What happens to my E-Mail account when I graduate or resign?

In case you are graduating or resigning, the email will be deactivated after 90 days.

If you have special circumstances and you would like to keep your account active for a longer time, please get in touch with the Director of the computer center.

What do I need to check before opening an E-Mail attachment?

  1. Check the sender’s email address (e.g., username and domain name) to make sure it is not from a suspicious sender
  2. Make sure the content of the email is not empty
  3. Make sure the content of the email is addressed to you and it is about a topic that you are familiar with
  4. Check the sender’s signature and make sure it is recognizable
  5. After checking 1-4, download the attachment and before opening it scan it for viruses using the anti-virus software that is installed on your computer
  6. Take extra caution when opening attachments with the following file extensions: .exe, .zip, .rar, .cab, .iso, etc
  7. Make sure to disconnect your external storage external devices ( External Hard Disk, USB flash) after every use

What do I do when my computer crashes?

There are many reasons why a computer may just stop working or "freeze". Most of the time there isn't much we can do about it, it is a fact of life that computer programs have become so complex that occasionally users will experience problems even when performing common tasks. When your computer no longer responds to keyboard commands your best bet is to re-boot the computer.

What types of attachments can I use with my Exchange account, and how large can they be?

The attachment limit is 10 MB per email. You can send any attachments except the ones listed in the following table:

File extension File type
.ade Microsoft Access project extension
.adp Microsoft Access project
.app Application file
.asp Active server page
.bas Microsoft Visual Basic class module
.bat Batch file
.cer Internet Security Certificate file
.chm Compiled HTML Help file
.cmd DOS CP/M command file, Microsoft Windows NT command script
.cnt Windows Help contents file
.com Microsoft MS_DOS program
.cpl Control Panel extension
.crt Security certificate
.csh Script file
.der DER Encoded X509 certificate file
.exe Executable file
.fxp Microsoft Visual FoxPro compiled program
.gadget Windows Gadget
.grp Windows program group file
.hlp Help file
.hpj Help project file
.hta HTML program
.inf Information or setup file
.ins Internet Naming Service
.isp Internet Communication settings
.its Internet Document Set file
.jar JAVA archive file
.js JavaScript source code
.jse JScript Encoded script file
.ksh UNIX Shell script file
.lnk Windows shortcut
.mad Microsoft Access module shortcut
.maf Microsoft Access shortcut
.mag Microsoft Access diagram shortcut
.mam Microsoft Access macro shortcut
.maq Microsoft Access query shortcut
.mar Microsoft Access report shortcut
.mas Microsoft Access stored procedures
.mat Microsoft Access table shortcut
.mau Media attachment unit
.mav Microsoft Access view shortcut
.maw Microsoft Access data access page
.mcf Manifest configuration file
.mda Microsoft Access add-in program
.mdb Microsoft Access program
.mde Microsoft Access MDE database file
.mdt Microsoft Access data file
.mdw Microsoft Access workgroup
.mdz Microsoft Access wizard program
.msc Microsoft Common Console document
.msh Windows PowerShell script helper
.msh1 Windows PowerShell script helper
.msh2 Windows PowerShell script helper
.mshxml Windows PowerShell script helper
.msh1xml Windows PowerShell script helper
.msh2xml Windows PowerShell script helper
.msi Windows Installer package
.msp Windows Installer update package file
.mst Visual Test source file
.ops Microsoft Office profile settings file
.osd Open software description file
.pcd Microsoft Visual Test compiled script
.pif Windows program information file
.pl Perl script file
.plg Developer Studio build log
.prf Outlook profile file
.prg Program source file
.ps1 Windows PowerShell
.ps1xml Windows PowerShell
.ps2 Windows PowerShell
.ps2xml Windows PowerShell
.psc1 Windows PowerShell
.psc2 Windows PowerShell
.pst Microsoft Outlook personal folder file
.reg Registration entries, Registry data file
.scf Windows Explorer command file
.scr Windows screen saver
.sct Windows script component
.shb Windows shortcut to a document
.shs Shell Scrap object file
.tmp Temporary file or folder
.url Uniform Resource Locator (Internet shortcut)
.vb Microsoft Visual Basic Scripting Edition (VBScript) file
.vbe VBScript Encoded script file
.vbp Visual Basic project file
.vbs VBScript script file, Visual Basic for Applications script file
.vsmacros Microsoft Visual Studio .NET binary-based macro project file
.vsw Microsoft Visio workspace file
.ws Windows script file
.wsc Windows script component
.wsf Windows script file
.wsh Windows Script Host settings file
.xbap XAML browser application
.xnk Microsoft Exchange public folder shortcut

What is a computer virus?

