Search 315 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

Disabling DNS over HTTPS

Browsers on personal or work machines may have DNS over HTTPS (DoH) by default. IT Services has observed that these settings have been known to cause issues when connecting to services like ...  Disabled. Click Relaunch to relaunch the browser window with this change.  How To, Newer versions of Chrome: In Chrome's settings, select 'Privacy and Security' In 'Privacy

FAQ: Campus Authentication Portal

update your security questions or password. Q: I forgot the answer to the security question: what do I do? Please contact the IT Service Desk. Walk-In Support: Galileo Hall Room 111 Phone Support: (925

What is Phishing?

Phishing is a type of attack carried out to steal usernames, passwords, credit card information, Social Security numbers, and/or other sensitive data. Phishing is most often seen in the form of ... our Security Awareness Course on Moodle. (Access the Course Now!) If you think you've received a Phishing Email please mark it as Phishing in Gmail and forward it to it.security@stmarys-ca.edu

User unable to access GaelXpress.

 and Security... Next, click on Security on the right half of the page... Next, scroll down the right half of the page to Advanced. Directly under Advance will be the SecureDNS preferences

Canvas - How to: Enable third-party cookies for Proctorio support

Chrome Click settings from the drop-down menu Click Privacy and security Click Cookies and other site data Select either "Allow all cookies" or "Block third-party cookies in incognito" There is no Save, it takes automatically

How-To setup 2-Factor Verification on Google

required to present something you know (Password) and something you have (your phone or other security key). ... Verification you add an extra layer of security to your account. Most people only have one layer - their password - to protect their account. With 2-Step Verification, if an attacker hacks through the

How to: Install, Access, Logout of the SMC Virtual Desktop

.   2. Click the All Apps icon  3. Click the VPN icon  4. You will see a connecting to VPN box and the OneLogin Security Questions. Enter the answer to the security question. (NOTE

Thunder Bird - Clearing Out Old Password

updated password for the account. 1.  Open Thunderbird. From the top menu click Tools, then Options. A window will appear. 2. Click on the Security tab, then the Saved Passwords button. The Saved

How To Manually Set up SMC Wifi on a Mac OS X Computer

  Security: WPA2 Enterprise Mode: Automatic. Username: Your SMC Username. Password: Your SMC Password. Click OK. The Verify Certificate window will pop up.  Click Continue The computer will open a

How To: Set up SMC Wifi on Windows 7

list of available WiFi networks, click on “Open Network and Sharing Center.” Select “Manually Connect to a Wireless Network.” Key in the following:   Network Name:  SMC-WiFi   Security: WPA2

How-To Secure Your Android Device

software onto your device unless you know and trust the source of that software, and you were expecting to receive it. Never ignore or override security prompts displayed by your device unless you are

Zoom: Curious about Zoom Bombing? Here are the Best Ways to Secure Your SMC Zoom Meetings

Zoom.us menu item>  and click Check for Updates > and click the Update button and Install  update as guided by the Zoom installer.  This update will enable the new Zoom Security Button.   The

User Guide: Technology Quick Start Guide for Staff

. Password Reset - As a measure of security you should change your initial password as soon as possible.  Go to http://www.stmarys-ca.edu/password and follow the prompts to change your password.  You

Technology Use Policy - Mobile Use Policy

Security Policy, immediately, to the Information Security Officer (ISO) and to their supervisor or department chair. Related IT Policies Saint Mary’s College of California Technology Use Policy

Technology Equipment Lending Timeframes

the DUE DATE.  If there is sufficient inventory, IT Services may lend out comparable equipment at return of the current item.  For security purposes, IT Services does not extend lending periods over the