Answers to Frequently Asked Questions

List of Topics and Questions


Computer Recommendations for Students

ECC Computer Recommendations

ECC Labs and installed software lists can be found here. If you would like software for personal use, you must purchase a license and install the software on your computer yourself. Software that is required for Engineering classes is already installed on the lab computers.

Engineering College Computing highly recommends that students wait to purchase a new computer until after classes have started.

Here's some advice from a fifth year student: Students will have a better idea of what kind of computer they need after seeing what they use them for both inside and outside of class. Many students purchase laptops thinking they will take notes with them, but in reality, it almost never happens (especially in engineering).

PC Recommendations:
Nearly all laptops sold in the last few years include a built-in wireless card

  Desktops Laptops
Processor Intel Core i5 or i7; AMD Ryzen 5 or 7 Intel Core i5 or i7; AMD Ryzen 5 or 7
Memory 8GB RAM or more
Hard Drive 256 GB SSD
Operating System Windows 10
Software Packages Microsoft Office 365 or 2016 (free through UT), or LibreOffice
Apple Recommendations:
Any of the laptop models: Macbook, Macbook Pro, or Macbook Air.

Processor Intel Core i5 or i7; AMD Ryzen 5 or 7
Memory 8GB RAM or more
Hard Drive 256 GB SSD
Operating System macOS
Software Packages Microsoft Office 365 or 2016 (free through UT), or LibreOffice

These recommendations were last updated: June 2018

When using College of Engineering Computers:
  • College of Engineering computer labs have a wide selection of the software used in CoE classes.
  • It is recommended to use a USB flash drive or a network home drive to store files. Do not save important files on a lab computer's drive or desktop.
  • The three College of Engineering open student computer labs (North Engineering 1002, North Engineering 1047, and Nitschke Hall 1072) are open 24 hours a day with a Rocket Card.

When using UT's Wireless Network:
  • Public - does not require credentials. Requires an acceptance screen agreement before use and is outside the UT firewall.
  • Secure Public - requires UTAD credentials and is outside the UT firewall. Credentials are cached so you will not need to keep agreeing to the acceptace prompt, nor will the connection time out.

Recommended Accessories:

  • Surge protector
  • USB 3.0 flash drive (8GB minimum)

Optional Accessories:

  • Printer (don't forget a USB cable to connect it!)
  • Items not commonly included with laptops, such as mice and carrying cases, if desired.

Recommended Software:

Asset Disposal Policy

University policy requires that all assets, whether tagged with a University property control tag or not, follow the established disposal method as outlined by the ORC and The University of Toledo. This method requires assets to be listed on an Asset Management Form and submitted to Property Control for disposal consideration. Surplus property is disposed of by public sale, public auction, sealed bid or through coordination with Rocket Recycling. At no time are University assets authorized to be donated, given, traded or sold to any outside organization, individual or non-profit organization. For complete information, please click here to see the University of Toledo's Asset Disposal Policy.

Electronics Recycling Services

Current University Asset Disposal policy is as follows:

Equipment Disposal Procedure

Current University Policy states that only the Principal Administrative Officer can authorize the disposal of a university asset. Principal Administrative Officer includes dean, director, department chair, associate vice president, vice president, president, and business manager. In order to dispose of assets, whether through recycling or surplus property auction, or transfer an asset from one department to another, the correct documentation must be completed and submitted to the Office of Property Control in the Purchasing department. This documentation is simply the completion of a University of Toledo Equipment Management Form.

Only after this form has been properly completed and submitted to Property Control can assets be released to Campus Recycling for disposal or Surplus Property for auction. Once the documentations has been submitted to Property Control who, in turn, will initiate the process of having the item removed from the department's records and or space. All requests for disposals will be coordinated through the Property Control office either for Surplus, disposal or recycle.

Please note that the capitalization amount was recently raised to $5000. Only assets that had an original cost in excess of $5000 are tracked by Property Control but no matter what the cost all equipment for disposal forms must come through Property Control. If you believe the asset you wish to dispose of may be beneath this limit, you may call (or e-mail) Sandy Adamski at extension 3531 and she can verify.

For recycling needs which meet the requirements of the University Asset Disposal policy please see the following references:

Electronics Recycling

When two of the three recycling storage shelves are full, submit a request for pickup on the next Thursday (AIM visits the UT Computer Center, UC, every Thursday). You must specify the preferred hours, who the contact is and the phone number for the contact, i.e. who will be working during the requested pickup hours.
University of Toledo Electronic Recycling Policies

A search engine for recycling centers, based on the product you are looking to recycle, is also available.

Please see this link: Earth911 and fill in the search box with your item type. Then fill in your zip code under the zip code box and click search.

For all other electronic recycling needs in Ohio consult this link:

Ohio EPA Recyling Centers

Hard disks, USB memory, and floppy disks must be physically destroyed before leaving UT. ECC will accept such equipment and arrange for it's destruction.

