Software Outages & Alerts

Banner Upgrades on Friday, November 28, 2014 at 11:00 a.m. (21 November 2014)
MediaWiki (wiki.wpi.edu) maintenance Wed, 11/12 from 5:00 AM to 7:00 AM (11 November 2014)
Windows XP Support Discontinued as of April 8, 2014 (1 April 2014)
Email using Outlook Web Access (OWA) via exchange.wpi.edu (21 March 2014)
Windows 8 Support Advisory (20 November 2012)
Macintosh Flashback Virus Patch Available – 04/13/2012 (13 April 2012)
Banner Services Unavailable 1/21/11 – 1/23/11 due to planned upgrade (14 January 2011)
Java (JRE) versions to be managed by Information Technology starting on 11/23/2010 (17 November 2010)
Office 2011 for Macintosh is now available. Upgrade now for security reasons. (16 November 2010)
Use Maple? Please update your license file before 11:00 pm (EDT) on August 9, 2009 (30 July 2009)
Verify Exchange Calendar Items that occur during Extended Daylight Saving Time (23 February 2007)
Daylight Saving Time adjustment for Exchange (Outlook) users (10 February 2007)
Impact of Daylight Saving Time Change for 2007. Exchange/Outlook users should take notice! (22 January 2007)
New Banner Forms (INB) version requires Java client (1 August 2006)
The final migration of the Matlab clients to our new Matlab license server and implementation of a Matlab license format change. The old Matlab license server will be decommissioned. (26 June 2006)
Microsoft Security Advisory for Word Attachments (24 May 2006)
E-mail Phishing scheme seen on campus (18 October 2005)
Connecting to Exchange from Off-Campus (22 August 2005)
Deployment of Microsoft Windows XP Service Pack 2 to ADMIN Domain Users (19 July 2005)
Warning & Information About the W32/Sober.o@MM Virus (19 April 2005)
Planned Oracle Upgrade / Outage (7 March 2005)
Plant Services Work Order System Outage and Upgrade (17 November 2004)
Connections to WPI Sites Using SSL Are Being Redirected (15 November 2004)
Exchange Global Address List changes (26 August 2004)
CCC's Position on Windows XP Service Pack 2 (18 August 2004)
Warning & Information About the MyDoom.O Virus (26 July 2004)
Run Microsoft Office Update (28 May 2004)
Deployment of Microsoft Office 2003 to ADMIN domain users (5 May 2004)
Deployment of MS Office 2003 to ADMIN domain users (30 April 2004)
Warning About Virus Propagated E-mails (3 March 2004)
Microsoft Security Bulletin MS04-007 Released - Users should install all Windows Critical Updates and Service Packs (20 February 2004)
Software Update for computers on the ADMIN domain (Windows XP and Windows 2000 systems) (20 February 2004)
Warning & Information about the MyDoom virus (28 January 2004)
Windows/Exchange Servers - planned outage (19 December 2003)
Banner 5 PC Client removal from WPI desktops (Windows 2000 and XP machines only) (10 November 2003)
Windows 98 Users Cannot Connect to the ADMIN Exchange Server Using the Outlook Client (31 October 2003)
Active Virus Discovered: W32/Mimail.c@MM (31 October 2003)
Critical Update for Windows (Security Bulletin MS03-039) (11 September 2003)
Banner PC Client Upgrade Issues/Abandonment of Banner PC Client Upgrade deployment (11 July 2003)
Planned software deployment for Internet Native Banner (INB) use (12 June 2003)
Bogus e-mail sent from spoofed WPI e-mail address. (31 January 2003)
Final Close of Banner Finance (19 September 2002)
SSH services availability outage (4 June 2002)

Banner Upgrades on Friday, November 28, 2014 at 11:00 a.m.
Posted 21 November 2014 by CCC Helpdesk
When? Friday, November 28, 2014, starting at 11:00 a.m.
How long? Approximately 6 hours
Why? Mandatory Advancement and Database upgrades
Groups Affected Faculty, Staff, and Students using Banner Services
Impact The following services will be unavailable for the duration of the upgrade:
• Banner Production Forms (INB)
• Banner Self-Service (bannerweb.wpi.edu)
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Mandatory upgrades are required on the Banner Advancement module and on the Banner database. Expected downtime is approximately 6 hours on Friday, November 28, 2014 beginning at 11:00 a.m.

Impacted services for the duration of the upgrade:
• All Banner services, including Banner Production Forms (INB), BannerWeb (Self-Service)
• All interfaces with 3rd party applications, will be unavailable.
• Reporting against the Banner database will not be possible.

Once the upgrade is complete, these services will be again available for normal business use.

Please contact the Helpdesk with any questions regarding the down time. Should there be a major conflict, please send email to helpdesk@wpi.edu.

Thank you for your patience and understanding as we work to improve the systems we support.

MediaWiki (wiki.wpi.edu) maintenance Wed, 11/12 from 5:00 AM to 7:00 AM
Posted 11 November 2014 by CCC Helpdesk
When? Wednesday, November 12, 2014 beginning at 5:00 AM ET
How long? Approximately 2 hours
Why? To upgrade MediaWiki software and servers
Groups Affected Faculty, Staff, and Students using wiki.wpi.edu
Impact Sites hosted at wiki.wpi.edu will be available as read-only throughout the duration of the maintenance window. Editing may resume upon completion of the upgrade.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
The MediaWiki software will be upgraded to the latest version and moved to newer servers. Sites hosted at wiki.wpi.edu will be available as read-only throughout the duration of the maintenance window. Editing may resume upon completion of the upgrade. Wiki pages will remain viewable throughout the maintenance but may experience some disruptions in display of content.

Please contact the Helpdesk (call Ext. 5888 or e-mail helpdesk@wpi.edu) with any questions or concerns regarding this process.

Thank you for your patience and cooperation as we work to improve the systems we support.

Windows XP Support Discontinued as of April 8, 2014
Posted 1 April 2014 by CCC Helpdesk
When? Tuesday, April 8, 2014
How long? Permanent
Why? Microsoft is ending support for Windows XP Operating System
Groups Affected Faculty, Staff, and Students using Windows XP
Impact Technical assistance and network support will no longer be provided for Windows XP, including automatic updates that help protect your computer.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Microsoft will be ending all support for Windows XP Operating System as of April 8, 2014. After this time security updates (via automatic updates) and bug fixes to Windows XP will not be provided by Microsoft. WPI Information Technology (IT) will be discontinuing support of the Windows XP at this time.

Windows XP systems will continue to function after this date, but our ability to provide support will be limited. IT is providing the following recommendations for your Windows XP computer:
Upgrade to a newer version of Windows. For personally-owned computers, upgrades are available through the Campus License Agreement. For WPI-owned computers, contact the Helpdesk for assistance upgrading. Please note that some hardware may not support upgrading the operating system. Replacement of hardware may be needed.
Disconnect from the network. We are aware that some specialty systems have specific software needs that require Windows XP and cannot run on newer versions of Windows. We will work with departments to identify these machines and configure them to function without network connectivity, or we can work to see if there is newer software that will work on Windows 7. Without regular security updates, Windows XP computers become a security risk and must be removed from WPI’s network.
Decommission. If you are considering purchasing a new personally-owned computer, visit IT recommendations for specifications and discounts. To replace a WPI-owned computer, contact the Helpdesk. If decommissioning a computer that was used for WPI sensitive data, please contact the Helpdesk regarding purging the hard drive.

NOTE: Microsoft provides guidance for end of Windows XP support.

Please contact the Helpdesk (call Ext. 5888 or e-mail helpdesk@wpi.edu) with any questions or concerns regarding this change in support.

Thank you for your cooperation.

WPI IT Helpdesk
Visit the Helpdesk in Gordon Library
http://www.wpi.edu/+helpdesk | helpdesk@wpi.edu
508.831.5888 | Ext. 5888


Email using Outlook Web Access (OWA) via exchange.wpi.edu
Posted 21 March 2014 by CCC Helpdesk
When? Friday, March 21, 2014
How long? Intermittent
Why? Under investigation
Groups Affected Faculty, Staff, and Students using Outlook Web Access
Impact Helpdesk has been fielding reports that some people are experiencing login issues with Outlook Web Access via exchange.wpi.edu using a web browser.

Symptoms include:
• Login unsuccessful
• Login appears to be successful momentarily, but session returns to login screen unexpectedly

This issue does not appear to impact access to Exchange email via the Outlook PC or Mac client or using a Smartphone email application.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Helpdesk began seeing reports of login troubles for Outlook Web Access earlier today. Hosting Services is investigating at this time.

People experiencing this issue are asked to contact the Helpdesk with the following details:
• Device Type (PC, Mac, Tablet, Smartphone, etc.)
• Operating System in use (Windows, Mac, etc.)
• Web Browser

This information will help inform our investigation.

Thank you for your patience and cooperation as we conduct our investigation into the cause of these reports.


Windows 8 Support Advisory
Posted 20 November 2012 by CCC Helpdesk
When? Advisory is effective immediately
How long? Henceforth
Why? Windows 8 Availability and Support
Groups Affected Faculty, Staff, and Students
Impact WPI IT is providing guidance on our support plans for Windows 8
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
On October 26, Microsoft released Windows 8 to retail stores. It is also now available on many new computers and laptops.

As with all previous releases of Windows, WPI Information Technology will be working to test and provide guidance on our support of the new operating system. We will be testing support for network connectivity, VPN access, access to web services, and business and academic software.

While we continue testing, we recommend that Faculty, Staff and Students hold back on upgrading existing systems to Windows 8 until we have a better idea of what will and won’t work.

In many cases, new versions of software will be required in order to operate correctly on the new operating system. For many applications, we cannot upgrade the software we provide until the summer session as academic software upgrades require coordination with the faculty who are using the software in their courses.

We will provide continual updates to support on Windows 8 on the Helpdesk web pages:



What should work:
  • Network Connectivity
    • Wired Network: Windows 8 systems should work on the wired network provided they are properly registered
    • Wireless Network: The certificate installation tool has been updated for Windows 8, but has not been heavily tested. Wireless should work, but may have problems as we continue our testing.
    • VPN: The VPN should work for windows 8 systems. The VPN will not work for Windows RT devices, such as the Surface Tablet.

  • Applications
    • Anti-Virus: McAfee has not yet supplied an updated version that will work with Windows 8.
    • Office 2010: Microsoft Office should work with Windows 8
    • Academic Software: We are in the process of testing the various Academic software packages and will update the community as we have more information.



NOTE: Windows RT, which is based on Windows 8, is the operating system for the Microsoft Surface and other lightweight Microsoft based tablet devices. Windows RT is designed for tablet processors and is not compatible with any applications outside of the Apps provided by the Microsoft Store. Windows RT comes with a specialized version of Office 2013, but will not be able to run academic software. Windows RT devices should be viewed solely as accessories in addition to a standard computer, just as Android tablets and iPads are viewed.

