Do you need to change the borders, fill colors, or font on a spreadsheet? With Google Docs, you can format a spreadsheet to look just the way you want!
Thinking of contacting the Tech Desk because your computer is slow, your applications close unexpectedly, you see strange error messages, or nothing happens when you click on a file? Before you call, restart! If you can’t recall when you last restarted, do it now! And put it on your schedule – restart at least once a week!
Bmail Document Collaboration
Can we work together on that document? If we’re using Bmail Documents to collaborate on a document, presentation, or spreadsheet, we can share with 200 collaborators – but only 50 of us can edit at once!
Bmail Drive – What is Drive?
A. A sync tool that synchronizes your files between multiple computers and devices
B. A collaboration tool that allows you to share files and folders
C. An editing tool that gives you the ability to create documents, presentations, and spreadsheets
D. All of the above
Ready to start syncing your files between your computer and Bmail Drive? Just install Drive on your computer – your documents will immediately start synchronizing between your computer and your Google Docs!
Note: At the Google login screen type your email address and a blank password, then login with your username and password on the Bucknell login screen.
October is National Cyber Security Awareness Month!
Cyber security begins with controlling access to your computer. Close and lock your door when you leave your room or office. If you don’t have a door, use a laptop lock to make your computer a less attractive target. Never leave your computer unattended in a public area. Secure your space so it is hard for an unauthorized person to put their hands on your computer!
Who’s been reading your email? It’s quick and easy to view the Recent Activity list in Bmail – see the date, time, location, and type of device for the last ten times your mail was checked. Practice your Cyber Security skills – verify that you are the only one reading your mail!
Secure Your iPad
Is your iPad secure? When you turn on a new iPad you should set up these security features immediately, but if you missed a step, do it now!
- Set up a passcode.
- Set up iCloud
- Set up Find My iPad
- Backup your iPad with iCloud or by syncing with a computer.
- Protect your iPad with a cover or sleeve.
- Do not share your iPad with anyone.
Macintosh Software Update
Do you think your Mac is secure? Are you sure that only Windows computers are vulnerable to exploits and hacking? If you have a Macintosh, your computer is most secure when you are current on software updates! If you can’t recall when you last installed a software update, go to the Apple menu, select Software Update, then install, reboot, repeat!
Every time you walk away from your Windows computer, you should lock it! Before you step out to get a cup of coffee, chat with a colleague, or check your mailbox press the windows key and the letter l (that’s L, the twelfth letter in the alphabet). That’s all it takes to lock your computer – Windows + l. Anytime you can’t see your computer, make sure no one is using your computer or reading your files!
Browser Updates for Security
What version is your web browser? Out of date web browsers can put your entire computer at risk! Update to Chrome 22, Firefox 16, and Safari 6 for the most secure, stable, and functional browsing. On your personally owned computer, update to Internet Explorer 9, but leave your Bucknell owned computer on version 8, which is required for some university web sites. Not sure how to update your browsers? Start by upgrading Mozilla Firefox to the current version today!
Do you have a Cyber Security plan for the computer you use most often? You may spend a significant amount of time using the little computer in your pocket – the one that goes everywhere you go and contains every important detail of your life. Security is important, so have a plan if you lose or replace your Android or iOS mobile device.
Losing Your Mobile Device
Safely Disposing of Your Mobile Device
Securing Your Mobile Device Apps
Phishing Alerts in Bmail
Do fish have a warning sytem, alerting them that the tempting worm hides a dangerous hook? The fish are on their own, but Bmail has a great system to signal that an intriguing email message is too good to be true. Learn more about Bmail’s phishing protection, so you don’t take the bait!
Questions? You can always call the Tech Desk x77777
Search Ask Library & IT: http://asklit.bucknell.edu
Contact the Tech Desk (firstname.lastname@example.org, 570-577-7777) for assistance.