Virtual Private Networking (VPN) uses encription and key exchange to provide secure communications over insecure networks. Typically, VPN is used to connect a remote computer or network back to an organization's primary network where protected resources, like your access to email or shared drives, reside. When you connect through a field office network, you're automatically connecting through a Virtual Private Network. However, you can also use VPN on an individual basis to connect to protected resources when you're not on the IASTATE network.
Learn how to install VPN software on your Windows Computer.
How to install a printer on a new computer, as well as adding a new printer. Step by step instructions are included.
This page gives detailed instructions on upgrading a Windows 7 computer to Windows 10 via USB.
This page provides steps on uninstalling a program within Windows 10.
TurningPoint and clickers can be used with or without internet connectivity. Instructions include setup, installation and usage of turning point on both Windows machines and Macs.
Most software will require that you know your administrator password to install correctly. You are responsible for your own administrator password. When your computer ws initially set up (assuming it was set up at EIT), an administrator password was set and included with the paperwork you received with the computer.
This page lists steps to install Office 365 onto a Windows computer.