Skip to main content

Degrees:
B.A. English, emphasis in Technical Writing. UW-Eau Claire, 1990.
Masters in Library and Information Studies. UW-Madison, 1998.

I'm a Senior Information Processing Consultant specializing in desktop and server security issues in the College of Letters & Science.

My current areas of expertise include desktop and server security management, and web development in Drupal (LessonShare & Collaborative Sites), My past areas of expertise include Moodle, Chat (IRC, Jabber, video), and Voice Tools. I also have a wide range of experience with computer lab management, imaging, cloning, and lab configuration issues for PPC Macs, Intel Macs, and Windows computers.

Web server security, Desktop security, Moodle, Drupal, Voice Tools, Chat, Lab Management

My contributions

Titlesort icon Type Posted
"Mailbox Update" phishing email
There's nothing like a campus-wide phishing email to enliven a Monday afternoon.  Today, the TechZone began receiving messages from...
Story 11/23/2015 - 16:44
Audacity: Recording your voice
The attached PDF document outlines the steps required to record your voice in the LSS InfoLab using the Audacity application.  ...
How to guide 01/19/2009 - 11:42
Case Scenario Builder: Transitioning to the new email reporting server
This document is targeting CSCR Builder (CSCR) users that are using the email reporting feature.  If you use CSCR Builder, but don't...
How to guide 08/27/2012 - 11:36
CLUE tip sheet
The UW-Madison Campus Libraries have provided the attached tipsheet for those students completing CLUE.  CLUE is a web-based...
Story 09/08/2009 - 13:54
Collaborative Sites: Create a Glossary Post
Glossary Post Glossary Posts allow you to define a term, character, or topic that you are using in your course. You may or may not have the...
How to guide 07/02/2010 - 14:20
Configuring the CSB email reporting feature
The CSCR Builder application provides the option of grade reports emailed to the instructor.  To take advantage of this feature, there...
How to guide 08/27/2012 - 11:14
Don't believe it. The Wisc! Helpdesk
Don't ruin your holiday season by falling victim to this new phishing scheme.  An email with the subject "The Wisc! Helpdesk" is...
Story 12/20/2013 - 14:49
Foreign character key combinations (Macintosh)
The attached document displays two types of key combinations often used when composing non-English documents on a Macintosh. The...
How to guide 01/05/2009 - 17:36
Foreign character key combinations (PC)
The attached document displays two types of key combinations often used when composing non-English documents in Windows. The Microsoft...
How to guide 01/05/2009 - 17:32
Formatting the external LaCie hard drives
Your LaCie drive should be formatted as FAT32 when you check it out from the InfoLab.   See the table below for information about...
How to guide 11/23/2010 - 15:00
H2 Audio Recorders: Start to finish
You’ve checked out an H2 audio recorder. The case contains the following items, needed for using the recorder: Recorder Power supply...
How to guide 01/25/2010 - 15:35
Happy Cyber-Security Month!
Better anticipated for Halloween, October is also Cyber Security Month. Instead of ghosts and goblins, beware of malware, viruses, and...
Story 10/02/2012 - 09:58
How to use Identity Finder - Windows
Identity Finder is a software that looks for private (or "restricted") data on your computer and helps you remove or protect it. ...
How to guide 10/21/2014 - 14:21
Identity Finder logo Identity Finder: What do I do now?
Identity Finder is a software tool that helps find restricted or sensitive data saved in files on your computer. In departments supported...
Story 11/12/2012 - 16:40
Is this real?
No, it's not, but it's difficult to tell without a second look.  One of my colleagues forwarded me this very realistic phishing email...
Story 06/24/2014 - 12:37
Premium Drupal Themes by Adaptivethemes