What happens to my E-Mail account when I graduate or resign?

In case you are graduating or resigning, the email will be deactivated after 90 days.

If you have special circumstances and you would like to keep your account active for a longer time, please get in touch with the Director of the computer center.

What do I need to check before opening an E-Mail attachment?

  1. Check the sender’s email address (e.g., username and domain name) to make sure it is not from a suspicious sender
  2. Make sure the content of the email is not empty
  3. Make sure the content of the email is addressed to you and it is about a topic that you are familiar with
  4. Check the sender’s signature and make sure it is recognizable
  5. After checking 1-4, download the attachment and before opening it scan it for viruses using the anti-virus software that is installed on your computer
  6. Take extra caution when opening attachments with the following file extensions: .exe, .zip, .rar, .cab, .iso, etc
  7. Make sure to disconnect your external storage external devices ( External Hard Disk, USB flash) after every use

What do I do when my computer crashes?

There are many reasons why a computer may just stop working or "freeze". Most of the time there isn't much we can do about it, it is a fact of life that computer programs have become so complex that occasionally users will experience problems even when performing common tasks. When your computer no longer responds to keyboard commands your best bet is to re-boot the computer.

I lost my printer installation disk, how can I install my printer?

Thankfully a missing printer installation disk or disc is not the end of the world and will not require you to wait until a new diskette or CD can be sent to you. Today all printer and other hardware manufacturers are providing downloads on the Internet to their software programs and drivers that are included with their products.

Can I receive fax on my extension number?

All university phone numbers are capable of receiving faxes without the need of a fax machine. To receive a fax, ask the the sender to the send the fax to your phone number. GJUs phone system will detect a fax call and intercept the call. The system will receive the fax and email it to your GJU email address as a PDF attachment.

If you are having difficulty with this service please contact ISTC Ext. 4040

What types of attachments can I use with my Exchange account, and how large can they be?

The attachment limit is 10 MB per email. You can send any attachments except the ones listed in the following table:

File extension File type
.ade Microsoft Access project extension
.adp Microsoft Access project
.app Application file
.asp Active server page
.bas Microsoft Visual Basic class module
.bat Batch file
.cer Internet Security Certificate file
.chm Compiled HTML Help file
.cmd DOS CP/M command file, Microsoft Windows NT command script
.cnt Windows Help contents file
.com Microsoft MS_DOS program
.cpl Control Panel extension
.crt Security certificate
.csh Script file
.der DER Encoded X509 certificate file
.exe Executable file
.fxp Microsoft Visual FoxPro compiled program
.gadget Windows Gadget
.grp Windows program group file
.hlp Help file
.hpj Help project file
.hta HTML program
.inf Information or setup file
.ins Internet Naming Service
.isp Internet Communication settings
.its Internet Document Set file
.jar JAVA archive file
.js JavaScript source code
.jse JScript Encoded script file
.ksh UNIX Shell script file
.lnk Windows shortcut
.mad Microsoft Access module shortcut
.maf Microsoft Access shortcut
.mag Microsoft Access diagram shortcut
.mam Microsoft Access macro shortcut
.maq Microsoft Access query shortcut
.mar Microsoft Access report shortcut
.mas Microsoft Access stored procedures
.mat Microsoft Access table shortcut
.mau Media attachment unit
.mav Microsoft Access view shortcut
.maw Microsoft Access data access page
.mcf Manifest configuration file
.mda Microsoft Access add-in program
.mdb Microsoft Access program
.mde Microsoft Access MDE database file
.mdt Microsoft Access data file
.mdw Microsoft Access workgroup
.mdz Microsoft Access wizard program
.msc Microsoft Common Console document
.msh Windows PowerShell script helper
.msh1 Windows PowerShell script helper
.msh2 Windows PowerShell script helper
.mshxml Windows PowerShell script helper
.msh1xml Windows PowerShell script helper
.msh2xml Windows PowerShell script helper
.msi Windows Installer package
.msp Windows Installer update package file
.mst Visual Test source file
.ops Microsoft Office profile settings file
.osd Open software description file
.pcd Microsoft Visual Test compiled script
.pif Windows program information file
.pl Perl script file
.plg Developer Studio build log
.prf Outlook profile file
.prg Program source file
.ps1 Windows PowerShell
.ps1xml Windows PowerShell
.ps2 Windows PowerShell
.ps2xml Windows PowerShell
.psc1 Windows PowerShell
.psc2 Windows PowerShell
.pst Microsoft Outlook personal folder file
.reg Registration entries, Registry data file
.scf Windows Explorer command file
.scr Windows screen saver
.sct Windows script component
.shb Windows shortcut to a document
.shs Shell Scrap object file
.tmp Temporary file or folder
.url Uniform Resource Locator (Internet shortcut)
.vb Microsoft Visual Basic Scripting Edition (VBScript) file
.vbe VBScript Encoded script file
.vbp Visual Basic project file
.vbs VBScript script file, Visual Basic for Applications script file
.vsmacros Microsoft Visual Studio .NET binary-based macro project file
.vsw Microsoft Visio workspace file
.ws Windows script file
.wsc Windows script component
.wsf Windows script file
.wsh Windows Script Host settings file
.xbap XAML browser application
.xnk Microsoft Exchange public folder shortcut

