Clemson Computing & Information Technology

Full Listing

Computer Security and Virus Protection
View The Full Article
This help guide will show users how to update and maintain security on their personal workstations. Perform Windows Critical Updates and Service Packs Open the start menu, go to All Programs and select Windows Update. Click on Check for updates on the left side of the window. Only install updates marked as ImportantSome updates will need to be installed alone, so you will need to perform the previous steps again. Make sure to reboot when prompted. Install and Update Virus Scanning Software Trend Micro is licensed for all Universityowned computers, all currently enrolled studentsand39 computers, and faculty and staff home use. It is real time virus protection for Windows and Mac computers.It can be downloaded at download.clemson.edu . Install Trend Micro and run updates. Run manual scans of hard drives and removable devices if necessary. Download Spyware Removal Programs and Scan System Download Trend Micro from download.clemson.edu Update both products In Spybot, go to updates check for updates download updates In Adaware, there will be a link on the right side of the program to update the software Run Adaware, once it has completed and displays a list of objects, right click on one of them and select all objects, proceed with the removal process. Run Spybot Search and Destroy, once it has completed, proceed with the deletion of harmful objects and reboot the machine. Contacting the Help Desk Contact the Help Desk to let them know the status of your machine if you received a phone call or email Employees If you are unable to resolve the problem, contact your TSP or local consultant. You may also contact the Help Desk at 6563494 or email ITHELPclemson.edu Students If you are unable to resolve the problem contact the appropriate support group CCIT Support Center on the second floor of Cooper Library.ITHELPclemson.edu, 6563494 Some Clemson computers are being infected with worms and viruses because of weak passwords. Use secure Windows userids and passwords. Do not use accounts with the same names and passwords, like admin admin or user user. This allows computer worms and hackers easy access to your computer. Guidelines for userids and passwords are posted here.