The Office of Online & Professional Learning Resources (Formerly known as UW Extended Campus) Tech Support provides assistance with course access and/or course-related software or hardware questions for UW Online Collaborative Programs, Independent Learning and the UW Flexible Option.
Canvas Help
How do I log in?
If you are an Independent Learning (IL) student, please refer to the two welcome e-mails which were sent upon your registration for your IL course. You will find a link to Canvas, along with your Canvas username and a one-time password. You will need to follow the directions in numerical order to reset your password and then log into Canvas. If you forgot your password, please submit the form to the right and we will be happy to assist.
For all other programs: Please contact your home campus help desk for assistance. If you forgot your password, your campus help desk should be able to help you reset it.
How can I confirm my computer meets the minimum requirements?
Just visit this page with each computer you plan on using for your online coursework and the System Requirements Utility below will automatically run a scan of your computer and provide you with feedback on your system. Check below to see the results for the computer you’re using right now! Please check your program for additional program-specific hardware and software requirements.
Notes regarding web browsers: Mozilla Firefox and Google Chrome are available for both Windows and Macintosh (Mac). Internet Explorer (IE) is no longer supported by Canvas. Please be sure to use a different browser like Firefox or Chrome to access Canvas.
Your operating system does not meet the requirement!
Recommended operating systems:
- Windows Vista
- Windows 7
- Windows 8
- Windows 8.1
- Windows 10 (or later)
- macOS
Your web browser is not supported!
Please try using any of the following web browsers:
- Microsoft Edge 12+
- Firefox 27+
- Chrome 33+
- Opera 12+
- Safari 6+
IT Announcements
From US Computer Emergency Readiness Team
October 31, 2018
View Previous Tips from USCERT
Security Tip (ST18-005)
Proper Disposal of Electronic Devices
Original release date: October 30, 2018
Why is it important to dispose of electronic devices safely?
In addition to effectively securing sensitive information on electronic devices, it is important to follow best practices for electronic device disposal. Computers, smartphones, and cameras allow you to keep a great deal of information at your fingertips, but when you dispose of, donate, or recycle a device you may inadvertently disclose sensitive information which could be exploited by cyber criminals.
Types of electronic devices include:
- Computers, Smartphones, and Tablets— electronic devices that can automatically store and process data; most contain a central processing unit and memory, and use an operating system that runs programs and applications.
- Digital Media— these electronic devices create, store, and play digital content. Digital media devices include items like digital cameras and media players.
- External Hardware and Peripheral Devices— hardware devices that provide input and output for computers, such as printers, monitors, and external hard drives; these devices contain permanently stored digital characters.
- Gaming Consoles— electronic, digital, or computer devices that output a video signal or visual image to display a video game.
What are some effective methods for removing data from your device?
There are a variety of methods for permanently erasing data from your devices (also called sanitizing). Because methods of sanitization vary according to device, it is important to use the method that applies to that particular device.
Methods for sanitization include:
- Backing Up Data. Saving your data to another device or a second location (e.g., an external hard drive or the cloud) can help you recover your data if your device is stolen. Options for digital storage include cloud data services, CDs, DVDs, and removable flash drives or removable hard drives (see ST08-001 Using Caution with USB Drivesand ST04-020 Protecting Portable Devices: Data Security for more information). Backing up your data can also help you identify exactly what information a thief may have been able to access.
- Deleting Data. Removing data from your device can be one method of sanitization. When you delete files from a device—although the files may appear to have been removed—data remains on the media even after a delete or format command is executed. Do not rely solely on the deletion method you routinely use, such as moving a file to the trash or recycle bin or selecting “delete” from the menu. Even if you empty the trash, the deleted files are still on device and can be retrieved. Permanent data deletion requires several steps.
- Use a disk cleaning software designed to permanently remove the data stored on a computer hard drive to prevent the possibility of recovery.
- Secure erase.This is a set of commands in the firmware of most computer hard drives. If you select a program that runs the secure erase command set, it will erase the data by overwriting all areas of the hard drive.
- Disk wiping.This is a utility that erases sensitive information on hard drives and securely wipes flash drives and secure digital cards.
- Smartphones and Tablets.Ensure that all data is removed from your device by performing a “hard reset.” This will return the device to its original factory settings. Each device has a different hard reset procedure, but most smartphones and tablets can be reset through their settings. In addition, physically remove the memory card and the subscriber identity module card, if your device has one.
- Digital Cameras, Media Players, and Gaming Consoles. Perform a standard factory reset (i.e., a hard reset) and physically remove the hard drive or memory card.