What do I do if my hard disk fails to work?

As with most computer errors, your first step is to shut down your computer and restart it. This will help you confirm weather or not you actually have a hard disk problem. If the disk is severely damaged then your computer will probably fail to restart properly. If this is the case then contact MC Ware, this is a job for the professionals.

What is a computer virus?

A computer virus is a software program that has been intentionally created to cause a user grief, spread to other computers, or destroy data on an individual's computer. To help prevent a computer from becoming infected by a virus, software developers have developed anti virus programs that stay active on the computer helping to protect it. It is important to realize that many computers do not come pre-loaded with these already installed and that if computers do come with these programs, the programs may expire within 90 days.

How to record a temporary greeting that all callers will hear (until this greeting is deleted)?

  1. Dial 9999 or press the Voicemail button on your phone.
  2. Press 0 for “Mailbox Options”.
  3. Press 4, and follow instructions to record the unavailable greeting.
  4. Wait for the tone.
  5. Say your greeting.
  6. Press ‘#’.
  7. Press 2 to listen to your recording.
  8. Press 1 to accept or 3 to rerecord your greeting.

What is the maximum recipients per email?

60 recipients.

There is no display on the monitor, what do I do now?

Make sure the monitor is on. If no power light (green or orange light) is seen on the monitor display try pressing the power button until it comes on. If your computer monitor was on and you stepped away from the computer and upon returning it was black it's likely that the computer is asleep. Try moving your mouse, clicking the mouse buttons, and/or pressing any key (space bar) on the keyboard to wake it up. Make sure that the monitor is connected properly to the back of the computer.

Does Windows come with a virus protection program?

All versions of Microsoft Windows do not come pre-installed with a virus protection program. This includes: Microsoft Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, Windows XP and Windows Vista.

How to delete your temporary greeting?

  1. Dial 9999 or press the Voicemail button on your phone.
  2. Press 0 for “Mailbox Options”.
  3. Press 4.
  4. Press 2.

What software programs are available for free to GJU Staff?

German Jordanian University has site licenses for many programs including Microsoft Office, Symantec Endpoint and more. See full information on the Software and Downloads page.

What do I do if the image on screen is distorted or skewed?

You may receive a distorted image when the cable is loose or defective. Disconnect the video cable going from the back of the computer and verify that no pins are bent, burnt or broken. Once verified re-connect the monitor cable. If the refresh rate is not properly set the monitor may have a wavy or an appearance that lines are going down or across the monitor slowly or fast, this may also cause a flickering affect. A distorted image can be caused by magnetic or other types of interference. Verify no speakers, fans or other magnetic devices are close to the monitor.

Can a virus damage computer hardware?

No. Computer viruses are software code designed to spread to computer files and other computers, delete files, and cause other problems with the data on the computer. So if you're experiencing an issue with a hardware device such as your printer, video card, sound card, etc. it is not due to a virus.

How to record the greeting that callers hear when you are unavailable?

