Computer Repair Information

This webpage will remain available until Spring, 2005.
While this site has resource and reference information that are used by individuals throughout LAUSD, some files and links may be out of date.
Use this site with caution.

 Updated July 30, 2004
Note: Most of the items here are from notes and e-mails accumulated over several years.
Some links and information will be obsolete.

 Computer Repair | Following Up a Network Repair Call | Telephone Repair Unit | LAUSDnet Assistance | ITD | Waterford Repair

CTI and AB2882 and Lexmark Printers | Lexmark Printers - Networking

Win2000 Network Printer Setup |

LAUSDnet Dialup Assistance | LAUSDnet WebMail Account Status |

Apple Harddrive Cloning

Apple MacManager and Office | Apple Care Support Index | Xsever Support site for Higher Ed

KISS Computers

XP Tips and File Recovery | Hard Drive Recovery | Winnebago Support | Lexmark Printers | Dell

Overhead Projectors | When E-Mail Does Not Work | 3Com Network Mapping Software - Free | Fluke Network Testers

Spyware Adware Removal | Netscape 7.0 E-Mail List Migration | Password Control | Win2000 Network Printer Setup

Distributed Internet Backup System | Apple Wireless Use String | Subnet/Class Info

External School Servers Anonymous Web Services | Rogue User ID |Synchronizing Files | Network Security Statements

Win 95 Machine Upgrade Ideas | C2 C3 Insurance Form Details | XP and SIS | AOL Mail

LAUSD Exchanger Server and winmail.dat problems | E-mail Account Blocking

Subnetting info | IT Web Source | Wireless AR WIFI mapping | SPAM | Outlook and Outlook Express SPAM reduction

WEP Keymaker | Teachscape Contact - Accounts

EL Reading Coach's iBook Support | Coach's Gateway Laptop Support | Reading First Laptop Modem fix

Popup Blocking on 2000/XP | Grades on the Web -NOT | Hardware Finding Software | Read180 Support

Vrus Information Center - Computer Associates | Secure POP for ePALS

Windows 2000 Server Hardware/Software information | for PC Bootdisk files

UtilityGeek | Lock Down IE History | Apple Shortcuts OSX OS 9 | File Extension List | Adding and Deleting Names From Active Directory

Create Linux Boot Disk for file recovery and disk recovery | RAIDs Explained

Windows XP utilities includes Turning off Messenger | iPhoto Text inculsion

BootDisks - PC Support - Essential Utilities
 This site has it all:
Thanks to K.J.

Also, see Useful Contacts

Computer Repair Information

Edited from Memoradum No. K-14 "Technology Hotline Procedures"

Webpage for entering repair requests:

Phone for District Computer/Network/Software Repairs and District Applications HelpDesk - 323.224.2277
For repairs, school network, SIS, etc. assistance.
Any computer over five years old will not be supported.

Prepare for the call:

Have ready:

School name: ______________________________________________________________________________

Site Location Code (LC):_____________________________________________________________________

Brief and concise description of the problem:_____________________________________________________

Location of the equipment (room number, office. etc.: _______________________________________________

Make of device: _____________________________________________________________________________

Model: ____________________________________________________________________________________

Red Tag #:_________________________________________________________________________________

Serial #:____________________________________________________________________________________

Person making call: __________________________________________________________________________

Contact person: _____________________________________________________________________________


Making the call:

Call 323.224.2277

Listen to the menu choices. Many times you can be referred to someone trhat can immediately assist you.

If you hold for assistance be ready to provide the information requested.

Write down the reference number given to you, the date when you called, and the estimated time to be contacted or estimated completion date.


After the problem is reported:

The problem may be resolved remotely or by a visit to the location.

If there is no response or if the problem is not resolved by the estimated time provided to you, call 1.323.224.2277 and use your reference number to follow up.


After a Network Trouble call was made, followup procedure
If you call about a Network Problem call 213.633.1070 after a few days after the trouble call. Have the Reference Number ready.


Telephone Repair Unit 213.633.1200




LAUSDnet Assistance

Assistance 213.633.1620

Accounts 213.241.1244 C. Adams

PW assistance 213.241.124(0-5)


ITD 213.633.1227


Waterford repairs and Support
Small Troubles with Waterford computers...? who to call
Teachers can't make the sound work...Can't make this or that turn on... . If they are having problems with the WATERFORD computers then they are to call the phone number on the MOUSE PAD in each of the Waterford rooms. Their technical people will determine if it is a software or a HARDWARE issue. If the tech determines that it is a HARDWARE issue then WATERFORD will contact Arey Jones to send out a technician. DO NOT have the schools call Arey Jones for Waterford machine. Each room has the service number by each of the computers. Make sure that they have the Room number and the Serial number of the machine that is not working correctly. (AND A CONTACT person once the team comes to the school.)

