Recently, UIS users began experiencing access issues that were related to Java configurations on their systems. Either they were unable to access Host On-Demand (HOD) at all due to error messages (located at http://www.bu.edu/uis_web3270/), or the UIS terminal would simply load to a black screen and not bring them to the login screen. The usual fixes we had implemented in the past to solve Java issues with UIS would allow them to proceed to this black screen in many cases, but no further.
To resolve this issue if you experience it, try the following:
- On a PC, locate the application called “Configure Java.” In Windows 7, you can search for it using the search bar in your Start menu. It is located in “All Programs” within a folder called “Java.” On a Mac, open System Preferences and click on Java (towards the bottom).
- The Java Control Panel application should open in the “General” tab. Under the heading “Temporary Internet Files”, click the button that says “Settings…”
- A window will open called Temporary Files Settings. Uncheck the box that says “Keep temporary files on my computer.” Then click “OK” to close the window.
- Go to the “Security” tab.
- Click on “Edit Site List…” (towards the bottom).
- Ensure that http://www.bu.edu and https://www.bu.edu are in your site list. If they are not, you can add them using the “Add” button. Then click “OK” to close the window.
- Click the “Apply” button in the Java Control Panel. Then click “OK” to close the window.
- Quit any browsers you have open, then reopen them and try to access UIS again.
BUMC IT believes this may resolve the black screen issue for many users. If you still experience issues after trying these steps, or if you have any trouble following the steps and want our help, feel free to contact BUMC IT at 617-638-5914 or at firstname.lastname@example.org.
As described last week in a BU Today article, members of the BU community were recently victims of phishing; and IS&T has again received several reports of a phishing message being received by members of our community like the one below.
We believe the scammers are trying to use the fact that they were successful last time to continue and extend their crime. The message to watch out for claims to be from BU Security and talks about protecting you from the evils of phishing. You can tell the message is a fake because it claims to be from BU, and even uses the BU logo, but it is pointing you to a link that is not a bu.edu link.
A real BU link will always have “ .bu.edu/ ” in it. There is always a dot before bu and a slash after edu, as shown below.
Other things to watch out for:
- If you are prompted to Web Login, make sure it is the authentic BU Web Login page which begins with https://weblogin.bu.edu/something
- Remember that BU will NEVER ask you for your password or ask you to “verify” it; nor would any other legitimate business or institution. It is important that you safeguard your passwords and never give them to anyone.
For more good ways to detect phishing, go to: www.bu.edu/infosec/howtos/how-to-detect-phishing/.
Additional information on phishing is provided by IS&T at www.bu.edu/tech/phishing.
Making your spam/phishing filter more effective
Mail that is clearly spam is filtered for you, automatically. However, one person’s spam might be another person’s research project, so other messages are simply tagged as suspicious and then allowed to go through. You can decide how to handle suspicious mail that does get through, following the tips for Managing Spam provided by IS&T at www.bu.edu/tech/comm/email/unwanted-email/spam/.
If you see a phishing message, please send it and full headers to email@example.com. For details on how to do this, see www.bu.edu/tech/comm/email/unwanted-email/report-abuse/.
This time of year is wonderful. People are thinking of others a little more and reaching out to them again if they haven’t talked in a while. Unfortunately, as with any other time when behavior can be predicted, the bad guys are working overtime to try to take advantage of it. This year has seen record levels of malicious activity online and via email as they are taking advantage of all the shopping being done online.
This is a quick reminder to be extra careful this time of year with your email.
We have been seeing many, many malicious messages
- pretending to be receipts for purchases that you didn’t make or
- offers for discounts on products you like, or
- pretending to be complaints from the Better Business Bureau (BBB) or
- notifications of a lawsuits against you, etc.,
- anything to try to goad you into clicking the link.
These emails are trying to: (1) trick you into following a link to a fake site pretending to be someplace you normally go so you give them your password or (2) infect your computer with malicious software, or both.
Here are a few simple tips to avoid being hooked by a phisher:
1. If the email asks for your password, it is a scam. Delete it.
2. If the email is about an order that you don’t know anything about, it is almost certainly a scam. It may thank you for purchasing something that you know you didn’t order and then either include a PDF attachment as a receipt or give you a “Dispute” link. If you click the link or open the attachment, it will almost certainly infect your system.
- If you want to confirm if a purchase was made without your authorization, DON’T CLICK THE LINK IN THE EMAIL. It is completely possible to make a link lie to you. Instead, call the number on the back of your card or use your browser to go to the known and trusted website by typing in the URL/Web Address yourself.
- General rule: if the email message is lying to you about where it wants to send you, it is a scam.
For example, take this link: http;//www.google.com/ If you click this, it will not take you to Google, it will take you somewhere completely different. Scammers use this trick all the time to trick you to going to malicious websites. You can tell where a link is going to take you by hovering over it with your mouse. DON’T CLICK. Hover. If you do this for the link above you will see a completely different link pop up in a box by your pointer or in a space at the bottom of your email client or browser.
3. Forward scam emails to firstname.lastname@example.org and then delete them. If in doubt, call the IT Help Desk (617) 638-5914.
For more information visit: bu.edu/infosec/howtos/how-to-avoid-phishing/
(The above link was sent in clear text and is pointing to a domain you trust, bu.edu. But if your browser made the link clickable, you should still get into the habit of not clicking it, but copying and pasting the link into your browser.)
Keep your eye out for scams, and best wishes to you all,
Quinn R Shamblin
Executive Director of Information Security, Boston University
If you have an iPad and wished you could type with your thumbs like you do on your phone, try out the split keyboard! http://aol.it/X4d0pB
Mac Users: Did you know you can easily scan your handwritten signature to your Mac using OS X Lion’s Preview app? Find out how at http://aol.it/OuJfXw
Are you a student currently registered for a course that requires SAS but cannot download it? Have your professor e-mail us at email@example.com and confirm that you are enrolled in the class to gain access to the SAS download. More information about SAS: http://bit.ly/whT6Nk
Check out www.bu.edu/tech/training to view course descriptions and register for classroom tutorials. Some notable course options include training for Outlook 2010, Blackboard and Scientific Visualization software.
Avoid being a victim of phishing! If you are ever unsure whether an e-mail you receive is legitimate or if you receive an e-mail messages that is abusive or harassing in nature, you can forward it to firstname.lastname@example.org for verification. Read the following tips to protect yourself from phishing…
Configure your iOS device (iPhone, iPad, iPod Touch) for BU e-mail, VPN and WiFi in SECONDS! Open http://www.bumc.bu.edu/it/iosconfig/ on your iOS device and download the appropriate configuration file.