From Longview ISD Technology Wiki

Jump to: navigation, search


Administrative Rights: What are they and do I need them?

Administrative rights to a computer allow the user to do anything at all to that computer. This sounds like a good thing, but in most cases in LISD, it is not!

Having administrative rights to a computer is like having the key to the hood of that school bus out front. Yes, you could dive into that Caterpillar C7 7.2L Diesel and change the timing, but why would you want to? And would the mechanics thank you for it when you were done?

Administrative rights allow a user to install software and modify the deeper settings of a computer. According to Longview ISD's Acceptable Use Policy, you really should not be installing software anyway! (The technology department reviews each piece of software for compatibility with the computer and our network system as well as copyright compliance.)

In general, a user should have no need for administrative rights. Properly written programs work fine under the security levels granted to our users. This protects the district from improperly installed software, copyright violations, and often from the worst types of viruses and worms.

Home computers: Can I bring mine to LISD?

Personal devices fall under our BYOD policies. For staff, visit our BYOD for Staff page. For students, visit our BYOD for Students page.

Netbooks: What are they and are they supported?

“Netbooks” or “minis” are reduced-size computers with limited computing capacity due to smaller memory sizes and slower, more power-efficient processors. Most netbooks are not made for centralized management and cannot handle the load required of a regular LISD workstation.

Netbooks that belong to LISD are able to connect wirelessly (where available) to a special wireless network made just for them. At this time, devices that do not belong to LISD are not generally permitted on the LISD network.

Important Points about LISD Netbooks

• Netbook purchases must be approved and the initial installation handled by the Technology Department.

• Netbooks will be supported as peripheral devices. The Technology Department has limited experience and knowledge of these products and may refer you to the manufacturer or vendor for support. Interoperability with other devices and suitability for a specific purpose cannot be guaranteed.

• Netbooks are required to have a Windows operating system and the district’s antivirus and security software installed.

• Netbooks carry full operating system installations and are susceptible to the same security issues found in full-sized computers.

• Netbooks will not be able to log on to the district’s network, but they may be used to access district resources and the internet.

• Netbooks will be permitted on the district’s wireless network where appropriate.

• Netbooks pose a security risk. The user of the device is expected to secure all information appropriately and will be responsible for the loss or exposure of the data.

• Users may not install software unless it has been pre-approved!

Network Drives: What is a network drive?

It is always important for an LISD user to make sure you are logged into the network and are seeing the network resources (drives) you are assigned access. Each network drive has a function.

H Drive
All students and employees have an H drive. (Personal Folder or Home Directory)
This is a “private” place to save files. No one else can see what is in this drive unless they know YOUR username & password.
M Drive: Also listed as LISDComm on Jupiter
ALL LISD employees have access to this drive. It is a place to SHARE files. Always keep a backup in your H:drive because every employee has the ability to read, write and delete files in LISDComm. Students cannot “see” this drive.
N Drive: Also listed as SCommon on Jupiter
Students and LISD employees have access to this drive. It is a place to share files with students.
Student Rights:
Students can READ files in this drive but MUST save in their own H drive.
See your ITS about a common place for students to save files so that you, the teacher, can easily check completed technology projects.
Employee Rights:
Teachers can use this drive to share curriculum related templates with students.
Teachers can READ, WRITE, and DELETE files from this drive.
See your campus ITS for more information.
Other Misc. Drives: These vary depending on your campus and job description.

SPAM: What is SPAM?

What is it?
SPAM is another word for UBE or Unsolicited Bulk E-mail. All of the stuff you did not ask for, and generally do not want.
Where did they get my address?
If you have an e-mail address with Longview ISD, there is a good chance that your e-mail address is published on the web. Making it convenient for students and parents to contact you also makes it convenient for the spammers to find you! Sometimes, though, they just guess. In a large organization it is not too hard to be right some of the time. The more common your last name is, the more likely you are to receive random spam.
How did I send it to myself?
Chances are, you did not. Just like postal mail, e-mail allows any return address to be used. You did not send that mail to yourself, it just looks like you did. Sometimes spammers attempt to get mail to you by letting another mail system "bounce" the spam to the return address (which, of course, is bogus!)
Why don't the filters block it?
Chances are that it is not as blatant as it would first appear. Our filter should catch overtly ugly words, but spammers craft their e-mails carefully, using medically correct terms and innuendo.
What can be done about it?
LISD does have measures in place to stop SPAM and our detection system is updated several times a day to detect new types. We do our best to protect our recipients from receiving these inappropriate messages, however not all SPAM can be accurately identified and blocked. Spammers daily invent new and creative ways to structure their messages so that detection is difficult. In spite of increasingly intelligent and accurate SPAM detection systems, computer security studies have shown that over 75% of email sent is SPAM. While the measures we have in place currently block the majority of these undesirable emails, there will still be a few that make their way through undetected. Though it is possible to tighten the detection settings to perhaps catch a few more SPAM emails, this also increases the possibility that we would block valid and desirable emails.

VPN: What is it?

What is the LISD VPN?
VPN is an acronym for Virtual Private Network. The LISD VPN allows your internet connected computer at home to talk over the internet to LISD servers without compromising the security of the data that is being transmitted. When you connect to LISD’s VPN concentrator, your computer acts as if it were plugged in to the LISD network. The benefit of using the LISD VPN instead of LISD’s dial pool is high speed access to otherwise unaccessible servers such as the EDP servers and File Servers. It is very important to never share your VPN username and password with anybody as this compromises the security of our entire network.
Who can use the LISD VPN?
Limited licensing and bandwidth forces the LISD VPN to be reserved for users who have a valid need for administrative access to secure servers from remote locations. At this time, access is generally not available to teachers.
When is the LISD VPN available?
To preserve bandwidth, the LISD VPN generally becomes available after 4:30 PM.
Which Internet Service Providers can support a VPN connection?
Most, but not all ISPs support VPN connections through both dial-up and high speed (cable, satellite, and DSL) connections. If you are unsure, you should ask your ISP.
I can't get it to work. Now what?
LISD Technology provides facilities but not support for remote access capabilities. An LISD analyst will be happy to answer any questions that they can, but may not be able to provide you with a solution to your problems. An LISD analyst will not come to your home and help you set it up.

Main Page

Personal tools