Tech Documentation

Tech tips and resources at your fingertips day and night

Back Up a Moodle Site (with User Data)

Including enrolled user data greatly increases the size of a backup and may produce a file that must be securely stored. You only need to include enrolled user data if: You are migrating a Moodle Organization site from Moodle Archive to the current Moodle site and you need to keep user submissions, posts, comments, etc. You […]

Read more»


Password Expiry Email

Welcome to a special edition of SCAMALOT! In this post, we change course from our usual mission of providing tips and tricks for recognizing phishing attacks to learn how to assess automated emails you’ll encounter in your inbox. At times, you will receive automated messages from Bryn Mawr College or Bi-College software, like the password […]

Read more»

Adding Links to Specific Tegrity Videos in Moodle

Screen shot of Tegrity Campus block

Clicking on the Tegrity Campus link in a the McGraw-Hill AAIRS block within a Moodle course, takes you to a Tegrity page listing all of the recordings associated with that course, as show below.   But what if you want to direct viewers to a specific recording in that list? Every recording in Tegrity has a […]

Read more»


In this edition of SCAMALOT, we’ll take a closer look at an email that raises a number of common phishing flags. Scam emails aren’t always as easy to identify as you might think; it may have been a while since you’ve been asked to wire money to a foreign prince! The most dubious attacks have […]

Read more»

Recommended Chrome Settings

If you’re using your College computer  and you are new to Chrome (you haven’t set up bookmarks or customizations), go to Software Center and double-click on the chrome installer.  This install is pre-configured with all the LITS-recommended options. These settings are as per Chrome version 57.  Chrome updates often and settings may change.  Feel free […]

Read more»


Welcome back to SCAMALOT! In this spring 2017 edition, we continue to closely examine aspects of scam emails to help you identify similar attacks in the future. There is usually more than one way to determine if a message is legitimate or not, and by taking the time to look for phishy evidence in your […]

Read more»

Collecting and Sharing Audiovisual Assignments

Faculty planning to assign projects that require students to produce audiovisual recordings may be wondering about how to collect this work. Examples of recording assignments might include longform edited audio pieces, weekly recorded oral practice in language courses, or recordings of group presentations. This Tech Doc is a comparison of several tools that might be used […]

Read more»

Managing Access with Group Manager

Group Manager is a tool used by some departments on campus to grant or remove access to network resources (like S: drive folders and printing). For instructions on how to use Group Manager, please see the document below. If you have questions about Group Manager or your department’s group usage, please contact the Help Desk […]

Read more»

Guide to Cleaning-Up the S: Drive (Network Storage Directory)

Cleaning up your S: Drive (known as Network Storage Directory on Macs)? Please review the following guide in full before beginning.

Read more»

Guide to Cleaning Up Moodle

Cleaning up your Moodle courses? Please review the following guide in full before beginning.

Read more»
« Newer Posts | Older Posts »