All posts by Megan Clark

Browser Troubleshooting

Need assistance with your web browser (Chrome, Firefox, Safari, etc.)? Every browser is a little different, but each provide information on how to perform basic troubleshooting tasks, like clearing your cache and history. For more information, you can visit the support pages for your browser of choice:

Managing Access with Group Manager

Group Manager, available for download via Software Center on your College computer, is a tool used by some departments on campus to grant or remove access to network resources (like S: drive folders and printing). For instructions on how to use Group Manager, please see the document below. If you have questions about Group Manager or your department’s group usage, please contact the Help Desk via, 610-526-7440,, or visit us on the 1st floor of Canaday Library.

Granting/Removing Access via Group Manager
Title: Granting/Removing Access via Group Manager (0 click)
Filename: groupmanager_0319.pdf
Size: 217 KB

Email Spam & Phishing

Spam email is unsolicited email sent to your email address. Here are some tips and tricks on how to avoid spam, as well as how to block it, and what to do if important emails are being marked as spam.

What is spam?

Spam is unsolicited email. Much like junk mail from the post office, these messages can simply be deleted or ignored. We have configured Office 365’s Online Protection features to identify and prevent spam messages, though no anti-spam solution is perfect.  You can also use Office 365 features to minimize the unwanted messages in your mail, see below.

What are the different types of spam message?

Some spam messages want you to purchase things or support a cause. These are mostly harmless, and can be blocked and deleted.

More dangerous variants may also contain a file attachment, usually containing malicious software (malware, viruses) to infect your machine. A virus can steal information without your knowledge, as well as use your machine in future attacks on other machines. A phishing email (see below) is one that attempts to “fish out” information, including usernames and passwords, Social Security numbers, bank account information, etc. Once the phisher has this information, they use the compromised account to, in turn, send out thousands of similar messages to other unsuspecting recipients.

How do I block spam?

We have instructions for using Office 365’s spam filtering located here.

Some messages are still getting through. What should I do?

Do not respond to the emails. Continue to mark items as Junk or Clutter.  Report particularly sophisticated messages to the Help Desk.  If you are unsure whether or not a message is spam, please call the Help Desk (x7440) or forward the message with an inquiry to Finally, be aware of which sites are asking for your college email address. Check if their privacy policies will protect your information or if they send that information to third parties.


Internet or email phishing is a common online threat. To help protect yourself, it’s important to be aware of common phishing scams to prevent becoming a victim.

What is email phishing?

Email phishing consists of emails sent with the purpose of gaining personal information from the email recipient, such as passwords or Social Security numbers. These messages are disguised as being from known companies or users, but are not from a legitimate source.

What are some common phishing attempts?

Phishers will often send messages to users saying their email account will expire or be closed unless the user replies with their username and password. The phisher then uses the account information contained within it. Please remember that Bryn Mawr College will never ask for your password under any circumstance, nor should there be any reason to share it. If you suspect someone may have access to your password or account, change your password immediately.

How can I recognize a legitimate email?

Bryn Mawr College will never ask you to give or send us your password, especially via email. Other major account providers (Yahoo!, Gmail, MSN, Comcast, etc.) follow the same practices. Messages from Bryn Mawr Library & Information Technology Services, especially regarding computing issues, will always be signed with one or more person’s name and title. If you receive a message where the name is not familiar, or the message does not conform to this standard, feel free to verify with the Help Desk or check the LITS Blog for verification. Please remember as well that many businesses or groups (especially govenrment entities such as the IRS) do not communicate via email.  Others, like UPS or FedEX, will not send you a generic message with too little specific information, and do not use attachments.

I may have given my information to a phisher. What should I do?

Immediately change your password and call the Help Desk or make an appointment as soon as possible. The Help Desk can then walk you through getting your account preferences set back to their original state.

If you have any questions or concerns, please contact the Help Desk at x7440 or

Please visit for additional information and tips and advice for good online safety habits.

Campus Visitors

If you are bringing a visitor to campus, whether they are a guest speaker, alumni, or a friend from home, Bryn Mawr’s LITS offers multiple types of access for guests while they are on campus.

Please note that individuals visiting as part of a conference, camp, or event booked with our Conferences office should obtain all login information from that office.

Computer Access

Visitors are welcome to use any public computer on campus.

  • For quick web access, there are web-only kiosks in each library and the Campus Center.
  • Visitors can stop at the Help Desk on the 1st floor of Canaday Library to receive a temporary username and password (Guest Account) for use on campus. These credentials can be used to access a lab computer in any library, or a classroom presenter computer. Please visit for the Help Desk’s open hours.
  • Offices that regularly host visitors to campus may request batches of visitor accounts from the Help Desk in advance; please allow a minimum of 3 business days.

Wireless Access

Visitors from participating eduroam institutions (available on eduroam’s web site) can connect to eduroam using their home institution email address and password.

