Link to CCU Home Page
Link to Quick Links
Link to Search Link to CCU Home Page
Student Computing Services
image for decoration
 

Frequently Asked Questions

Question Categories

I have failed SafeConnect Validation. What do I do now?

SafeConnect will identify and display the missing requirement(s):

  1. Anti-virus?
    • ITS-SCS recommends Symantec Endpoint Protection click here.
    • If you are sure that an anti-virus utility is installed and you fail validation, verify that the signatures/definitions are up to date.
  2. Signature/Definitions?
    • Use the Update utility of your anti-virus to install the new definitions/signatures.
    • If you are sure that the signatures/definitions are current and you fail validation, verify that your system updates are current
  3. System Updates?
    • Follow the instructions to download and install all Updates.
    • You may have to restart your computer and repeat this process a few times.
    • Once you have installed all the Updates, you will granted internet access instantenously. You may need to close any browsers and re-open a new one to gain internet access.
  4. If you are sure that your system has all of the above and you fail vailidation, you will need to contact the Tech Support Center at (843) 349-2220.

[Top of Page]

Which authentication provider do I choose?

If you are a student at Coastal Carolina University, you should login using CCUnwired or CCUResnet as your authentication provider.

[Top of Page]

I do not have a Windows PC; do I need the SafeConnect Policy Key?

Yes. SafeConnect is required for all computers accessing Coastal Carolina University Network.

[Top of Page]

I have forgotten my username and/or password. How do I retrieve this information?

If you have forgotten your username and/or password, access https://www.coastal.edu/search/password. On this page, you will be prompted for your Social Security Number and birth date.

[Top of Page]

Is there a wireless Internet connection available at Coastal Carolina University?

Yes. For a list of available wireless locations, visit Wifi Hotspots.

[Top of Page]

How do I connect to the Internet via a wireless network connection?

  1. You must have a computer with a wireless network interface (internal card or external device). If a network interface card is not already installed, please purchase one and follow your product's documentation for installation instructions, or read the installation instructions given here. Once installed, restart your computer.
  2. Once the operating system has booted, if you are running Microsoft Windows XP , Windows Vista , or Windows 7 or consult your product's installation guide for further instructions. The SSID for the wireless network is CCUnwired. If WEP is enabled, please disable.
  3. If you are running Mac OS, click here for installation instructions. The SSID for wireless network is CCUnwired. If WEP is enabled, please disable.
  4. If you are running Linux, consult your product's installation guide or contact Student Computing Services at 843-349-2220 for further assistance. The SSID for wireless network is CCUnwired. If WEP is enabled, please disable.
  5. Access the Internet via an Internet browser (e.g., Google Chrome, Microsoft Internet Explorer, Mozilla Firefox, Mac Safari, etc.).
  6. You will be prompted to Authenticate by logging in with your Coastal Username and Password. Enter your Username and Password. If you have forgotten this information, click here. Then, select your authentication provider. If you do not know your authentication provider, click here.
  7. You need a SafeConnect Policy Key installed onto your computer/device to access the internet. You can get the SafeConnect Policy Key by following the instructions:.
  8. If you are running a Windows PC or Apple Mac:
    1. SafeConnect Policy Key Installation Instructions .
    2. If you pass validation, click the "OK" button. Otherwise, if you fail validation, click here.
[Top of Page]

How do I access the Internet from the Residence Halls?

  1. Connect to the Coastals' Network via CCUnwired (wireless) or CCUResnet (wired).
  2. Access the Internet via an Internet browser (e.g., Google Chrome, Microsoft Internet Explorer, Mozilla Firefox, Mac Safari, etc.).
  3. If you are running Linux, login to the ResNet via the web page prompt on the authentication age. Enter your username and password. If you have forgotten this information, click here. Then, select your authentication provider. If you do not know your authentication provider, click here.
  4. You will be prompted to Authenticate by logging in with your Coastal Username and Password. Enter your Username and Password. If you have forgotten this information, click here. Then, select your authentication provider. If you do not know your authentication provider, click here.
  5. You need a SafeConnect Policy Key installed onto your computer/device to access the internet. You can get the SafeConnect Policy Key by following the instructions:.
  6. If you are running a Windows PC or Apple Mac:
    1. SafeConnect Policy Key Installation Instructions .
    2. If you pass validation, click the "OK" button. Otherwise, if you fail validation, click here.
[Top of Page]

Do you recommend a specific hardware vendor?