A computer virus is a software program that has been intentionally created to cause a user grief, spread to other computers, or destroy data on an individual's computer. To help prevent a computer from becoming infected by a virus, software developers have developed anti virus programs that stay active on the computer helping to protect it. It is important to realize that many computers do not come pre-loaded with these already installed and that if computers do come with these programs, the programs may expire within 90 days.

How to record a temporary greeting that all callers will hear (until this greeting is deleted)?

  1. Dial 9999 or press the Voicemail button on your phone.
  2. Press 0 for “Mailbox Options”.
  3. Press 4, and follow instructions to record the unavailable greeting.
  4. Wait for the tone.
  5. Say your greeting.
  6. Press ‘#’.
  7. Press 2 to listen to your recording.
  8. Press 1 to accept or 3 to rerecord your greeting.

What is the maximum number of recipients per email?

60 recipients.

There is no display on the monitor, what do I do now?

Make sure the monitor is on. If no power light (green or orange light) is seen on the monitor display try pressing the power button until it comes on. If your computer monitor was on and you stepped away from the computer and upon returning it was black it's likely that the computer is asleep. Try moving your mouse, clicking the mouse buttons, and/or pressing any key (space bar) on the keyboard to wake it up. Make sure that the monitor is connected properly to the back of the computer.

How to delete your temporary greeting?

  1. Dial 9999 or press the Voicemail button on your phone.
  2. Press 0 for “Mailbox Options”.
  3. Press 4.
  4. Press 2.

What software programs are available for free to GJU Staff?

German Jordanian University has site licenses for many programs and they are :
 
  • Semantic X.
  • Ms 365.
  • Azure development tools.

How to record the greeting that callers hear when you are unavailable?

  1. Dial 9999 or press the Voicemail button on your phone.
  2. Press 0 for “Mailbox Options”.
  3. Press 1, and follow instructions to record the unavailable greeting.
  4. Wait for the tone.
  5. Say your greeting.
  6. Press ‘#’.
  7. Press 2 to listen to your recording.
  8. Press 1 to accept or 3 to rerecord your greeting.

Why is a file opening in Protected View and how can I exit it?

Protected View is used by Office for some files if they are from an unknown location or sender, are a blocked file type or editing isn't allowed. You will see a message near the top of the document or file; click on the message for more details and, if allowed, to exit protected view and edit. Only do this if you know the file is from a trusted source and you must read it, opening unknown files may infect the computer with a virus or other malicious program. Additional help can be found at Microsoft Office's What is Protected View?

I get a 'no signal input' message, what do I do?

Verify that the monitor is properly connected in the back of the monitor as well as to the back of the computer. If the monitor appears to be connected properly, verify that a cable is not loose by disconnecting all cables that can be disconnected in the back of the monitor (generally the data cable cannot be disconnected). Next, disconnect the data cable connected to the back of the computer and then reconnect the cable. When connecting the cable in the back of the computer ensure the cable connection is tight. Most Computers will also have screw ends that can be screwed in to hold the connector in place.

If I format or erase my hard drive will it remove a virus?

If your computer is infected with a virus formatting or erasing the hard disk drive and starting over will almost always remove any type of virus. However, keep in mind if backups have been made that contain the virus, other media or drives connected to the computer have a virus, your computer is connected to another computer on a network with a virus, and/or the virus is stored on some other type of software you use with your computer it can become re-infected if not properly protected.

How to record your name?

  1. Dial 9999 or press the Voicemail button on your phone
  2. Press 0 for “Mailbox Options”
  3. Press 3, and follow instructions to record your name.
  4. Wait for the tone.
  5. Say your name.
  6. Press ‘#’.
  7. Press 2 to listen to your recording.
  8. Press 1 to accept or 3 to rerecord your name.