Access to Engineering Buildings & ECC Labs
Access to Engineering Buildings & ECC Labs

Access to the Engineering Buildings, Palmer Hall (PL), Nitschke Hall (NI) and North Engineering (NE) and to the ECC labs is controlled by card readers which accept the UT Rocket card. The Rocket card provides access for all students registered in The University of Toledo College of Engineering, as well as faculty and staff. All access questions, problem reports, and service requests should be directed to an ECC secretary.

-Please do NOT prop lab doors open. Doing so is a violation of Engineering College Computing's Acceptable Use Policy. This is for your own benefit and safety.

eLearning, Distance Learning and Blackboard

ECC does not support Distance Learning or Blackboard.

For support please visit the Distance and eLearning website.

  • This
  • and this
I can't use my Rocket Card to swipe into a lab. What do I do?
I can't use my Rocket Card to swipe into a lab. What do I do?

If you are having problems with your card swipe access to engineering labs, please talk to an ECC secretary in NI 1013 / NI 1010.

How do I access the ECC Virtual Lab?

The University of Toledo's Virtual Labs are designed to help students, faculty, and staff access their files and university licensed programs while they are not on campus. The Virtual Labs are run by Main Campus IT so any and all questions/problem should be directed to them.

College Of Engineering vlab current setup:

17 virtual workstations (controlled by IT, not ECC), each with

After downloading one of the suitable clients given below, enter your UTAD account information to log in, then select ENG - ECC Lab as The lab you would like to log into.

Vlab clients are available through UTAD Account Management.

For more information please visit

How to use Netsupport School

Software (NetSupport School) to manage student computers during class sessions has been installed in all ECC MS Windows instructional computer labs except NE 1039 (which has an application (GABI) which has been troublesome). This tool has many capabilities, some of which are listed below. This and additional information is available from the ECC faculty/staff web page as NetSupport School Help Use of this application is controlled by a password specific to the application.

  • Blank Student screens (to gain attention).
  • Lock the Student's mouse and keyboard when instructing.
  • Representation of the layout of the physical classroom.
  • Prevent data being copied to or from attached devices (USB, CDR, DVD).
  • Transfer files to and from from the Tutor PC to multiple Student workstations.
  • Show the Tutor's screen or a specific desktop to selected students.
  • Show a Replay file (previous screen recording) to selected students, and output as a video file.
  • Virtual Whiteboard for collaboration within the classroom.
  • Internet co-browse: synchronise instructor's browser with the browser on each Student PC.
  • View the screens of student computers in real time.
  • Monitor the keystrokes of students in real-time.
  • Student journal- capture selected items during class and automatically include in a PDF file for post-lesson review         by each student.
  • Student surveys.
  • Student testing: include text, picture, audio and video questions.

  • Netsupport School Manual (.pdf)

    ECC and IT Accounts and E-mail

    How Do I connect the ECC wireless network?
    How Do I connect the ECC wireless network?

    For information on connecting to the Wireless network, click here.

    What are the differences between ECC and IT Computer Accounts and e-mail systems? How do I initialize and coordinate both e-mail systems?

    What are the differences between EIT and ECC accounts and E-mail systems. How do I initialize and coordinate both E-mail systems?

    Why Two Accounts?
    Two accounts and access to two e-mail systems are automatically made available when each engineering student registers. One account is created because the student is enrolled in engineering and pays the Engineering Technology Fee and the second account is created because the student pays University fees. Therefore each engineering student has an Engineering College Computing (ECC) account and a University Educational & Information Technology (EIT) account.

    Features of Each Account
    Feature ECC Account EIT Account
    Lab access All 13 ECC labs and user services area. Labs in  SU, CL, RH
    Permanent storage on central file server accessible from any lab machine 1GB(u:\ on Windows machines or $HOME on UNIX machines) 50MB
    Email Stored on eng server (10,000,000 byte single message limit) Stored on floppy when accessed from engineering computer (1.4 MB single message limit)
    Laser Printing  2000 prints per semester in ECC labs ($0.10 after that, in $5.00 increments--additional print quota can be purchased by visiting the ECC secretary in NI-1010.) Printing is also possible with EIT lab account (use #2 on the UT Request menu to activate.)
    Access to application software Access to extensive software from ECC labs (p: or programs disk on NT and UNIX machines) Generally limited to MS Office
    Dial-in/Remote Access Through EIT EIT runs all dial-in modems for the University and one needs a separate account & password for access. (use #2 on the UT Request menu to activate.)

    Step by Step Procedure for Activating Each Account and E-mail
    Function mail mail
    To create account Register for classes Register for classes
    Wait until the next day    
    To pick up an account Visit NI 1013 and bring your ID From any EIT or ECC laboratory log into UOFT02  using the account name "request" without the quotation marks. (or use UT Request menu)

    Select menu item 2 to request or activate a pop3 e-mail account.

    Follow instructions.

