It is easy to fake what appears in the From or Reply-to line of an email message. Check the message headers to discover the message's real origin. Message headers are the material that comes...
To stop uploading, you must do one of the following:
Completely remove the filesharing software from your computer (recommended). See directions below.
Locate and change the...
Step One Is Always Confirm the Source
If you receive an unexpected message that asks you to take action by clicking a link or to do something unusual like sending a gift card, check the...
The Cornell IT Security Office (ITSO) recommends the following baseline precautions while traveling internationally. In the event your devices are lost, stolen, or altered while traveling,...
If you are working in an area that has restricted, weak, or slow Wi-Fi, or weak cellular service indoors, consider whether these options might be useful. Please note that Cornell does not endorse...
For information on how to teach remotely, visit the Center for Teaching Innovation's Planning for Teaching Remotely.
See what tools can help you work remotely.
Please also see COVID-19:...
Whether for personal reasons (illness, family care, etc.) or broader situations (pandemic, severe weather, etc.), you may need to be able to conduct your work from remote locations. This article summarizes how university IT services can help with that.