Technology & IT Service Desk
The IT Service Desk provides support for your Dunwoody-issued laptop. In addition, Information Technology at Dunwoody works to provide networking, software and hardware solutions for students and faculty to assist in the learning that takes place on campus.
The Learning Technology and Laptop fees ensure that all Dunwoody students have modern laptops, pre-loaded with the latest versions of software for their program. It also covers:
- Internet access.
- E-mail – the official form of communication at Dunwoody.
- Office 365
- Wireless access.
- IT Service Desk support available by email, phone and on a no-appointment, walk-in basis.
- Computer training. Instruction for the software you use in your program, and general training for your laptop.
- Computer Labs in addition to laptops.
- Space for a school website.
- Print Services – not just plain printing and blueprints, but a Graphics department which can do custom posters, business cards, and postcards.
- Special interest databases like EBSCO and AllData.
Dunwoody also provides industry-leading systems for our programs like Johnson Controls Metasys, Reynolds and Reynolds and Multisim.
Dunwoody’s goal in providing these services to our students is to promote educational excellence by facilitating resource sharing, innovation, and communication.
Support for Dunwoody-issued laptops is provided by the Information Technologies Service Desk located in Green 70 or by e-mailing email@example.com.
Pharos End User FAQ
Q. How long before my printed documents are purged from the system?
A. Documents will stay in your print queue for up to 10 hours after submission.
Q. If I forget to log off the device, how long until I am automatically logged off?
A. Your account will stay signed into the device for 10 seconds of inactivity before you are automatically signed off the device. Get in the habit of touching the “sign-off” button when you are finished using the device.
Q. How do I install the Dunwoody Pharos print queue?
A. The Dunwoody Pharos print queue was installed automatically on all Dunwoody owned computers around the building. If you do not see it in your list of printers, send an email to firstname.lastname@example.org to schedule a time for installation.
Q. What if I am unable to sign into the device using my badge?
A. You can try another Multi-Function Printer around Dunwoody — there are 30 across campus and many printers have signs near them that indicate where the nearest alternate printer is.
If that still doesn’t work, there may be a problem with your ID card. Stop down to the IT Service Desk in Green 70 or send an email to email@example.com with your name and the 5-digit number from the back of your ID.
Q. What if I forget my ID card and need to print today?
A. You can input your network credentials (the username and password you use to log in to your computer, the wireless network, etc.) by clicking on the “Secure/Print Release” touchscreen button on the device.
Q. Can I use Pharos to fax?
A. Since faxing is a dead technology it’s always best to try and find an alternate means to send the file, such as email. If you’ve spoken to someone on the receiving side and they tell you faxing is the only option, you can fax from the IT Help Desk in Green 70. Or you can use the scan-to-email feature from one of the 30 multi-function printers around Dunwoody. Then send that email, along with the recipient phone number, to firstname.lastname@example.org.
A strong password is one of the most important protections you have on your computer and online. Tools such as LastPass or KeePass can help create and manage passwords for your online accounts, but you still need to know how to create a strong password for the master password and your accounts that are not online.
Strong passwords share these characteristics.
- Length: eight or more characters
- Complexity: include lower-case letters, upper-case letters, numbers, and – if permitted – symbols and punctuation. (Beware of using a single word with common letter/number/symbol changes. Cracking software knows of these substitutions.)
- Variation: even if a criminal is attempting to crack your password, changing it will set them back to square one.
- Variety: don’t use the same password everywhere. If the criminals get one password, they will try it elsewhere.
Here is a simple and effective tip for creating a memorable strong password: play Mad Libs!
What to do
- Choose a noun, verb, and adjective/adverb
Example: Camel laughs hysterically
- Remove the spaces
- Change words into shorthand or change a letter into a look-alike number or symbol
- If you need a longer password, add some meaningful numbers to the end
Following this process will create a password that would take decades to crack using a brute force method on the fastest computer on Earth! To remember it, you keep a mental picture of a camel laughing hysterically, which is far easier to do than remembering the actual password.
Pitfalls to Avoid
Criminals use sophisticated tools to crack passwords quickly. You should avoid these things when creating any password.
- A single word found in any dictionary (Examples: password, Rechnerkennwort, or NCC1701)
- A single word spelled backwards, common misspellings, or abbreviations (Examples: drowssap, accomodate, or blvd)
- Repeated characters or sequences (Examples: 123456789, 999999999, abcdefgh, or asdfasdf)
- Personal information (Examples, names, birthdays, or driver’s license number)
To set up office apps and your Dunwoody email on your mobile device, click here. The URL will take you to a Microsoft support website with step-by-step installation instructions for both Android, iOS, and Windows phones and tablets.
For additional help or questions, contact the IT Service Desk.
Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.
As a student of Dunwoody College of Technology, you need to be aware that unauthorized distribution of copyrighted material, including peer-to-peer file sharing, may subject a student to civil and criminal liability. Generally, anyone found liable for civil copyright infringement may pay actual or statutory damages of not less than $750 and not more than $30,000 per work infringed. For “willful” infringement, a court may aware up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys’ fees. Willful copyright infringement can also result in criminal penalties, including imprisonment of up to five years and fines of up to $250,000 per offense. Reference: Title 17, United States Code, Sections 504, 505.
Dunwoody has the technological infrastructure to block peer-to-peer file transfer. Policies and penalties are in place addressing peer-to-peer file transfer. Students can read these policies and penalties in the Student Handbook.
You can direct questions on peer-to-peer file transfer to the Executive Director of IT or the Provost’s Office. For more information on copyrights, please see the Web site of the U.S. Copyright Office at www.copyright.gov, especially their FAQ’s at www.copyright.gov/help/faq.
Monday-Thursday: 7 a.m. – 8 p.m.
Friday: 7 a.m. – 4 p.m.
The IT Service Desk is located on the Green Level in room 70.