    Accounts Used to log in to any ECC PC or UNIX workstation as well as e-mail address Used to log in to any EIT PC, as well as e-mail address and for dial-in
    You should next forward all mail to a single account so you only need to check in one place.
    To forward mail:
    Follow instructions in mail_forward.html which explains how to use the forwardmail newaddress command after logging into eng server. From any EIT or ECC laboratory log into UOFT02 using the account name "request" without the quotation marks. (or use UT Request menu)

    Select menu item 4 to forward pop3 or uoft02 e-mail.

    Follow instructions.

    You should record your mail preference for UT directory and general e-mail sent to To record your preferences: Not applicable From any EIT or ECC laboratory log into UOFT02 using the account name "request" without the quotation marks. (or use UT Request menu)

    Select menu item 5 to register information

    Follow instructions.

    For EIT mail you must initialize the floppy disk which will hold your delivered mail: Not required Insert a floppy and click on create e-mail disk icon in the mail folder in ECC labs.
    To send/receive mail From any ECC laboratory click on e-mail for engineers icon. (E-mail is stored on eng server, 50 MB limit) Insert disk and click on e-mail for non-engineers icon in ECC lab or click on e-mail icon in EIT labs. (E-mail is stored on floppy, 1.44 MB limit)
    Web access to email Point your web browser to Enter your engineering username and password then click "Log in". Point your web browser to
    A dialog box will request user ID & Password. Your User ID is "utad\username" (without the quotes) where username is your UTAD User ID. Enter your UTAD password and click Ok.

    How do I purchase software for my personal use?

    Note: Office 365 is available for free for all current students. Click here to learn how to download it.

    Faculty, staff, and students may purchase full, perpetual licenses from a list of selected software titles offered by Microsoft. These are different from the work at home licenses previously available to employees in that they will be owned by the purchaser and not the university, and the licenses will be retained if the student/employee leaves the university. To puchase the software, visit this website and login with your UTAD username and password.

    General Systems and Servers

    How do I Log Into My Engineering Server Account?


    You will be using a protocol called SSH (Secure SHell). This is a protocol used to securely log on to a remote computer and execute commands on that machine. All traffic between your machine and the remote computer is encrypted using a key pair, one public and one private. It is almost impossible to view session traffic without knowing both keys.

    From A Windows Lab Machine
    1. On the desktop, double-click on the SSH-ENGhomedir icon to connect to (the home directory server). If Windows prompts you with a security warning, click Run. If you are prompted (by PuTTy) to accept the security key, click Yes.
    2. Enter your username and password when prompted.
    3. To exit the session when finished, type "exit".

    From A UNIX Lab Machine
    1. In a console window, type "ssh" (without the quotation marks).
    2. If you are prompted to accept the security key, type "yes" (without the quotes).
    3. If prompted, enter your username or password.
    4. To exit the session when finished, type "exit".

    From Your Windows Machine At Home
    1. Download and run PuTTy (you can download it from here). If Windows prompts you with a security warning, click Run.
    2. In the hostname field in the connection dialog box, type "". If PuTTy prompts you to accept the security key, click Yes.
    3. Enter your username and password when prompted.
    4. To exit the session when finished, type "exit".

    From Your Linux/Unix/BSD Machine At Home
    1. In a console window, type "ssh -l username" (without the quotation marks) where username is your engineering computer account username.
    2. If you are prompted to accept the security key, type "yes" (without the quotes).
    3. Enter your password and press enter.
    4. To exit the session when finished, type "exit".

    How do I change my password?

    The procedure described below permits you to change your ECC account password from the original, hard to remember and impossible to type, string of characters to a more easily remembered password.
    The procedure also permits you to change your password periodically. This should be done for improved account security.

    How do I select a good password?

    Do not use a word which appears in a dictionary, especially names.
    Do not use id numbers.
    Do not use birth dates.
    Do use an apparently random mixture of letters, meaningful to you
    Do use a mixture of upper case, lower case and numbers

    Brief procedure for Experienced Users

    If you wish to change your password you must first log into the server or log on to any UNIX machine. Once connected enter the command "passwd".

    Step by Step Procedure for inexperienced users

    Explanatory comments are written in italics. In most cases, text in [brackets] represents input which varies with needs of the user, text in "quotes" represent menu items, icon choices or something needing to be typed exactly as shown and bold text represents the expected computer prompt or resultant response.

  • Log into the server using the instructions in the How To Log Into Your Server Account
  • Go to Step 2 of the Unix instructions below.

  • UNIX

    In making all the entries which follow, case is critical. Enter the Account Name and Password exactly as provided, carefully noting upper and lowercase characters. Also be careful to distinguish between 1 (one) and l (el) and 0 (zero) and O (oh). The procedure below assumes you are logged into a UNIX machine.

    1. Logon onto the main server(gold). At the terminal, type "ssh" to logon. The user needs to be logged onto green to change his password.
    2. At the command prompt (example {homedir:101}) type "passwd"

    3. This should produce the following results:
    4. Enter your desired password after the New password: prompt. It will not be displayed as you type.
    5. To avoid creating an unknown password due to typing errors, you are required to retype your desired password after the New password (again) prompt. It will not be displayed as you type.
    6. Enter your current password after the Current password: prompt. It will not be displayed as you type.
    7. If an error occurs in changing the password enter the "passwd" command and repeat the procedure.
    8. Enter "logout" to end the UNIX session.