  1. Dial 9999 or press the Voicemail button on your phone.
  2. Press 0 for “Mailbox Options”.
  3. Press 1, and follow instructions to record the unavailable greeting.
  4. Wait for the tone.
  5. Say your greeting.
  6. Press ‘#’.
  7. Press 2 to listen to your recording.
  8. Press 1 to accept or 3 to rerecord your greeting.

Why is a file opening in Protected View and how can I exit it?

Protected View is used by Office for some files if they are from an unknown location or sender, are a blocked file type or editing isn't allowed. You will see a message near the top of the document or file; click on the message for more details and, if allowed, to exit protected view and edit. Only do this if you know the file is from a trusted source and you must read it, opening unknown files may infect the computer with a virus or other malicious program. Additional help can be found at Microsoft Office's What is Protected View?

I get a 'no signal input' message, what do I do?

Verify that the monitor is properly connected in the back of the monitor as well as to the back of the computer. If the monitor appears to be connected properly, verify that a cable is not loose by disconnecting all cables that can be disconnected in the back of the monitor (generally the data cable cannot be disconnected). Next, disconnect the data cable connected to the back of the computer and then reconnect the cable. When connecting the cable in the back of the computer ensure the cable connection is tight. Most Computers will also have screw ends that can be screwed in to hold the connector in place.

If I format or erase my hard drive will it remove a virus?

If your computer is infected with a virus formatting or erasing the hard disk drive and starting over will almost always remove any type of virus. However, keep in mind if backups have been made that contain the virus, other media or drives connected to the computer have a virus, your computer is connected to another computer on a network with a virus, and/or the virus is stored on some other type of software you use with your computer it can become re-infected if not properly protected.

How to record your name?

  1. Dial 9999 or press the Voicemail button on your phone
  2. Press 0 for “Mailbox Options”
  3. Press 3, and follow instructions to record your name.
  4. Wait for the tone.
  5. Say your name.
  6. Press ‘#’.
  7. Press 2 to listen to your recording.
  8. Press 1 to accept or 3 to rerecord your name.

How can I quickly find a command or menu option I used in a prior version of Office?

Microsoft's web site has instructions and an interactive guide that lets you view an older version of an Office program, select a command or option you used to use, and then show you how to select the same option within the 2010 version: Microsoft's Use an interactive guide to find my commands

There are black borders on my screen, what do I do?

If the resolution was recently changed it is possible for the monitor to not auto adjust or shift to the correct size. If this occurs, the resolution can be changed back to the original setting or you can manually adjust the monitor. If a black border exists on the monitor it can generally be resolved by manually adjusting the horizontal or vertical width. Because each monitor is different, the method of adjusting this setting will vary; consult your monitor documentation.

How do I delete Internet cookies?

Microsoft Internet Explorer users can go to tools and then choose 'Delete browsing history..', you can then choose to delete your Internet cookies.

How to make a call from the university?

  1. To call a phone number within the university, dial the 4 digit extension number only.
  2. To call a landline phone number in Amman, dial the 7-digit phone number without area code (06)
  3. To call other phone numbers in Jordan, dial 0 followed by the area code, then phone number (e.g. 027270000)
  4. To call an international phone number dial 00 followed by country code and phone number (e.g. 004940056789)

 

This service is subject to access permission.

What if this FAQ did not answer my question?

Send your question to helpdesk@gju.edu.jo or you can call the information desk at (+962) 429-4444 Ext. 4040

I need program X installed on my workstation?

Please contact the technical support on Ext. 4040

Why is my mouse acting erratically?

Users who have an optical mechanical mouse (most common mouse for desktop computers) are likely experiencing erratic behaviour because the mouse is not clean or is dirty. If you've cleaned the mouse and continue to encounter issues and this mouse has worked in the past fine unfortunately your mouse is likely defective. One additional test that can be done to help determine if this is the case or not is to connect the mouse to another computer. Otherwise we suggest replacing the mouse.

What should I do if my PC responds erratically, is sluggish or freezes up?

Most of the time this is happening due to a lack of available computer resources, such as RAM (random access memory). Occasionally, programs will consume a lot of RAM when they are opened and won't free up that memory for the operating system (i.e., Windows XP, Vista, Linux...) when the program is closed.

