Skip to main content

Cornell University

Content (1214)

Network administrators at Cornell use the DNS database to record and update DNS information for hosts on the subnets and domains that they administer. Changes made in this database will be uploaded to the Cornell production DNS servers every hour. Following are links to the DNS database:
Consider the configuration options described below when planning your subnet for DHCP. When you've determined your needs, CIT will assist with set up. Contact CIT by sending email to the hostmaster with your requests and/or questions.
If you're responsible for network connections in your department or building, you need to register all the network devices into DNS as per University Policy 5.7, Network Registry. 
If you're responsible for network connections in your department or building, you need to register all the network devices in DNS as per University Policy 5.7, Network Registry. For more information, see How to Comply with Network Registration Policy.
This information is for network administrators who need to set up visitor registrations on their subnets.
What is SafeDNS? SafeDNS helps protect computers from websites that host malicious software.  DNS Defined DNS (Domain Name Service) allows computers on the Internet to have human-readable names. For example, DNS translates www.cornell.edu to the computer-readable address 132.236.204.10.
You may try to replace an uploaded document or file with a new version, but the link keeps pointing to the old one.  Because of the way files are stored in the cloud service, CampusPress gives each upload a unique name by appending characters to the end of the filename. This means that the…
Use a Cornell-branded theme. Cornell has an Emergency Notification System in place which is used to communicate messages to the Cornell community in emergency situations. During an emergency when a message is active, the message will display automatically. At all other times, the code is…
In order for accounts to be created properly, a person who is to be added to a blog needs to log in once at blogs.cornell.edu before the blog administrator adds them to the blog. If this initial login does not happen, instead of signing in through CUWebLogin, CampusPress will try to sign the new…
Your email must be listed as the blog email contact before you can delete a blog. (You'll need to receive and respond to a confirmation email.) Click Settings, and then General. Make sure that your email address is listed in the E-Mail Address box. If it is not, you can make that change.
Installing SAS 9.4 for Microsoft Windows:Please be advised that SAS is a very complex piece of software. Installation is a multi-step, non-intuitive process. We strongly advise that you set aside several hours to devote to installation, and to follow along with our step-by-step instructions below.…
For the latest information about Cornell's ChemDraw license, please see the ChemDraw page at the Department of Chemistry and Chemical Biology.
The theme name is Cornell Branded Theme.Customize your Blog ThemeAll WordPress themes can be customized, but the Cornell default theme includes some quick and easy options available through the Customizer preview.Changes you make in the Customizer preview may not be immediately visible on your…
This feature is available on the Avaya system, which is due to be decommissioned in 2025. Groups that need this feature should migrate to RingCentral.
This feature is available on the Avaya system, which is due to be decommissioned in 2025. Groups that need this feature should migrate to RingCentral.
This feature is available on the Avaya system, which is due to be decommissioned in 2025. Groups that need this feature should migrate to RingCentral.
Any regular system maintenance and server restarts will be scheduled weekdays between 5am and 7am and Sundays between 5am and 12pm. All users should be aware that the system may become unavailable during this maintenance time.
As described in Cornell University Policy 5.10, Information Security, any information that contains any of the following data elements, when appearing in conjunction with an individual’s legal name or other identifier (for example, email address), is considered to be high-risk (confidential)…
To greatly reduce Cornell's risk of suffering data breaches, it's critical to identify what confidential data must be stored (temporarily or permanently) on a staff computer or departmental file server, to secure and track confidential data while it's being stored, and to delete that confidential…
Accepting individual responsibility for the university information entrusted to your care is essential. Data security is a problem that cannot be solved by technology.  If you work with highly sensitive information about other people, especially data classified as confidential under…

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.