    How do I select a good password?

    Do not choose your password hastily. Choice of a poor password can result in your account being accessed by someone else and/or deactivated by the Computing Center staff.

    First, bad passwords categories.

    A. Passwords should never be:
       - any word in any dictionary, in any language
       - any formal name or nickname, including spouse's, children's, or pet's
       - any mythological or fictional character or race
       - any name of a place (city, county, crossroads, forest, or place of natural beauty),
         real or fictional
       - fictional terms
       - titles of movies, books, compositions
       - the name of any author, composer, musician, actor
       - any special number
       - acronyms
       - phrases
       - fables or legendary characters or places
       - combinations of letters or patterns on the keyboard
       - great license plates you have seen, one2nv, 3vom, ibuy4u
       - neat word/letter combinations, aTdHvAaNnKcSe
       - religious figures, places or events
       - anything you can imagine being collected into a list

    B. Passwords should never be a simple algorithm applied against something in A, above:
       - the "word" backwords
       - substituting numbers for vowel, r1ch2rd for richard
       - common substitutions for letters, 3 for e, mov3
       - appending or prefixing digits, apple639 or 123 apple
       - appending or prefixing special characters, apple@ or $klingon

    C. Passwords should not contain information that can be automatically gathered by knowing your user name:
       - your user name
       - your user index/number (for Unix the UID and GID)
       - user name owner information (for Unix the gecos field) which commonly contains
         your name
       - information derivable from this information: your initials
       - This category is really an addition to category A above, but is dynamic depending upon your account information; category A is static.

    D. Passwords should not contain personal information that can be gathered if you are targeted:
       - your social security number
       - your student ID number
       - your phone number, your mother's phone number, your mother's maiden name
       - your passport number
       - your street address, the address where you were born
       - your license plate number
       - serial number from your camera, computer, stereo

    This may seem to be just about everything, right? A good password needs to be something that is not derivable in a semi-automatic manner. The above categories A-C represent known information, or easily derived information, that can be exhaustively applied by a computer to break your password. Category D represents information that would be applied to specifically break your account, as opposed to any account on a machine. While this may seem to be a very remote possibility, if you are ever personally targeted, it is potentially much more damaging to you. (It's personal, beware!)

    Two final items. Make sure you know how many characters the system allows for a password: a good 15 character password may become a terrible password if the system only uses the first 8 characters. Look at your password selection to ma ke sure it doesn't duplicate a bad password: a (usually) good personal password generation algorithm can generate a bad passw ord; the good and the bad may be the result of orthogonal approaches intersecting with a bad password. For example, a potenti ally good password, mxvhall, would be bad if your name was Mary Xavier Virginia Hall.

    Now, methods for generating good passwords.

    First, if the maximum password length is long enough, you can use two unrelated words together, perhaps separ ated by some punctuation or numbers. For example: parabolasextuplet, peddle$skew, embargo*.umber, apple:xerox, nova::orient, but not peanutbutter nor lionhunt. Note that if the maximum password length is eight characters, embargo*.umber is truncated to embargo* which will be cracked.

    Second, use the first letters of words in a memorable phrase. The phrase "Mary had a little lamb" produces th e password mhall. Obviously, memorable is good but traditional or classical is risky. Make up your own phrase. "I got a speed ing ticket on 6th avenue" generates igasto6a, "that last calculus exam was real painful" generates tlcewrp.

    Third, use grossly misspelled words. For example, fumigayt, lugrnch, phloot.

    Fourth, tighten up a good password into a better password: use both upper and lower case characters, add punctuation and/or numbers, depending on what the system allows. For example, igasto6a could become iGAsto6A, mhall could become mHa.*11$, phloot PhloOT, and MOUTHMOCCASINS MO76UTH81MOC33CASINS.

    Fifth, if you have a good memory, use eight or more, preferably the maximum allowed, random characters.

    After you have created a good password, how do you improve the odds of remembering it? Use your new password immediately: change your password and then logout and log back in. After ten minutes (about the length of short-term memory) use your new password again: logout and back in. (Changing your password Friday afternoon just before leaving for the weekend can make the new password very difficult to remember). If you absolutely need to write down your password, make sure that anyone seeing it or finding it cannot determine what it is: make sure that it is unrecognizable and cannot be associated with your account/user name. This is the same principle that applies to the pin number for your credit/bank card - and it can be even more costly.

    How often do you need to change your password? The effective half-life of your password depends on its exposure. Piano players can read your keystrokes if they can see your hands. Did you write down your password? (If you had to write it down, the fact it was a necessity does not lower the resultant risk). Was it accidentally displayed on the screen? Did you login from the hospitality suite at the conference? Do you have a nagging feeling that you should change it? Is it a good, strong password? It is better to have a good password for months than a bad password for days.