Please contact the Helpdesk (call Ext. 5888 or e-mail helpdesk@wpi.edu) with any questions or concerns regarding this process.

Thank you for your patience and cooperation as we work to improve the systems we support.


Macintosh Flashback Virus Patch Available – 04/13/2012
Posted 13 April 2012 by CCC Helpdesk
When? Patch is available now
How long? N/A
Why? Mac users should check for and install the latest Apple Software Updates to ensure protection against this recent malware.
Macs with Microsoft Office 2008 or later installed are not vulnerable to Flashback
Groups Affected WPI Faculty, Staff and Students using Mac OS X
Impact A recent version of malicious software called Flashback exploits a Java vulnerability in order to install itself on Macintosh systems.

Mac users should check for and install the latest Apple Software Updates to ensure protection against this recent malware.

Macs with Microsoft Office 2008 or later installed are not vulnerable to Flashback
Questions Contact the Helpdesk by calling x5888 or e-mail helpdesk@wpi.edu

Details
A recent version of malicious software called Flashback exploits a Java vulnerability in order to install itself on Macintosh systems

Macs are infected by being redirected to a compromised and forged website. Connection to the site allows the malware to be loaded onto the computer which can then be used to download and run malicious code from a remote network of servers.

How can I protect my Mac?

OS X 10.6 (Snow Leopard) & OS X 10.7 (Lion):
Apple has released an update protecting against this vulnerability through Apple Software Update which fixes the Java security flaw for systems running OS X 10.7 (Lion) and OS X 10.6 (Snow Leopard).

Users can manually check for the latest update using the Software Updates option from the Apple menu as described here: http://support.apple.com/kb/HT1338

OS X 10.5 (Leopard) and earlier:
Apple has no plans to release further Java updates for Mac OS X 10.5 (Leopard) or earlier and recommends users disable Java in their web browser using instructions found at: http://support.apple.com/kb/HT5241

Other information:
Systems with Microsoft Office 2008 or later are not vulnerable to Flashback. All systems deployed by WPI Information Technology since release of OS X 10.5 (Leopard) have had Microsoft Office 2008 or later installed.

More Information about Flashback malware can be found at http://support.apple.com/kb/HT5244

Please contact the Helpdesk (call Ext. 5888 or e-mail helpdesk@wpi.edu) with any questions or concerns regarding this issue.


Banner Services Unavailable 1/21/11 – 1/23/11 due to planned upgrade
Posted 14 January 2011 by CCC Helpdesk
When? Starting at 5:00 p.m. (EST) on Friday, January 21, 2011
How long? Approximately 48 hours
Why? In order to complete a required Banner upgrade, Banner services will need to be taken offline.
Groups Affected Faculty, Staff, and Students who use Banner
Impact During the upgrade, faculty, staff, and students will be unable to access any Banner services.

Information Technology staff have been working with the Division Information Analysts (IAs) to test specific Banner modules in preparation for this major upgrade. Specific concerns about impact to business processes should be directed to the appropriate Division IA.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
A software upgrade is required on our Banner database. Expected downtime is approximately 48 hours, ending on 1/23/11.

All Banner services will be unavailable during the upgrade, including:

-- Banner Web Information System
-- Banner Forms (Production)
-- ARD
-- ODBC Connections to the Banner Database
-- On-line conference payments
-- Web Admissions application status
-- On-line giving
-- Course Schedule lookup
-- CCC account creation and maintenance
-- Reporting from the Banner (PROD) database

Reporting from the ODSP database will be available during the outage, and will contain data from the beginning of the business day on Friday, January 21, 2011.

Please feel free to contact the Helpdesk with any questions regarding this planned downtime. Should there be a major conflict, please let us know.

Thank you for your patience and understanding as we work to improve the systems we support.


Java (JRE) versions to be managed by Information Technology starting on 11/23/2010
Posted 17 November 2010 by CCC Helpdesk
When? Tuesday Evening 11/23/2010
How long? Henceforth
Why? Mitigation of known security issues with out-of-date versions of Java
Groups Affected WPI Faculty, Staff and Students with computers connected to the WPI Windows domains (ADMIN or STUDENT).
Impact All versions of the Java Runtime Environment (JRE) prior to 1.6.0.22 will be removed and JRE 1.6.0.22 will be installed. Subsequent updates to the JRE will also be deployed automatically.

Those utilizing non-standard applications which require an earlier version of the JRE should contact the CCC Helpdesk by Monday, November 22, 2010 to discuss options.
Questions Contact the Helpdesk by calling x5888 or e-mail helpdesk@wpi.edu

Details
In order to provide better support of the Java Runtime Environment (JRE) and WPI’s line of business software, overnight on Tuesday 11/23/2010 all versions of the JRE prior to 1.6.0.22 will automatically be removed and JRE 1.6.0.22 will be installed on all WPI Windows domain computers. Subsequent updates to the JRE will also be deployed automatically.

The JRE is used by a number of software applications (including Banner). However, it is a frequent target for security attacks. WPI Information Technology has created a managed deployment method to automatically update the JRE and address these security concerns on all domain machines.

WPI has made every attempt to ensure continued compatibility with the JRE and supported line of business software. However, if you utilize any non-standard applications which require an earlier version of the JRE please contact the CCC Helpdesk to discuss any potential alternatives. Working from off-campus via a Remote Desktop Connection to your WPI IT-managed computer will ensure your use of the most up-to-date version of the JRE.

Please address any questions or concerns to the Helpdesk by calling x5888, (508)831-5888 or e-mail helpdesk@wpi.edu

Thank you for your cooperation as we work to ensure the safety and security of WPI information technology resources.


Office 2011 for Macintosh is now available. Upgrade now for security reasons.
Posted 16 November 2010 by CCC Helpdesk
When? Currently available.
How long? NA
Why? Office 2011 for Macintosh is now available via WPI’s Campus License Agreement (CLA). This new version provides access to recent security updates that are not yet offered for older versions. Systems running Office 2008 (Mac) or Office 2004 (Mac) should be upgraded.
Groups Affected WPI Faculty, Staff and Students using a Mac
Impact Microsoft Office 2011 is now available for installation on personal and WPI Macintosh computers.

Older versions of Office for the Mac may have security vulnerabilities with no available patch. Macintosh users are encouraged to upgrade to Office 2011, run automatic updates to obtain security patches, and remove prior instances of Office.

Effective immediately, new Macintosh computers for faculty and staff will be deployed with Office 2011.
Questions Contact the Helpdesk by calling x5888 or e-mail helpdesk@wpi.edu

Details
Office 2011 for Macintosh is now available for network download via WPI’s Campus License Agreement (CLA) at smb://shares.wpi.edu/applications/macintosh/Microsoft/Office 2011/. Office 2011 media for personally owned systems is available for online ordering and can be obtained at the Helpdesk, Gordon Library, Main Floor.

Key new features of Office 2011:
• Introduction of Outlook for Mac:
 Replaces Entourage
 Works with WPI’s Exchange mail system
 Imports Personal Folder files directly from Windows – no conversion required
• New interface uses “the ribbon”
• File formats are compatible with Office 2010 for Windows
• Co-authoring tools are included in Word and PowerPoint

Preview these and more new features at http://www.microsoft.com/mac/products/why-office2011.

Important notes for deployment:
• It is important to keep your Office 2011 system up to date by running Microsoft Automatic Update from within the Help Menu of any Microsoft Office application.
• WPI IT also recommends removing Microsoft Office 2008 from your Applications menu after installing Office 2011 as it is not removed automatically.

See our website for more information about Office 2011.

Instruction:
For those who have questions about Office 2011; Pat Moody and Deb Dexter will be hosting an instructional session in the Gordon Library Conference room, GL303, at 11:00am on December 1st

Important notes for deployment:
• It is important to keep your Office 2011 system up to date by running Microsoft Automatic Update from within the Help Menu of any Microsoft Office application.
• WPI IT also recommends removing Microsoft Office 2008 from your Applications menu after installing Office 2011 as it is not removed automatically.

Any questions or concerns can be addressed to the Helpdesk:
helpdesk@wpi.edu | (508) 831-5888.


Use Maple? Please update your license file before 11:00 pm (EDT) on August 9, 2009
Posted 30 July 2009 by CCC Helpdesk
When? Please update your license file before 11:00 pm (EDT) on August 9, 2009
How long? The update only takes a few minutes
Why? Maple clients must update their license files in order to position WPI to offer access to a service: new redundant Maple License Server triad. The license server triad will facilitate access to Maple licenses, making it easier to connect to the server.
Groups Affected WPI Faculty, Staff and Students using any WPI-licensed version of Maple software (including Maple10, Maple11, Maple12, and Maple13).
Impact People currently using Maple must update their existing license file.

Failure to update the license file prior to the specified date will result in loss of connectivity to WPI Maple license servers.

Updating the license file will provide improved access to Maple licenses beginning on August 10, 2009.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
People who have installed any version of WPI-licensed Maple software are asked to upgrade their license files to take advantage of the new license triad. License file updates must be completed by 11:00 P.M. on Sunday, August 9th.

The new license file is available on the following network file share. Instructions can be found in the “readme.txt” file:
\\rivet\applications\maple\license

License files on CCC-managed computers (like computer lab PCs) should have their license files updated automatically.

Thank you for your understanding and cooperation while we work to improve the IT services we provide to the WPI community. Please contact the Helpdesk with any questions or concerns.
________________________________________
Additional Information:

What is Maple?
Maple is academic software used for calculations and modeling simulations. WPI licenses the software for use by faculty, staff and students. Licenses to use the software are provided by a license server.

Directions for installing Maple:
http://www.wpi.edu/+helpdesk/Software/Installs/maplevx.html

What is a license server triad?
A license server triad is combination of 3 unique servers spread across campus. The 3 servers work together handing out software licenses. This configuration allows for continuous use of licensed software in the event of a single license server failure.


Verify Exchange Calendar Items that occur during Extended Daylight Saving Time
Posted 23 February 2007 by CCC Helpdesk
When? Immediate verification will prevent potential scheduling conflicts .
How long? Affected time frame: March 11 - April 1, 2007
Why? Changes to Daylight Saving Time (DST) for 2007 created problems scheduling appointments using Outlook/Exchange Calendar between March 11 and April 1, 2007. To address this, we ran a tool from Microsoft which attempted to resolve problems. In some instances, the tool provided inconsistent results, so please confirm your appointments for that time frame.
Groups Affected Exchange/Outlook users who rely on the Calendar.
Impact Appointments on Exchange/Outlook Calendars may be affected during March 11, 2007 and April 1, 2007. Impacted Calendar items may be off by an hour. This can result in scheduling problems. Details for dealing with this issue are outlined below.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Daylight Saving Time (DST) has been redefined starting this year. In prior years, DST began on the first Sunday in April but this year Daylight Saving Time will start on March 11, 2007 and end on November 4, 2007. For more information about the change please visit: http://webexhibits.org/daylightsaving/b.html

The tool provided by Microsoft adjusted appointments ocurring within the affected time frame. To ensure all appointments are in their proper place, please verify your personal & departmental calendars. The Helpdesk created a webpage listing instructions on how to verify your appointments for the extended time that may have been moved by the tool. Please visit the following website for further instructions.
http://www.wpi.edu/+helpdesk/Email/Exchange/dst.html

Thank you for you attention to this matter. Please contact the Helpdesk with questions by calling x5888, (508)831-5888, or via e-mail at helpdesk@wpi.edu.

