Conference Phones

We have been adding conference calling capabilities to some conference rooms around campus, and have put together a table to help you determine which room and what type of conference phone will meet your needs. Read on.

There are two types of conference phones, “analog”–a traditional phone line–and “Voice over IP” (or “VoIP”). We have been adding VoIP ports to various conference rooms when we are able (there are sometimes technical limitations that don’t allow us to add a VoIP port), and surveying the availability of analog ports as well.

Media services loans both analog and VoIP conference phones, but the first step is to figure out which type you will need. We have put together a list of all of the conference rooms with conference call capabilities and the type of phone that you need for each. Some conference rooms have multiple ports, so there may be a choice of phone types. Check out the list before you make your next conference call.

We may be adding more VoIP ports in the future and will update the list as that happens.

Six Signs it is a Scam

It must be phishing season–several examples of scam emails have come my way this week. Here are six clues to look for to figure out if it’s legit Hampshire email.

Those of you who have been here a few years will remember how many scam emails we used to get. That number has gone way down, largely thanks to the efforts of our system administrators. There are always going to be holes in our net, though, so one or two phish may find it to your inbox. Here are some things to watch for:

  1. The email is from someone not at Hampshire. We send out our own warning messages, and they’ll always come from an address including “”
  2. The email contains links to “hidden” web addresses. If you see a link to a website in email, put your cursor over the link without clicking. While the blue link text can say whatever it wants, if you look down at the bottom of the window you can see where it’s really going to send you to. We always show you exactly where we’re sending you, so the two should match; but even if they don’t, the real location would always be “”.
  3. The email wants you to go to a website because you’re over quota. If you’re over quota, just start deleting, no need to go off to any website other than Webmail!
  4. The email sends you someplace other than to change your password. If your account is indeed “locked” (which is a pretty rare thing), the page at will tell you that and instruct you to call us.
  5. The email mentions the wrong quota size. Our email quota is 2.5GB. That may change, but you can always see what it is and how close you are to it by logging into Webmail at It’s right there at the top of the window.
  6. The email contains gross grammatical errors. Not that we use the queen’s English or anything, but we can usually string together a group of words that include a subject and a predicate. This is becoming less of an issue, though, as scammers get more sophisticated.

If you’re unsure about an email after scanning it for signs, give us a call or send it our way; we’ll be able to tell you for sure. The Hampshire College help desk can be reached at, or 413.559.5418.

When Windows 10 Does Not Play Nice with our Networks

We were stumped this week by a Windows 10 computer that had to re-register with our wireless network every day. Turns out it’s a “feature” that was turned on in Windows 10.

Our Wallace network for faculty & staff and Gromit network for students both require that computers using them go through a registration process once a year. To register a computer you enter your Hampshire username and password, and once it is verified your computer is granted access to the network for the rest of the academic year. To accomplish this, behind the scenes we record a unique identifier for the computer so that the computer will be recognized the next time it connects to the network. The unique identifier is called the “Media Access Control” or “MAC” address for short.

Every device that connects to the internet has a MAC address that doesn’t change over the lifetime of the computer; Windows 10 adds a feature that allows the computer to make up a new (fake) MAC address every day. I won’t bore you with the details of why this might be desirable, but if you’re on the run from the FBI or hiding from the NSA you might want to consider it. On the other hand, if you’re on campus and want to use wireless, you definitely should make sure it’s off.

The consequence of this being turned on at Hampshire is that every day you will have to re-register your computer with the Hampshire network. Painful.

If you have a Windows 10 computer and have trouble connecting to our network, you might want to check the MAC address settings:

  1. Open up your Start menu and choose “Settings.”
  2. Select “Network and Internet.”
  3. In the panel on the left click on “Wi-Fi.”
  4. In the panel on the right select “Manage Wi-Fi settings.”
  5. In the “Random hardware address” section and under “Use random addresses for this network,” select either “On” (for a randomized MAC address that will stay the same) or “Off” (to use the computer’s actual MAC address).