For other guests, the Help Desk can provide Guest Accounts to connect to eduroam. If your guest is staying in Wyndham, they can use Wyndham’s wireless network by getting connection information from the front desk.

Offices that regularly host visitors to campus may request batches of visitor accounts from the Help Desk in advance; please allow a minimum of 3 business days.

Printing and Copying

Using a Guest Account from the Help Desk will allow visitors to print from public lab computers. Because guests do not have OneCards, they will need to type in the username and password on the Canon printers to release their print jobs. These accounts also allow them to make copies and scan to USB storage. Visitor accounts have a limitation of 100 prints/copies; at this time we have no mechanism for expanding this limit, and we will not issue additional accounts in order to allow additional printing.  There are also coin-operated copiers in Canaday Library.

If you have any questions, please visit the Help Desk on the 1st floor of Canaday Library, or contact 610-526-7440 |

Uninstalling Programs on Windows

To uninstall a program on a Windows computer, use the Programs and Features menu. If you’re unfamiliar with uninstalling programs, see the instructions below!

  1. Open the Control Panel (via the Start menu or by searching). If your Control Panel displays in Category mode, click Uninstall a program in the bottom left under the Programs category. If your Control Panel displays Icons, click Programs and Features, listed alphabetically among the other icons.
  2. This will bring you to a window with a list of all installed programs. In this list, locate the program you would like to uninstall. The programs are sorted by Name as default; you can also click on the Installed On column header to short by installation date.
  3. Once you have selected the program to uninstall, click the Uninstall option directly above the top of the list.


Naming Conventions & Best Practices

Files named on Mac or Windows computers usually work fine on the other platform, but there are a few characters sometimes used in file names that are exceptions. The table below explains which characters might cause problems, why they do, and potential substitutes for those characters that will work on both Mac and Windows.

Filename Lengths: It is possible, with most files, to create names with multiple hundreds of characters; however, not all programs or operating systems are able to process such long filenames. Additionally, some non-English characters, when moved into different file systems, can take up the equivalent of up to 9 English characters, so limiting filenames to a manageable length can prevent these potential issues.


Avoid Examples Reason Recommendations
File separators :   /   \ Colons and slashes are used as directory separators

(consider your H: or S: drive), which can cause problems when they are used in contexts like file names.

Underscores or dashes

( ___   — ) can provide the same effect without these potential issues.

Symbols $      Not all operating system file systems allow these       characters, so using them in one place may not work in another. They can also cause problems with certain file types that use them frequently (like XML). Omitting or using substitutes for these characters.
Punctuation marks . , ! “ ’ ? In programming languages, many of these characters have particular functions, which can potentially cause problems when used in file names. Omitting these characters or substituting underscores or dashes ( ___   — )
Parenthesis/brackets ( ) [ ] { } As with punctuation marks, many of these characters have particular functions in certain programming         languages, which can potentially cause problems when used in file names. Omitting or using substitutes for these characters.
Operators < > * | Punctuation marks, parenthesis/brackets, and operators all fall into the same category—many of these characters have particular functions in certain programming languages, which can cause problems if used in file names. Omitting or using substitutes for these characters.
White space Most files on Windows and Mac will allow the use of white space (e.g. spaces between words) in file names, though certain applications may have trouble processing files with white space in the name. Underscores or dashes

( ___   — ) can provide the same effect without these potential issues.

Changing Your Email Display Name

In Zimbra, it was possible to change the name that displayed next to your email address; if you changed your Preferred Name in BiONiC, you would have needed to change your email display name separately.

Office 365 will automatically use your Preferred Name from BiONiC, so you no longer need to set a separate display name for email. To change your Preferred Name in College systems like BiONiC and Moodle, please see the instructions provided by the Registrar’s Office (for students) or Human Resources (for faculty and staff).

Using Windows Live Gallery

Windows Live Gallery is a light photo editor available for download on College Windows computers via Microsoft Software Center. For more information on using and downloading programs via the Microsoft Software Center, please see our post here:

Basic help for using the Gallery is available by clicking the blue “?” in the upper right corner of the Gallery window. This will bring you to Microsoft support information, including how to edit and share photos. If you would like further assistance or in-depth tutorials, please visit LinkedIn Learning for more information.

Adobe Help and Resources

Bryn Mawr College computers have access to various Adobe software packages, including Illustrator, Photoshop and Presenter. Assistance for these products and many others is available at LinkedIn Learning.

Still have questions? Check out Adobe’s Help and Resources for each of these products:

If you don’t see the program you’re using in the above list, you can check out Adobe’s general Product Support.

Changing the Default PDF Reader in Firefox

In recent updates to the Firefox browser, Mozilla has released a built-in PDF viewer which is automatically installed in Firefox. The viewer generally works the same as Adobe Reader, but has caused some changes. Some PDF documents which formerly printed in a landscape format now automatically print in portrait format, and URLs are automatically printed on the PDF document. Firefox offers instructions on how to change .pdfs to open in Adobe Reader or a different browser plugin on their support web site.