Daylight Saving Time adjustment for Exchange (Outlook) users
Posted 10 February 2007 by CCC Helpdesk
When? Sunday, 2/11/2007 after 8:00 pm
How long? Unknown
Why? Microsoft has released a tool that will adjust Calendar items for March 11, 2007 - April 1, 2007 in Exchange mailboxes for 2007 Daylight Saving Time.
Groups Affected People using Exchange mailboxes will be impacted
Impact Calendar items scheduled for dates between March 11, 2007 and April 1, 2007 may be adjusted by the tool.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
To deal with new Daylight Saving Time definitions for 2007, Microsoft has released a tool for Exchange that will adjust calendar items occurring between March 11 and April 1, 2007 for Daylight Saving Time (DST).

The tool will be run against all Exchange mailboxes on Sunday night, February 11, 2007 after 8:00 pm. On Monday, all Exchange (Outlook) users should check their calendar items for March 11 - April 1, 2007 to ensure the items appear in their proper time spot.

Thank you for your understanding and cooperation.

Additional information: The issues raised for Exchange users by new Daylight Saving Time definitions are outlined in the following IT News item:
http://www.wpi.edu/Admin/IT/News/softwarealert.html#newsitem1169501707,18161,






Impact of Daylight Saving Time Change for 2007. Exchange/Outlook users should take notice!
Posted 22 January 2007 by CCC Helpdesk
When? March 11 - April 1, 2007 (and scheduling appointments for these dates)
How long? March 11 - April 1, 2007
Why? Changes to Daylight Saving Time (DST) for 2007 will create problems scheduling appointments using Outlook/Exchange Calendar between March 11 and April 1, 2007. We are awaiting a patch from Microsoft to resolve this problem.
Groups Affected Exchange/Outlook users who rely on the Calendar function should take notice.
Impact Software that tracks time depends on time-based calculations or involves scheduling / Calendar features may need to be updated to reflect the new Daylight Saving Time definitions for 2007.

Appointments on Exchange/Outlook Calendars will be affected during March 11, 2007 and April 1, 2007. Calendar items on impacted systems will be off by an hour. This can result in scheduling problems. Details for dealing with this issue are outlined below.

Operating Systems on personal computers may need to be updated as well.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Daylight Saving Time (DST) has been redefined starting this year. In prior years, DST began on the first Sunday in April but this year Daylight Saving Time will start on March 11, 2007 and end on November 4, 2007. For more information about the change please visit: http://webexhibits.org/daylightsaving/b.html

Many computer systems and software may require an update or patch to adjust to the new DST rules.

Microsoft Exchange using Outlook or Outlook Web Access (OWA):
==============================================================
Microsoft is due to release the required patches for Exchange and Outlook to address the new DST rules in the next few weeks. Until then, users will experience problems with appointments scheduled between the dates of March 11, 2007 - April 1,2007, specifically:

- Appointments will be off by one hour (a 10:00 AM meeting appears incorrectly at 11:00 am).

- Recurring appointments that span this time period (3/11/07 - 4/1/07) appear an hour later.

When the patches are installed, this issue will correct itself. To reduce confusion until then, we recommend editing existing appointment subject lines or creating appointment subject lines to include the correct meeting time.

For Example:
When scheduling a two hour meeting beginning at 10:00 am for March 14, 2007, begin the meeting at 11:00 and end it at 1:00 pm. Include the following text in the subject line "10:00 am Staff Meeting ending at Noon". Once the patches from Microsoft are installed, this meeting will appear correctly from 10:00 am to 12:00 p.m.

Windows Operating System:
==========================
- WPI Computers on the ADMIN Domain have been updated automatically and will not be impacted
- New machines shipping with Windows Vista will have the new definitions and will not be impacted
- Students and those with home computers can check http://www.microsoft.com/windows/timezone/dst2007.mspx for complete details.


Macintosh Operating System & Entourage:
=======================================
- Apple released a Mac OS patch for in 2006 to adjust for the new 2007 DST rules. Users who installed the patch and are running Mac OS X 10.4.8 will not be impacted by the change.
- To check for needed updates, click on the apple in the top left corner and select “software update”. This will check for and install required updates.

- Microsoft has released a patch for Mac users using Entourage. Patch 11.3.3 addresses the DST issue. Users in need of this patch can get it at: http://www.microsoft.com/mac/downloads.aspx?pid=download&location=/mac/download/Office2004/Office2004_1133.xml or through the Office update feature built into MS Office applications by choosing "Help" then "Check for Updates".

Other Devices and Software:
===========================
Check with your vendor or contact the Helpdesk to discover if there may be problems with any other time-based software or digital devices you may be using.

Thank you for you attention to this matter. Please contact the Helpdesk with questions by calling x5888, (508)831-5888, or via e-mail at helpdesk@wpi.edu.


New Banner Forms (INB) version requires Java client
Posted 1 August 2006 by CCC Helpdesk
When? Beginning Thursday, August 3, 2006 at 5:00 PM
How long? Until further notice
Why? The production Banner INB server will be upgraded to the currently supported software level, and a new java client will required to run Banner INB.
Groups Affected Faculty and Staff; Banner INB users
Impact While the INB server software is being upgraded, access to Banner Forms will be diverted to a temporary server.

A new java client will be required to run Banner Forms. It can be installed from \\admin\sys\netapps which is
mapped automatically to the O: drive when logging into the ADMIN domain. (see Details below for installation instructions)

After installing the new java client, Banner Forms Users always use the ADMIN web page to gain access to Banner Forms.
If you have created a shortcut icon on your desktop, you should discard it and use the standard process below:
Step 1. Open Internet Explorer and visit www.admin.wpi.edu
Step 2. Click the Banner Production link found in the Web Information System (Banner) section
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
It is necessary to upgrade the production Banner INB server to the currently supported software level.
The upgrade will begin on Thursday, August 3, 2006 at 5:00 pm. During the upgrade, Banner forms access will be provided via the standard link on www.admin.wpi.edu .
Installation of the new java client will be necessary. This new client will remain in use by the upgraded INB production server following the upgrade.

Instructions to install the required Java applet:
1. Login to the ADMIN Domain. Then Open "My Computer" and double-click on the O: drive ( "netapps on 'admin\sys' (O:) ) to open.
2. Double-click on "java_for_banner.exe' to run the install.
3. Click ‘Run’.
4. Accept the license terms and click "Next"
5. When prompted for Setup Type, select ‘Typical’ and Click ‘Next’. This will run the Install of the Java Runtime Environment SE v1.4.2_12 (this may take a few minutes)
6. Click ‘Finish’.

** Important: Following the installation of the java applet, you may occasionally receive a “pop-up” alert in the lower right-hand corner of your screen suggesting that you install Java updates. The INB Banner is not compatible with the updated Java versions. DO NOT click on anything that asks you to install updates to Java.

** A Java Web Start icon will appear on your desktop, you can drag this to the Recycle Bin or Right Click on it and delete.

Instructions to get to Banner using the temporary server (Columbus):

During the upgrade Banner Forms Users can use the ADMIN web page to gain access to the temporary server:
Step 1. Open Internet Explorer and visit www.admin.wpi.edu
Step 2. Click the Banner Production link found in the Web Information System (Banner) section
Step 3. Log in using your Banner username, your windows password,
Step 4. You will be asked a security question several times -- click “Always”.


Thank you for your cooperation as we work to keep our systems current. Please contact the Helpdesk (by phone at x5888 or
e-mail helpdesk@wpi.edu) with any questions or concerns.




The final migration of the Matlab clients to our new Matlab license server and implementation of a Matlab license format change. The old Matlab license server will be decommissioned.
Posted 26 June 2006 by CCC Helpdesk
When? Wednesday, July 12, 2006 at 6:00 AM
How long? Permanently
Why? In order to support all the versions of Matlab, WPI has updated the Matlab licenses on lab computers to use the new Matlab license server. We have also implemented a new Matlab client license format that will allow us to better handle future Matlab server upgrades without disrupting existing clients.
Groups Affected Students, Faculty, and Staff
Impact Users that have Matlab (any version) currently installed on their personal computers who do not install the new license file will receive a license server error and will not be able to use the WPI Matlab software.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Over the past few weeks WPI has been migrating the Matlab clients in the campus labs to a new license server. The time has come for individuals with Matlab installed on their personal computers to update their license files to use the new Matlab license server.

The CCC will be decommissioning the existing Matlab license server and moving to a new license server. The new license server is already running on matlab.wpi.edu. Users will need to install a new license file in order to use the new server on their personal computers and laptops. We encourage users to do this as soon as possible.

We have also changed the license file format. This change will allow for future Matlab server upgrades without disrupting Matlab clients.

The new license file format is shown below. Please copy and paste the lines below into a text editor and save them into a file named license.dat. Place the license.dat file into the Matlab's etc directory on your computer.

# BEGIN------cut here------CUT HERE-----BEGIN
# MATLAB license passcode file.
# LicenseNo: 193168 HostID: 000e0c62ec15
SERVER matlab.WPI.EDU ANY
USE_SERVER
# END------cut here------CUT HERE-----END

Linux installations are typically located in /usr/local/matlabXXX.

Windows installations of Matlab sp3 can be found in
C:\matlabR14sp3\bin\win32

Other windows installations (i.e. 2006a, SP2) are located in
C:\matlabXXX\bin\win32x

Thank you for your understanding as we work to improve the systems we support.


Microsoft Security Advisory for Word Attachments
Posted 24 May 2006 by CCC Helpdesk
When? Posted May 22, 2006
How long? Until further notice (when a patch becomes available)
Why? Microsoft is investigating reports of a newly discovered vulnerability in Word XP and Word 2003.
Groups Affected People using Microsoft Word XP and Word 2003 software; faculty, staff and students
Impact The newly discovered vulnerability impacts Word XP and Word 2003 and could allow remote Code Execution.

Information about known exploits can be found at:
http://vil.nai.com/vil/content/v_139539.htm

According to Microsoft:
"In order for this attack to be carried out, a user must first open a malicious Word document attached to an e-mail or otherwise provided to them by an attacker."
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
The Information Technology Division would like to make the WPI community aware of a recent advisory posted by Microsoft regarding Microsoft Word. Details can be found at:
http://www.microsoft.com/technet/security/advisory/919637.mspx

Information about known exploits can be found at:
http://vil.nai.com/vil/content/v_139539.htm

This notification is to warn WPI community members that attachments and Word documents can be dangerous. Do not open any attachments arriving from unsolicited sources or unexpected attachments arriving from known contacts.