Deleting Old iTunes Backups

If you’re concerned about storage space on your computer, consider removing old iTunes backups.

If you’ve ever looked at the Apple–>About this Mac/”Storage” section on your computer, you may have noticed that there is a chunk of storage space being used by “Other” files. One thing that is grouped in this category is old iTunes backups. On a Windows computer it’s not so easy to see exactly how your files are using up disk space, but it’s easy to check in iTunes to see if there are any backups you are ready to get rid of.

Seeing Exactly how Much Space iTunes Backups are Using (totally optional, for the curious)

If you want to see how much space is being used by iTunes backups on your computer:

On a Mac:

  1. Click on the desktop to make sure you’re in the Finder, hold down the Option key, and choose “Go–>Library”.
  2. Find and select (single click) the folder “MobileSync”.
  3. Select File–>Get Info and look at the “Size” figure.

On a PC the backups are stored in “Users\(username)\AppData\Roaming\Apple Computer\MobileSync\Backup”. To navigate to that folder:

  1. Find the Search bar:
    • In Windows 7, click “Start”.
    • In Windows 8, click the magnifying glass in the upper-right corner.
    • In Windows 10, click the Search bar next to the “Start” button.
  2. In the Search bar, enter “%appdata%”
  3. Press “Return”.
  4. Open up the “Apple Computer” folder
  5. Right-click on the “MobileSync” folder and select “Properties” and look for the folder size.

Checking & Removing Backups in iTunes

When you are ready to remove iTunes backups:

  1. Open up iTunes.
  2. On a Mac choose iTunes–>Preferences, and on Windows choose Edit–>Preferences.
  3. Click Devices.
  4. Choose the backup that you want to delete. If you have several devices or backups, hover the mouse pointer over the backup to see more details.
  5. Choose “Delete Backup”, then confirm.

Cleaning out your Thunderbird Address Book

If you’ve been using Thunderbird for a while it has probably built up a good-sized address book for you. Cleaning it out every now and then is a good practice to avoid making addressing mistakes.

Auto-fill of known addresses is a handy feature, but if you’ve got lots of old addresses hanging around it can cause headaches and mistakes if you’re not paying attention. For instance, usernames at Hampshire should always be unique, but email aliases, which are composed from the person’s first initial and last name, may be re-used. It’s also easier to type the first few letters of someone’s name and home in on the right correspondent if your address book is in good shape.

When you open up your address book in Thunderbird, you will notice there are at least 2: Collected Addresses and Personal Address Book. There may be more, including Mac OS X Address Book, depending on what type of system you’re working on and whether you’ve imported any address books in the past.

Open up each address book, and just scan the list quickly, looking for people who have moved on & with whom you no longer correspond. You can select a name and press the Delete key (Mac) or Backspace key (PC) to remove it. This can be a tedious project, but you can break it into different sessions if need be.

Hampshire Wireless Network Security

iOS 10 gives hints about how to make Hampshire wireless networks more secure. What’s that about?

If you have a device that runs iOS 10 you may have noticed that it offers hints for improving the security of wireless networks, in particular Hampguest, Wallace, and Gromit, but not for Eduroam. There’s nothing you need to do to improve the security, but all of us should understand the basics of the security issue so we can make the best choice.

Limiting Access to Wireless Networks
There are ways to limit who is allowed to connect using wireless networks. At Hampshire we limit access to the Wallace (faculty and staff) and Gromit (student) networks by requiring a Hampshire account be entered to register each device used on those networks; Hampguest is open for the public to use while on campus. This helps us keep our IT infrastructure somewhat protected, as well as helping to keep wireless traffic within our capacity.

Wireless Network Data Security
What simply controlling access to a wireless network does not do is to encrypt the information that you send over the wireless network. Data that is not encrypted is vulnerable to being intercepted by a nearby hacker. Keep in mind, though, that information you send to secure http sites (web addresses that start with “https”), as well as our email system (and hopefully any current email system), are encrypted by protocols enforced by those systems.

