Media Setup for Microsoft Teams
- Scheduling a Teams Meeting
- Sharing Content in a Microsoft Teams Meeting
- Teams & Zoom comparison
- Teams Meet Now
- Teams Meeting Breakout Rooms
- Using a Scheduled Meeting
- Using Closed Captioning Within Teams
- Using Teams in the Streaming Classrooms
- Video Conferencing Classroom Technology
- Video Conferencing with The College of Wooster
- Show all articles ( 8 ) Collapse Articles
-
-
Moodle
-
Network, Cybersecurity, and Best Practices
- Encrypting Devices
- Encrypting Mac Systems
- Encrypting Mobile Devices & Tablets
- Encrypting Windows Systems
- Information & Cyber Security @ Wooster
- Protect Your Computer
- Protecting your Personal Network
- Removing VPN From your Mac
- Safeguarding Individual Information ("Red Flags", "Identity Theft")
- Securing Portable and Mobile Devices
- VPN – Mac OS 10.13 or Later
- VPN – Mobile Devices and Chromebooks
- VPN – Windows
- Wooster’s External Email Alert Indicators
-
Multi-Factor Identification (MFA)
- Change Your Password
- Changing Your Mac Password While Off Campus
- Forgotten Passwords
- How to setup MFA (Multi-Factor Authentication)
- Multifactor Authentication Instructions for using wireless networking when phone service is not available
- Multifactor authentication while out of the US.
- Password changes
- Password Policy
-
College of Wooster Password
-
Phones and Conference calls
-
Scanning
-
Resources for Retirees
-
Using the Self-Service Portal for Equipment Reservation
-
Online File Storage Options
-
Computer Lab
-
Classroom Controls
-
Classroom Setup
-
Classroom Resources
-
Classroom Troubleshooting
Protecting your Personal Network
When working remotely, it is important to remember your home internet security. Some companies offer free security measures provided with certain packages. You may also be offered services through your home security provider for cybersecurity and personal protection. The College even requires that you access your network using a VPN for certain applications when working from home.
Here are some steps to insure your home wireless network is secure:
Step 1 : Always change the default name of your network when setting up a new service provider. We strongly recommend using a name that is not related to any personal information.
Step 2 : Make sure the password for your network is strong and unique. Never use the same password twice and don’t include any personal information. Some companies recommend a password for your wireless network be at least 20 characters and include numbers, letters, and symbols. At the very least your password should contain no less then 8 characters. These first 2 steps can be completed at the same time when setting up your network, as most come with a default username and password.
Step 3 : Now is the time to activate your network encryption. You may have already noticed when signing on to your network the letters WEP, WPA, WPA2, WPA3; these are the encryption languages. You may also receive a warning that your network is not secure or has low security standing. You can login to your network and apply updates to your network encryption, these updates may be free or could come with a fee so read the instructions carefully.
Step 4 : Change the location of your router. Your router should be placed as close to the center of your residence as possible. This will increase the likely hood that every room will share an equal network connection and decrease the likelihood of someone intercepting the signal outside your residence.
Step 5 : When logging in for updates you may notice that your admin credentials after different from those used to access your network. If you are still using the default admin credentials those should be changed. Most routers have default admin credentials and those are the same for all the routers produced by that provider. This gives a malicious person easy access to your network even without your network password. This password should be unique and at least 8 characters.
Step 6 : Disable remote access to your router. This will require you to log in using the web interface of your router with your admin credentials. These setting can be altered under the privacy settings, but keep in mind if you have issues with your network and call for support they may ask you to turn these settings off.
Step 7 : Always keep your router’s software up to date. This step allows the router to keep functioning at its best. This will require you to sign in with admin credentials on the web interface to download any updates.
Step 8 : Make sure the devices using your network are secure. Every device should have antivirus software installed and functioning. You can also use a VPN to better secure your network, but keep in mind that VPN could affect your network speed and performance, and only use one VPN at a time.