Friday, March 26, 2010

Libraries Closed for Easter Recess

Office of the CIO

March 26, 2010




Greeting University Community and Happy Easter,

Please be informed that both Libraries of the University of the Virgin Islands will observe Easter Recess beginning Friday, April 2, 2010 to Sunday, April 4, 2010. We will reopen on Monday, April 5, 2010 at 8:00 a.m.

In an effort to maintain technology services for students during the Holiday, both campuses will observe the following schedule for student lab access.

Lab Access:

On St. Croix campus students will be able to utilize the NWW 120 Lab. Students may request access through the Security Department. Students must present their UVI ID and sign in order to gain access.

On St. Thomas campus the 24/7 library lab is available for students use during the holiday. Students can access the lab by using their ID key cards.

St. Thomas: 24/7
St. Croix: NWW 120 Lab

Students may also access online library resources at any time by going to http://library.uvi.edu.

The Help Desk voice mail at ext.1466 and email will be monitored during the holiday. If a technology emergency occurs please leave us a message and an ITS technician will follow up. If you have any questions, please contact us at the Help Desk.

Have a Happy Easter Holiday.


“Service is key”



Cherie Wheatley
Office of the CIO
Manager,Technology Customer Service

Tuesday, March 23, 2010

Virus Alert

Office of the CIO

March 22, 2010

TECHNOLOGY UPDATE:


Greetings UVI Community,

This Technology Update is being sent to alert all users that the Palevo virus has been detected on several workstations on the St. Thomas campus. In an effort to contain the virus as much as possible, we have initiated from the F-Secure manager, a global scan of all workstations currently on the UVI network. The auto scan is transparent to the user; however the user may notice that their system may respond a little slower than normally while the scan is taking place.

Beginning at 4:00 PM today Enterprise Network Services will commence a global network scan of all workstations and appliances connected on the UVI network.

Additional information about this virus is below:

Name : Worm:W32/Auto run
Detection Names : Win32.Worm.Autorun
Worm.P2P.Palevo
Virus:W32/Auto run
Category: Malware
Type: Worm
Platform: W32

Summary
A program that secretly and maliciously integrates itself into program or data files and spreads by integrating itself into more files each time the host program is run.
Additional Details
Auto Run worms spread by copying themselves into the root directories of hard drives and other writable media such as USB memory sticks.
These worms create an autorun.inf file in the root directories of drives they want to infect.

Propagation
The autorun.inf includes the name and path of the actual worm executable.
When an infected media device (such as a CD, DVD or USB drive) is inserted into the computer, the autorun.inf and consequently the actual malicious program is automatically executed.
In addition to drives on the local computer, an Auto run worm can also spread to remote computers by infecting shared network drives.
Payload
Members of the Auto Run family also often contain other functionality in addition to just spreading.
This infection method is often used to propagate malicious payloads, such as a backdoor, password stealer, or some other kind of Trojan.

If you have any additional questions or concerns please contact our helpdesk at helpdesk@uvi.edu or call us 1466.


Cherie Wheatley
Office of the CIO
Manager,Technology Customer Service