Wireless Access User Guide
GroupWise Web Access User Guides
- GroupWise Web Access User Guide
- GroupWise Client User Guide
- Vacation Rule User Guide
- Personal Groups Guide
Student Network & E-Mail Guide
Mandatory Student E-Mail Policy for Undergraduate Students
An e-mail account (ending in @student.methodist.edu) will be created for all Methodist University students. New students will receive their e-mail and Blackboard account username and password in a letter sent to you by the Admissions Office. All students are responsible for checking their e-mail daily for messages from the University. All official University information (e.g., grades, academic notices, campus calendars, attendance policy updates, registration and financial information, etc.) will be sent electronically only. No University information will be sent to any other e-mail address.
Mandatory Student E-Mail Policy for Graduate Students
The above policy applies to all Methodist University graduate students. However, for graduate students, e-mail addresses and passwords will be issued to students by their program coordinators.
Computers at Methodist University and the Computer Use Policy
With the increasing copyright infringements of music and videos downloaded from the Internet, it is very important for you to be aware of copyright laws. The number of file sharing and peer-to-peer servers on the Internet are a great resource if used legally. If not, you could be held liable for what you download.
The following is provided to inform users and provide instructions to remove Spyware/Adware for your computer if it becomes infected with these programs.
Removing Spyware/Aware successfully is difficult enough, but preventing it in the first place is a PRIORITY.
Spyware is software that sends your personal information to a third party without your permission or knowledge. Spyware covertly gathers confidential and private information, and monitors system activity without the user’s knowledge. Spyware can record your keystrokes as you type them, obtaining passwords and credit card numbers, tracking where you surf, and logging chat sessions, and can even take random screenshots of your activity. Basically, whatever you do on the computer is completely viewable by the spy. Spyware is often sold as a spouse monitor, child monitor, surveillance tool, or simply as a tool to spy on users that gain unauthorized access to your PC. Unscrupulous companies often use this data to send you unsolicited targeted advertisements.
Adware is software that displays advertisements on your computer. These are ads that inexplicably “Pop Up” on your display screen, even if you’re not browsing the Internet. Some companies provide “FREE” software in exchange for advertising on your display. It is sometimes installed with “Freeware or Shareware” which has been download from the Internet, and provides one more channels for advertisers to reach you. Some adware will also track your files, Internet usage, and software which reports that information back to advertisers to help them channel relevant ads to you. It’s how they make their money.
Malware is slang for malicious software. Malware is software designed specifically to disrupt a laptops or computer desktop system. A trojan horse or a virus could be classified as Malware. Some advertising software can be malicious in that it can try to re-install itself after you remove it. Malware is software specifically engineered to damage your machine or interrupt the normal computing environment.
To read more about Adware and Spyware go to the following website. Check out the Adware and Spyware list: Spyware Guide.
Unauthorized Adware, Malware or spyware is usually installed on your computer covertly by using one of two methods:
- Method One: Tricking you into clicking a link that installs it. Links to spyware can be deceptive. For example, a Web site that’s trying to push spyware onto your computer might open a window that looks like a Windows dialog box, and then trick you by installing when you click a Cancel button to close the dialog box. Sometimes, spyware pushers will put a fake title bar in an empty window, and then install spyware when you try closing the window.
- Method Two: Installing freeware that includes it. For example, you might install a free file-sharing program that surreptitiously installs spyware on your computer. File-sharing programs can be a major conveyor of adware. Once installed, spyware can transmit your personal information and download advertisements 24 hours a day. It can also hijack your browser settings, such as your home page or search page. Other programs that contain Spyware/Adware programs are: Webshots, Comet Cursor, Gator, Bargain Buddy, Date manager, Any type of Web searches, Precision Time, Weather Bug, Bonzi Buddy, and Hotbars toolbar. This is NOT a conclusive list, but are the most common types of Spyware/Adware programs.
Other Spyware/Malware/Adware Effects:
It can also compromise your privacy, providing outsiders with information about your computer habits. If a spyware program installs a keylogger, it can capture your keystrokes and send it to a third party. This can potentially expose your user IDs and passwords to thieves. Some spyware programs are trojans, which allows someone to log into your computer remotely and use it for their own purposes like sending spam or launching malicious attacks on other computers on the Internet making it look like it was you.
Most people notice with either kind of program is that they cause performance issues with their computers. These programs hog precious system resources, memory and hard disk space. For example, Internet Explorer might not work properly any more, your computer might hang more frequently, or your computer might slow down significantly.
To assist in the removal and take measures against Spyware, Malware, or Adware:
These programs are not endorsed by Methodist University and are to be installed at the users own risk. However, these programs are free and seem to be able to rid your computer of most Spyware/Maleware/Adware programs. Adaware SE Personal Edition and Malwarebytes are not a cure all, but will assist in keeping most computers from being infected.
Download these free from the following sites. Follow the instructions to install and update the software.
- To download Ad-Aware Free, go to the Lavasoft Web Site.
- To download Malwarebytes Free, go to the Malwarebytes Web Site.
Connecting Student E-Mail to Mobile Devices
The following information is provided for students who choose to connect their phones to the Methodist University GroupWise Email. Visit the myMU Portal. Once at the myMU Portal, login with your Methodist ID and password. Click on the “Request Forms” tab, fill out the form and submit it.
Not all phones maybe compatible or work correctly with these settings, but we hope they work for you the majority of you. There are several phones on the market, so we can’t give specific instructions for each phone configuration as they maybe different depending on your phone. This will take 24 hours to activate.
Connecting Faculty/Staff E-Mail to Mobile Devices
The following information is provided for staff and faculty who desire to connect their mobile devices to the Methodist University GroupWise Email. To connect to the MU GroupWise email server using mobile devices, an account has to be setup on the Datasync server, which communicates to the GroupWise server allowing you access. In order to connect your iPhones, iPads or Droid phones, you must first put in a Computer work order, stating what your “username” is and the type of mobile device that you would like to connect to the Datasync server. Once we receive your request, you will be added to the Datasync server and we will email you the instructions on how to connect to the Datasync server to receive your MU email on your mobile device. If you are an adjunct professor, please send an email to firstname.lastname@example.org with the same information listed above.
Not all phones maybe compatible or work correctly with these settings, but we hope they work for you the majority of you. There are several phones on the market, so we can’t give specific instructions for each phone configuration as they maybe different depending on your phone.