How can I quickly find a command or menu option I used in a prior version of Office?

Microsoft's web site has instructions and an interactive guide that lets you view an older version of an Office program, select a command or option you used to use, and then show you how to select the same option within the 2010 version: Microsoft's Use an interactive guide to find my commands

There are black borders on my screen, what do I do?

If the resolution was recently changed it is possible for the monitor to not auto adjust or shift to the correct size. If this occurs, the resolution can be changed back to the original setting or you can manually adjust the monitor. If a black border exists on the monitor it can generally be resolved by manually adjusting the horizontal or vertical width. Because each monitor is different, the method of adjusting this setting will vary; consult your monitor documentation.

How do I delete Internet cookies?

Microsoft Internet Explorer users can go to tools and then choose 'Delete browsing history..', you can then choose to delete your Internet cookies.

How to make a call from the university?

  1. To call a phone number within the university, dial the 4 digit extension number only.
  2. To call a landline phone number in Amman, dial the 7-digit phone number without area code (06)
  3. To call other phone numbers in Jordan, dial 0 followed by the area code, then phone number (e.g. 027270000)
  4. To call an international phone number dial 00 followed by country code and phone number (e.g. 004940056789)

 

This service is subject to access permission.

What if this FAQ did not answer my question?

For Students Send your question to Tech.Support@gju.edu.jo 

For Employees Send your question to helpdesk@gju.edu.jo

Or you can call the information desk at (+962) 429-4444 Ext. 4040

Why is my mouse acting erratically?

Users who have an optical mechanical mouse (most common mouse for desktop computers) are likely experiencing erratic behaviour because the mouse is not clean or is dirty. If you've cleaned the mouse and continue to encounter issues and this mouse has worked in the past fine unfortunately your mouse is likely defective. One additional test that can be done to help determine if this is the case or not is to connect the mouse to another computer. Otherwise we suggest replacing the mouse.

What should I do if my PC responds erratically, is sluggish or freezes up?

Most of the time this is happening due to a lack of available computer resources, such as RAM (random access memory). Occasionally, programs will consume a lot of RAM when they are opened and won't free up that memory for the operating system (i.e., Windows XP, Vista, Linux...) when the program is closed.

First, try closing all applications that you can do without. If this does not remedy the problem, restarting the computer will release back the resources. If the start button is still responding, select Start/Shut Down, then Restart. If the Start button isn't responding, simultaneously press the Ctrl, Alt & Del keys, then select Restart.

If all else fails, push and hold the power button for a slow 10 second count. You will see the computer power down. You will then have to push the power button again to turn the computer back on; you will lose any unsaved changes to files that were open prior to (hard) rebooting.

How to contact technical support?

ISTC Helpdesk is the main technical support group for the university's staff and faculty. You can contact extension 4040, submit a ticket through helpdesk@gju.edu.jo or stop by the ISTC offices in your building.

What if my printer show message (PAPER JAM)?

Contact ISTC Technical members.

The wheel on my mouse isn't working properly, what do I do?

If you're running any version of Microsoft Windows and are encountering issues with the mouse wheel first attempt to adjust the mouse settings through the Mouse Properties window. This window can be accessed by opening the Control Panel and double-clicking the Mouse icon.

How to clean my LCD monitor?

Don’t use anything containing ammonia. The next time you walk down the automotive aisle look for some Auto Glass Cleaner. You’ll notice that Auto Glass Cleaner contains no ammonia and you should see the words "Ammonia Free" on the container and the price is just slightly more than regular window cleaner. Now you have something to clean your LCD screen with plus your car windows!

How I can forward my GJU emails to my personal account?

  • Log in to your GJU account
  • Go to Mail Option --> Organize E-Mail --> Inbox Rules
  • Create new rule for arriving messages
  • From " When the message arrives, and:" menu choose "Apply to all Messages"
  • From "Do the following:" menu choose " Redirect the message to..."
  • The address book will popup
  • In " Message recipients:" type your personal email and click OK
  • Click Save

How do I setup an Out of Office / On Vacation message?

Log in to your email account and choose Mail--> Options --> Organize E-Mail --> Automatic Replies

 

What is a Cookie?

