Frequently Asked Questions
Q: I’m finding spam messages or bouncebacks to messages in my Inbox from myself. I know I didn’t send these messages. Why is this happening?
It’s called “spoofing”. Hackers may have gotten your email address from somewhere, and rather than using their own email address to send out Spam, they are using your email address. Unfortunately, there’s very little we can do about this since the mail protocol allows anyone to put anything in the “From: “ field of a message being sent.
Q: My department will be moving next month to another location. What do I need to do to ensure that there will be network connectivity at the new location?
Faculty and staff who would like assistance in coordinating a smooth transition for your office move to a new location can contact Discovery Commons to request an office move consultation.
Prior to the move, we can help assess the new location to ensure that there will be sufficient number of active network jacks for all of your computers, printers and other peripherals. We can also provide assistance in disconnecting your computers and packing them into moving bins and then reconnecting your computers in the new location and ensuring full network connectivity for all of your devices. Should you require extra additional network cables, extension cables or power bars in the new location, Discovery Commons can order these items and have them available on move day.
We can also provide assistance in coordinating with Central IT Services to ensure that your staff can continue to use Administrative Systems like AMS and ROSI in the new location
Discovery Commons can work to coordinate with other departments like Facilities, Trades, Movers and Vendors involved in the project if required.
Q: My email was working fine before I went on vacation, but since I got back I no longer get email from outside sources in my Inbox. What happened?
You most likely enabled an auto-reply on the UTORid website. Doing this removes a forwarding that’s critical for your exchange account to function with your @utoronto email address. Contact the helpdesk to have a technician assist you with re-enabling the forwarding. To avoid this problem, please use the Outlook Out of Office assistant to notify users of your absence.
Q: Outlook just signed me out and there is now lost connection, why?
It is possible that the outage is temporary. Please try again in five minutes. If the outage continues, call the Service Desk to report the outage.
Q: What are media file types?
Media file types are the various ways in which media can be encoded in order that they play back in expected ways for different purposes. File types are denoted by the 3 (or 4) characters after the name of the file and preceded by a period.
File types contain specific codecs that allow the media to be read by an operating system, media player or application. While many codecs play on many current devices, they are not standardized and universally compatible. A common file type such as one listed below may have been compressed using an uncommon or defunct codec, resulting in a file that will no longer play.
Sometimes, media files need to be converted from one file type to another to be used in an application. If the file is quite old and uses a defunct codec, it may not be able to be converted.
Common video file types are:
Common audio file types are:
Common still image file types are:
- .jpg medi
Q: What computer security precautions I should consider as an end-user?
Here are some of the more important precautions that we advise for everyone:
- Encrypt all mobile devices (laptops, smartphones, tablets, USB keys)
- Don’t login to sensitive web applications from a public computer or public WiFi network
- Don’t cache your username and password in your workstation (i.e. “remember me”)
- Remember to log off at the end of a session
- Use different sets of logins and passwords for different web applications and services, and especially for personal and work systems
- Regularly change your passwords used in critical web applications
- Report abnormal behavior to the service provider immediately
- Ensure that the operating system and system components like Internet Explorer (browser) and Microsoft Office are fully patched and up-to-date
- Install a personal firewall as well as anti-virus software with the latest virus signatures
- Don’t download software, plug-ins, or browser toolbars from unknown sources
Q: What general security precautions does Discovery Commons take for web servers?
We take a range of industry-standard precautions, including:
- We configure the web server securely according to the vendor’s security guidelines
- We identify application files on the web server and protect them with access controls
- We run web server processes with appropriate privilege accounts. We avoid running web server processes using full privileged accounts (e.g. ‘root’, ‘SYSTEM’, ‘Administrator’)
- We configure web server software to prevent any leak of information such as web server software version, internal IP address, directory structure, etc.
- We configure access rights so that server software cannot modify files being served to users. In other words, the web server software should have read-only access rights to those files
- We apply the latest security patches to web server software
The University’s latest security baseline can be found on the ISEA website (ISEA is a part of ITS).
Q: What is the difference between webcasting and webconferencing?
Webcasting is a one-to-many technology, commonly used for broadcasting live presentations and other events where there are speakers and an audience. A camera image shows the speaker(s), microphones transit the speaker’s voice, and if there is a presentation, such as a powerpoint, that can be shown as well. An audience can be present with the presenter and view the session in person, and others can experience the live session while at their computers (this is the remote audience). The remoter audience receives a link in advance of the event, and at the scheduled time, will see and hear the webcast when they click the link. The remote audience has the option of using a chat box to communicate with other remote participants, but cannot be seen or heard by the presenting site. Often, the chat is used to allow remote participants to ask questions, and a moderator at the presenting site monitors the chat and relays questions to the presenter or answers them.
Webconferencing technology is used when collaboration between online participants is important, such as during a course or group training session, and remote participants can all have input. There is usually a moderator who initiates the conference, and using settings, can control how much or how little input participants will have. Participants can be seen and heard via their own webcams, and can also chat. They can also be given write access to any displayed documents or whiteboards. Webconferencing requires special software, but usually only the moderator requires the full version and participants connect via a free client that is downloaded onto their own computer. Examples of webconferencing software are Blackboard Collaborate, Adobe Connect, and WebEx.
A webinar is a commonly used term for a webcast or webconference that has, as its content, a seminar or training session.
Q: What is the difference between “hosting” and “posting” a media file?
When media, such as a video or audio, appears on a web page, there are two necessary elements that allow it to play: one is the text on the screen, known as a hyperlink, and the other is the fact that there is a media file on a server somewhere that the text is linked to. The hyperlink (commonly referred to simply as the link) is posted on a webpage; the media file is hosted on the server.
Sometimes, in place of a link, a “player” is embedded on the web page (sometimes this is referred to as an “embed code”), which appears to play to media file directly on the page. However, the media file itself is still hosted on a remote server.
Q: What is the process if I wanted to have the ability to work and remote from home?
Please complete the Request for Remote Desktop Access form, which requires your supervisor’s approval, and send the completed, signed form to email@example.com. We will configure the network to allow remote access, and will send a technician to set your computer up for it.