Computers at LTS facilities are part of a network that not only connects them to the internet, but also allows them to share software, data, and other resources such as printers. This guide explains how to use these computers, where to find assistance, and the policies governing their use.
Once any LTS computing site computer has been started and is ready for use, you will see the instruction to press Ctrl-Alt-Del to Login. Pressing the Ctrl, Alt, and Del keys will invoke a login dialog box. To log into the computer, enter your user name and password in the appropriate fields; press the Tab key to move between fields. Make sure "Log on to: AD" below the password field is visible. If it says something like "Log on to: PS-xxxxx" then you'll need to enter your username as "ad\username" in the username field. If it says "Log on to: FSxxxxxx" then it's a faculty/staff machine (you may still be able to login using ad\username if you have permission). When you are finished using a computer at an LTS Computing Site, REMEMBER TO LOG OUT. If you fail to log out, someone could access your email, coursework, or academic records. To log out, click on Start and choose Log Off from the Start Menu. Make sure you are completely logged out before you leave the PC. Often the logout process with require user confirmation or the process could hang. You are not logged out until the PC returns to the main Logon screen.Back to Questions
If another user has been logged into the workstation and left without logging out, the computer will display the message "Press ctrl + alt + delete to unlock this computer" and below that in small type it says who's logged on. If you are not the user who is logged in you will need to turn the PC off and then on again. Hold the On/Off button down for at least 10 seconds or until you see the light behind the button disappear. Then, turn the PC back on, and log in as usual.Back to Questions
On boot up the computer will display some messages as it loads it's operating system into memory. The system will briefly display a menu with two choices: Press F3 to ghost or wait 5 seconds for normal boot. If F3 is selected, the reload process will take 30- 40 minutes on a lightly loaded network with a 100Mb connection. Please do not touch the keyboard until the process is completed. It is important to not interrupt this process once it has started. Ghost Refresh - If you selected Ghost Single Refresh option, the computer will load software to connect to a remote image server and run ghost from this server to restore the hard drive image for this computing site computer. As it finishes, it will automatically reboot the computer twice more. The Ghost refresh resolves many computing issues, including printing problems, software errors, network problems, and more. When the refresh process is complete, all software not on the base image will have been removed from the hard drive (see software section below for an explanation). The computer will continue to start up Windows and then present you with the login screen.Back to Questions
The Windows desktop contains several items. Along the right-hand side are:
At the bottom of your screen is the taskbar which includes the Start button at one end and the system clock at the other.
Other icons, such as the Firefox, IE, Chrome and Word quick launch and the Microsoft Antivirus active protection logo, may appear in the taskbar.
All software can be started from the Start button's 'All Programs' menu.Back to Questions
Each classroom or lab computer comes with a base set of programs, which include the following titles: Adobe Reader, iTunes, Microsoft Forefront Endpoint Protection (antivirus software), Microsoft Office (Word, Excel, PowerPoint, Access), Notepad ++, Internet Explorer, Firefox, Thunderbird, along with Quick time, VLC and Paint.NET. (Other utility programs are under Accessories.) LTS refers to this base set of programs as the base image. Performing a complete software reload provides a new copy of this base image to the computer's hard drive. Click the Software link on the Desktop to install software that is not included in the base image. There may be restrictions on where some titles can be installed.Back to Questions
There are several methods for accessing your Lehigh electronic mail from the computing sites.
More information about using mail can be found on the web page:https://lts.lehigh.edu/services/faq/email-guide-faqBack to Questions
In order to protect users' confidential data, a password-protected screen saver has been implemented at the computing sites and computer classrooms. The timeout for classroom instructors stations is 2 hours, for all other computing site machines it is 10 minutes. The screen saver can be activated at any time by pressing the "Windows + L" keys on the keyboard. The original user can log back into the computer with the Lehigh password. If the original user has left the PC without logging off, the next user will need to shut the PC down and restart it.Back to Questions
When you are finished using a computer at an LTS computing site, REMEMBER TO LOG OUT. If you fail to log out, someone could access your email, coursework, or academic records. To log out, click on Start and choose Log Off from the Start Menu. Make sure you are completely logged out before you leave the PC. Often the logout process will require user confirmation or the process could hang. You are not logged out until the PC returns to the main Logon screen.Back to Questions
Invasive software (described by terms such as computer viruses, worms, and Trojan programs) can be spread around the world in a matter of days; anyone connected to the Internet can be at risk from invasive software. All LTS computing site computers have Microsoft Forefront protection software installed. You can also minimize risks from invasive software. Electronic mail. Avoid opening executable (.exe) attachments and attachments of that are unfamiliar or unexpected. Save attachments as files and run virus detection on them before opening them by right clicking on the file and scanning for viruses. Look out for phishing email, i.e. someone you don’t know or someone pretending to be someone else requesting sensitive and personal information from you. Phishing e-mail usually asks you to e-mail a password, or fill out a form on a non-Lehigh website (check the address bar) with your username and password. Never login any website with your Lehigh username and password if the site isn't part of the "lehigh.edu" domain. Never e-mail your password to anyone, even someone at Lehigh. Web browsers. Download software with caution, and run virus detection on the files before running/installing them. Practice safe downloading practices by loading software from a trusted site.Back to Questions
The LTS Facilities pages contain lists of what equipment is installed in which buildings and rooms.Back to Questions
The Help Desk service in the Fairchild-Martindale Library Information Commons (main floor of the Fairchild-Martindale Library) provides a starting point for getting answers to questions about Lehigh libraries, computing, and telecommunications. Help Desk staff respond to inquiries about hardware, software, classroom and lab computing, library collections and services, and phone problems and services. You can reach the help desk by calling 610-758-HELP (4357). The Help Desk is available by email at email@example.com or by chat. More information about the Help Desk is available at: http://www.lehigh.edu/helpdeskBack to Questions
Library & Technology Services
8A East Packer Ave,
Bethlehem, PA 18015
Lehigh University provides a leading-edge library and technology environment that enables flexibility, innovation, and effectiveness in all areas of the academic enterprise, including learning and the student experience, research, administration, community-building and outreach.
27 Memorial Drive West, Bethlehem, PA 18015