First, try closing all applications that you can do without. If this does not remedy the problem, restarting the computer will release back the resources. If the start button is still responding, select Start/Shut Down, then Restart. If the Start button isn't responding, simultaneously press the Ctrl, Alt & Del keys, then select Restart.

If all else fails, push and hold the power button for a slow 10 second count. You will see the computer power down. You will then have to push the power button again to turn the computer back on; you will lose any unsaved changes to files that were open prior to (hard) rebooting.

How to make a call to the university?

  1. The main university number is +962-6-429-4444
  2. The university can also be called at the following international phone numbers:
    • USA: +1-202-600-2226
    • Germany: +49-4022611081

Internal extensions that start with the digit 4 can be dialed from the outside directly without calling the main university phone number. For example extension 4040 can be called from outside the university as 06-429-4040.

How to contact technical support?

The GJU ISTC Service Desk is the main technical support group for staff and faculty members at GJU. You can call Ext. 4040, email helpdesk@gju.edu.jo or stop by the ISTC offices in your building.

What if my printer show message (PAPER JAM)?

Check printer paper path if there any paper jammed in printer, remove paper slowly, and never use force to remove paper, ( Always there is instruction strikers on printer door show how to remove this papers )

The wheel on my mouse isn't working properly, what do I do?

If you're running any version of Microsoft Windows and are encountering issues with the mouse wheel first attempt to adjust the mouse settings through the Mouse Properties window. This window can be accessed by opening the Control Panel and double-clicking the Mouse icon.

How to clean my LCD monitor?

Don’t use anything containing ammonia. The next time you walk down the automotive aisle look for some Auto Glass Cleaner. You’ll notice that Auto Glass Cleaner contains no ammonia and you should see the words "Ammonia Free" on the container and the price is just slightly more than regular window cleaner. Now you have something to clean your LCD screen with plus your car windows!

How I can forward my GJU mails to my personal account?

  • Log in to your GJU account http://mail.gju.edu.jo/owa
  • Go to Mail Option --> Organize E-Mail --> Inbox Rules
  • Create new rule for arriving messages
  • From " When the message arrives, and:" menu choose "Apply to all Messages"
  • From "Do the following:" menu choose " Redirect the message to..."
  • The address book will popup
  • In " Message recipients:" type your personal email and click OK
  • Click Save

How do I setup an Out of Office / On Vacation message?

Log in to your email account through web mail https://mail.gju.edu.jo/owa

choose Mail--> Options --> Organize E-Mail --> Automatic Replies

 

I already removed the paper that jammed in the printer, but the message still appears?

This mean you are not correctly remove paper from printer, there is pieces of paper inside the printer, Call technical support to fix it.

How can I clean my keyboard?

The keys on a keyboard are only clipped on, with a knife or other thin object carefully pop the keys off, this will allow you to clean under the keys as well as cleaning the keys themselves.

What is a Cookie?

Cookies are small files that websites put on your computer hard disk drive when you first visit. Think of a cookie as an identification card that's uniquely yours. Its job is to notify the site when you've returned. Cookies shouldn’t be confused with viruses. While it is possible to misuse a cookie in cases where there is personal data in it, cookies by themselves are not malicious.

Many websites, including Microsoft's, use cookies. Cookies tell us how often you visit pages, which helps us find out what information interests you. In this way, we can give you more of the content you like and less of the content you don't.

Cookies can help you be more efficient. Have you ever put something in a virtual shopping cart in an online store and then returned a few days later to find that the item is still there? That's an example of cookies at work.

Cookies let you store preferences and user names, register products and services, and personalize pages.

But if you never register or leave personal information at a site, then the server only knows that someone with your cookie has returned to the website. It doesn't know anything else. You're in charge of deciding whether "they" know anything about you.

Do I need a new account to login to Moodle?

No, you can login to Moodle using your GJU E-Mail credentials similarly to MyGJU

How do I access email from offsite?

What if my printer show message (Paper Mismatch)?

Please check printer properties to select paper size and type , all printers in university are use A4 Paper size & Plain paper Type ( you can check this option from printer properties and go to ( Layout , Basic ,,,,,etc. ) tab and make sure the paper size / type setting is set to A4 / Plain .