    It may seem that you don't have much if anything to lose if your password is guessed and your account is broken into; but that's not true: you can lose your good name, your reputation. Obscene, racist, threatening e-mail from your account, with your name attached, sent to your friends, family, peers, strangers and world-wide news groupd, can be as difficult to overcome and correct as a public scandal.

    Credit: David G. Beausango Colorado School of Mines

    I forgot my password, what do I do?

      If you have forgotten your password, then please go to the help desk in NI1013 with your Rocket Card. There, a secretary will change your password for you.

      If there is no secretary available, a password change request will be generated. Come back in a day or two to get your changed password.

    I forgot my username, what do I do?

      If you have forgotten your user name, then simply come to the ECC office in NI 1013 with your Rocket Card and ask one of the consultants to look up your username. If you have forgotten your password as well, see here.

    How do I get the name associated with my account changed?

      ECC does not change user/account names.

      To have the first and/or last name that is associated with an account changed:

      1. Send your ECC user/account name, old first and last name, new first and last name, and UT ID number to an IT Helpdesk ticket. with the subject 'Change of name'.
      2. Return e-mail will notify you the change has been made.
      3. firstname.lastname e-mail addresses will change along with this update. This allows you to receive e-mail with either your account name or your new firstname.lastname addresses (the old firstname.lastname will not work).

    How do I transfer files securely


    You will be using a procedure called SFTP ( Secure File Transfer Protocol). This is an application using the TCP/IP protocol to move files from one place to another. It is possible to move files from your local machine to the remote host (upload) as well as from the remote host to the local machine (download).

    Procedure for using SFTP or SCP from an ECC PC Lab
    1. Click on Start, Programs, WinSCP, WinSCP to open up the client. Or in the run bar type in "P:\winscp421\winscp.exe" If Windows gives you a security prompt, click Run.
    2. Choose whether you would like to use SFTP (Secure File Transfter Protocol) or SCP (Secure Copy) as your transfer agent
    3. Use the following settings:

      Host Name/Address:
      Port number: 22
      User name: Your engineering account username
      Password: Your engineering account password (case sensitive!!!)
      Private key file: Leave this blank
      File protocol: SFTP

    4. Upon clicking [Login] or hitting enter, you should be prompted with a [Warning] message box stating "The server's host key was not found in the cache. You have no guarantee that the server is the computer you think it is." either hit [enter] or click [yes] and it will finish connecting.
    5. If an error occurs stating that the packet size was to large to complete the connection. Restart the application, this time use SCP as your [File protocol:] leaving everything else the same. As it was for the SFTP connection above.
    6. This will log you into your home (root) directory. The files on the left are the files on the local computer (the computer you are currently using). The files on the right are the files on your engineering account.
    7. Choose the desired files and/or folders and move them in the desired direction.
    8. Exit the session when finished.

    Procedure for Using SFTP from Outside an ECC Lab

    To use SFTP you must download a SFTP client from the internet. it is recommended to use WinSCP which you can download from

    After successfully installing WinSCP you can follow the instructions and use the settings given above for the in lab procedures.

    As you develop more familiarity with this process you will no doubt wish to have some type of directory tree structure to organize your files in your account. This can be done using the sftp session or in an interactive session in your account using telnet.
    For most file transfer applications, the binary transfer mode is best. On occasion after moving plain text files (files created with Notepad, Wordpad, raw data output, vi etc.) unexpected results will occur when using a PC to edit files created on a UNIX machine and vise versa. If this should occur, assistance can be obtained from your instructor, a consultant, or in the ECC offices.

    Why should I log off of a lab computer every time I take a break?

      ECC recommends NEVER leaving a computer logged on while taking a break

      While you are gone, anybody may use the computer to:

    • Delete all of the files in your home directory (U: drive)
    • Change the password of your account
    • Deplete the print quota of your account
    • Send email in your name
    • Enter a logout command causing a logout immediately after login

    • Note: Every one of the events listed above has happened at least once in the College of Engineering.

    When does my account expire?

      Below is the excerpt dealing with account expiration from the computer usage policies document:

      Student accounts expire when the student is no longer registered in the College of Engineering. Expiration occurs at 8:00 A.M. on the day following the last day of late registration. The only exceptions to account expiration are no accounts expire over the summer and accounts do not expire for students on co-op who have officially registered with the co-op office on or before the last day of late registration. Student accounts that have expired are deleted at the time of expiration. Information stored in the account is not recoverable.

      To read the full document on computer usage policies, click here.

    Why can't I install programs to my U: Drive?

    Because all ECC lab computers are used by many people permissions to system functions are very restricted. Most installation programs require a higher level of privilege than what is available in our labs. Anyone who logs in though ECC_SAMBA or ECCSAMBA3 is part of the USER built-in group for Windows. This group prevents its members from compromising the operating system and the programs installed on it. Also, members of the USER group cannot modify system wide registry settings, operating system files, or program files.