The University is partnered with two major hardware vendors to provide students with extra savings on computer purchases. You can link to these savings by clicking here.

[Top of Page]

Should I purchase a desktop, notebook (laptop), netbook computer?

Deciding to purchase a desktop, notebook (laptop), or netbook can be a difficult process. Student Computing Services has created a website that highlights the advantages of all three choices. Follow this link.

[Top of Page]

Do you recommend the purchase of any peripherals or accessories in addition to a computer?

In addition to your computer and monitor, you should first consider purchasing a printer (ink jet or laser). This is a convenience, not a requirement because printing services are available at most SCS labs. One additional accessory one may consider is a USB drive. These drives allow one to transport large amounts of data from one computer to another. Similar to a portable hard drive in their functionality, USB drives have hundreds times to thousands times greater capacity. Further, USB drives are very reasonably priced. These economical devices can be found at most major retailers (who carry electronics) and through the two vendors listed here.

[Top of Page]

Can I use a dial-up service in my dorm room?

No, as the dorm rooms do not have a Telephone line.

[Top of Page]

Does Coastal Carolina offer dial-up Internet service for off-campus students?

No, the University does not offer a dial-up Internet service. However, Horry Telephone Cooperative (HTC) offers students discounted dial-up rates. For information, please visit your local HTC office. For office locations and other information, visit http://www.htcinc.net.

[Top of Page]

Does Coastal Carolina offer broadband (high-speed) Internet service for off-campus students?

No, the University does not offer a broadband Internet service. However, Horry Telephone Cooperative (HTC) features promotional broadband rates. For information, please visit your local HTC office. For office locations and other information, visit http://www.htcinc.net.

[Top of Page]

How do I connect to the Internet via a wired network connection?

  1. You must have a computer with an internal or external network interface card (NIC) and a Category 5 (or "Cat 5") patch cable. If a NIC is not already installed, please purchase one and follow your product's documentation for installation instructions, or read the installation instructions given here.
  2. If the NIC is installed, you must connect the NIC (on the computer) with network jack (in the wall) using the Category 5 patch cable.
  3. Now, you may access the Internet via an Internet browser (e.g., Microsoft Internet Explorer, Mozilla Firefox, Mac Safari, etc.).

[Top of Page]

How do I release my IP address?

In Microsoft Windows XP, click Start -> Run. Type ipconfig /release in the text box, then click OK.

In Microsoft Windows Vista and Windows 7, click Start, type cmd in the search box -> press enter. Type ipconfig /release in the text box, then exit the text box.

In Mac OS, enter the Terminal from the administrator account. Type ifconfig enX down (X is the Ethernet adapter with which you are interested, usually en0) in the command prompt, then press Return.

In Linux, enter the Terminal from the root account. Type ifconfig ethX down (X is the Ethernet adapter with which you are interested, usually eth0) in the command prompt, then press Enter.

[Top of Page]

How do I renew my IP address?

In Microsoft Windows XP, click Start -> Run. Type ipconfig /renew in the text box, then click OK.

In Microsoft Windows Vista and Windows 7, click Start, type cmd in the search box -> press enter. Type ipconfig /renew in the text box, then exit the text box.

In Mac OS, enter the Terminal from the administrator account. Type ifconfig enX up (X is the Ethernet adapter with which you are interested, usually en0) in the command prompt, then press Return.

In Linux, enter the Terminal from the root account. Type ifconfig ethX up (X is the Ethernet adapter with which you are interested, usually eth0) in the command prompt, then press Enter.

[Top of Page]

How do I update Microsoft Windows?

Regularly, you should audit your current version of Microsoft Windows for security updates and software improvements. In Microsoft Windows XP, Windows Vista, and Windows 7 you may access windows update by clicking on Start -> Programs/All Programs -> Windows Update.

