UNC-PSK Configuration for Chromebook
Description: Configuring Wi-Fi for UNC-PSK STEP 1: Obtain the pre-shared key Go to a device already connected to the internet. Visit What is the UNC-PSK SSID? and obtain the pre-shared key. STEP 2: Connect to UNC-PSK Click on the wireless icon in the bottom right-hand corner of the screen. Select the Network tab (“No Network”). Click on the […]
» Subjects: , , » Tags: ,

Getting Connected at UNC
Description: Wireless Connecting to the UNC Wireless Network Email  Campus Email Cheat Sheet     Heelmail (live.unc.edu) Outlook Android iOS (iPhone, iPod, iPad)     Exchange (ad.unc.edu) Outlook Web App Outlook 2010 and 2013 (Win) Outlook 2011 (Mac) Android iOS (iPhone, iPod, iPad) Antivirus      Personally Owned Microsoft Security Essentials (Windows) ClamX Antivirus (Mac)      University Owned Microsoft […]
» Subjects: , , , , , , , , , , » Tags: , , , , , , , , ,

[Exchange] Outlook 2013 Configuration
Description: The University Campus Exchange account can be configured on Outlook. This document is written to take a person through the Exchange Email Configuration on Outlook 2013. In order to setup your account, please follow the instructions below. Configuration Settings User Name: Onyen Password: Onyen Password Server: outlook.unc.edu Domain: AD Exchange Email Setup on Outlook   […]
» Subjects: , » Tags: , ,

Installing SAS 9.4 on Windows
Description: This document provides instructions for installing the Windows version of SAS 9.4 on 7 and 8. This installation may take an hour or more. This document is written based on installing SAS 9.4 on Windows 7 64-bit version.  In this installation only the SAS Foundation was chosen to be installed.  If you choose to install […]
» Subjects: , , , » Tags: ,

Installing ArcGIS 10.x Desktop on Windows (Onyen Restricted)
Description: -
» Subjects: , , , , » Tags:

How to enable a firewall on Windows and Mac OS X?
Description: To protect the campus network from the spread of viruses and malware, we require all computers to have a firewall installed, enabled and configured to block malicious traffic. A firewall provides a layer of protection between your computer and the internet. It serves as a barrier and can help defend against someone attempting to access […]
» Subjects: , , , , » Tags: , ,

Update Your Software Regularly
Description: As a best practice the University recommends that you keep your software up to date on a regular basis.  This software includes, Operating Systems, Web Browsers, and Web applications/ web browser plug-ins.  Leaving these unattended can leave them open to attacks and breach in sensitive information. How to update you operating system: Windows Turn on […]
» Subjects: , , , » Tags: , ,

VPN Installation
Description:
» Subjects: , , , » Tags: , , , , ,

Identity Finder Search on Mac OS X
Description: Starting a Search What will Identity Finder scan and how long will it take? Identity Finder will search your computer for any occurrences of Social Security numbers, credit card numbers, and passport numbers. It will only search local hard drives (C:, D:, etc.) and external USB drives. It will not search remote drives connected to […]
» Subjects: , , , » Tags: ,

Identity Finder Search on Windows
Description:  Starting a Search  What will Identity Finder scan and how long will it take? Identity Finder will search your computer for any occurrences of Social Security numbers, credit card numbers, and passport numbers. It will only search local hard drives (C:, D:, etc.) and external USB drives. It will not search remote drives connected to […]
» Subjects: , , , » Tags: ,