Is it safe to turn off a Windows computer without doing a shut down?

Users should not simply press the power button or restart the computer while Windows is still running unless there is an issue with the computer. Microsoft has included the shut down feature because it enables a computer to go through all the all the necessary steps that are required before turning off the computer. In fact many versions of Microsoft Windows will check the computer for any problems if the computer is not shut down properly.

Should I leave the computer on or turn it off?

Turn it off when not in use! You turn your TV, radio, and other devices off, so shut that computer down, too. There are always two sides to this issue and we believe the reasons to shut it off outweigh the reasons to leave it on, including leaving your system in "sleep" or "standby" mode.

Another reason you should shut your system down is memory leakage. When you run a program it grabs a chunk of memory to use and it is suppose to free up the memory when you close it, but sometimes it doesn't release all the memory and it becomes unavailable for other programs to use. When this happens your resources may become low and your computer sluggish. Re-starting the unit will solve this problem. When you just place your system in "suspend" mode it won't refresh your memory.

When you get an error message or other computer problem, the first thing you need to ask yourself is, what have you changed or installed. If you turn your computer off every day you only have to remember the last 24 hours but if you keep your system on and the error occurs after a reboot you have to remember everything that you did since the last time you rebooting your system which could be days, weeks or even months!

Your computer contains at least one fan if not more. These fans suck in air along with dust. Even if you have a very clean environment, the longer they run the dirtier they get inside.

How do I get a full backup of my email?

The current email server stores messages in a database system that is not directly user accessible, therfore you can use any email client to accomplish that.

Using Microsoft Office Outlook 2013 :

  1. File --> Open & Export --> Import / Export --> Export to a File --> Next --> Outlook Data File ( .pst ) --> Next
  2. Highlight your account name and make sure that "include subfolders" is checked then click on Next
  3. Choose the physical path for your backup file or keep the default location ( C:\Users\[username]\Documents\Outlook Files\backup.pst )
  4. Check " Do not export duplicates item " and click Finish

 

How I can print on both sides?

Go to printer properties and from tab ( Layout , Basic ,,,, etc. ) there is an option ( Duplex , 2 side printing or print on both side ) make sure that option is set to duplex , 2side printing ,,,,etc. )

How can I recover a file from the recycle bin?

Double click the recycle bin icon on your desktop, here you will see all of the files within your bin. Select the files you wish to recover, right click and choose restore.

What does it mean when my wireless adapter tells me I have "Limited or No Connectivity?"

This means that your computer failed to receive an IP address from the server.

How much space do I have on my Exchange account?

Staff and Faculty Members 500 MB

Students 350 MB

My printer prints, but the print quality is too sharp?

May your printer toner is empty, Please call technical support to check it.

I am unable to send or receive email?

Verify that your computer is able to see the Internet and/or other computers to ensure that your computer is not encountering a connection issue, which would be causing your e-mail issue. Ensure that your Internet e-mail server or your Network e-mail server is not encountering issues by contacting either your Internet Service Provider or your Network administrator.

Why does my wireless card disconnect frequently?

Most of the time, this is caused by a low signal strength from the wireless access points. Some adapters will be able to pick up on weaker signals, while others will drop the connection sporadically. If you are using an adapter that works solely on the 2.4 GHz frequencies (such as B and G cards), then try not to operate electronics that also work on the frequency (such as 2.4 GHz phones and microwaves) in the vicinity.

Some wireless adapters, however, do have driver issues that may cause them to sporadically break their connection. To avoid this issue, always make sure that you are running the proper drivers from the manufacturer’s Web site.

How can I change my outlook E-Mail account password?

  1. Log in to your account through the web mail https://mail.gju.edu.jo/owa
  2. Mail --> Options --> Settings --> Password
  3. Enter your current password, type a new password, and then type it again to confirm it.
  4. Click Save

Note : The Password mustmeet the minimum length and complexity requirements.

  • Not contain the user's account name or parts of the user's full name that exceed two consecutive characters
  • Be at least six characters in length
  • Contain characters from three of the following four categories:
    • English uppercase characters (A through Z)
    • English lowercase characters (a through z)
    • Base 10 digits (0 through 9)
    • Non-alphabetic characters (for example, !, $, #, %)

I make print job but nothing happen in printer?