The safest way to share documents for editing is to store documents on a secure network file share. The Helpdesk can assist with setting up file shares or managing access to existing network file shares.

For those who regularly receive file attachments, Microsoft's recommendations include using Word Viewer and disabling Word as the E-mail editor to protect against this vulnerability.

From: http://www.microsoft.com/technet/security/advisory/919637.mspx

-- Use Word Viewer 2003 to open and view files.
================================================================
Word Viewer 2003 does not contain the vulnerable code and is not susceptible to this attack. It can be downloaded for free at http://www.microsoft.com/downloads/details.aspx?familyid=95E24C87-8732-48D5-8689-AB826E7B8FDF&displaylang=en.

-- Disable Outlook feature to use Word as Mail editor
=================================================================
1. Restart the machine.
2. Open Outlook
3. Click the Tools menu, choose Options, and then click the Mail Format tab.
4. Clear the "Use Microsoft Word to edit e-mail messages" check box.
5. Clear the "Use Microsoft Word to read Rich Text e-mail" messages box.
6. Exit Outlook.
7. Restart the machine.

**Impact of Workaround: Users will not be able to use Word as their Email-Editor or use Rich Text to read their e-mail.




E-mail Phishing scheme seen on campus
Posted 18 October 2005 by CCC Helpdesk
When? Over the past two weeks, some WPI community members have received a bogus email message purporting to be a "virtual postcard from a family member"
How long? NA
Why? This email is the result of a known "phishing" scheme. "Phishing" is a term used to describe means by which indentity thieves attempt to steal personal information from potential victims.
Groups Affected Email users who receive this message
Impact Users who receive an email message from Postcards 1001 with the subject: "You've received a greeting from a family member!" should refrain from clicking on the links provided as the links may lead to a web site asking for personal information or may result in a trojan horse virus installation attempt.

The threat to WPI users is low because of protections in place at WPI, but home users should beware of potential dangers of this message.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Over the past two weeks, some WPI users have received a bogus email purporting to be a "Virtual Postcard from a family member" (See sample below).

Recipients of this message are advised not to click on any of the embedded links in this email as they are harmful in nature and could initiate an installation attempt of malware (harmful software) on your computer.

WPI users are protected in several ways, including:
#1. WPI's SPAM scanner (PureMessage) recognizes this as a known phishing scheme and as such will mark the messages as having a high probability of being SPAM. Mail filters should intercept the SPAM and deal with it accordingly.
#2. McAfee virus scanner (in use at WPI) recognizes and intercepts this threat.

Home users should proceed with more caution. It is recommended that home users install and maintain virus protection software and institute some level of mail filtering.

More information about similar threats can be found at:
http://blogs.washingtonpost.com/securityfix/2005/04/you_have_just_r.html
http://nwc.desktoppipeline.com/160502034

More information about Phishing can be found at:
http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.htm
http://www.washingtonpost.com/wp-dyn/articles/A59383-2004Nov18.html

Contact the WPI CCC Helpdesk with any questions. The Helpdesk can be reached at (508)831-5888 or by emailing helpdesk@wpi.edu.

Sample of bogus email message/phishing attempt:
====================================================
From: postcards1001 [mailto:postcards@postcards1001.com]
Subject: You've received a greeting from a family member!


D>

You have just received a virtual postcard from a family member!
.

You can pick up your postcard at the following web address:
.

http://www2.postcards.org/?a91-valets-cloud-31337
.

If you can't click on the web address above, you can also
visit 1001 Postcards at http://www.postcards.org/postcards/
and enter your pickup code, which is: a91-valets-cloud-mad
.

(Your postcard will be available for 60 days.)
.

Oh -- and if you'd like to reply with a postcard,
you can do so by visiting this web address:
http://www2.postcards.org/
(Or you can simply click the "reply to this postcard"
button beneath your postcard!)
.

We hope you enjoy your postcard, and if you do,
please take a moment to send a few yourself!

.

Regards,
1001 Postcard
http://www.postcards.org/postcards/

=======================================================



Connecting to Exchange from Off-Campus
Posted 22 August 2005 by CCC Helpdesk
When? Immediately
How long? N/A
Why? To allow all members of the community, whether on- or off-campus access to Exchange via the Outlook client, without having to run the VPN.
Groups Affected Exchange Server Users
Impact The WPI VPN client is no longer necessary to connect to the Exchange server from off-campus if you are running Outlook 2003 on Windows XP Service Pack 2.
Questions Contact the Helpdesk by calling x5888 or e-mail helpdesk@wpi.edu

Details
After making a quick configuration change in Microsoft Outlook, use of the WPI VPN client is no longer necessary to connect to the Exchange server from off-campus. In order to take advantage of this functionality, you must be using Microsoft Outlook 2003 and Windows XP Professional Service Pack 2 (SP2).

We have created detailed instructions to reconfigure your client for this functionality:

http://www.wpi.edu/+helpdesk/Email/Exchange/rpc.html

Note: If you have a laptop/portable computer and use it both on- and off-campus, you can make this configuration change and your system will function properly in both environments.

Please also take this time to ensure that your system is properly patched with all Microsoft critical updates by visiting Windows Update:
http://update.microsoft.com/microsoftupdate.

If you are prompted by Microsoft to install an ActiveX control or application, please do so. Allow the page to properly scan your system for applicable updates to both Windows and Office, and then proceed to install the updates.

If you have any questions or concerns, please contact the CCC Helpdesk at helpdesk@wpi.edu or x5888.

Thank you.

Deployment of Microsoft Windows XP Service Pack 2 to ADMIN Domain Users
Posted 19 July 2005 by CCC Helpdesk
When? Starting Wednesday, July 27, 2005
How long? Ongoing
Why? To upgrade all Windows XP installations to Service Pack 2 which will increase security and stability.
Groups Affected All ADMIN domain users; most faculty and staff
Impact - The installation process should be transparent. The update will install in the background and will require a reboot when finished.

In order to maintain the highest level of quality and security on desktop systems, all Windows XP installations will be upgraded to Service Pack 2.
Service Pack 2 contains many critical security and stability fixes as well as new features. Listed below are the major changes with links to information about them.

- Improved Wireless network support - supports WPA wireless encryption which WPI will be migrating to this summer
- Integrated Internet Explorer Pop-up Blocker
- Internet Explorer Security Information Bar
- Improved Windows Firewall
Questions Contact the Helpdesk by calling x5888 or e-mail helpdesk@wpi.edu

Details
Service Pack 2 (SP2) was released by Microsoft in the summer of 2004. Service Pack 2 included many changes to the underlying architecture of the operating system and as a result we have been holding off installing it so that we could test Academic applications to identify potential problems with the upgrade. Now that testing has completed we will be deploying SP2 to the entire campus.

In order to efficiently deploy Service Pack 2 the CCC will be remotely installing the update to all Windows XP installations in the ADMIN domain.

Service Pack 2 will begin to be deployed to computers as of July 27, 2005. Systems that are powered off for the summer should receive the update within 24 hours of being turned on.

The evening prior to the deployment, you should log out of your computer, but leave it turned on. Once the update is downloaded and installed on your computer it will automatically reboot. When you return in the morning you should be fully updated.

Please contact the Helpdesk (call Ext. 5888 or e-mail helpdesk@wpi.edu) with any questions or concerns regarding this process. Thank you.



Warning & Information About the W32/Sober.o@MM Virus
Posted 19 April 2005 by CCC Helpdesk
When? First Appeared Monday, April 18, 2005
How long? N/A
Why? Virus-generated E-mail received by WPI users
Groups Affected E-mail users
Impact Members of the WPI community have reported receiving e-mail messages with the subject: "I've_got your EMail on my_account!" that was generated by the W32/Sober.o@MM virus.
Questions Contact the Helpdesk by calling x5888 or by
e-mailing helpdesk@wpi.edu

Details
These e-mail messages are the product of the W32/Sober.o@MM virus and appear to be sent from off-campus computers. This mass-mailing worm arrives in an e-mail messages that is designed to trick users into thinking that someone else is receiving their e-mail. These messages are now being blocked, but many were delivered earlier in the day. The virus inside the zipped file attachment was removed from any of the messages that had been delivered.

It arrives in a message as follows:

***************

Subject: I've_got your EMail on my_account!
Body:

Hello,
First, Very Sorry for my bad English.

Someone is sending your private e-mails on my address.
It's probably an e-mail provider error!
At time, I've got over 10 mails on my account, but the recipient are you.

I have copied all the mail text in the windows text-editor for you &
zipped then.
Make sure, that this mails don't come in my mail-box again.

bye

Attachment: your_text.zip (containing the file
mail.document.Datex-packed.exe )

***************

Complete details about this virus can be found at McAfee's Virus Information Library:

http://vil.nai.com/vil/content/v_133061.htm

WPI is protecting its users by removing infected attachments before they come into our network. A second check of e-mail sent to the ADMIN and STUDENT Exchange servers provides another level of protection.

To best protect against computer viruses users should:
- maintain up-to-date virus definition files
- use virus protection software to regularly scan their PCs
- always scan files before downloading from Internet sites or before copying from portable media
- never open attachments from unknown sources
- never open attachments that you were not expecting even from known sources.

Please contact the Helpdesk if you have any questions or concerns related to this notice or to virus protection in general.

Thank you,
The CCC Helpdesk


Planned Oracle Upgrade / Outage
Posted 7 March 2005 by CCC Helpdesk
When? Thursday, March 10, 2005 @ 6:00 AM
How long? Approximately 1 hour
Why? Software and hardware upgrade
Groups Affected Computer Science and Management Department's Database Users
Impact The Oracle databases for the Computer Science and Management departments will be unavailable from 6:00 AM - 7:00 AM on Thursday, March 10, 2005.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
The Oracle databases for the Computer Science and Management departments will be unavailable from 6:00 AM - 7:00 AM on Thursday, March 10, 2005.

The Oracle software will be upgraded to Oracle 10G and will be relocated to a faster machine.

Plant Services Work Order System Outage and Upgrade
Posted 17 November 2004 by CCC Helpdesk
When? Wednesday, November 24, 2004 @ 5:00 pm
How long? Services will be unavailable for approximately 24 hours
Why? Work Order Server and Software Upgrade
Groups Affected Users of http://workorders.wpi.edu
Impact The Plant Services work order system (Maximo) will be unavailable for 24 hours starting on Wednesday, 11/24/2004 for a server and software upgrade.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
The Plant Services work order system, Maximo (http://workorders.wpi.edu), will be unavailable for approximately 24 hours starting on Wednesday, November 24, 2004 at 5:00 pm. At this time, the server and work order software will be upgraded.

Users will need to e-mail workorders@wpi.edu to obtain a new temporary password.

Thank you for your cooperation and patience. Please contact the Helpdesk with any questions or concerns.

