IT Services During Hurricane Sandy

The Office of Information Technology is closely monitoring all core IT services during Hurricane Sandy and will do everything that is safely reasonable to keep those services active.

As of 11:45 am, all services are operating normally.

IT Outage: Thursday, October 18, 5am-7am

The server that includes the following services will be down for a performance maintenance update from 5am to 7am on Thursday, October 18:

Banner Production and Self-Service
Student Gmail
WorkflowAppworx Production

This update is necessary to enhance the performance of these services for the SJU Community. All services will be available at 7am on Thursday.

If you have any questions about this outage, please contact the Technology Service Center at x292



Computer viruses are programs that spread or self-replicate. The virus may arrive in an  e-mail message as an attachment or be activated by visiting a malicious web site. Some viruses consume storage space or simply cause unusual screen displays. Others destroy information. If a virus infects your PC, all the information on your hard drive may be lost and/or compromised.  Also, a virus in your PC may easily spread to other machines that share the information you access.  (State of New Jersey, 2008)

By Any Other Name:

Although they may be introduced into your system by the same means, not all computer viruses behave the same way.  Some of the most common types of computer viruses include:

  • Trojan Horse: A Trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer.
  • Worms: A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism.
  • Bootsector Virus: A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup.
  • Macro Virus: Macro viruses are viruses that use another application’s macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.
  • Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after its initiating program closes.
  • Rootkit Virus: A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files.
  • Logic Bombs/Time Bombs: These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.  (Top Choice Previews)

 A Growing Problem:

There were  1 ,017,208 viruses reported during the first of 2010 alone. This represent(ed) an increase of 50 percent compared to (the previous) year. Experts (predicted) a  record total of over two million new malware programs for 2010 as a whole.  (Leeuwen, 2010) With statistics like this indicating an ever-increasing threat of attacks, it’s important to know what to look out for.   Signs that your computer is  infected by a virus may include:

  • Your computer behaves strangely, i.e. in a way that you haven’t seen before. 
  • You see unexpected messages or images. You hear unexpected sounds, played at random.
  • Programs start unexpectedly. Your personal firewall tells you that an application has tried to connect to the Internet (and it’s not a program that you ran).
  • Your friends tell you that they have received e-mail messages from your address and you haven’t sent them anything.
  • Your computer ‘freezes’ frequently, or programs start running slowly.
  • You get lots of system error messages. The operating system will not load when you start your computer.
  • You notice that files or folders have been deleted or changed. You notice hard disk access (shown by one of the small flashing lights) when you’re not aware of any programs running.
  • Your web browser behaves erratically, e.g. you can’t close a browser window. (Kaspersky Lab)

If you feel your computer may have been infected by a virus, please contact the SJU Technology Service Center (TSC) at x2920 or by email at Remember: The TSC will NEVER ask you for your password or Social Security number.


State of New Jersey. 2008. New Jersey Info Secure. State of New Jersey. [Online] 2008.

Kaspersky Lab. Symptoms. Kaspersky Lab. [Online]

Leeuwen, Danielle Van. 2010. News Details. G Data. [Online] 2010.

Top Choice Previews. Antivirus Software. Top Choice Previews. [Online]


Hawk Card Program

In conjunction with many offices throughout campus, the Office of Information Technology has implemented the new Hawk Card program.  The whole campus community will receive new Hawk Card ID cards.  If you have not already done so, your Hawk Card can be picked up in the Public Safety and Security office in Barbelin room 13.

The Hawk Card program has an exciting new feature called Hawk Cash. Hawk Cash enables cardholders to add money to their card to make secure, cashless purchases at on-campus dining facilities, the bookstore, mail room, student life, copy and print stations, as well as at specific off-campus retailers.  The retailers that are currently part of the program include ACME, CVS, Dake’s Drugstore, Dana Hot Yoga, Hess Express, Fellini’s Cafe, KFC, Landmark Americana, Larry’s Steaks, and Taco Bell with additional off-campus locations coming soon.  For the latest information about the Hawk Card visit

IT’s Jill Cleary was featured in The Hawk’s article, “Hawk Cash Simplifies Commerce On and Around Campus”, describing the great reception the Hawk Card has received from the campus community.   The Hawk Card is a welcome upgrade at SJU.  Let us know your feedback!

IT Training Classes Now Open to Students

IT Training would like to announce that it has opened its applications training classes to students.  These classes are not intended to replace or conflict with any applications proficiency courses students are currently required to take.  Instead, they offer additional opportunities for SJU students to improve their Microsoft Office skills free of charge.

Students interested in enrolling in an IT Training class or wishing to see a complete list of classes offered should check out the Student Training channel on the School Services tab on MySJU.

Any questions can be directed to the IT Technology Service Center at or Ben Jezierski, IT Training Coordinator at Licenses

In order to offer continuing technical support, we’d like to announce that we’ve recently purchased a limited number of licenses from LYNDA.COM, a recognized provider of online training. These licenses are available on a first come first served basis, and will provide you with full access to LYNDA.COM’s library of online training material for a one-month period free of charge. At the end of that time, your license will expire. You may, however, request another license anytime thereafter.

In order to request a license to access to LYNDA.COM, please email Ben Jezierski, IT Training Coordinator at

You will receive instructions for accessing the online training material shortly after submitting your request.

Please refer to the School Services Tab on MySJU for a list of IT Training workshops we’re currently offering. We welcome your comments and look forward to providing you with additional opportunities for training in the future.  Additional information on this topic can be found on our Facebook page

Verizon iPhone 5 Update

An update has been released for the Verizon iPhone 5 that resolves an issue where the iPhone would use cellular data while connected to a wireless network. This issue could have resulted in overage charges. To install the update  to carrier settings, follow these steps:

  1. Tap Settings > General > About.
  2. Wait for the following alert to appear:
  3. Tap OK to install the update.
  4. Hold the Sleep/Wake button down until you see “slide to power off”.
  5. Slide to power off.
  6. After the device powers off, hold the Sleep/Wake button to turn your phone back on.

Note: To finish the installation of the update, your iPhone 5 must be turned off and then on again.

After your iPhone restarts, tap Settings > General > About, then scroll down to Carrier and verify that “Verizon 13.1” is displayed.

Apple Releases iOS 6

Yesterday, Apple officially released iOS 6.  Some of the major changes you will see are Maps, which includes spoken directions and real time traffic updates, improved Siri, Facebook integration and FaceTime over cellular.  Some features that we in the TSC are excited about are the Panorama mode for the camera, the ability to save pages from Safari in your reading list, and the new calling features.   Now, rather than simply declining an incoming phone call, you are able to set callback reminders or send the caller a text letting them know you will call them back later.

Some things you will no longer see are the YouTube App and Google Maps. If you’ll miss the built in YouTube app, you can still download a YouTube app from the App Store.

We encourage all iPhone users on campus to keep their phones up to date. If you have a university owned iPhone and need assistance, please contact the TSC at or x2920.  Let us know how you like iOS 6!