    If you have access to another PC you can try to install it and copy the installation directory onto a disk and then copy it to your U: drive. This may or may not work depending on the type of the program. If this is a program for a class please ask your instructor to go to the ECC office (NI 1010) and fill out a software installation request

    How do I access my home directory off campus?

    Click here to view step by step instructions on how to access your home directory from a non-ECC computer.

    Procedure for recovering files to your ECC U: drive ($HOME directory)

  • WARNING!: Although user accounts are backed up nightly, ECC does NOT guarantee the availability of files. If you consider your data precious, back up your data to your own media.

    File Recovery must now be done through a Service Request

    For the file(s) you need recovered, please include:
  • The complete path(s).
  • File name(s).
  • Date the file(s) was/were created.
  • Date the file(s) was/were lost or damaged.
         Please note: a file cannot be recovered if a backup was not done between the time the file was created and the time it was lost/deleted/damaged.

  • Why are my personal settings not being saved when I use an ECC lab computer?

    Following are the reasons for why you can not save your personal settings:-
    1. The Windows PCs already take a long time to log in. If we add on time for copying over desktop settings, favorites from three different browsers and the "my documents" folder, the login process is going to be unacceptably slow.
    2. It's also going to slow down the logoff process while it copies those files back to U:.
    3. Storing these extra items will require space on your U: drive.
    4. The increase in logon/logoff times for everyone is not worth the small benefit it would provide.
    ECC can reevaluate when new faster disk space is put into production if a need is demonstrated for this ability.

    So it is highly recommended to keep important bookmarks and files in U: drive or a flash drive.

    Unix Systems

    How to use Netsupport School

    Following a successful login on an ECC supported UNIX machine the command interpreter ("shell") is "csh". At the present time ECC Unix does not support user changeable login shells because of security concerns.


    1. Enter the appropriate command for another shell after login
    2. Edit the initialization file, at your own risk, to execute another shell each time you login.


    1. ECC does not have the human resources to support shells that are not distributed with the vendor operating system.
    2. Corrupt shell initialization files (.cshrc, .login) may be restored by entering the command reinit.account. Most ECC consultants are not prepared to debug initialization files.

    How do I place Matlab jobs in the background and run them at the lowest priority?

    - In order to adhere to the ECC usage policy, the following links show the procedure to put Matlab jobs in the background running at the lowest possible priority.
    - The specific technical support document from Mathworks for placing Matlab jobs in the background
    - If the above link is broken, do a search on 'background AND nice' at the general Mathworks FAQ page.
    - NOTE:
      In order for a background job to remain running after you log out, you must log in to the machine remotely using SSH. To do this, follow the instructions here, but instead of using, use the machine name. For example, to login to ne102628, you would need to use as the host name for a PuTTy session or, from a UNIX console, type "ssh" (without the quotation marks).
      In order for the script given on the Mathworks page to work properly, please make the following change:
      nohup nice -10 matlab < $1 > $2 &
      nohup /usr/bin/nice -19 matlab < $1 > $2 &

    How do I change my default Window Manager to FVWM for ECC Controlled UNIX Workstations?

    Only CDE and OpenWindows are available as window managers on an ECC supported UNIX machine.

    Solution(with thanks to Dr.Rafe)
    As for starting fvwm (or any other window manager, for that matter), one has several choices; I'd recommend one of the following:

    1. Over-ride CDE by placing "exec fvwm2" at the end of $HOME/.dtprofile and choose CDE Session in the dtlogin screen.

    2. OR
    3. Over-ride OpenWindows by placing "exec fvwm2" in $HOME/.xinitrc and choose OpenWindows Session in the dtlogin screen.

    In the former case, the environment needs to be established in $HOME/.dtprofile, while in the latter, the standard login environment is setup by dtlogin/xdm. By employing the latter method, users still have access to CDE from the dtlogin screen if they need it.


    1. ECC does not have the human resources to support window managers that are not distributed with the vendor operating system.
    2. Most ECC consultants are not prepared to debug initialization files.

    Procedure for recovering files to your ECC U: drive ($HOME directory)

    The procedure below will remove all initialization and configuration files used during logon and replace them with the system defaults. It is useful when you are unable to log on to the Solaris machines, when an attempt to change your logon shell by editing these files has failed, or when your files have otherwise become corrupted.
    Log on to the main engineering server and run the following command. THIS OPERATION CAN NOT BE UNDONE! MAKE SURE YOU HAVE TRIED ALL OTHER OPTIONS BEFORE DOING THIS:


    I can't use my Rocket Card to swipe into a lab. What do I do?
    How do I delete items from the print queue before they are printed?


    Explanatory comments are written in italics. In most cases, text in [brackets] represents input which varies with needs of the user, text in "quotes" represent menu items, icon choices or something needing to be typed exactly as shown and bold text represents the expected computer prompt or resultant response.


