Quick Links

On this page:

Other pages: (Opens in a new tab or window)


Zoom

zoom

Zoom offers communications software that combines video conferencing, online meetings, and mobile collaboration.

Zoom Login

From this page you can Join a Meeting or Login

zoom

To Login in hover on "Log In" and select "UR NetID"

zoom

Zoom Tutorials provided by University IT

Zoom FAQ's provided by University IT

Box

box

Box provides cloud storage and file hosting for businesses. Client software and apps are available for Windows, macOS, and several mobile platforms.

Box Login

Click on "Log In to Box"

box

Select "UR NetID" and click on "Continue"

box

Enter your "NetID" and your "NetID Password" and click on "Login"

box

Box Tutorials provided by University IT

Box FAQ's provided by University IT

Virus FAQs

Frequently Asked Questions about Viruses

We rely on our users to let us know about unusual or somehow questionable content they receive via the Internet.

There is no foolproof protection as yet and there probably never will be so common sense is your best protection. If you don't recognize the name of the person that sent you the e-mail and it contains any kind of attachment, DON'T OPEN IT!

Be very stingy with the information you provide on the web and if you shop on the web, avoid unsecured pages at all costs (use the phone instead) and check your credit card statements carefully. Notify your bank if anything looks suspicious. They can investigate and let you know exactly who charged your account. Notifying them also protects you from liability!

For help with computer security concerns, contact Computer Support.

Virus incidents are on the rise here at LLE. If you think you have received a virus, please forward the message to Computer Support's problem@lle.rochester.edu. Do not delete the suspect message until Computer Support can look at your copy. In general, be extremely cautious when opening any e-mail attachment.

The following are frequently asked questions about receiving a virus via e-mail:

What is an "incident"?

The easy answer is "Anything you want." Anytime you have a question about an e-mail message you should feel free to forward the message to the "virus" address. Do not delete a message that you forward to us until we have contacted you. This may seem counterintuitive, but in order for us to track down the source of a virus transmitted via e-mail, we must be able to examine the entire message. Unfortunately, the act of forwarding a message does not (by default) pass on all of the message headers, and these headers help us determine the origin of a message.

But isn't a virus dangerous sitting in my inbox?

No—only if you open any attachment(s) to the message. Never open any of the attachments.

I already clicked on an attachment that I think might be a virus. What should I do?

If you have actually opened an attachment that you now suspect has infected your machine, you should unplug your machine from the network, if you know how. Immediately call the Computer Support Group at 313-6636. If you cannot reach someone, we recommend shutting down your computer until support can examine it.

I received a message that warned me of some danger and urged me to do something to my system (such as deleting a file, forwarding the warning on to others, etc.); what should I do?

Forward the message to problem@lle.rochester.edu and do nothing else.

When I attempt to forward the message to the virus address, my mail program says that it will have to download the attachments in order to forward it; is this ok?

Yes. This only happens to people who are set up to use the IMAP protocol (rather than the POP protocol) to read their mail. Note that you should not use POP. Contact the Computer Support Group if you are.

Is there anything else I should include when I forward the suspected virus message?

The following additional information will be useful:

  • Your telephone extension or cell phone number
  • Name of the possibly infected computer
  • Whether or not your Cylance software flagged the message
    • If it did: what action Cylance took

In a strict sense, we are MOST interested in tracking down "uncaught incidents." An uncaught incident is when you receive an e-mail with an attachment that you feel is in any way suspicious but has NOT been reported by Cylance.

If you have any virus-related question, contact problem@lle.rochester.edu at any time.

Adding a Printer

To add a printer on your Windows PC:

  1. Type \\printserv in the Windows 7 or 10 run dialog off the start menu (or search).
  2. When the Window appears, double click on the printer you'd to use.
  3. Answer in the affirmative to any prompts presented.

For printing help on other platforms:

SecurID Software Tokens

A limited number of SecurID software tokens are available for LLE users with an iPhone or Android smartphone. A software token is functionally equivalent to a hardware token, but it resides in an application on your smartphone, which means you have one less device to carry. To obtain a software token, first download and install the RSA SecurID application from the Apple App Store or Google Play Store.

Scan the appropriate QR code below with your smartphone to go directly to the application's page

RSA SecurID App from Apple App Store QR code
Apple App Store
Apple App Store
RSA SecurID App from Google Play Store QR code
Google Play Store
Google Play Store

After the application is installed, contact any member of the Computer Support Group to obtain a software token.