Connections to WPI Sites Using SSL Are Being Redirected
Posted 15 November 2004 by CCC Helpdesk
When? Starting on Monday, 11/15/2004
How long? Until Further Notice
Why? To Protect Data Transferred by SSL
Groups Affected All User's of WPI's SSL Web Sites (e-mail, myWPI, and others)
Impact Off-campus users with marketscore.com spyware will not be able to access WPI secure web sites while the block is in place. On-campus users with marketscore.com spyware will not be able to access any secure web sites. Instead they will be redirected to the following web site:
http://www.wpi.edu/Academics/CCC/Services/sslproxy.html

If you experience any problems accessing any of WPI's secure web sites, this may be an indication that your computer is infected with this "parasite".
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
encrypted data such as passwords and other secure transactions. To protect WPI's systems from unauthorized release of private data and other security risks, connections to Marketscore from WPI are being blocked.

Marketscore (the commercial name) or ossproxy (the program name), previously called Netsetter, is a program advertised to enhance Internet speed. You will not notice an increase in speed, and this software poses a threat by installing a trusted certificate authority in your browser and routing all your Web connections through its proxies, logging and analyzing them on behalf of Marketscore's customer sites.

This includes Secure Sockets Layer (SSL) traffic, which it decrypts, then re-encrypts, and communicates with your target host.

The Marketscore service collects, analyzes, and stores everything you send to and receive from any Web site. This includes passwords, credit card numbers, and e-mail (if you use a browser-based mail program).

To protect WPI's systems from unauthorized release of private data and other security risks, connections to Marketscore from WPI are being blocked. In order to protect your privacy and the security of the WPI network, you must remove this software.

The following web site will help you determine if your computer has been configured with certain versions of marketscore.com spyware.

https://www.wpi.edu/cgi-bin/sslproxytest

Many spyware removal programs will find and remove Marketscore, such as Lavasoft Ad-Aware and Spybot - Search & Destroy. Instructions for installing and using these utilities can be found here:

http://www.wpi.edu/Academics/CCC/Help/Software/spyware.html#4

After you have cleaned your system, we suggest that you change any passwords or PINs that might have been entered on the computer, including those for external accounts at sites outside of WPI.

If you need assistance with this process, please contact the CCC Helpdesk at x5888.

Thank you.

Exchange Global Address List changes
Posted 26 August 2004 by CCC Helpdesk
When? Henceforth
How long? NA
Why? The STUDENT Exchange server is now in the same Exchange organization as the ADMIN Exchange server. Following the migration of the Academic Exchange server to the new STUDENT domain, the appearance and functionality of the Global Address List (user directory) for Exchange users has changed. The changes will be apparent to both ADMIN and STUDENT Exchange users.
Groups Affected ADMIN and STUDENT Exchange users (some faculty, most staff and some students)
Impact - Faculty and Staff Outlook users will now be able to choose student names from the Global Address List.
- Faculty and Staff Outlook users will now be able to use the Outlook "Plan A Meeting" tool to arrange meetings with students who have Exchange accounts.
(Note: many new students have created STUDENT Exchange mailboxes already)
- Students with Exchange accounts will be able to plan meetings with each other and invite Faculty and Staff who have Exchange accounts.
- Exchange users working in cached mode will need to update their Global Address List more frequently while new STUDENT Exchange accounts are being created
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
The STUDENT Exchange server is now in the same Exchange organization as the ADMIN Exchange server. Following the migration of the Academic Exchange server to the new STUDENT domain, the appearance and functionality of the Global Address List (user directory) for Exchange users has changed. The changes will be apparent to both ADMIN and STUDENT Exchange users.

The changes include the following:

- Faculty and Staff Outlook users will now be able to choose student names from the Global Address List.
- Faculty and Staff Outlook users will now be able to use the Outlook "Plan A Meeting" tool to arrange meetings with students who have Exchange accounts.
(Note Many Freshman have created STUDENT Exchange mailboxes already)
- Students with Exchange accounts will be able to plan meetings with each other and invite Faculty and Staff who have Exchange accounts.
- Exchange users working in cached mode will need to update their Global Address List (GAL) more frequently while new STUDENT Exchange accounts are being created in order to avoid receiving bounce messages for mail sent to new STUDENT Exchange users. This can be accomplished as detailed in the following problem solution:

Solution Details:
====================================================================

Problem: Bounced E-mail Messages Sent from Outlook 2003 Clients to Recipients in the Global Address List

Applies To: Outlook 2003 in Cached Exchange Mode

Solution: The Global Address List (GAL) used while Outlook is running in Cached Exchange mode is not always up-to-date. To make sure that the GAL is up-to-date, please do the following:

1. Open Outlook.
2. Click on Tools -> Send/Receive -> Download Address Book...
3. Uncheck "Download changes since last Send/Receive"
4. Make sure that "Full Details" is selected under "Information to Download".
5. Make sure that "\Global Address List" is selected under "Choose address book:".

The other option is to not run Outlook in Cached Exchange mode while the GAL is so fluid at this early stage in the academic year.

Please contact the Helpdesk with any questions or concerns.




CCC's Position on Windows XP Service Pack 2
Posted 18 August 2004 by CCC Helpdesk
When? NA
How long? Until further notice
Why? In order to give IT staff the time they need to properly test the use of Windows XP Service Pack 2 in our environment, we are asking users to refrain from installing the Service Pack released by Microsoft.
Groups Affected Faculty and Staff users
Impact Until Testing has been completed, the CCC cannot guarantee that all software products will work with Windows XP Service Pack 2 (SP2). The CCC cannot guarantee support will be available for issues that arise as a result of using Windows XP SP2.

Users who require the use of specialized software should contact the Helpdesk to ensure that their software is added to the list of software to test.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Dear Members of the Faculty and Staff,

As some of you may or may not know, Microsoft has released Service Pack 2 for Windows XP. This service pack contains many new security related features designed to help prevent viruses, worms and other security problems that have affected Windows systems.

It is our intention to deploy this Service Pack to all Windows XP systems eventually, but not until we determine what, if any, potential problems there may be with this rollout.

Microsoft has made many major changes in the process of tightening security on Windows XP and has stated that this will likely cause a small percentage of applications to not work as designed on Service Pack 2; specifically custom designed applications.

For the time being we are asking the WPI community *NOT* to install Service Pack 2 on their systems until we have fully tested it with WPI supported systems. Faculty and staff who write their own custom Windows software for use on the WPI Campus are being asked to contact the Helpdesk. From there members of the Windows Administration group will work with you to test your applications. It is our goal to make this transition as smooth as possible and to give everyone in the community enough time to adapt to these large changes.

We appreciate your patience and cooperation in these efforts.

Thank you.


Warning & Information About the MyDoom.O Virus
Posted 26 July 2004 by CCC Helpdesk
When? Monday, July 26, 2004
How long? N/A
Why? A virus infected e-mail has been sent to WPI e-mail addresses using a spoofed WPI address: postmaster@wpi.edu
Groups Affected Students, Faculty, & Staff (various WPI e-mail users)
Impact A new variant of the MyDoom (W32/Mydoom.o@MM) virus has been detected in e-mail messages delivered to WPI addresses, some claiming to have originated from postmaster@wpi.edu.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
These e-mail messages are the product of the Mydoom.O virus. This message DID NOT originate from WPI or any WPI e-mail address. The From field was spoofed to make it look like it did. These messages are not being blocked, but the virus infected attachment is being removed before delivery.

Here is a sample of the spoofed e-mail:

***************

-----Original Message-----
From: Automatic Email Delivery Software [mailto:postmaster@WPI.EDU]
Sent: Monday, July 26, 2004 11:31 AM
To: xxxxx@wpi.edu
Subject: Returned mail: see transcript for details

Dear user of wpi.edu,

Your e-mail account was used to send a large amount of spam messages during the last week.

We suspect that your computer had been infected and now contains a hidden proxy server.

Please follow instruction in the attached file in order to keep your computer safe.

Sincerely yours,
wpi.edu support team.

***************

Complete details about this virus can be found at McAfee's Virus Information Library:

http://vil.nai.com/vil/content/v_127033.htm

WPI is protecting its users by removing infected attachments before they come into our network. A second check of e-mail sent to the ACADEMIC and ADMIN Exchange servers provides another level of protection.

To best protect against computer viruses users should:
- maintain up-to-date virus definition files
- use virus protection software to regularly scan their PCs
- always scan files before downloading from internet sites or before copying from portable media
- never open attachments from unknown sources
- never open attachments that you were not expecting even from known sources.

Please contact the Helpdesk if you have any questions or concerns related to this notice or to virus protection in general.

Thank you,
The CCC Helpdesk

Run Microsoft Office Update
Posted 28 May 2004 by CCC Helpdesk
When? Ongoing
How long? Indefinitely
Why? To ensure that Microsoft Office is running at the highest levels of security, stability, and critical functionality available
Groups Affected Microsoft Office Users
Impact Failure to run Microsoft Office update could lead to Office instability or could leave your PC vulnerable to security threats.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
All Microsoft Office users should run Office Update, even those who were recently upgraded to Microsoft Office 2003 via the WPI ADMIN domain network deployment.

The Microsoft Office Update site is the online extension of Office that helps you keep your Office products up-to-date. Office product updates are created by Microsoft for all applications in the Office suite including Word, Outlook, PowerPoint, Excel, FrontPage, Publisher, Visio and Project. This is to bring you the highest levels of security, stability, and functionality available. Updates are available for free through the Office Update site.

To ensure the integrity of your Microsoft Office installation, the Microsoft Windows Installer requires access to your installation media or network installation location before applying any product updates. This is a technical requirement of Windows Installer-based software patching and is not intended to be an anti-piracy measure.

How to install Microsoft Office Updates:
1. Open Internet Explorer
2. Go to: http://officeupdate.microsoft.com
3. Click 'Check for Updates'.
4. If you receive the following security warning, click 'Yes': "Do you want to install and run "Office Update Installation Engine". If you don't want to see this message again, make sure that "Always trust content from Microsoft Corporation" is checked.
5. Click 'Next >' to accept "End-User License Agreement for Microsoft Software"
6. Click 'Next >' to confirm your selection.
7. Click 'Next >' to "Please have your Office product CD ready."
8. The updates will then be downloaded and installed on your computer. Office Update may need to run more than once, it will inform you to do so if need be.

Please visit the Office Update site regularly to make sure that your Office products are up-to-date.

To help ensure that your computer is performing at the highest levels of security, stability, and critical functionality available, you should also install critical updates from the Windows Update site http://windowsupdate.microsoft.com as well.

Please contact the Helpdesk with any questions or concerns regarding this information. Thank you.


Deployment of Microsoft Office 2003 to ADMIN domain users
Posted 5 May 2004 by CCC Helpdesk
When? Monday, May 10, 2004 - Thursday, May 13, 2004
How long? Each individual installation should take approximately 30 minutes.
Why? To install the newest version of Microsoft Office on all administrative computers.
Groups Affected All users of the ADMIN domain; most faculty and staff
Impact The installation process should take approximately 30 minutes for most computers. A reboot will be required to initiate the installation. There will be a noticeable delay on login.