Further, in Microsoft Windows XP, Windows Vista, and Windows 7, you are able to set your operating system to download updates automatically by clicking on Start -> Control Panel and choosing Automatic Updates. From this point, follow the directions given on the form.

ResNet students may be occasionally prompted to download Windows Updates to achieve SafeConnect validation. If this occurs, please follow the instructions above.

Please note that when finished updating your software, you should continue updating your software until no recommended updates appear. Repetition of this process is needed because some updates are prerequisites of other updates.

Follow this link for more information on how to update your computer.

[Top of Page]

How do I update Microsoft Office?

Regularly, you should update your current version of Microsoft Office for security updates and software improvements. These updates can be installed during regular System Updates(put link to system updates).

  • If you are updating your System for the first time after the installation of an Office Suite, you may want to download its' Service Pack from Microsoft.
    • PC Users:
      1. Using an Internet Browser, visit Office Updates.
      2. Look for Downloads and Updates then Service Packs
      3. Select your Office suite (e.g. Office 2010, Office 2007, etc...)
      4. Select Download
      5. You will be prompted to Run or Save the file
      6. Follow the directions given during installation
    • Mac Users:
      1. Using an Internet Browser, visit Office Updates for Macs.
      2. Look for Latest Software Updates
      3. Select your Office Suite (e.g. Office 2004, Office 2008, etc...)
      4. Available Updates, Select the latest release
      5. Download Details, Select Download Now
      6. You will be taken to the Download Center, Select Download
      7. The Update file will be download to your Download Destination Folder
      8. Locate the file then run it
      9. Follow the directions given during installation

Please note that when finished updating your software, you should continue updating your software until no recommended updates appear. Repetition of this process is needed because some updates are prerequisites of other updates.

[Top of Page]

How do I update Mac OS?

Regularly, you should audit your current version of Mac OS for security updates and software improvements. Using an Internet browser, visit http://support.apple.com. Locate your product and follow the directions given on the site. In Mac OS X 10.3 or later, you may click on Software Update from the Apple menu. Once the form appears, you may choose which updates to install (the checked updates are recommended selections). Once you have made your final selection, click Update.

Please note that when finished updating your software, you should continue updating your software until no recommended updates appear. Repetition of this process is needed because some updates are prerequisites of other updates.

[Top of Page]

How do I delete temporary internet files?

In Microsoft Internet Explorer, click on the Tools menu, then choose Internet Options. Once this window opens, click Delete. Select which files you want removed from your computer, click Delete.

In Mozilla Firefox, click on the Tools menu, then choose Options. Once this window opens, click on the Privacy options tab. Once this tab opens, click clear your recent history. When prompted, choose Clear Now.

In Mac Safari, click on the Safari menu, then choose Empty Cache. When prompted, click Empty.

There are cleanup utilities that you can use if your not comfortable changing your browser settings, CCleaner . Follow instructions during installation.

[Top of Page]

How do I disable System Restore in Microsoft Windows XP, Windows Vista and Windows 7?

In Microsoft Windows XP, click Start -> Control Panel. In the Control Panel window, click on System. Next, choose the System Restore tab. Check the Disable System Restore checkbox. When prompted, click Yes. Then, click OK.

In Microsoft Windows Vista and Windows 7, click Start -> Control Panel -> System and Maintenance -> System -> System Protection. Next, uncheck any checked boxes in this window. When prompted, click Yes or Turn Off System Restore. Then, click OK.

[Top of Page]

How do I disable startup programs in Microsoft Windows XP, Windows Vista, or Windows 7?

If you are operating Microsoft Windows 2000, please consult Microsoft Knowledge Base article 244905 at http://support.microsoft.com/default.aspx?scid=kb;en-us;244905.

In Microsoft Windows XP, click Start -> Run. Type msconfig in the text box and then click OK. Once the System Configuration Utility window opens, click the Services tab. Check the Hide All Microsoft Services checkbox. Uncheck the services you do not which to run. When finished, click the Startup tab, then uncheck the programs you do not wish to load at startup. Please only uncheck services and/or programs you know are not required for your operating system.