Cookies are small files that websites put on your computer hard disk drive when you first visit. Think of a cookie as an identification card that's uniquely yours. Its job is to notify the site when you've returned. Cookies shouldn’t be confused with viruses. While it is possible to misuse a cookie in cases where there is personal data in it, cookies by themselves are not malicious.

Many websites, including Microsoft's, use cookies. Cookies tell us how often you visit pages, which helps us find out what information interests you. In this way, we can give you more of the content you like and less of the content you don't.

Cookies can help you be more efficient. Have you ever put something in a virtual shopping cart in an online store and then returned a few days later to find that the item is still there? That's an example of cookies at work.

Cookies let you store preferences and user names, register products and services, and personalize pages.

But if you never register or leave personal information at a site, then the server only knows that someone with your cookie has returned to the website. It doesn't know anything else. You're in charge of deciding whether "they" know anything about you.

I am unable to send or receive email?

Verify that your computer is able to see the Internet and/or other computers to ensure that your computer is not encountering a connection issue, which would be causing your e-mail issue. Ensure that your Internet e-mail server or your Network e-mail server is not encountering issues by contacting either your Internet Service Provider or your Network administrator.

What is Windows Remote Assistance?

Sometimes clients and the HelpDesk can work more efficiently when they are both looking at the same screen. This is easy when your computer is at the Service Counter, but when people are working in their office over the phone, communication can be more difficult. That is why using Remote Assistance can be a great help to both you and to the HelpDesk. The nice thing about Remote Assistance is this feature is already installed on all computers running Windows XP, and ready to use. It is also secure, because no one can connect to your PC without you giving them permission.

After receiving a request for Remote Assistance, the HelpDesk consultant can remotely connect to your PC and view the screen directly to fix the problem. When you initiate a request for help, the Remote Assistance client securely sends an encrypted ticket to the HelpDesk consultant who is prompted to accept the invitation.

Remote Assistance uses a simple, secure process in establishing a connection between you and HelpDesk

I cannot receive any email attachments?

If the e-mail box is full of other e-mail messages and/or your storage space is only a few megabytes it's possible that the attachment being sent cannot be received. Often if this problem is occurring the person sending the e-mail should get a response back from your e-mail server indicating that your mailbox is full and/or has exceeded its allocated size. Because computer viruses and other malware are best distributed through e-mail, many e-mail service providers, companies, and e-mail programs prevent certain types of file extensions from being distributed or received through e-mail. For example, Microsoft Outlook protect its users by automatically disabling certain file extension types from being received in e-mail.

What if my printer show message (Paper Mismatch)?

Please check printer properties to select paper size and type , all printers in university are use A4 Paper size & Plain paper Type ( you can check this option from printer properties and go to ( Layout , Basic ,,,,,etc. ) tab and make sure the paper size / type setting is set to A4 / Plain .

Are spaces allowed in email addresses?

Just like an Internet URL no spaces are allowed in an e-mail address. However, names can be broken up using a period; for example, John Smith may have an e-mail address: john.smith@computerhope.com or john.s@computerhope.com because no spaces are allowed in the e-mail address.

How I can print on both sides?

Go to printer properties and from tab ( Layout , Basic ,,,, etc. ) there is an option ( Duplex , 2 side printing or print on both side ) make sure that option is set to duplex , 2side printing ,,,,etc. )

My printer is printing smudged/distorted pages?

When printing on untraditional paper your printer may experience smudges, un-even or crooked text, and/or text that runs off the edges of the paper. Your printer may be printing fuzzy, blurry, and/or other faint text because of dirty print heads. All modern printers have some type of printer cleaning, self-test, and/or diagnose mode that can be performed to check and clean the printers print heads and other internal equipment used to print.

My printer prints, but the print quality is too sharp?

May your printer toner is empty, Please call technical support to check it.

I make print job but nothing happen in printer?

Make sure the printer is powered on, and check USB cable between computer and printer, check paper tray and make sure is not empty, Make sure you was select this printer , and printer is not paused .

How do I access email from offsite?

Please follow this link https://outlook.office.com/mail/

The print quality is too poor; there is a black line on the paper.