Wireless networks that are encrypted protect the information you send from your computer so that an eavesdropping computer cannot decipher them. There are different methods of encrypting, with a WPA2 encryption method being the current standard.

Eduroam is the Encrypted Wireless Network on Campus
Of the Hampshire wireless networks, only Eduroam provides this encryption protection. We strongly recommend that the Hampshire community use Eduroam whenever possible. Eduroam does provide access to file servers and printing for faculty and staff, but there are Hampshire web services that are not currently available on Eduroam; if you run into problems accessing a service, try switching to Wallace to see if it works.

We are planning to eventually discontinue Wallace and Gromit, and switch entirely to Eduroam. It is a good idea to set up Eduroam sooner rather than later, not only to take advantage of its security features, but also because it is available at many other educational institutions.

Learn more about Eduroam

macOS Sierra

If you have a Mac you may have noticed the offer to upgrade to the latest version of the operating system, macOS Sierra. Here’s our breakdown on whether to upgrade.

[Note that with the introduction of Sierra, Apple has changed its naming conventions from “OS X” to “macOS”, similar to their mobile operating system “iOS.”]

New Features in Sierra
Sierra has several new features, but nothing that we have found to be essential:

  • Siri, Apple’ voice-command system, is a part of macOS Sierra. This allows you to talk to your Mac instead of typing in search commands or using menus for basic commands. Apple does tout several other ways to use Siri, but we haven’t integrated those into our workflow. Being able to talk to our phones seems like a really useful feature, but we aren’t sure how helpful it is to be able to talk to our computers, even in a home environment; in an office environment we have not found Siri to be appropriate or useful.
  • You can copy and paste between your iOS devices and your Mac. We haven’t even wrapped our minds around that one, let alone found a use for it.
  • There is support for iCloud storage for all of your Mac desktop and Documents folder files–the idea being that most of the files you use can be synced with iCloud and accessed on your phone or iPad. We do not recommend you use this feature for reasons that are explained below.
  • “Memories” is a feature of Photos that automatically creates albums from your photos. This was admittedly stunning in some instances–family vacations, for instance–but it was absurd in others (we have an awful lot of pictures of computers in our photos that we use to document inventory numbers, damage, repair processes, etc., and Memories includes them right along with our personal photos).
  • There are other enhancements if you use Apple Pay or an Apple Watch, but we haven’t explored those.

Problems We are Aware Of

  • We have read of a serious issue that arose when a user attempted to use the iCloud storage sync feature with two Mac’s and an iOS device: he ended up losing all of the files on one of the computers. Luckily he had a backup of the files, but this tale convinces us that this feature is not ready for prime time, and you should not enable it. Please also note that work-related files of a sensitive nature must never be saved on non-Hampshire devices; see the Hampshire College Data Security Policy.
  • We have not done broad testing of printers, but we have found that some Cannon PIXMA printers do not work with the new system without going through a multi-step work-around every time a document is printed. Hampshire Xerox and HP printers on campus appear to work just fine.
  • Adobe InDesign may have some graphical issues when dragging items around. This problem is purely visual, and other Adobe Creative Cloud applications reportedly work fine.

Our Recommendations

  • We do not find the new features compelling enough to recommend an upgrade. If you do have a strong desire to upgrade, there are no show-stoppers that we have found except for the iCloud syncing feature–use that at your own risk on personal computers, and please do not use it on Hampshire-owned computers.
  • As with any upgrade, you should do a full backup of your computer before you do the upgrade. Our recommendation is to use Time Machine, but if you have another full backup solution that you use, go ahead and use that.
  • Be aware that there may be compatibility issues with applications or printers. It’s always a good idea to do a Google search to see if anyone else has reported issues with key applications or printers and the new operating system.