Resources

Search our resource library below to find helpful information. You can fitler by your role at FDU as well by department or service.

icon Help Desk
Resources Header

Spot a Phishing Scam

Resources for:
icon Close

What is a phishing scam?

Phishing refers to the act of using a fraudulent identity and scenario to extract personal information or something else of value. Although phishing scams can occur over various mediums including text messages, phone calls, and social media, they are most frequently carried out via email.

Scammers have many means of acquiring bulk email addresses. Receiving a phishing attempt does not mean that your account has been singled out or has been compromised in any way.

Fairleigh Dickinson University’s email accounts employ Microsoft’s Advanced Threat Protection (ATP) which, in addition to traditional spam filtering, removes malware infected attachments and utilizes Safelinks to scan messages for malicious links. Additionally, we have appended the subject line of messages coming from outside of the FDU domain with the “[External]” tag. Although phishing can occasionally come from inside of our domain, messages with the external tag demand extra scrutiny.

Despite all of these efforts, keeping up with the latest scams is always a cat and mouse game. It is best practice to have a solid foundational knowledge of how these scams work.

Detecting a Phishing Scam

Although each phishing scam is unique, there are certain common traits which can serve as red flags. The most common “tell” is a sense of urgency. Generally, phishers would like for you to act promptly and without careful consideration. As a result, they will pepper their email with phrases such as “immediate action required” and “to avoid the immediate suspension of your account”.

Although an urgent tone is likely to be your first clue, there are plenty of other red flags that you will begin to notice over time. Many phishing attempts are poorly constructed emails. Incorrect spelling and grammatical errors are common. The message could contain a blank subject line and the sender’s signature may only list their title instead of their name. Be wary of messages in which the quality of writing does not meet your expectations for the purported institution.

The goal of many scams is to make a request for your personal information. This can take the form of bluntly asking for your social security number. However, it may also take a subtler approach. Many phishing attempts will create a mock version of a University, banking institution, or commerce website and ask you to log in. Once you enter your account information, the scammers have acquired your password.

Although most phishing scams cast a wide net, some recent attacks have specifically targeted individual members of the University. If someone is claiming to be your colleague or supervisor, check to confirm that the message is coming from their FDU account. Do not trust messages claiming to be from FDU employees which originate from external accounts such as Gmail and Yahoo.

Many of these personalized scams also have a very specific common thread. After a bit of conversation, the scammer will request that you purchase gift cards for common services such as iTunes, Google Play, or Amazon. No, your boss does not urgently require you to purchase gift cards out of pocket.

Also, beware of solicitations coming to your FDU email address from businesses offering deals or asking you to click on a banner to receive a promotion. Make sure that the email is coming from the domain of the company offering the sale or promotion.

What does a phishing scam look like?

Now that you know what to look for, let’s look at a sample phishing attempt:

Reporting a Phishing Scam

You can use your newfound expertise to assist the FDU community. When you see a message that you believe to be a phishing scam, please report it to us. Via Outlook this can be accomplished via our reporting tool. Please see Reporting Phishing or Junk Emails for more information. If you are using an alternative mail client such as Apple Mail, you can forward the suspected scam to phishing@fdu.edu.

How should I proceed if I have already replied to a Phishing Scam?

Please change any passwords that you have provided to the scammer. Once this is completed, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) for further instructions.

Last Modified: Copy Link

Student Technology Resources

Resources for:
icon Close

Fairleigh Dickinson University offers a variety of technological resources and services for students. This guide will help students navigate the different tools to access and manage their accounts or information.

ID and Email

  • Your FDU NetID verifies who you are and ensures the privacy of your personal information. Your FDU NetID and your NetID password will provide access to a variety of IT resources including your Self-Service, WebCampus, Office365, and Email. To get your NetID, review the guide on how to Claim or Create an FDU NetID Account.

  • To protect the University and our students from cyber attacks and other malicious activity, we require that everyone in our community to periodically change their password. To change your password, review the guide on How To Change Your FDU NetID Password.

  • To successfully use your NetID to access your accounts, you will need Two-Factor Authentication with Cisco DUO MFA

    Two-factor authentication adds a second layer of security to your FDU NetID. It requires two factors to verify identity. These factors include something you know – your FDU NetID and password, and something you have – a phone or passcode, to authenticate and gain access to your account on FDU services. Passwords alone no longer provide adequate protection against cyber hacking. DUO is required for all current FDU students.