This mean your printer may need new drum, please call technical support to check it.

How do I get a full backup of my email?

The current email server stores messages in a database system that is not directly user accessible, therfore you can use any email client to accomplish that.

Using Microsoft Office Outlook 2013 :

  1. File --> Open & Export --> Import / Export --> Export to a File --> Next --> Outlook Data File ( .pst ) --> Next
  2. Highlight your account name and make sure that "include subfolders" is checked then click on Next
  3. Choose the physical path for your backup file or keep the default location ( C:\Users\[username]\Documents\Outlook Files\backup.pst )
  4. Check " Do not export duplicates item " and click Finish

 

My computer does not turn on, what do I do now?

First check the computer's power cord to make sure it is completely plugged into the wall socket. If you are using a plug strip, make sure it is completely plugged into the wall socket and that the power switch on the plug strip is turned on. Some plug strips also have a built in circuit breaker which usually looks like a black or red button near the power switch. Press the button to reset it and see if that solves the problem.

How can I change my outlook E-Mail account password?

  1. Log in to your account through the webmail 
  2. Mail --> Options --> Settings --> Password
  3. Enter your current password, type a new password, and then type it again to confirm it.
  4. Click Save

Note : The Password must meet the minimum length and complexity requirements.

  • Not contain the user's account name or parts of the user's full name that exceed two consecutive characters
  • Be at least six characters in length
  • Contain characters from three of the following four categories:
    • English uppercase characters (A through Z)
    • English lowercase characters (a through z)
    • Base 10 digits (0 through 9)
    • Non-alphabetic characters (for example, !, $, #, %)

What should I do if I've forgotten my exchange email account password?

The password needs to be reset, Please contact ISTC 

Will I see the same mailbox sub-folders on any computer and Outlook Web?

Yes, you can see all sub-folders in your mailbox if it was an ( Offline Storage Table .ost ) file, other files ( Personal Storage Table .pst ) will not sync. and you can see it just on one device ( locally ).

Should I leave the computer on or turn it off?

Turn it off when not in use! You turn your TV, radio, and other devices off, so shut that computer down, too. There are always two sides to this issue and we believe the reasons to shut it off outweigh the reasons to leave it on, including leaving your system in "sleep" or "standby" mode.

Another reason you should shut your system down is memory leakage. When you run a program it grabs a chunk of memory to use and it is suppose to free up the memory when you close it, but sometimes it doesn't release all the memory and it becomes unavailable for other programs to use. When this happens your resources may become low and your computer sluggish. Re-starting the unit will solve this problem. When you just place your system in "suspend" mode it won't refresh your memory.

When you get an error message or other computer problem, the first thing you need to ask yourself is, what have you changed or installed. If you turn your computer off every day you only have to remember the last 24 hours but if you keep your system on and the error occurs after a reboot you have to remember everything that you did since the last time you rebooting your system which could be days, weeks or even months!

Your computer contains at least one fan if not more. These fans suck in air along with dust. Even if you have a very clean environment, the longer they run the dirtier they get inside.

What does it mean when my wireless adapter tells me I have "Limited or No Connectivity?"

This means that your computer failed to receive an IP address from the server.

Why does my wireless card disconnect frequently?

Most of the time, this is caused by a low signal strength from the wireless access points. Some adapters will be able to pick up on weaker signals, while others will drop the connection sporadically. If you are using an adapter that works solely on the 2.4 GHz frequencies (such as B and G cards), then try not to operate electronics that also work on the frequency (such as 2.4 GHz phones and microwaves) in the vicinity.

Some wireless adapters, however, do have driver issues that may cause them to sporadically break their connection. To avoid this issue, always make sure that you are running the proper drivers from the manufacturer’s Web site.

How to make my password secure?

It is essential that clients follow the best practices of password security.

· Don't reveal a password over the phone to ANYONE.
· Don't reveal a password in an e-mail message.
· Don't talk about a password in front of others.
· Don't hint at the format of a password (e.g., "my family name").
· Don't reveal a password on questionnaires or security forms.
· Don't share a password with family members.
· Don't reveal a password to co-workers while on vacation.
· Don’t use the "Remember Password" feature of applications.
· Don’t use the same password on several computers and/or services as once revealed, it would compromise the security within all the others in one go.
· Do not write passwords on a piece of paper.
· Choose passwords that have a combination of upper case, lower case and numbers.
· If you choose good passwords and keep them confidential your password will remain secure.