The following Microsoft Office 2003 products will be installed: Word, Excel, Access, PowerPoint, Outlook and Publisher. All previous versions of these products will be removed during the installation process.

3rd party add-ins may need to be reinstalled to work properly.

Installations of the following Microsoft products will NOT be affected by this deployment process:
Visio, Project or Front Page
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
In order to efficiently deploy the new version of the Microsoft Office suite of products (version 2003), the CCC will be implementing a remote installation procedure which will automatically remove previous versions of Microsoft Office products and install the new Microsoft Office 2003 suite on administrative computers in the ADMIN domain. The deployment schedule is as follows:

Monday, May 10
Fuller Labs, Higgins Labs, Boynton Hall (Admissions, Financial Aid, Provost's Office, University Relations Only), Southboro, Waltham

Tuesday, May 11
Washburn Labs, Kaven Hall, AK, Campus Center, Gordon Library, Boynton Hall (Accounting Only)

Wednesday, May 12
Stratton Hall, Olin Hall, Goddard Hall, Salisbury Labs, Boynton Hall (Registrar's Office Only)

Thursday, May 13
Any remaining offices and systems in the Admin domain.

The evening prior to your scheduled deployment, you should log out of your computer, but leave it turned on. We will be rebooting the computers remotely and initiating the installations to happen during the night. This will eliminate the half-hour wait during login in the morning.

The installation procedure will take approximately 30 minutes for most computers. Any previous versions of Microsoft Office Products will be removed (or uninstalled) from the computer and the new versions of the following products will be installed: Word, Excel, Access, PowerPoint, Outlook and Publisher. Users will be unable to use the computer while the installation is in progress.

Other Microsoft product installations will not be affected, including installations of: Visio, Project or FrontPage.

Training for Microsoft Office 2003 topics will be offered starting in the month of May by Debra Dexter, the CCC Software Applications Instructor.

Please contact the Helpdesk (call Ext. 5888 or e-mail helpdesk@wpi.edu) with any questions or concerns regarding this process.

Thank you.

Deployment of MS Office 2003 to ADMIN domain users
Posted 30 April 2004 by CCC Helpdesk
When? Between the end of D term and the Start of E term
How long? Each individual installation should take about 30 minutes. Remote installations will happen over the course of 3-5 days. Schedule to be released next week.
Why? To install the newest version of MS Office on all administrative computers.
Groups Affected All users of the ADMIN domain; most faculty and staff
Impact The installation process should take about 30 minutes for most computers. A reboot will be required to initiate the installation. There will be a noticeable delay on login.

The following Microsoft Office 2003 products will be installed: Word, Excel, Access, PowerPoint, Outlook and Publisher. All previous versions of these products will be removed during the installation process.

Installations of the following Microsoft products will NOT be affected by this deployment process:
Visio, Project or Front Page
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
In order to efficiently deploy the new version of the Microsoft Office suite of products (version 2003), the CCC will be implementing a remote installation procedure which will automatically remove previous versions of Microsoft Office products and install the new Microsoft Office 2003 suite on administrative computers in the ADMIN domain. The remote installation procedure will be taking place during the time between the end of D-term and the beginning of E-term. The deployment will happen over serveral days.

The installation procedure will take approximately 30 minutes for most computers. Any previous versions of Microsoft Office Products will be removed (or uninstalled) from the computer and the new versions of the following products will be installed:
Word, Excel, Access, PowerPoint, Outlook and Publisher. Users will be unable to use the computer during the installation process.

Other Microsoft Product installations will not be affected, including installations of:
Visio, Project or FrontPage.

Training for Microsoft Office 2003 topics will be offered starting in the month of May by Debra Dexter, the CCC Software Applications Instructor.

More information about training and a detailed deployment schedule will be made available next week. Please contact the Helpdesk (Ext. 5888 or helpdesk@wpi.edu) with any questions or concerns regarding this issue.

Thank you.



Warning About Virus Propagated E-mails
Posted 3 March 2004 by CCC Helpdesk
When? Wednesday, March 3, 2004
How long? n/a
Why? The W32/Bagle.j@MM virus is characterized is categorized as Medium-Outbreak risk factor by Network Associates, makers of McAfee virus protection software.
Groups Affected Users of WPI E-mail Systems
Impact The W32/Bagle.j@MM virus is a mass-mailing worm with the following characteristics:
- contains its own SMTP engine to construct outgoing messages
- harvests email addresses from the victim machine
- the From: address of messages is spoofed
attachment can be a password-protected zip file, with the password included in the message body.
- contains a remote access component (notification is sent to hacker)
- copies itself to folders that have the phrase shar in the name (such as common peer-to-peer applications; KaZaa, Bearshare, Limewire, etc)
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
This notice is in regards to the recent e-mails that were received with the following subjects:

- "Email account utilization warning."
- "Notify about using the e-mail account."
- "Warning about your e-mail account."

sent to the wpi community which appears to be sent from staff@wpi.edu, management@wpi.edu, administration@wpi.edu, or possibly another @wpi.edu e-mail address. These messages DID NOT originate from WPI or a WPI e-mail address. The From field was spoofed to make it look like it did. Your e-mail account has not and will not be disabled.

These messages were sent from a computer infected with the W32/Bagel.j@MM virus. All incoming WPI mail traffic is scanned for this virus and all instances of the virus are being stripped from infected messages.

Complete details about this virus can be found at:
http://vil.nai.com/vil/content/v_101071.htm

WPI protects its users by blocking infected messages before they come into our network. A second check of e-mail sent to the ACADEMIC and ADMIN Exchange servers provides another level of protection.

To best protect against computer viruses users should:
- maintain up-to-date virus definition files
- use virus protection software to regularly scan their PCs
- always scan files before downloading from internet sites or before copying from portable media
- never open attachments from unknown sources
- never open attachments that you were not expecting even from known sources.

Please see the following web page if you need instructions on how to install antivirus software:
http://www.wpi.edu/Academics/CCC/Help/Software/Virus/mcafee.html

Please contact the Helpdesk if you have any questions or concerns related to this notice or to virus protection in general.

Thank you,
CCC Helpdesk

Microsoft Security Bulletin MS04-007 Released - Users should install all Windows Critical Updates and Service Packs
Posted 20 February 2004 by CCC Helpdesk
When? Effective Immediately
How long? N/A
Why? Microsoft has issued a critical update for Windows NT, 2000 and XP and 2003 server computer operating systems. The Software Update must be performed in order to protect computers from the vulnerability that could expose machines to remote access or attack. This vulnerability could lead to problems similar to those endured at the beginning of A term this year, e.g. attacks similar to those imposed by the Nachi and Blaster worms.
Groups Affected Computers Running Microsoft Windows NT, 2000, XP or 2003
Impact An attacker who successfully exploited this vulnerability could gain complete control over an affected system.
Questions Contact the CCC Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
This week Microsoft issued a critical update for several versions of its Windows NT, 2000, XP and 2003 operating systems. The critical update addresses a vulnerability in its ASN.1 Library that could lead to malicious code being run on a computer by a remote user (hacker). This vulnerability has the potential of leading to an attack on the scale of that we experienced back in August of 2003 with the Nachi & Blaster worms.

To protect your personal computer from this vulnerability and potential exploitation by malicious entities, you should patch your system immediately. Users can easily do so by running all Windows Critical Updates and Service Packs:

1. Open Internet Explorer
2. Choose Windows Update from the Tools menu
3. Install all Critical Updates and Service Packs
4. Reboot when prompted.
Note: Users may not be able to install all Critical Updates and Service Packs at one time and once prompted to reboot should re-visit Windows Update to see if there are any additional Critical Updates and Service Packs to install.

Read the MS04-007 security bulletin, and download patches at:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms04-007.asp

Articles related to this vulnerability:
http://www.techtv.com/news/securityalert/story/0,24195,3614695,00.html
http://www.gcn.com/vol1_no1/security/24946-1.html

Please contact the Helpdesk at ext. 5888 or (508)831-5888 or helpdesk@wpi.edu with any questions you may have.

Thank you!


Software Update for computers on the ADMIN domain (Windows XP and Windows 2000 systems)
Posted 20 February 2004 by CCC Helpdesk
When? Monday, February 23, 2004 – to begin after midnight
How long? Software Update installation is very Brief, but a reboot is required.
Why? Microsoft has issued a critical update for Windows NT, 2000 and XP and 2003 server computer operating systems. The Software Update must be performed in order to protect WPI computers from the vulnerability that could expose machines to remote access or attack. This vulnerability could lead to problems similar to those endured at the beginning of A term this year, e.g. attacks similar to those imposed by the Nachi and Blaster worms.
Groups Affected Machines that are part of the ADMIN Domain; Faculty and staff computers
Impact The Software Update will be issued automatically over the network. Computers that are still powered on will receive the software update during the early morning hours of Monday. Machines that had been turned off when the Software Update was issued will receive the software update when the machine next connects to the domain (for most users that will be at start of business on Monday morning). Once the software update has been installed on the computer, the user will be prompted to restart the computer. We recommend that all users re-start when prompted so that they will receive up-to-date notices about any new Windows Updates.

To ensure that a computer receives the software update when it is released, a user should leave their computer turned on over the weekend. (Just remember to log out first!)
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
This week Microsoft issued a critical update for several versions of its Windows NT, 2000, XP and 2003 operating systems. The critical update addresses a vulnerability in its ASN.1 Library that could lead to malicious code being run on a computer by a remote user (hacker). This vulnerability has the potential of leading to an attack on the scale of that we experienced back in August of 2003 with the Nachi & Blaster worms.

To protect WPI personal computers from this vulnerability and potential exploitation by malicious entities, the WPI Computing and Communications Center (CCC) Windows support group is issuing an automatic Software Update.

This Software Update will allow for the critical patch (MS04-007) to be installed on WPI personal computers that are on the ADMIN domain, protecting them from this vulnerability.

The Software Update will be pushed out to personal computers in the early morning hours of Monday, February 23, 2004. Personal computers that are powered on at the time will receive the update immediately. Personal computers that are not powered on at the time, will receive it on next login (start of business on Monday morning for most users). After these systems receive the update, the user will be asked to restart the computer. The CCC recommends that users choose to restart when prompted. Users who choose not to restart will not be able to receive newer Windows updates later. Please restart when prompted!

ADMIN Domain users will have the advantage of being protected from this potentially dangerous vulnerability. Users of personal computers that are not on the ADMIN domain are STRONGLY encouraged to immediately install the required patch manually. Users can do so by following the link to the Microsoft Security Bulletin and choosing the appropriate patch to download.

Read the MS04-007 security bulletin, and download patches at:

<< http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms04-007.asp >>

Articles related to this vulnerability:
<< http://www.techtv.com/news/securityalert/story/0,24195,3614695,00.html>>

<< http://www.gcn.com/vol1_no1/security/24946-1.html >>

All users are encouraged to keep their home PCs protected by running Windows Update. To do this:

1. Open Internet Explorer
2. Choose Windows Update from the Tools menu
3. Install all Critical Updates and Service Packs
4. Reboot when prompted.

