Virtual Private Networking (VPN) uses encription and key exchange to provide secure communications over insecure networks. Typically, VPN is used to connect a remote computer or network back to an organization's primary network where protected resources, like your access to email or shared drives, reside. When you connect through a field office network, you're automatically connecting through a Virtual Private Network. However, you can also use VPN on an individual basis to connect to protected resources when you're not on the IASTATE network.
Learn how to install VPN software on your Windows Computer.
Obtaining Permission for the sites can be done in one of two ways:
How to install a printer on a new computer, as well as adding a new printer. Step by step instructions are included.
In the event that you wish to access your email, but don't have your Extension computer with you, you can use OWA (Outlook Web Access)...
Several types of email mailing lists are available for your use. Each has different features that may affect your decision of which to use. Please contact the EIT Support Hotline for assistance. To find existing lists visit our ListSearch site.
This page gives detailed instructions on upgrading a Windows 7 computer to Windows 10 via USB.
This page provides steps on uninstalling a program within Windows 10.