Make sure the printer is powered on, and check USB cable between computer and printer, check paper tray and make sure is not empty, Make sure you was select this printer , and printer is not paused .

I cannot receive any email attachments?

If the e-mail box is full of other e-mail messages and/or your storage space is only a few megabytes it's possible that the attachment being sent cannot be received. Often if this problem is occurring the person sending the e-mail should get a response back from your e-mail server indicating that your mailbox is full and/or has exceeded its allocated size. Because computer viruses and other malware are best distributed through e-mail, many e-mail service providers, companies, and e-mail programs prevent certain types of file extensions from being distributed or received through e-mail. For example, Microsoft Outlook protect its users by automatically disabling certain file extension types from being received in e-mail.

How to make my password secure?

It is essential that clients follow the best practices of password security.

· Don't reveal a password over the phone to ANYONE.
· Don't reveal a password in an e-mail message.
· Don't talk about a password in front of others.
· Don't hint at the format of a password (e.g., "my family name").
· Don't reveal a password on questionnaires or security forms.
· Don't share a password with family members.
· Don't reveal a password to co-workers while on vacation.
· Don’t use the "Remember Password" feature of applications.
· Don’t use the same password on several computers and/or services as once revealed, it would compromise the security within all the others in one go.
· Do not write passwords on a piece of paper.
· Choose passwords that have a combination of upper case, lower case and numbers.
· If you choose good passwords and keep them confidential your password will remain secure.

What should I do if I've forgotten my exchange email account password?

Password need to be reset, Please call ISTC at Ext. 4040

Print quality is too poor; there is black line in paper?

This mean your printer may need new drum, please call technical support to check it.

Are spaces allowed in email addresses?

Just like an Internet URL no spaces are allowed in an e-mail address. However, names can be broken up using a period; for example, John Smith may have an e-mail address: john.smith@computerhope.com or john.s@computerhope.com because no spaces are allowed in the e-mail address.

What are the best practices in choosing a password?

The following provides some tips for the management of passwords.

· use longer passwords
· do not use real words in passwords
· change your passwords periodically
· use a combination of upper and lowercase letters, as well as numbers and symbols in passwords
· use a different password for GJU accounts than for personal accounts
· for more important accounts use different, more complicated passwords or passphrases

The table below is a quick guide to relative strength of passwords.
 

4 characters (only letters and numbers)

too short

Not Acceptable
6 characters (letters, numbers)
Very Weak
6 characters (letters, numbers, AND symbols)
Weak
8 characters (letters, numbers, AND symbols)
length OK
OK
10 characters (letters, numbers, AND symbols)
very good length
Better
12 characters (letters, numbers, AND symbols)
Best

Will I see the same mailbox sub-folders on any computer and Outlook Web?

Yes, you can see all sub-folders in your mailbox if it was an ( Offline Storage Table .ost ) file, other files ( Personal Storage Table .pst ) will not sync. and you can see it just on one device ( locally ).

I made a copy on the copy machine, but the copy has a black line?

Make sure that the copy machine glass is clean, if not try to clean it .( follow instructions on copy machine door to clean it) , if not please call tech. Support to check copy machine .

My printer is printing smudged/distorted pages?

When printing on untraditional paper your printer may experience smudges, un-even or crooked text, and/or text that runs off the edges of the paper. Your printer may be printing fuzzy, blurry, and/or other faint text because of dirty print heads. All modern printers have some type of printer cleaning, self-test, and/or diagnose mode that can be performed to check and clean the printers print heads and other internal equipment used to print.

What are the best practices in remembering multiple passwords?

A big problem with passwords is making them "strong" yet memorable. A strong password is one that is hard to guess (e.g. not a dictionary word or a number), is "complex" by using letters, numbers and special characters, and is long to defeat brute-force attacks (where every combination of letters and numbers is tried). Users want something memorable, not something cryptic and hard to remember.

People's natural tendency is to use a word that they will remember, like a pet's name or their favourite meal. These are often proper words that are found in a dictionary and are considered weak passwords because they are easily guessed by someone who knows you.