    There is currently no direct way for a user to cancel a single print job, but 2 options exist which give the same result:
    When a job reaches the head of the print queue for a particular printer, a check is made to see if the user who submitted the job is still logged into the machine from which it was submitted.
  • If so, processing continues and the data is then sent to the printer.
  • Otherwise, the print job is canceled and an e-mail message is sent to the user

  • Anyone can request that a consultant clean a print queue
    (the consultant can not remove a single job currently -- he/she has to remove all jobs from a queue):
  • Take the printer off-line before your job reaches the head of the queue. Announce your intentions to everyone in the room.
  • Visit a consultant in NI1013 and ask him/her to clean the queue for the particular room you are in.
  • The consultant will verify you still have jobs in the appropriate queue, accompany you back to the lab, announce his or her intentions (so that everyone who may have submitted a job will know they will have to resubmit), clean the queue, let everyone in the lab know they can submit their jobs again.

  • Unix

    Find your print job number using either the lpstat command (see the man page) or

    Before the job reaches the head of the queue, use the cancel command (see the man page) on the machine from which the job was submitted to remove it from the queue
    (e.g. `cancel lj1022-111`).

    Jobs submitted from Unix machines are NOT automatically canceled if you are not logged in when they reach the head of the queue.
    Special Note

  • A user's print quota is only updated for print jobs which complete successfully
  • It is ECC's intention to make it easier to cancel print jobs than the above listed methods, but this is not a high priority item currently.
  • Why does it take so long for my exam paper to be printed?

      Although the printers in the ECC teaching labs are capable of printing 18 pages per minute (PPM), that speed is achieved only for a single print job with many pages. For the case of a class submitting their work for an examination, typically 1 page per student, the highest rate of printing is 2PPM! The limiting factor is the job set up time in the printer itself over which we have no control. So, 30 students printing simple text documents at about the same time to one printer, will take at least 15 minutes to print.


      Plan according to the constraints of the printers.

    How do I use the color plotter?

    Note: PowerPoint or a PDF format are usually the best for printing a poster on the plotter. The maximum width a poster can be is 42".

    How to Use the Plotter:

    1) Log on to a computer and pull up the item you would like to be printed.
    2) Notify an ECC Secretary that you are ready to print. The secretary will: 2.1) Release any jobs in the queue. 2.2) Wait for jobs to complete printing. 2.3) Enter the length of the plot area. 2.4) Enter the width of the plot area. 2.5) Verify the cost of the job.
    3) When the plotter finishes printing the poster, the secretary can roll the poster and up and put a rubber band on it if necessary.

    I can't use my Rocket Card to swipe into a lab. What do I do?
    How do I print on Both Sides?

    How to print on both sides of a page

    All printers in ECC computer labs are capable of printing on both sides of the page.

    NOTE: Printing on both side of a page does not reduce the number of pages subtracted from your print quota.

    To print on both sides, do the following:

    1. Select properties from the print dialog box.

    2. Choose Yes, Flip Over from the Print on both sides: drop down menu. Click OK.

    3. The document should now print on both sides of the page.


    How Do I connect the ECC wireless network?
    How do I check my email from a browser?

    You can check your engineering email by visiting the following link:

    How do I setup my email for my smart phone?

    Please visit the following link for instructions on setting up your email with your mobile device:

    How do I forward my engineering email?

    To forward your engineering email to another address, follow the link below

    How do I stop forwarding my engineering email?

    To stop forwarding your engineering email, visit the link below and click "Stop forwarding."

    How do I archive my emails?

    Please view this pdf for instructions on archiving emails.

    Instructions for configuring the Outlook 2007 email client

    Note: Engineering accounts will no longer be active after 12/31/2017. This information is for engineering account emails.

    If you need help configuring your Outlook email client with your engineering account email, please follow these instructions by clicking here.


    Using Your Webspace

    Using Your Web Site

    As of July 28, 2011 there is a new method for you to access your public web share from our Windows computers. Formerly, you would access your web share by navigating to the "www" directory on your U: drive (U:\www). Now, we have created a new network drive available in "My Computer" to access your web share.
    1. Open My Computer from the Windows Desktop.

    2. Under the Network Drives section in "My Computer" there will be a network drive named public-webspace with the drive letter "O:\" (see selected below).
      Click here if you do not see a drive as described.

    3. Double click the selected network drive. Your web share will open in the window.

      An example web share with a folder and an "index.html" file.

    Anything that is placed in this folder is available publicly on the internet at your personal web address ( Dragging and dropping files into this network drive is all that is required to share them. The web server's default index names are index.html, index.htm, home.html, and home.htm. The server does not offer support for 3rd party proprietary extensions such as ".aspx".

    If the drive is not mapped on your computer please use the following instructions.
    This first set of instructions is only avaliable to Faculty and Staff. If you are a student please use the more advanced method at the bottom of this page.

    1. Open My Computer from the Windows Desktop.
    2. Click on Map Network Drive

    3. Select O: for the drive letter, then select Folder and type:
    4. Check Reconnect at logon so that the O: drive will be available everytime you log into your computer.