In Microsoft Windows Vista / 7, click Start then type msconfig in the text box and then click on it once it appears. Once the System Configuration Utility window opens, click the Startup tab. Uncheck the programs you do not wish to load at startup. Please only uncheck programs you know are not required for your operating system.

[Top of Page]

What is a virus?

A virus is a type of program that can replicate itself by making (possibly modified) copies of itself. The main criterion for classifying a piece of executable code as a virus is that it spreads itself by means of 'host file(s)'. A virus can only spread from one computer to another when its host file(s) is taken to an uninfected computer, for instance by a user sending it over a network or carrying it on a removable disk. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with worms. A worm, however, can spread itself to other computers without needing to be transferred as part of a host file(s). Many personal computers are now connected to the Internet and to local-area networks, facilitating their spread. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms.

Viruses can infect different types of host file(s). The most common targets are executable files that contain application software or parts of the operating system. Viruses have also infected the executable boot sectors of floppy disks, script files of application programs, and documents that can contain macro scripts. Additionally, viruses can infect files in other ways than simply inserting a copy of their code into the code of the host program. For example, a virus can overwrite its host file(s) with the virus code, or it can use a trick to ensure that the virus program is executed when the user wants to execute the (unmodified) host program. Viruses have existed for many different operating systems, including MS-DOS, AmigaOS, and Mac OS; today, the majority of viruses run on Microsoft Windows.

A legitimate application program that can copy itself as a side-effect of its normal function (e.g. backup software) is not considered a virus. Some programs that were apparently intended as viruses cannot reliably self-replicate, because the infection routine contain bugs. For example, a buggy virus can insert copies of itself into host programs, but these copies never get executed and are thus unable to spread the virus. Self-replicating programs that have very limited spreading capabilities because of bugs should not be considered legitimate viruses.

Definition cited from Wikipedia.

[Top of Page]

What is spyware?

Strictly defined, spyware consists of computer software that gathers and reports information about a computer user without the user's knowledge or consent. More broadly, the term spyware can refer to a wide range of related malware products which fall outside the strict definition of spyware. These products perform many different functions, including the delivery of unrequested advertising (pop-up ads in particular), harvesting private information, re-routing page requests to fraudulently claim commercial site referral fees, and installing stealth phone dialers.

Spyware as a category overlaps with adware. The more unethical forms of adware tend to coalesce with spyware. Malware uses spyware for explicitly illegal purposes. Exceptionally, many web browser toolbars may count as spyware. On the other hand, adware may simply load ads from a server and display them while a user runs a program, with the user's permission; the software developer gets ad revenue, and the user gets to use the program free of charge. In these cases, adware may function ethically. If the software collects personal information without the user's permission (a list of websites visited, for example, or a log of keystrokes), it may become spyware.

Data collecting programs installed with the user's knowledge do not, technically speaking, constitute spyware, provided the user fully understands what data they collect and with whom they share it. However, a growing number of legitimate software titles install secondary programs to collect data or distribute advertisement content without properly informing the user about the real nature of those programs. These barnacles can drastically impair system performance, and frequently abuse network resources. In addition to slowing down throughput, they often have design features which make them difficult or impossible to remove from the system.

The first recorded use of the term spyware occurred on October 16, 1995, in a Usenet post that poked fun at Microsoft's business model. Spyware later came to refer to espionage equipment such as tiny cameras. However, in 1999 Zone Labs used the term when they made a press release for the Zone Alarm Personal Firewall. Since then, computer users have used the term in its current sense. 1999 also saw the introduction of the first popular freeware program to include built-in spyware: a humorous and popular game called "Elf Bowling" spread across the Internet in November of 1999, and many users learned with surprise that the program actually transmitted user information back to the game's creator, Nsoft. For many Internet users, "Elf Bowling" provided their first experience with spyware.

In 2000, Steve Gibson of Gibson Research released the first ever anti-spyware program, OptOut, in response to the growth of spyware, and many more software antidotes have appeared since then. More recently Microsoft (http://www.microsoft.com) has released an anti-spyware program and the International Charter now offers software developers a Spyware-Free Certification (http://www.icharter.org/certification/software/spyware_free/index.html) programme.