    Review the Duo – Student Quick Start Guide to set up your mobile device with Cisco DUO MFA, and look at the Cisco Duo FAQ’s to get more information about Cisco DUO MFA.

  • Students can access their emails through any Web browser using their NetID and password to log in. To access our email, visit the Office Portal Login.

    Students can also access their FDU Email accounts on their mobile devices by installing the Outlook app. Read the guide below:

    Current students who are registered for classes for the current term, or a future term have access to Microsoft Office 365 Suite applications. For more information, click on the links below:

Academic Systems

  • Webcampus is a course content management system. FDU’s Webcampus is also known as the Blackboard System. On-line courses are taught through this system which also allows for interaction between the student and faculty member as well as on-line class discussions.

    To learn more about how to access Webcampus, read the guide on How to log in to Webcampus.

     

  • Self-Service is an interactive web application that enables students to view their individual information contained in FDU’s Student Information System. Students can use Self-Service to do things like view their financial aid, pay their bills, and register for classes.

    To learn more about how to use Self-Service, review the Self-Service Tutorial.

Network

Security

Software

Printing and Labs

Frequent Asked Questions

Last Modified: Copy Link

Trouble Connecting to Zoom

Resources for:
icon Close

If you are scheduled to attend class using Zoom and you run into technical difficulties, here are some steps you can take.

Common Fixes for Zoom Connection Issues

  1. Do. Not. Panic. This shift to distance learning is a sudden change. We will do everything we can to support your learning
    • Try your best to progress through the steps and troubleshooting resources below. Join when you are able. You can use the chat or hand-raising function once you join the class to let the faculty know if you have questions.
  2. Try to exit Zoom and open it again
  3. Try to restart your device and re-open Zoom
  4. Check that you do not have pop-ups blocked. Also check that you have “allowed” the Zoom browser extension to operate, if needed
  5. Try on a different device, if you have access to one. If you do not have access to a different device, proceed to step 6
  6. If you still cannot access Zoom after taking these steps, please contact the University Technical Assistance Center (UTAC) with a description of the problem (e.g., error message that you received). Please also bring the issue to the attention of your instructor so they can let you know what you missed in the class session that you were unable to attend

More Resources for Troubleshooting with Zoom

The following troubleshooting guide gives support for all devices that Zoom supports.

Last Modified: Copy Link

True Up Policy

Resources for:
icon Close

Below is the policy for departments at the University regarding the return of Cisco Desk phones that are no longer in use. This process is known as the “Phone True-Up Process.” It begins with a request from the department to Voice Services at voiceservices@fdu.edu to remove currently active phones from service.

Voice Services will coordinate the collection, inventory, and eventual shipping of the phone(s) to our vendor.

Warning Warning

Do not remove the phones without the help from an IT department technician.

Leave these phones in place and mark them with a Post-It Note that provides the HOST/MAC address of the phone. This ensures easy identification when a technician arrives to retrieve the device.

There are two methods to find the HOST/MAC address:

  1. Press the gear button on the phone and use the central navigation key to scroll to “Phone Information.”
  2. Alternatively, this information is also listed on the back of the phone.

The True-Up process is carried out annually, around June, coinciding with the end of the University’s Fiscal Year. The new True-Up cycle begins on July 1st with the commencement of the new Fiscal Year. Phones can be removed at any point during the year and stored until the next True-Up. However, billing for these phones continues until the end of the Fiscal Year.

Note

If you remove a phone but retain the line for services like voicemail, call forwarding, or Jabber, there is a monthly charge of $20 that will continue to be applied for these services.

Last Modified: Copy Link

Use SFTP or SCP to Upload Files to a FDU Linux Server

Resources for:
icon Close

What’s SFTP and SCP?

Secure File Transfer Protocol (SFTP) is a file protocol for transferring large files over the web. It builds on the File Transfer Protocol (FTP) and includes Secure Shell (SSH) security components. This term is also known as Secure Shell (SSH) File Transfer Protocol. Secure copy protocol (SCP) is another method to securely transfer files between a your local PC and a remote host or between two remote hosts. It is also based on the Secure Shell (SSH) protocol.