- Office Equipment (e.g., copiers, printers, fax machines, multifunction devices). Remove any memory cards from the equipment. Perform a full manufacture reset to restore the equipment to its factory default.
- Use a disk cleaning software designed to permanently remove the data stored on a computer hard drive to prevent the possibility of recovery.
- Another method of sanitization is to delete sensitive information and write new binary data over it. Using random data instead of easily identifiable patterns makes it harder for attackers to discover the original information underneath. Since data stored on a computer is written in binary code—strings of 0s and 1s—one method of overwriting is to zero-fill a hard disk and select programs that use all zeros in the last layer. Users should overwrite the entire hard disk and add multiple layers of new data (three to seven passes of new binary data) to prevent attackers from obtaining the original data.
- exeis a built-in command-line tool in Microsoft Windows operating systems that can be used to encrypt or decrypt data on New Technology File System drives. This tool also securely deletes data by overwriting it.
- Clearingis a level of media sanitation that does not allow information to be retrieved by data, disk, or file recovery utilities. The National Institute of Standards and Technology (NIST) notes that devices must be resistant to keystroke recovery attempts from standard input devices (e.g., a keyboard or mouse) and from data scavenging tools.
- Physical destruction of a device is the ultimate way to prevent others from retrieving your information. Specialized services are available that will disintegrate, burn, melt, or pulverize your computer drive and other devices. These sanitization methods are designed to completely destroy the media and are typically carried out at an outsourced metal destruction or licensed incineration facility. If you choose not to use a service, you can destroy your hard drive by driving nails or drilling holes into the device yourself. The remaining physical pieces of the drive must be small enough (at least 1/125 inches) that your information cannot be reconstructed from them. There are also hardware devices available that erase CDs and DVDs by destroying their surface.
- Magnetic Media Degaussers.Degaussers expose devices to strong magnetic fields that remove the data that is magnetically stored on traditional magnetic media.
- Solid-State Destruction.The destruction of all data storage chip memory by crushing, shredding, or disintegration is called solid-state destruction. Solid-State Drives should be destroyed with devices that are specifically engineered for this purpose.
- CD and DVD Destruction.Many office and home paper shredders can shred CDs and DVDs (be sure to check that the shredder you are using can shred CDs and DVDs before attempting this method).
For more information, see the NIST Special Publication 800-88 Guidelines for Media Sanitization.
How can you safely dispose of out-of-date electronic devices?
Electronic waste (sometimes called e-waste) is a term used to describe electronics that are nearing the end of their useful life and are discarded, donated, or recycled. Although donating and recycling electronic devices conserves natural resources, you may still choose to dispose of e-waste by contacting your local landfill and requesting a designated e-waste drop off location. Be aware that although there are many options for disposal, it is your responsibility to ensure that the location chosen is reputable and certified. Visit the Environmental Protection Agency’s (EPA) Electronics Donation and Recycling webpage for additional information on donating and recycling electronics. For information on recycling regulations and facilities in your state, visit the EPA Regulations, Initiatives, and Research on Electronics Stewardship webpage.
Check out this month’s Ouch! newsletter to learn about ways to protect yourself from cyber attacks that may masquerade as important e-mails.
Check out this month’s Ouch! newsletter to learn about smart devices and how to safely use them and protect your home and information from unwanted attention.
July 2018 Ouch! Newsletter: Phone Call Attacks & Scams
Cyber criminals are increasingly turning to phones to trick victims. Check out this recent SANS newsletter, OUCH!, for more information and guidelines for protecting yourself both online and over the phone.
PHISHING
We have noticed a recent spike in fake emails and online “phishing” attacks. Phishing is an attempt to obtain sensitive information such as usernames, passwords, and credit card details through fraudulent and malicious messages. Our attackers have been using “spoofing”, a method of forging the email to appear to be from another person or company.
Please remember the following, to help protect your personal information:
- Do not share your ID or passwords with anyone, including family and friends.
- Carefully read any account threats. A communication that contains a threat such as “your account will close immediately” should be treated as suspicious. Do no enter information, or click on any link that seems off.
- Who is the email from? Always double check who is sending the email. If a name seems weird, the logo is wrong, or the spelling is off, don’t open the email, or any attachments.
- Think before you click. Be suspicious if an email asks you to go to an odd web address, or if the email contains an unusual attachment.
- When in doubt, just ask. Please contact The Student Support Service Center if you are unsure if an email is a phishing attempt. The quickest way to contact us is to use the web form to the right.
When your confidential data is compromised, attackers can use your account to send even more phishing messages, as well as steal your information to open credit cards, access additional accounts, or commit other crimes associated with identity theft. It is critical that you protect yourself from these types of attacks. The measures above will help safeguard your private information.