    5. Then select Finish and continue with the tutorial at the top of this page.

    A More Advanced method
    On a Windows machine on the engineering network you can go to Start > Run and paste (or type) into the prompt: net use O: \\\public-webspace
    A prompt may ask for your Engineering username and a password. Once completed go to My Computer and there should be a new drive titled: "public-webspace" as shown above.

    Last Updated by: egauthie (11/09/2017)

    How do I share files using my web page?

    Oftentimes you want to move a file larger than 12MB, the maximum file size that e-mail allows. In order to make these files available, you can make use of the web page provided with your engineering account. To host a file follow these steps:

    1) Windows: In My Computer there should be a drive named O: public-webspace, If it is not there please read this FAQ.
        Linux: If you are using Linux there will be a folder in your home directory titled www.

    2) Put inside this folder all the files you want to share on your personal website.

    3) Now you need to set permissions for others to be able to download them.

    Windows: On your desktop should be an icon called "ENG Web Permissions." Double-click on it and enter your Engineering username and password to set the correct permissions.

    Unix/Linux: Open a terminal window and enter the following: ssh Enter your Engineering username and password and then enter this command: /eng/local/bin/

    This will set the permissions. Remember to repeat this procedure when you add new files.

    4) Your files are ready to share. Now others can access them by opening any internet browser and entering in the following address:
    Replace the fields in parenthesis above with your information and give the address to those who need the data. If they cannot access the file, e.g. no download window appears, then verify that the permissions were set correctly in step 3.

    The web server's default index names are index.html, index.htm, home.html, and home.htm. The server does not offer support for 3rd party proprietary extensions such as ".aspx".

    If you have any questions, please contact us at the help desk in NI 1013.

    I don't want my web page to appear on Google. How do I stop this?

    In some situations, it may become necessary to prevent Google or other search engines from indexing your web page. If you are hosting content on, the main way to do this is through the meta tag.

    At the top of your page, insert the following:

    <meta name="robots" content="noindex" />

    This will prevent search engines from listing your page, as it is a standard accepted by Google, Yahoo, Bing, and Ask. If you want to prevent these engines from maintaining a copy of your page in their archive as a cache:

    <meta name="robots" content="noarchive" />

    For a more comprehensive look at this and other methods, with pros and cons for each, try here.

    Windows Support

    How to Obtain Admin Access

    Items We Need From You

    • UTAD username of requester
    • Computer Name
    • Adviser approval


    1. Go to the following link:
      1. If prompted, login with your engineering account.
    2. Fill out the form to request Admin Access
      • If desired, contact your advisor and let them know to look for the email to approve access.
    3. An ECC Employee will receive the approval and provide you with admin access

    Upgrading to Office 2016

    Estimated Time

    • 1 hour

    Items We Need From You

    • Computer Name


    1. Uninstall/Remove the current Microsoft Office Suite from your computer
    2. Install the Microsoft Office Suite 2016 (30+ minutes)
    3. Microsoft updates will need to be run on your computer to ensure optimal performance for Office 2016 (30+ minutes)

    Setting up My Ricoh Printer

    Estimated Time

    • Less than 10 minutes

    Items We Need From You

    • Valid Access Code (Ask the department secretary)
    • Room number or the full name of the Ricoh printer


    1. Left click the start menu
    2. Left click "Devices and Printers"
    3. Left click "Add a printer"
    4. Left click "Add a network, wireless or Bluetooth printer"
    5. Left click "The printer I want isn't listed"
    6. Left click in the text box and type "\\print11\" followed by the printer name. This name starts with the building code (NI, NE, PL, R1, R2), the room number, followed by "Ricoh", and then the tag on the printer.
    7. Left click "Next"
    8. Left click "Next"
    9. Left click "Finish"
    10. Right click the newly added printer and left click "Printing preferences"
    11. Left click the "Valid Access" tab and type in the valid access code into the text box.
    12. Left click "Apply".
    13. Left click "OK".

    Mapping a Network Drive

    Estimated Time

    • Less than 10 minutes

    Items We Need From You

    • Engineering credentials of the user.


    1. Left click the "Start" button.
    2. Right click the "Computer" button.
    3. Left click on the "Map network drive" option.
    4. Enter the path in the path text field.
    5. To have the drive available every time you log on, select the checkbox "Reconnect at Logon."
    6. Left click on "OK" button when done.

    Finding My Computer Name

    Estimated Time

    • Less than 10 minutes

    Items We Need From You

    • N/A


    1. Left click the "Start" button.
    2. Left click the "Computer" button.
    3. The computer name is in the lower left of the new window.

    Get Matlab

    Estimated Time

    • Varies

    Items We Need From You

    • Hostname
    • Department Name
    • Adviser Name
    • Adviser Approval
    • Your UTAD Username


    1. Email the following information:
      • Hostname (If you have trouble finding the hostname, visit this link)
      • Department Name
      • Adviser Name
      • Your UTAD Username
    2. Have your adviser also email approving your Matlab access