Is it safe to turn off a Windows computer without doing a shut down?

Users should not simply press the power button or restart the computer while Windows is still running unless there is an issue with the computer. Microsoft has included the shut down feature because it enables a computer to go through all the all the necessary steps that are required before turning off the computer. In fact many versions of Microsoft Windows will check the computer for any problems if the computer is not shut down properly.

What are the best practices in choosing a password?

The following provides some tips for the management of passwords.

· use longer passwords
· do not use real words in passwords
· change your passwords periodically
· use a combination of upper and lowercase letters, as well as numbers and symbols in passwords
· use a different password for GJU accounts than for personal accounts
· for more important accounts use different, more complicated passwords or passphrases

The table below is a quick guide to relative strength of passwords.
 

4 characters (only letters and numbers)

too short

Not Acceptable
6 characters (letters, numbers)
Very Weak
6 characters (letters, numbers, AND symbols)
Weak
8 characters (letters, numbers, AND symbols)
length OK
OK
10 characters (letters, numbers, AND symbols)
very good length
Better
12 characters (letters, numbers, AND symbols)
Best

How can I recover a file from the recycle bin?

Double click the recycle bin icon on your desktop, here you will see all of the files within your bin. Select the files you wish to recover, right click and choose restore.

What are the best practices in remembering multiple passwords?

A big problem with passwords is making them "strong" yet memorable. A strong password is one that is hard to guess (e.g. not a dictionary word or a number), is "complex" by using letters, numbers and special characters, and is long to defeat brute-force attacks (where every combination of letters and numbers is tried). Users want something memorable, not something cryptic and hard to remember.

People's natural tendency is to use a word that they will remember, like a pet's name or their favourite meal. These are often proper words that are found in a dictionary and are considered weak passwords because they are easily guessed by someone who knows you.

It is recommended that instead of picking a password, pick a passPHRASE. For instance, you could use the phrase "Winner winner, chicken dinner!" It's easy to remember, yet is long enough and has enough special characters to make a complex password. Passphrases can be based on anything, a favourite line from a movie, or a nursery rhyme for example.

You should also use substitutions to strengthen passphrases.

If you wanted a very strong passphrase for your most important accounts, you would want to make sure any dictionary words are changed using character substitution. Take the passphrase "Winner winner, chicken dinner!" again for example.

You could eliminate the dictionary words by replacing one of the 'n's by a capital 'N', or replacing the consecutive nn's by the lookalike 'm': "WinNer wimer, chickeN dimer!" Another frequent substitution is to replace the 'i' by '1' or 'l', resulting in "W1nNer wimer, ch1cken dimer!"

For a long passphrase, you could just make an acronym from it. Take the phrase "If not for bad luck, I would have no luck at all." By taking the first letter of each word and the punctuation in the phrase, you can create a password: "Infbl,Iwhnlaa." That's a pretty strong password, yet it's still very easy to remember.

If you use the same kind of substitutions all the time, then you begin to remember the substitutions, so each time you change a password, all you need to do is remember the phrase and apply the substitutions.

Use a common root to help retention.

Passphrases are very useful for creating strong passwords. However, even with all the great phrases available to us, you may begin to run out of memorable ones. Another approach is to use a common root for the password a few times to extend the lifetime of the passphrase. You can either change the substitutions or add some new elements.

For instance, using "Winner winner... " again, if you previously changed the 'i' into a '1', perhaps this time you can choose to flip letters over, making 'w' into 'm' and 'n' into 'u', giving you "Miuuer miuuer..." You could change the menu, and have "Winner winner, eggplant dinner!" Some people like to include the date, so that all they have to do is remember the root and the date they last changed their password: "Win20ner win09ner, chick09en din25ner!" if they changed their password Sept 25, 2009.

Combining the passphrase, substitution and common root approaches can help you to make strong, memorable passwords that have an extended lifetime, simplifying your password management task and increasing the security of your accounts.