October, 2004
IMAGE: envelope

Read This if You Want to Read Email after Nov. 1 and You Don't Already Use the Lab-Issue Mozilla

As part of the Computer Protection Program's ongoing efforts to protect Lab users against escalating security threats, beginning Tuesday, November 2, all connections to the Lab's central mail server, imap4.lbl.gov, must be encrypted using secure sockets layer (ssl). This will not affect the majority of users, however, please check to ensure your email is ready. Read more.

Reminder: Use Discretion in Chat and Instant Messaging Sessions

Chat rooms can be a valuable tool for information exchange and collaboration, but please use this resource wisely and exercise discretion in the types of chat you engage in. Chat and instant messaging (IM) sessions are monitored by the Computer Protection Program. Chat rooms are open to the public and may give a false impression of indiscretion. Everything posted on any network information service reflects on the Lab and the employee who uses the resource.

IMAGE: MS Office logo

New Class Teaches Transition to Office 2003

ITSD now offers a new course for employees transitioning to Office 2003. The class will teach new features of Word, Excel, and PowerPoint. The Office 2003 transition class will be held on Wednesday, November 10 in 90-0026. Choose either the morning session from 8 a.m. to 12 noon, or the afternoon session from 1 p.m. to 5 p.m. Cost is $129 and there is a two-week cancellation policy. Enroll online at the Employee Self Service page.


Tips for Safely Using Internet Explorer

Microsoft's Internet Explorer (IE) is the most widely used web browser, making it a good target for hackers who attack its numerous security-related vulnerabilities. Due to these concerns, it is important that you use IE only when necessary, and use another browser, like Mozilla, as your primary web browser. But avoiding IE altogether is not practical for many users. For IE safety tips, read more in the current Computer Protection Quarterly.

Service Tip

IMAGE: Computer workstations

Networking Calls Now Go to ITSD Help Desk

Determining who to call when you have a network or computer problem just got easier. Previously, users needed to figure out whether to call the Help Desk (x4357) for a computer problem, or Networking Services (x4559) for a networking problem. But it may be difficult to pinpoint the problem and therefore, which number to call. Starting Monday, November 8, all calls will go straight to the Help Desk, which will determine the type of problem and conference in LBLnet (Networking Services) as necessary. Now both numbers will lead to the ITSD Help Desk.

 Protecting Your Computer
IMAGE: Spybot banner

Spybot Sniffs Out Unauthorized Spyware

The problem of spyware — hidden software that gathers and sends information about you and your system without your authorization — is getting out of control. Not only does spyware spy on you, but your system can become so full of spyware that it can slow to a crawl. You need Spybot. Read more.

Protect Your Windows System from Serious Microsoft JPEG Processing Flaw

A major security flaw in the way Windows systems and applications handle the .JPEG graphics format makes your system susceptible to security compromise if you simply view a .JPEG file when you are on the web or reading email. For detailed instructions on how to patch your system, read more.

IMAGE: padlock

Reminder: Protect your Computer, Literally

Computer security includes physical security of computing assets. This means that offices and work areas should not be considered "safe" areas to leave unattended electronic devices such as PDA's, laptops and cell phones. For tips on securing your computer, read more.

IMAGE: 'computer virus'

Monthly Virus Update: More than 105,000 Viruses Stopped Cold

The Lab’s virus wall continued to provide an effective block against worms and viruses, identifying and destroying over 105,000, almost exactly the same as in September. The Netsky.P worm, which attacks Windows systems, was the biggest offender with about 60,000 copies detected and eradicated. Read more.