Linux / Mac

If you are running a Linux or Mac computer, SFTP and SCP clients are already installed, so you don’t need to download anything using those OS. You can open up a terminal window and run the either command like below to connect to a remote Linux server.

sftp username@opus.fdu.edu

or

scp filename username@132.238.2.116:

Windows

Option 1 (Recommended): Use WinSCP

You will need to download and install WinSCP:

  1. Launch the WinSCP program
  2. In the login window, click “New Site
  1. Fill out the information as follows:
    • Host name: Enter opus.fdu.edu
    • User name: (username on FDU Linux servers will be the part of your FDU NetID to the left of the @ sign)
  2. Click “Advanced…
    • Select “Environment > SFTP” and enable “Allow SCP fallback
  1. Click “OK
  2. Click “Save“, enter a name for the connection, and click “OK
  3. In the WinSCP login window, select the connection name and click “Login

Option 2:

Install Putty, which also includes PSCP (SCP for Windows) and SFTP (SFTP for Windows):

Please select the latest version of MSI (‘Windows Installer’) for your computer (32-bit or 64-bit)

Optionally you may choose to download only pscp.exe(SCP for Windows) or “psftp.exe” (SFTP for Windows) and copy into the folder where you need to use it.

Once you have installed your program of choice, you’ll be able to launch each command from the Command Line of Windows.

pscp -P 22 filename username@opus.fdu.edu:
psftp username@opus.fdu.edu

Note

You may need to accept the server’s host key the first time you connect the Linux server.

Last Modified: Copy Link

Use SSH to Log into Opus Linux Server

Resources for:
icon Close

Accessing the Opus server

The Opus server can be access using secure transport protocols such as SSH and SFTP. Access is only allowed from campus networks. All off campus users will need to access Opus using FDU’s Virtual Private Network (VPN) to use the Opus server

What’s SSH?

SSH stands for Secure Shell, which was invented in 1995 to replace the insecure Telnet (Telecommunication Network). It’s now the primary way for system administrators to securely log into remote Linux servers over the public Internet. Although it looks and acts the same as Telnet, all communications over the SSH protocol are encrypted to prevent packet sniffing.

Linux / Mac

If you are running a Linux or Mac computer, SSH client is installed by default. You can open up a terminal window and run the ssh command like below to connect to a remote Linux server.

ssh username@opus.fdu.edu

or

ssh username@132.238.2.116

Now let’s discuss how to use SSH on Windows.

Windows

Method 1: Windows 10’s Built-in SSH Client

The Microsoft PowerShell team decided to port OpenSSH (both the client and the server) to Windows in 2015. It finally arrived in Windows 10’s Fall Creator Update in 2017 and is enabled by default in the April 2018 Update.

To use the OpenSSH client on Windows 10, simply open a PowerShell window or a command prompt window and run the ssh command. For example, if I want to connect to the Opus Linux server on the FDU network, I would run

ssh username@opus.fdu.edu

username on FDU Linux servers will be the part of your FDU NetID to the left of the @ sign (username@fdu.edu becomes just username) and opus.fdu.edu is name the Linux server you want to access (The IP address of the Linux server can also be used). The first time you connect to a Linux computer, you will be prompted to accept the host key. Then enter your password to login. After login, you can run Linux commands to do tasks.

Note

If you want to paste a password into the PowerShell window, you need to right-click the mouse and press Enter.

To log out from the Linux box, run the “exit” command or press “Ctrl+D“.

The default font size in PowerShell Window is very small. To change it, right-click the titlebar and select properties, then you can change the font size, and the background color.

Method 2: Use SSH in Windows Subsystem for Linux

Windows Subsystem for Linux (WSL) enables you to run native Linux command-line tools directly on Windows 10. If you are a system administrator, WSL is probably an overkill for just using SSH because it would install and run a Linux distro (without graphical user interface) on your Windows 10 desktop. WSL is created for web developers or those who need to work on open-source projects. You can use not only SSH but also other Linux command line tools (Bash, sed, awk, etc).

Open the Microsoft Store and enter “WSL” in the search box. Select Run Linux on Windows and install a Linux distro of your choice.

For example, I choose “Ubuntu” and click the “Get” button to install it.

