Personal Services Available to Home Users
UW employees and affiliates may use the Microsoft Outlook e-mail program to access their Exchange mailbox from a home computer. The e-mail application is included in the Office Suite. Additionally, users may access their Exchange mailbox by using a Web browser and going to http://uwmail.uwyo.edu.
Other e-mail applications including non-Windows based programs may be configured to access an Exchange mailbox.
For details on how to configure certain applications and access e-mail, check out the instructions in the “E-mail” section of our UWIT Knowledge Base (https://uwyo.teamdynamix.com/TDClient/KB/?CategoryID=1882).
Spyware is, "Any software that covertly gathers user information through the user's Internet connection without his or her knowledge."1
Malware may enable pop-up ads, change browser behavior, or collect personal information about a user’s browsing habits, credit card information, passwords and email addresses. Malware can severely degrade and disrupt the performance of a PC.
Information Technology recommends that all faculty, staff, and students take advantage of software available from the Internet to help combat increasingly aggressive attempts to collect personal information from PCs and to keep personally owned computers functional.
IT suggests the following application to help fight malware on personally owned (home) computers:
- Spybot Search & Destroy is free and may be downloaded by visiting www.safer-networking.org/en/index.html. Under the Home section, click on the Download link. Donations are accepted by the Spybot Search & Destroy authors, but they are not expected. A browser search may take users to other Web sites that try to mimic the popularity of this free product. Be careful to get the authentic Spybot Search & Destroy.
Protection for home computers is available through other free and fee-based applications that are intended for personally owned computers.
Although Information Technology is unable to support personally owned computers, the information we pass along on this website, in the IT newsletter and other IT forums may help you maintain your own computers. IT cannot assure any of these programs will work properly on personally owned computers.
1See www.webopedia.com/TERM/s/spyware.html for a complete definition of spyware.
User's Security Checklist for Windows1
Microsoft's Safety & Security Center Web page
1Information Technology does not endorse nor support every aspect of the checklist provided at the site listed above, but the concepts are applicable for many home computer users. The opinions of the author are theirs alone and do not represent the opinions of the University of Wyoming nor Information Technology. UW Information Technology does not support the use of personal firewalls when using VPN to access University resources. Specific configurations of the Outlook email client may not be compatible with UW servers.
The resources described on this page are for home users only. IT user consultants will assist you with your office computer to ensure secure environments through antivirus, browser settings, Windows Updates, and environmental configurations to help protect institutionally owned computers.