The process by which applicants or new employees activate their CGU UserName.
A system that is synchronized with User Names and User Passwords automatically for use with applications such as Exchange.
A program that accesses and displays files and other data available on the Internet and other networks, e.g. Internet Explorer, Firefox, Netscape, and MSN.
A type of memory reserved for holding recently accessed data, designed to speed up subsequent access to the same data.
CENIC is the Corporation for Education Network Initiatives in California. It will represent the common interests of California's higher education academic and research communities in achieving robust, high capacity, next generation Internet communications services. CENIC's membership is drawn from California higher education institutions and information technology industries. It is highly accountable to the institutions it serves in order to fulfill the trust that will be placed with it.
Common Management System also called Learning Management System.
A small amount of information that a website copies to the hard drive, which helps that website identify you the next time you visit.
See Domain Name System.
A computer domain is a group of networked computers that share a common communications address.
Domain Name System
Domain Name System (DNS) is a distributed Internet directory service. DNS is used mostly to translate between domain names and IP addresses, and to control Internet email delivery. Most Internet services rely on DNS to work, and if DNS fails, web sites cannot be located and email delivery stalls.
Forging an email header to make it appear as if it came from somewhere or someone other than the actual source.
Frequently Asked Questions
Computer and the associated physical equipment directly involved in the performance of data-processing or communications functions.
LDAP, or "Lightweight Directory Access Protocol", is a standard that defines a network protocol for accessing information in the directory, an information model defining the form and character of the information, a namespace defining how information is referenced and organized, and an emerging distributed operation model defining how data may be distributed and referenced.
The user name and password used to access a computer system.
The password used to log in to the Virtual Private Network (VPN) and the CGU wireless network.
One of several network connecting points inside a networking router or switch that connects to the campus Wide Area Network.
Open Labs (General Computing Labs)
Refers to several open access general computing labs that are available for use by current Students, Faculty, and Staff.
The database software used to support CGU's student information system and most other campus database systems.
Outlook Web Access
The web-based interface to the Claremont Graduate Unversity Exchange Server (also called OWA).
A string of characters, kept as a secret by a computer user, that allows access to a computer system.
The company that produced the Common Management System (CMS), used by the Claremont Graduate University for student administration, human resources, and finance.
The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
Personal Identification Number. PINs were formerly used for access to several central computer resources, but they are now used only by the Library.
The practice of obtaining confidential information by manipulation of legitimate users. The act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information.
The programs, routines, and symbolic languages that control the functioning of the hardware and direct its operation.
Unsolicited email, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups; junk email.
Any software that covertly gathers user information through the user's Internet connection without his or her knowledge. The
information collected is usually for marketing research purposes.
Trojan horses are malicious programs disguised as something benign. They have been known to pose as games, utilities, and email attachments. Once opened, Trojan horses act much differently than expected. Some merely annoy users by sending emails to everyone in your address book. Others do serious damage, to the point of stealing passwords and data files. Unlike viruses, Trojan horses are not self-replicating. Active Trojan horses are an advanced type of Trojan horse. They use unprotected ports to open lines of communication with your computer and can ultimately give hackers control over your machine. Active Trojan horses are also called Remote Access Trojans. (Symantec Reference)
The identifier used to authenticate to a computer system, ordinarily used along with a password.
A method for transferring video such that it can be processed as a firm and continuous stream. With streaming, the client can start presenting the data before the whole file has been transmitted.
Virtual Private Network (VPN)
A system of two or more private networks connected over a public telecommunications infrastructure such as the Internet. The Claremont Graduate University VPN service provides an off-campus individual secured access to resources typically reserved for on-campus use only.
Viruses are self-executing, self-replicating programs. They alter the way a computer operates without the knowledge or permission of the user. When activated, viruses may damage files, cause erratic system behavior, or display annoying messages. The ability to self-replicate differentiates viruses from Trojan horses, worms, and other virus-like programs. Much like a biological virus passes from person to person, computer viruses pass from computer to computer. (Symantec Reference)
A wireless connection is a network connection that requires a special network card for the computer and special wireless access points.
A worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks. (Symantec Reference)
Connect using either
Instant Messaging, Phone, or via Email.
You should receive an E-mail confirmation within 1 hour of submitting a request.
If you do not receive an E-mail confirmation, please contact the Help Desk again: