Frequently Asked Questions

Email 

 

1. To activate the Junk Senders List 
 
a. Click on the Organize Button on the toolbar 
b. Click on the fourth option on the left top: Junk Email 
c. Select the parts in bold from the list: "Automatically move Junk Messages to Deleted Items" and then click "Turn On" 
d. Close the Organize Tool 
 
2. To use the Junk Senders List 
 
a. When you receive a Junk Email, click once on that email to highlight it 
b. Go to Actions > Junk Email > Add to Junk Senders List 
 
3. To delete or edit anyone currently on the Junk Senders List 
 
a. Go to Tools > Rules Wizard 
b. Click on the Rule named "Junk Email Rule (Client Only)" (if it doesn't exist, go to step #2) 
c. At the bottom of the window, click on Junk Senders or Junk Senders, and hit the Delete or Edit buttons accordingly. Click OK and then OK to save the changes to the server. 
 

 Viruses 

 
1. How to spot a virus and avoid infection 
 
a) Most viruses are spread through email attachments. Common misconception: "The only way you can get infected is if you open the attachment." There are a few rare viri that have been able to launch simply by previewing the message in Outlook or Outlook Express. For those of you who have the preview pane on in either of these programs, I have purposely been turning them off. If you are still using it, go to the View menu and select "Preview Pane" to turn it back off again, please. 
 
b) If you receive an attachment from someone, even if you know that person, but are not expecting the attachment, CALL OR SEND A SEPARATE EMAIL TO THEM to make sure they intended to send it to you. Common misconception: "since it's from my brother, I know it must be safe to open." 
 
The email viri are programmed to automatically send themselves to everyone in your address book - that will usually include your co-workers, family, friends, etc. You won't even know it sent itself out, but you can imagine as the recipient it seems it's from someone familiar so most people just open them. The best way you can protect others from wondering if your attachment is infected, is to copy the contents of the attachment and paste it directly into your email. NEVER, NEVER OPEN AN ATTACHMENT THAT ENDS WITH ".EXE" or ".VBS". 
 
- Today we learned of a new virus which capitalizes on the World Trade Center attack. It looks like this; Subject: Fwd:Peace BeTweeN AmeriCa And IsLaM !
Body: Hi iS iT A waR Against AmeriCa Or IsLaM !? Let's Vote To Live in
Peace!
Attachment: WTC.EXE 
 
c) Fun or socially oriented attachments really don't need to be forwarded from your work email accounts. The IS Department understands that there are sometimes funny jokes, pictures, and/or politically oriented items that seem fun to read and distribute to other members of the HUC-JIR community. However, if you perceive your HUC email account as a work-oriented account and not only discourage people from forwarding this type of email to you, but stop forwarding this type of email to other HUC accounts, you will dramatically cut down the chances of infecting your workstation. Most organizations have very strict policies regarding this and we are hoping not to have to enforce it at HUC. 
 
HUC's policy on acceptable email can be found on page 31 and 32 of your employee handbook. The following is an excerpt.
"The Email, phone mail, and Internet browsing systems of HUC-JIR are part of the business equipment and technology platform and should be used for College-Institute purposes. Excessive personal use of any of these systems is prohibited." 
 
d) Recent virus attacks have also resulted from using Internet Explorer and visiting less-known websites that were transparently infected. The website could prompt the user to install a file to enable the user to view the website better; if the user agreed the virus was automatically installed on the user's computer (In some cases it automatically loaded the file and ran the program - without you knowing). HUC-JIR policy states that users should never install something on a workstation unless the user receives the approval and/or assistance of the Helpdesk. 
 
e) Your workstation is scanned daily for viruses. Common misconception: "Since the scan caught a virus and shows me that it was quarantined, I don't have to notify the Helpdesk." 
- If a virus made it onto your workstation it was most likely delivered to you via the HUC email server. This means it made it past our firewall and other users will be receiving the same virus, and will need to be warned.
- the scan may not have caught in before it was spread it to other users from your workstation. ALWAYS Notify the Helpdesk when a virus is detected - do not wait, please call and let the Helpdesk determine the virus and the threat level. 
 
f) Your home workstation should be configured to check for new virus definitions at least once per week and should scan for viruses daily. If you do not know how to do this, call me your Helpdesk person to see if they can walk you through it on the phone, or bring your user manual in to the Helpdesk person and they will review it with you. 
 
2. What to do if you become infected: 
 
a) At HUC, call the Helpdesk to review your workstation immediately. If the Helpdesk person is not available, leave a message and then discontinue using your workstation (but do not turn it off) until the Helpdesk can look at it. 
 
b) If you are at home, go on the internet to www.symantec.com and click on the link "Symantec security response." Here you can view the recent virus names, information on the damage it can cause, and if available, download for free a tool to repair the damage that was done to your workstation. 
 
The Symantec website also has a section dedicated to hoax virus names. If you receive an email from someone that warns of an email virus that is being spread, please take the time to check the Symantec website to see if the virus is a hoax or real before you forward the virus warning email to other people. 
 
Please let me know if you have any questions. Feel free to copy this information and paste it into an email to send to your family members and associates to help educate others on computer virus infection. 
 

 Search Tips 

 
Without getting technical and explaining how Boolean Logic works, here are some simple tips to help you find what you're looking for. 
 
  • Most search engines are not case sensitive. Thus, searching for "Beverly Hills" would be the same as "Beverly hills". 
  • The plural of a word by adding an "s" is generally ignored. The search for Oak Tree should give the same result as Oak Trees. 
  • Most searches ignore common words such as "how" "the" and many single digit numbers. If the word is essential to the search, add a plus sign (+) before the word. For example, Godfather Part +2. 
  • If you want to do an exact search on your words or phrase, put the whole thing in quotes. 
  • To omit a word from being searched on (for?), use a minus sign (-). This is especially useful when refining your search. 
  • You can also use an either or search by using the "OR" Boolean operator. For example, you can search for a computer training school in Arizona OR California OR Nevada.

Accessing The JSP

The JSP provides access to electronic resources in Bible, Rabbinic Literature, History, Hebrew and other related disciplines.
The Jewish Studies Portal website is accessible through the:
 
 
  • Click on it to set it up. Add the server address: jsp.huc.edu (This is done only once).
  • Add the domain: huc.int\youraccountname
  • Password is your HUC password.
  • Add the icons to the Citrix desktop. Click on the plus sign on the left middle of the screen.
  • Select All Applications. Click on the applications and a green check will appear and they will also drop on the Citrix desktop. The Library continues to update and add software to the JSP so periodically check the All Applications tab for new software.
  • Click on the screen behind the apps and this will be your working desktop.
  • We recommend using the Citrix Client for the JSP. For continued usage use the app in the tray on your desktop and login with: huc.int\youraccountname