Please contact the Helpdesk at ext. 5888 or (508)831-5888 or helpdesk@wpi.edu with any questions you may have.

Thank you!




Warning & Information about the MyDoom virus
Posted 28 January 2004 by CCC Helpdesk
When? First seen on Monday afternoon (1/26/2004)
How long? NA
Why? The MyDoom virus (called W32/Mydoom@MM by McAfee) is categorized as High-Outbreak risk factor by Network Associates, makers of McAfee virus protection software. This means it is a high-risk virus that spread quickly accross multiple continents.
Groups Affected Faculty, Staff, and Students
Impact The impact of the existence of the MyDoom virus and its variants include:
1. Possible infection of a personal computer used to open an infected e-mail message.
2. Generation of bogus e-mail messages including bounced messages or "Returned due to virus" notifications to innocent victims (persons who did not send out infected messages)
3. Payload includes: Denial of Service attack from infected PCs to www.sco.com on first startup after Feb. 1, 2004, relaying of TCP traffic and more.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
This virus is spread primarily via email. All incoming mail traffic to WPI is being scanned for this virus and all instances of the virus are being stripped from infected messages.

Since stolen or spoofed email addresses may be used by the virus to complete the TO: and FROM: fields of infected messages generated by the virus to propagate itself, one cannot assume that the sender address is indicative that the sender's machine is infected. A side-effect of this is that innocent users may receive bounced email that say "returned due to virus". These messages will imply that a message sent by you to the server was infected, which may not be the case.

Complete details about this virus can be found at:
http://vil.nai.com/vil/content/v_100983.htm

WPI is protecting its users by blocking infected messages before they come into our network. A second check of e-mail sent to the ACADEMIC and ADMIN Exchange servers provides another level of protection.

To best protect against computer viruses users should:
- maintain up-to-date virus definition files
- use virus protection software to regularly scan their PCs
- always scan files before downloading from internet sites or before copying from portable media
- never open attachments from unknown sources
- never open attachments that you were not expecting even from known sources.

Please contact the Helpdesk if you have any questions or concerns related to this notice or to virus protection in general.

Thank you,
The CCC Helpdesk


Windows/Exchange Servers - planned outage
Posted 19 December 2003 by CCC Helpdesk
When? Saturday, Dec. 27, 2003 starting at 6:00 AM
How long? Approximately 24 hours
Why? In order to upgrade the server software for the Windows servers and for the Exchange servers (adminmail.wpi.edu & acadmail.wpi.edu), the servers will have taken offline. This is a planned outage and will impact all Windows services offered through the ADMIN and ACADEMIC domains.
Groups Affected Faculty, staff and students; All users of ADMIN and ACADEMIC Windows services
Impact While the Windows servers are down, there will be no access to any Windows based services. The following Windows services will be affected:
- Domain logins to ADMIN or ACADEMIC domains will be unavailable intermittently throughout the day
- Users will be unable to map network drives, including \\salsa, \\toaster or \\mcteer.
- Use of the Banner PC client (which relies on mapped network drives) will not work. Banner users can use Internet Native Banner (INB).
- Windows-based print services will be unavailable.
- Network Software installations and software installed via Advertised Programs, or software that relies on windows license servers will not function.

The following Exchange services will be impacted:
- No access to Exchange email via any client (Outlook, Pine, other IMAP client).
- Outlook Web Access be unavailable.


Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
CCC Windows and Exchange servers will be offline for a planned outage on Saturday Dec. 27, 2003. The planned outage is necessary in order to upgrade the Windows Server Software and Exchange server software. The outage should last approximately 24 hours. During the outage no Windows Services or Exchange services will be available to users.

The following Windows services will be affected:

- Domain logins to ADMIN or ACADEMIC domains will be unavailable intermittently throughout the day
- Users will be unable to map network drives, including \\salsa, \\toaster or \\mcteer.
- Use of the Banner PC client (which relies on mapped network drives) will not work. Banner users can use Internet Native Banner (INB).
- Windows-based print services will be unavailable.
- Network Software installations and software installed via Advertised Programs, or software that relies on windows license servers will not function.

The following Exchange services will be impacted:
- No access to Exchange email via any client (Outlook, Pine, other IMAP client).
- Outlook Web Access be unavailable.

**Please note that the Helpdesk will be closed during this outage due to WPI being closed for the Holiday break. Issues reported to the Helpdesk during the WPI closure will be addressed when WPI reopens on January 5, 2004. Thank you for your understanding.

Banner 5 PC Client removal from WPI desktops (Windows 2000 and XP machines only)
Posted 10 November 2003 by CCC Helpdesk
When? Thursday, November 20, 2003
How long? NA
Why? The existing Banner 5 pc client will not function with Banner 6 Software (soon to be upgraded). An upgraded version of the pc client or use of the Internet Native Banner (INB) interface is required with Banenr 6. The removal of the Banner 5 PC client from desktops running Windows 2000 and Windows XP is a preparation for the upcoming Banner 6 software upgrade.
Groups Affected Banner 5 PC client users (faculty, staff) or users who rely on the ODBC connections available via the Banner pc client installation.
Impact 1. the Banner 5 Client will no longer be available for use on WPI Windows 2000 and Windows XP desktops. The client will be uninstalled from these WPI systems automatically. (Windows 98 machines are NOT impacted by this removal)
2. Users will be able to use Internet Native Banner (INB) in place of the PC client. Users who wish to continue using a Banner PC client will need to install an upgraded version of the client for use. No Banner PC client will be installed on a local machine unless initiated by a user of that machine.

3. Users who rely on the ODBC component of the Banner 5 installation for access to Banner Data connecting from Excel, Acess, ARD, etc. will need to install the upgraded version of the PC client to use the ODBC drivers.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Early on Thursday, November 20, 2003 an automated process will remove the Banner 5 PC client from WPI personal computers. This is a key step to preparing for the Banner 6 software upgrade. The Banner 5 pc client will not work with Banner 6.

Impact:
1. The Banner 5 Client will no longer be available for use on WPI Windows 2000 or Windows XP desktops. The Banner 5 client will be uninstalled from WPI Windows 2000 and Windows XP systems automatically. (Windows 98 machines are NOT impacted by this change).

2. Users will be able to use Internet Native Banner (INB) in place of the PC client.
Users who wish to continue using a Banner PC client will need to install an upgraded version of the client for use.
No Banner PC client will be installed on a local machine unless initiated by a user of that machine.

The upgraded client can be installed by:
A. Access \\salsa\netapps
(Mapped to the O: drive for most users)
B. Double-click on the "Banner Served Install" icon
C. When prompted to proceed, click the "Next" button.
D. When the installation is complete, click the "Finish" button.
E. A "Banner" icon and a "Discover" icon will appear on the desktop. (Discover is a data mining tool soon to be deployed at WPI)

3. Users who rely on the ODBC component of the Banner 5 installation will need to install the upgraded version of the PC client to use the ODBC drivers to connect to Banner Data from ARD, Excel, Access, etc. (see installation instructions from item #2 above)

Please contact the Helpdesk with any questions or concerns.




Windows 98 Users Cannot Connect to the ADMIN Exchange Server Using the Outlook Client
Posted 31 October 2003 by CCC Helpdesk
When? Friday, October 31, 2003
How long? Until Further Notice
Why? Unknown at this time, however the Windows Systems Administrators are currently working to find a resolution
Groups Affected ADMIN Exchange Users Running Windows 98
Impact Users running Windows 98 have been unable to connect to the ADMIN Exchange server using the Outlook Client. When Outlook is opened, users are repeatedly prompted to re-enter their password.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Users running Windows 98 have been unable to connect to the ADMIN Exchange server using the Outlook Client. When Outlook is opened, users are repeatedly prompted to re-enter their password.

In the interim, the Helpdesk recommends using Outlook Web Access (OWA) to read e-mail and access other Exchange features. ADMIN Exchange OWA can be accessed here (from on- or off-campus):

http://adminmail.wpi.edu/


Shortly after this was posted a fix was discovered. The fix is located at \\argus\applications\Exchange. To apply the fix:
1. navigate to \\argus\applications\Exchange
do this by mapping a network drive or
by Start -> Run , then type \\argus\applications\Exchange in the "Open:" box.
2. Double-click on the file named EXCHCred.reg to apply the fix.
3. Reboot your machine to complete the process.


Active Virus Discovered: W32/Mimail.c@MM
Posted 31 October 2003 by CCC Helpdesk
When? New virus discovered today by McAfee has been seen at WPI
How long? Since early this morning
Why? Infected computers propagated the virus via email.
Groups Affected WPI e-mail users - faculty, staff, students are all susceptible to infection by opening the infected attachment.
Impact The virus propagates via email. The Infected email message subject contains the phrase" our private photos" and has an infected attachment called photos.zip. Incoming e-mails containing and attachment called photos.zip are now being blocked at the mail server. The McAfee virus scanning device has been updated to include virus definitions that will detect this virusis and block the delivery of the infected file. However, users who received an email with this attachment prior to 11 AM today may have received an infected copy. To protect against being infected by this virus, DO NOT OPEN the attachment PHOTOS.ZIP
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
A new virus, discovered today by McAfee and called W32/Mimail.c@MM has been discovered as active on WPI campus computers. More detailed information can be found at: http://vil.nai.com/vil/content/v_100795.htm

The virus propagates via email. The infected email message subject contains the phrase "our private photos" and has an infected attachment called photos.zip. Incoming e-mails containing an attachment called photos.zip are being blocked at the mail server. The McAfee virus scanning device is now set to discover this infected message and block the delivery of the infected file. However, users who received an email with this attachment prior to 11 am, today - probably received an infected copy. To protect against being infected by this virus, DO NOT OPEN the attachment PHOTOS.ZIP

Since this virus was just discovered today, a special update, called a Super Dat is necessary to detect and clean this virus. McAfee has recently released a SuperDat which we are now making available for download through local servers. Follow these directions to obtain the Super Dat update:

1. Navigate to \\girona\superdat by mapping a network drive or via Start -> Run and typing \\girona\superdat in the "Open:" box.

2. Locate the Setup.exe file and double-click to run it.

3. The Network Associates SuperDat wizard will start. Click the "Next" button to start the installation. Click "Finish" to complete the installation.

4. To check for the presence of infected files run a full system scan:
A. Start -> Programs -> Network Associates -> VirusScan On-Demand Scan for McAfee Version 7 or Start -> Programs -> Network Associates -> Virus Scan for McAfee version 4.5.1.
B. Check the virus scan settings and click the "Scan Now" button to initiate the scan.

For further assistance with updating the virus definition files or cleaning an infected system, please contact the Helpdesk at ext. 5888 on-campus, at (508)831-5888 from off-campus, or by emailing helpdesk@wpi.edu.



