August 2006
---------------------------------
---------------------------------
Dell has begun shipping the first of over 4 million new batteries to replace batteries subject to fire hazards in laptops sold between April 2004 and July 2006. To find out if your battery is defective, go here, or call the IT Help Desk (x4357). If your battery is recalled, you may continue to use your Dell notebook safely by turning the system off, ejecting the battery, and using the AC adapter and power cord until the replacement arrives. For details, go here.

Employees who experience any pain they believe is due to their workstation environment should advise their supervisors and request an ergonomic evaluation as soon as possible. To request an ergonomic evaluation:
For more information, contact EH&S (x7170).
![]()
Apple is recalling batteries due to overheating from its 12-inch iBook G4 and 12- and 15-inch PowerBook G4s sold after October 2003. To find out if your battery is defective, go here, or call the IT Help Desk (x4357). If your battery is recalled, you may continue to use your Apple laptop safely by turning the system off, ejecting the battery, and using the AC adapter and power cord until the replacement arrives. For detailed FAQs, go here.
It's time for LBNL to renew its bulk subscription for RedHat Enterprise Linux (RHEL) for next fiscal year. If you're interested in purchasing RedHat licenses, go here.
The easiest way to secure your Windows systems is to join Active
Directory (AD). Computers in AD are automatically patched, firewall enabled (for XP), applied with a security template, and easily checked for critical security issues. Joining AD will also ensure your computer meets some of the minimum security requirements. Go here to join. Read more.

The installation of Wireless Access Points (WAPs) at LBNL is prohibited, except by the IT Division’s LBLnet Services Group. The installation of WAPs by others violates the Lab's security policies and puts our ability to offer wireless service at risk. IT actively scans for so-called rogue access points and, if detected, a security incident will be recorded against the user and the division, and the hardware will be confiscated. Computers acting as wireless access points (offering wireless service) are also prohibited. Read more.
The Lab's virus wall continues to guard LBNL systems against worm and virus infections. Last month it detected and destroyed 103,848 worms and viruses, almost all of which targeted Windows systems. In contrast, the number in June was 61,374. As a best practice, users should continue to be wary of unexpected emails and attachments.
Computer Protection
Program, Minimum
Security Requirements,
Change Password.
Email, Calendar, Backups,
Software Downloads,
Buy a Computer, Computer
Training, Suggestion Box.
IT Services, Office of the CIO, IT Policy.
---------------------------------