Once your Linux distro is installed, open the Control Panel and select Programs => Turn Windows features on or off. Tick on the checkbox of Windows Subsystem for Linux to enable this feature. (You may need to reboot your Windows PC for this change to take effect.)

Next, you can launch the Linux distro from the start menu by search the distro’s name. The first time you launch it, you need to create a user and set a password.

After that, you can use the ssh command like below to connect to a Linux server or PC that runs a SSH server.

ssh username@opus.fdu.edu

Method 3: Use Putty

Putty is a well-known and the most popular SSH client on Windows before the arrival of Windows OpenSSH client and Windows Subsystem for Linux. To use SSH with Putty, you need to download the Putty program from the official website and install it.

Launch Putty from the Start menu. Then enter the IP address or hostname of the Linux box and click the Open button to connect to it.

Accept the host key and you will be prompted to enter the username and password.

Tip

When you type in your password, the cursor doesn’t move, but it’s actually accepting your password. To paste text into Putty, first press Ctrl+C to copy the text, then go to Putty window and press the right-button of your mouse.

Last Modified: Copy Link

Use The FDU Shared Drive Management Portal

Resources for:
icon Close

Introduction

This document provides information about the use of the FDU Shared Drive Management Portal. It describes navigation of the website in detail to facilitate proper use of this resource.

Logging In

To access the Shared Drive Management Portal, navigate to this URL to login: sharemanagement.fdu.edu

Once you have logged in with your NetID, you will see a list of the shares you own or have been given authorization to manage in the left‐hand column. If you are the owner of the share, your name will appear in the panel on the right side under “Shared Drive Owner”. If you are not the share owner, your name will be listed on the right side panel under “Delegated Administrator”. To switch between shares you manage, select the appropriate share name from the list in the left side panel.

Note

Underneath the Shared Drive Owner information, you will see an area for Delegated Administrator information. Delegated Administrators are people you wish to grant the ability to add and/or delete Shared Drive Members. It is important to understand that while a Share Owner can delegate membership responsibilities to others, the Share Owner is always the primary person responsible for the management of any Personal Information or Protected Health Information contained within that share.  The Share Owner has the sole accountability for the data managed and viewed within their share.

Adding Members and Delegated Administrators

To add a member to the share, click on the down‐arrow at the right of the “Add User to Share” button and choose the type of user you would like to add from the drop‐down menu. You can choose from Employee, Administrator, or Student. Then, enter either the last name or the FDU NetID of the person you would like to add into the text box. If more than one name appears, choose the person you want to add.

A pop‐up window will appear asking you to confirm or cancel the add.

The individual’s information will be added to the list of members at the bottom of the page. When you add Delegated Administrators, they will appear in the list to the right, and the Owners/Administrators count will increase. It is important to note that Delegated Administrators can not add additional Delegated Administrators.

As you add more members or Delegated Administrators, the count of members for each will increase. When viewing members of a share, the “Number of rows:” menu can be used to select 12, 24, 36, or All rows to view.

Currently, all Shared Drive Members are granted Read/Write access to the contents of the Share. Future updates to this application will allow you to choose Read Only or Read/Write access rights to each new Member. Meanwhile, the Share Owner can contact University Systems and Networking at help@fdu.edu to request Read Only access for a new member.

From time to time, a Share Owner or Delegated Administrator might try to add a new member to a drive to which an existing drive letter cannot be assigned. If that happens, the following message will appear, and the Share Owner or Administrator will need to contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) to have that member added.

Deleting Members

You will notice a check‐box to the left of each Administrator and Member of the share. To delete an Administrator or a Member, click the check‐box next to it. You can click on multiple check‐boxes. When you have selected all the Members or Delegated Administrators you wish to delete, click on the “Delete Selected Delegated Administrators” or “Delete Selected Members” button to delete all the selected Administrators/Members. The lists and the counters will be updated to reflect the change. It is important to note that Delegated Administrators can not delete other Delegated Administrators.

Downloading Members

To download a list of Shared Drive Members in .csv format, click on the “Download Members” button.

A new file will be placed in your Downloads folder called “ShareDriveMembers.csv”. When imported into a spreadsheet application, it will look similar to this (you will see the actual FDU NetID).

Requesting a New Shared Drive

To request a new Shared Drive, please follow the link below:

Last Modified: Copy Link