According to a study (http://www.net-security.org/press.php?id=1973) by the National Cyber-Security Alliance, spyware has affected 90% of home PCs.

Definition cited from Wikipedia.

[Top of Page]

Which anti-virus application do you recommend?

Coastal Carolina University recommends the use of Symantec Endpoint Protection. The University offers Symantec Endpoint Protection free to all currently enrolled students.

Follow this link to download and install Symantec Endpoint Protection for free.

[Top of Page]

Which spyware removal application do you recommend?

The Tech Support Center uses Malwarebytes for spyware and adware removal. This free application can be downloaded from the malwarebytes website. Follow the link below.

Malwareytes

[Top of Page]

How do I check my e-mail over the Internet?

Open your preferred internet browser and type www.coastal.edu/its/ccuapps to go to Coastal Carolina University Email Login Page CCUApps. Here, you will need to login using your username and password. If you have forgotten this information, click here.

[Top of Page]

How do I check my e-mail using a mail application, i.e., Microsoft Outlook?

Using your preferred mail application, create a new Internet Message Access Protocol (IMAP) account. Set your incoming server (IMAP) as mail.coastal.edu; and set your outgoing server (SMTP) as smtp.coastal.edu. Configure your username and password as your username and PIN, respectively. You need to use the same authentication for both your incoming (IMAP) and your outgoing (SMTP) servers.

For step by step instructions on configuring Outlook 2007 or Outlook 2010, follow the links below.

Outlook 2007       Outlook 2010

[Top of Page]

How do I set up email on my phone?

For step by step instructions on configuring webmail on your phone, follow the links below.

iPhone       Android       Blackberry       Windows 7 Phone      

[Top of Page]

Can I forward my e-mail to another e-mail address?

For step by step instructions on forwarding your CCUApps E-mail, Click here.

[Top of Page]

Why should I check my e-mail?

E-mail is the only method by which university announcements and messages are electronically transmitted. Information regarding registration, financial aid, grades, etc. is only sent via your CCUApps. This service is available 24/7 from any Internet connection.

[Top of Page]

What is myCoastal?

MyCoastal is a site devoted to providing students, faculty, and staff with administrative and informational tools on the Internet. MyCoastal for students features news and weather, WebAdvisor, Webmail, Blackboard, and other features. Please visit myCoastal by linking to http://my.coastal.edu.

[Top of Page]

How do I change my password?

If you are having problems logging in to services on the CCU website, you can reset your password. To reset your password go to the password search webpage. This page allows you to search for and reset your password.

Whenever you reset your password, it is propagated to all CCU logins. For formal instructions please go to the Login Help page of SCS.

[Top of Page]

What is a productivity suite?

A productivity suite is commonly a group of programs used for word-processing, data-processing, presentation development, and personal organization/communication. Some suites also offer features which allow for desktop publishing and database management.

[Top of Page]

Which productivity suite do you recommend?

Coastal Carolina University recommends the Microsoft Office suite. The latest suite is available for purchase at a discounted rate for current students, click here.

[Top of Page]

What is an operating system?

In computing, an operating system (OS) is the system software responsible for the direct control and management of hardware and basic system operations. Additionally, it provides a foundation upon which to run application software such as word processing programs and web browsers.

Definition cited from Wikipedia.

[Top of Page]

Which operating system do you recommend?

Coastal Carolina University recommends the use of Microsoft Windows 7 Home Premium. However Windows XP Home/Pro, Windows Vista Home Premium, and Windows Vista Ultimate will work as well. Windows 7 and Vista do have some problems with legacy devices, such as very old printers, but Windows 7 is still recommended for new computers. If you decided to get a system with a different OS the Tech Support Center will still try and help you as much as they can.

[Top of Page]

How do I check the version of Microsoft Windows my computer is running?

In Microsoft Windows, click Start -> Control Panel. In the Control Panel window click System. Under the General tab, you will find your current version listed under the "System" details.

[Top of Page]





Link to CCU Home Page
University Policies | Site Policies | Contact Us
© 2014 Coastal Carolina University | P.O. Box 261954, Conway, SC 29528-6054 | +1 843-347-3161