It is recommended that instead of picking a password, pick a passPHRASE. For instance, you could use the phrase "Winner winner, chicken dinner!" It's easy to remember, yet is long enough and has enough special characters to make a complex password. Passphrases can be based on anything, a favourite line from a movie, or a nursery rhyme for example.

You should also use substitutions to strengthen passphrases.

If you wanted a very strong passphrase for your most important accounts, you would want to make sure any dictionary words are changed using character substitution. Take the passphrase "Winner winner, chicken dinner!" again for example.

You could eliminate the dictionary words by replacing one of the 'n's by a capital 'N', or replacing the consecutive nn's by the lookalike 'm': "WinNer wimer, chickeN dimer!" Another frequent substitution is to replace the 'i' by '1' or 'l', resulting in "W1nNer wimer, ch1cken dimer!"

For a long passphrase, you could just make an acronym from it. Take the phrase "If not for bad luck, I would have no luck at all." By taking the first letter of each word and the punctuation in the phrase, you can create a password: "Infbl,Iwhnlaa." That's a pretty strong password, yet it's still very easy to remember.

If you use the same kind of substitutions all the time, then you begin to remember the substitutions, so each time you change a password, all you need to do is remember the phrase and apply the substitutions.

Use a common root to help retention.

Passphrases are very useful for creating strong passwords. However, even with all the great phrases available to us, you may begin to run out of memorable ones. Another approach is to use a common root for the password a few times to extend the lifetime of the passphrase. You can either change the substitutions or add some new elements.

For instance, using "Winner winner... " again, if you previously changed the 'i' into a '1', perhaps this time you can choose to flip letters over, making 'w' into 'm' and 'n' into 'u', giving you "Miuuer miuuer..." You could change the menu, and have "Winner winner, eggplant dinner!" Some people like to include the date, so that all they have to do is remember the root and the date they last changed their password: "Win20ner win09ner, chick09en din25ner!" if they changed their password Sept 25, 2009.

Combining the passphrase, substitution and common root approaches can help you to make strong, memorable passwords that have an extended lifetime, simplifying your password management task and increasing the security of your accounts.

How I can setup email signature?

Using Outlook Web:

  1. Log in to your account through web mail https://mail.gju.edu.jo/owa
  2. Mail --> Options --> Settings --> Mail
  3. Write your signature and save

Using Microsoft Office Outlook 2013:

  1. File --> Options --> Mail
  2. Click on Signatures button
  3. Write your signature and click Ok

 

Note : The signature can't be synchronized. therefore the only signature you will have is the one defined in your email client.

My computer does not turn on, what do I do now?

First check the computer's power cord to make sure it is completely plugged into the wall socket. If you are using a plug strip, make sure it is completely plugged into the wall socket and that the power switch on the plug strip is turned on. Some plug strips also have a built in circuit breaker which usually looks like a black or red button near the power switch. Press the button to reset it and see if that solves the problem.

How do I fix a paper jam?

Turn off the printer. Inspect the location or tray the printed paper ejects to. If the stuck paper is visible manually remove it. Remove all paper trays and any paper that may be stuck between the tray and the printer. If the stuck paper is visible manually remove it. Open the printer door that allows you access to the printer ink cartridges or toner and look for any stuck paper. If the stuck paper is visible manually remove it. Turn the printer back on.

What is Windows Remote Assistance?

Sometimes clients and the HelpDesk can work more efficiently when they are both looking at the same screen. This is easy when your computer is at the Service Counter, but when people are working in their office over the phone, communication can be more difficult. That is why using Remote Assistance can be a great help to both you and to the HelpDesk. The nice thing about Remote Assistance is this feature is already installed on all computers running Windows XP, and ready to use. It is also secure, because no one can connect to your PC without you giving them permission.

After receiving a request for Remote Assistance, the HelpDesk consultant can remotely connect to your PC and view the screen directly to fix the problem. When you initiate a request for help, the Remote Assistance client securely sends an encrypted ticket to the HelpDesk consultant who is prompted to accept the invitation.

Remote Assistance uses a simple, secure process in establishing a connection between you and HelpDesk: