Information, Technology & Consulting

Knowledge Base Search

KB - Search Helper Text

Use the search box to look for specific articles, or use the topic filters to display results that are relevant to a particular subject. Use the "clear filters" button to reset all search terms and filters.

Use the search box to query for articles in the Knowledge Base, or use the categories on the left to narrow down what results you are interested in.

The search found 298 results in 0.022 seconds.

Search results

    CrashPlan Service Description



    CrashPlan is an automated, continuous, cloud-based back up and data recovery service for desktop and laptop devices. CrashPlan runs automatically and silently in the background, continuously protecting the data created and stored on desktops and laptops. CrashPlan is developed and hosted by Code42.

    Acrobat Reader for Windows


    Adobe Acrobat Reader is a freeware program that allows you to open files that were saved in a PDF format. PDF is a file format used for making documents available while retaining their formatting. You can download Adobe Acrobat Reader from Adobe's website. Please pay close attention to each page on the Adobe website to be sure you are not downloading optional software that you don't want or need.

    VPN Client for Linux


    Dartmouth uses Big-IP Edge Client for VPN access. On a Windows or Mac OS X computer, that requires software be installed on the computer before the VPN connection is tried.

    On a Linux computer, VPN access is provided via a Big-IP Edge web-based plugin. Open a browser and enter in the URL field.

    Remove previous Linux VPN clients such as Juniper Network and Network Connect clients.

    VPN Client for Windows


    Dartmouth uses Big-IP Edge Client (also known as F5 Access) for VPN access that requires software be installed on the computer before the VPN connection is tried.

    Before you begin

    Security Awareness


    Staying Safe After the Anthem Breach

    In light of the Anthem Health Insurance security breach that affected 80 million accounts, the ITS Security Team has offered cyber security seminars for Dartmouth faculty, students, and staff. View the presentation attached.

    Security Scandal Cartoons

    ITS implemented a security awareness program around Sam N. Security, a hypothetical Dartmouth student who engages in unsafe computing practices.

    View the cartoons attached:

    Mac OS X Computer Name and IP Address


    To locate the name of your Mac OS X computer or it's current IP address:

    Incoming Students Computer Recommendations


    Dartmouth offers a number of laptop computer packages to incoming students — both Windows and Macintosh. To keep up to date on the most current information about packages we recommend, we suggest you monitor The Computer Store's Class of 2021 website. Updated information will be posted there as it becomes available over the summer.

    Before Reinstalling Mac OSX


    Important: You need to be connected to the Internet and to a power source to reinstall OS X.

    You cannot reinstall an earlier version of Mac OS X over a later version unless you perform an archive install or reformat the computer.

    Read the "Before You Install" or "Read Me" document associated with your operating system if one is available for the software you are installing. This may list the system requirements and any known problems.

    Stuffit Expander for Macintosh


    A freeware utility that allows you to expand compressed files.

    Information Security Representatives


    With Dartmouth's approach to information security, each department appoints key colleagues to enhance information security practices within their areas. Information Security Representative (ISR) duties consume a minimum amount of time per month, and each ISR receives training from Dartmouth's Chief Information Security Officer.

    Dartmouth has adopted a comprehensive security policy for information security representatives, which outlines the processing, sharing, and storage of information. It is attached to this article.


Information, Technology & Consulting