Critical Update for Windows (Security Bulletin MS03-039)
Posted 11 September 2003 by CCC Helpdesk
When? The Critical Update patch (MS03-039) will be installed overnight for ADMIN domain users. All other users should install the patch manually.
How long? NA
Why? Microsoft has identified a security issue that could allow an attacker to remotely compromise a computer running Microsoft Windows and gain complete control over it.
Groups Affected ADMIN domain users and all Users of Windows 2000, XP, NT 4.0, and Server 2003 operating systems
Impact Microsoft has identified a security issue that could allow an attacker to remotely compromise a computer running Microsoft Windows and gain complete control over it. To protect WPI computers, all ADMIN domains users will obtain the patch automatically overnight. All other users should protect their computers from possible exploitation by installing the critical update from Microsoft.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Microsoft has identified a security issue that could allow an attacker to remotely compromise a computer running Microsoft Windows and gain complete control over it. You can help protect your computer by installing an update from Microsoft.

Products Affected by This Update:
Windows 2000
Windows XP
Windows NT® 4.0
Windows Server™ 2003

PC's connecting to the WPI ADMIN domain will have the patch applied overnight or when the machine is next booted. All other users will need to manually install the patch.

To determine which version of Microsoft® Windows® you are running:
1. On the taskbar at the bottom of your screen, click Start, and then click Run.
2. In the Run dialog box, type: winver
3. Click OK. A dialog box displays the version that you are running

Obtaining the Patch:

ADMIN or ACADEMIC Domain users can obtain the patches in the following locations.

Start --> Run, type:
\\argus\installpoint\Critical Security Patches
hit or click Ok.
Or
Map a network Drive to
\\argus\installpoint\Critical Security Patches
For directions on mapping a network drive, see:
http://www.wpi.edu/Academics/CCC/Help/Network/Mapping/

The files are also available using the same methods to access \\toaster\microsoft\Critical Security Patches

Patches can also be obtained through the Network Operations web site:

Patch for Windows 2000 Users:
http://www.wpi.edu/Admin/Netops/Patches/Windows2000-KB824146-x86-ENU.exe
When the "File Download" window appears, click "Open" to install the patch.

Patch for Windows XP Users:
http://www.wpi.edu/Admin/Netops/Patches/WindowsXP-KB824146-x86-ENU.exe
When the "File Download" window appears, click "Open" to install the patch.

Once completed, visit Windows Update, scan for updates and then review and install any critical updates. It is good practice to visit Windows Update weekly to make sure you are running the most up-to-date patches.

http://windowsupdate.microsoft.com

You may be asked to reboot your machine before all of the critical updates can be applied. Please follow the prompts and run Windows Update until there are no more critical updates to be applied.

Windows Millennium (Windows Me), Windows 98, Windows 98 Second Edition (SE), and Windows 95 also are not affected by this issue.

If you experience any problems while installing the appropriate patch, please contact the CCC Helpdesk for further assistance.

More information on this Microsoft Security Bulletin (MS-039) can be found here:
http://www.microsoft.com/security/security_bulletins/ms03-039.asp#


Banner PC Client Upgrade Issues/Abandonment of Banner PC Client Upgrade deployment
Posted 11 July 2003 by CCC Helpdesk
When? Today - Friday, July 11, 2003
How long? NA
Why? Unexpected problems have occurred with the Banner Upgrade deployment. For this reason, the decision has been made to temporarily abandon the deployment of the Banner Upgrade.
Groups Affected Faculty and Staff users; ADMIN domain users
Impact Faculty and staff users who received the Banner Upgrade Deployment during the day today will need to reboot their PC in order to restore the previous Banner Client settings; on reboot the Banner Upgrade will be removed and the previous version of Banner, Banner 5, will be re-installed. The re-installation of Banner 5 will require Windows 2000/XP to run a patch in order to use the Banner 5 client. Banner users are reminded the Banner web client, Internet Native Banner (INB) is also available for them to use.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
There were unexpected problems with the Banner PC Client Upgrade deployment scheduled to run today. Some users experienced problems installing Patch 13 that did not present themselves in our test environment.

In order to minimize the inconvenience to users, the decision has been made to temporarily abandon the Banner PC Client Upgrade deployment. Users who received the upgrade should reboot their PC first thing on Monday morning. This will initiate a process that will uninstall the Upgrade and re-install the previous version of the Banner Client (Banner 5). Once the Banner 5 client installation completes, Windows 2000/XP users will need to run a patch. Windows 98 users do not need to install the patch!

The patch for Windows 2000/XP can be obtained by clicking on the following link and choosing the option to Open the file: \\salsa\netapps\fix_win2k.bat

OR
\\salsa\netapps is mapped to the O: Drive for most users. One can also obtain the patch by:
1. Double-clicking the "My Computer" icon on the Desktop
2. Double-clicking the icon for netapps on Salsa (O:)
3. Double-clicking on the file called Fix_Win2K.bat (or Fix_banner.bat)

A black box will appear briefly and then disappear and you are finished.

Windows 98 users were not impacted by this installation and need not take any action.

Banner users are reminded that the Banner web interface, Internet Native Banner (INB) is available for their use. Whenever you experience problems using the Banner PC Client, please feel free to use the INB interface instead.

We apologize for the inconvenience. Thank you for your understanding and cooperation.



Planned software deployment for Internet Native Banner (INB) use
Posted 12 June 2003 by CCC Helpdesk
When? Friday June 20, 2003 on login
How long? until installation completes (reboot required)
Why? A Java applet called Jinitiator is required to run Internet Native Banner (aka INB - the new Banner Web Client) using Internet Explorer 5.x +.
Groups Affected Faculty and staff users who login to the ADMIN domain
Impact Users should reboot their PC in order to complete the installation of the Jinitiator client. After the install completes, a new Internet Explorer Icon called "adminweb" will appear on the user's Desktop.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Internet Native Banner is the new Banner web client. In order to use the Internet Native Banner (INB) from a desktop computer, a special Java applet called Jinitiator is required. For the convenience of our users, we are deploying this software via the ADMIN domain login process. This software deployment is scheduled to begin the morning of Friday, June 20, 2003.

Upon logging in to the ADMIN domain, the installation of Jinitiator will proceed. In order to complete the install a PC reboot is required. When prompted to reboot, users should click the "Ok" button. When the PC is rebooted, there will be a new Internet Explorer Icon called "adminweb" on the user's Desktop. The icon will bring users to the Administrative Systems web site (admin.wpi.edu ) where they can click the link for "Internet Native Banner".

PLEASE NOTE: The use of Internet Native Banner (INB) is only supported for use with browser: Internet Explorer 5.x or above.

Also, users who intend to use the Internet Native Banner (INB) client from a remote computer not authenticating to the ADMIN domain should contact the Helpdesk for assistance obtaining the required installation files.

Thank you inadvance for your cooperation.

Bogus e-mail sent from spoofed WPI e-mail address.
Posted 31 January 2003 by CCC Helpdesk
When? Thursday, Jan. 30, 2003
How long? Message is currently being blocked. No new messages should arrive.
Why? Some SPAM source generated email to be sent to wpi email addresses using a spoofed WPI mail address: admin@wpi.edu
Groups Affected Students, Faculty, Staff (various WPI email users)
Impact A bogus email message was delivered to WPI email addresses claiming to have originated from admin@wpi.edu.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
This message DID NOT originate from WPI or any WPI e-mail address. The From field was spoofed to make it look like it did. These messages are now being blocked and will no longer be delivered to WPI e-mail addresses.

Here is a sample of the spoofed e-mail:

Date: Thu, 30 Jan 2003 xx:xx:xx -0500
From: admin@WPI.EDU
To: xxxxxxx@WPI.EDU
Subject: Message from WPI, Worcester Polytechnic Institute

I just visited RateMyProfessors.com - Rate your college
professors and thought that you might want to check it out as well.
You can visit the website by clicking

http://www.ric1.com/c.e?D159A

Here's a description of what the website is all about:

The most college professor ratings on the net!. If you visit the site and use its Recommend-It(R) feature to tell your friends you will be entered to win $10,000.

www.RateMyProfessors.com

WPI, Worcester Polytechnic Institute


* Get free newsletters on the topics that interest you!
* Click http://www.ric1.com/go.e?113003&s=857498 to sign up


-------------------------------------------
Powered by the FREE Recommend-It(r) Service http://www.recommend-it.com/go.e?291107







Final Close of Banner Finance
Posted 19 September 2002 by CCC Helpdesk
When? Friday, September 20, 2002 at 1:00 PM
How long? 3 hours (approximately)
Why? Final Close of Banner Finance for last year's fiscal data.
Groups Affected Staff, Faculty and Administration
Impact PROD (Banner Production Database) will be available to users during the close, however it will not be possible to make any changes to funds, organizations, accounts, programs, and activities during the time of the close.
Questions Contact Frank Conti via phone at Ext. 5577 or via e-mail at fpconti@wpi.edu

Details
In order to finish the final close of Banner Finance for last fiscal year, it is necessary to limit access to certain forms during the close process. Changes to funds, organizations, accounts, programs and activities will not be possible while the close process is happening.

The close process will begin at 1:00 Pm on Friday, September 20, 2002 and should last 2-3 hours, as long as no problems are encountered. It may take longer if problems arise.

Thank you for your understanding and patience as Frank Conti and his staff finish the final close of last year's financial data.

SSH services availability outage
Posted 4 June 2002 by CCC Helpdesk
When? 5:00 PM - Thursday, June 6, 2002
How long? Approximately half an hour
Why? Upgrading SSH client/server software
Groups Affected Anyone attempting to log into the CCC Unix systems using the SSH protocols
Impact SSH login services on the CCC Unix systems will be unavailable for the duration of the outage. After the outage, most of the host keys for the Unix systems will be different, causing SSH clients that attempt to connect to those systems to generate a warning.
Questions Contact the Helpdesk by calling x5888 or
e-mail helpdesk@wpi.edu

Details
Details:
--------
Due to an upgrade to the SSH services on the Unix systems, SSH protocollogin capabilities will be unavailable for a period of approximately half an hour on Thursday evening, June 6 starting at 5:00 PM. The upgrade will move the Unix systems from running a combination of ssh.com's SSH1 and SSH2 servers to running the latest version (currently 3.2.3p1) of OpenSSH's server (which combines the functionality of both of the old servers into one).

Users will not be able to log into the CCC Unix systems using SSH
protocols for the duration of the outage. Telnet access will still be
available.

After the outage is over, and the servers are running the new SSH
software, most of the host keys will have changed, and SSH clients that attempt to connect to the Unix systems will issue a warning about this.
Most users should just indicate that it's okay to use the new keys, and continue logging in. Those users who wish to verify that the current key is correct will be able to do so by comparing the key signature against a list which we will be compiling and will make available on the WPI Web server. The exact URL for this list will be announced in a separate mailing, once it has been created.


Maintained by itweb
Last modified: Feb 25, 2005, 16:41 EST
[WPI] [IT] [Back] [Top]