Software: Electronic Education (888)977-7100 Hardware: Arey Jones (800)998-9199


CTI and AB2882 Computer and Printer Repair

Call Apple first for possible Software Problems

866.992.7753, if it's determined a school needs a visit, Apple will give a dispatch number to KIS. KIS will contact the school.
KIS: 562.942.0338 x111/115

Software: Arey Jones (800)998-9199
Hardware: Arey Jones (800)998-9199

Software: Electronic Education (888)977-7100 Hardware: Arey Jones (800)998-9199

Software: Arey Jones (800)998-9199
Hardware: Arey Jones (800)998-9199
Apple support may be similar to the CTI (needs follow up)

AB2882 Printers

Schools that received LexMark printers through the AB2882 program or that are within warranty can access customized LAUSD support from 800-453-9787.

You will be asked to enter your customer number.

Enter - 54201681 followed by # sign.

The number you entered will be repeated on the phone.

If the number is correct, press the number 1.

If it is not correct, press the number 2 and enter the number again.

From there a list of menu options will be presented based on the makes and models of printers supplied by you.

AB2882 printers are Optra 312's, newer models to be received through TLCG III are Optra 320's

Lockdown keys for 2882 installations
Call Business Machine Security
Tell them you have lost keys for the AB2882 computer installation done by Arey Jones.
They may require a request on school letterhead.
They will provide the address.
Also, Arey Jones can be contacted at: (800)998-9199.



Lexmark Printers (312L for CTI and AB2882)

Drivers and MarkVision found at:

Configuring Lexmark 312L for the Network
If you install the Lexmark "Markvision Printer Utility" and the "Printer Server Setup Utility" found on the Lexmark CD, setup and maintenance can be quite easy.

Once you attach the printer to the Print Server, pressing the "TEST" button on the Print Server will yield a printout which contains the MAC address of the print server. Then go to the "Print Server Setup Utility" to assign the IP address. From there on, you can http to the server or use the Printer Utility to configure as needed. There is also some security possible if the need should arise.

Entering the IP in any late browser one can see and assign names for AppleTalk and TCP/IP. You can rename the IP address, also.

Most printer servers have internal webservers and/or telnet access. Have you tried using your webbrowser to connect to the ip of the printer? What about telnet? Also, other people have mentioned that most print servers have to have Appletalk enabled (but it seems that you already have it enabled).

If the printer does not have Appletalk available, you can use a WindowsNT based computer to share the printer to your Appletalk enabled machines. First, install the Appletalk Protocol (directions vary from WinNT to Win2k/XP). You then need to install the printer (using LPR in the Add Printer Wizard). Once done, the printer should be available to Appletalk clients (like the old G3 stations).


Printing with Macs and Lexmarks (non-AppleTalk)

1. Printing via TCP/IP involves a server and a client component.

2. The server is called "lpd" and the client is called "lpr"

3. They both reside on machines that have IP addresses on the same subnet. Ex: Server- Client- and the subnet mask is . (?)

4. Network printers have "lpd" built-in. Setup an IP and Subnet mask and it is ready to accept jobs.

5. The client on a mac can be set up using this howto and "the desktop printer utility" provided by Apple.

The client for the PC is here..
The installation will end in a help file that will show you how to set it up. Basically you need to "add new printer" as a "local printer" of the type you have first. Then use the "properties" "details" and setup a "new port" which happens to have the IP of the said printer.

6. Increase the memory(RAM) "in" the printer if more than 10 clients use it "simultaneously".

7. If you want to route all your print jobs through a "Print Server", ("lpd" running on NT or Linux) can have multiple print queues that are connected to printers,either local to the server or connected via ethernet to TCP/IP(as above). When setting up each client enter the exact name of "queue" as defined on server and use the "server" IP address instead of the "printer" IP address.


Most printer servers have internal webservers and/or telnet access. Have you tried using your webbrowser to connect to the ip of the printer? What about telnet? Also, other people have mentioned that most print servers have to have Appletalk enabled (but it seems that you already have it enabled). If the printer does not have Appletalk available, you can use a WindowsNT based computer to share the printer to your Appletalk enabled machines. First, install the Appletalk Protocol (directions vary from WinNT to Win2k/XP). You then need to install the printer (using LPR in the Add Printer Wizard). Once done, the printer should be available to Appletalk clients (like the old G3 stations).



Windows 2000 Network Printer Setup
Here is a small guide on how to setup the network printer.
Download file here. (Word) created by Fredy C. former MAHS student



LAUSDnet dialup assistance 213.633.1620



LAUSDnet Account Status - 213.633.1244
Use this number to follow up on pending LAUSDnet Applications.
Please note additional staff has been hired to reduce the time it takes to get a new account.


 AB2882 iMac configuration with MacManager
Getting AB2882 MACs to work under MultipleUsers on Office.

When I opened Office on my new MACs under a limited multiple user (student) I was asked for a 10 digit code (only some of my MACs had this issue). I first entered ten ones (111-1111111) as suggested, and it worked. I got an error message, but I clicked through it and everything was fine, even after rebooting, I was not again asked for a 10 digit code, but was allowed access.

Then I tried reading the 10 digits that appear as you open these Office products. I couldn't figure out how to pause them, so I kept restarting the application until I discovered all 10 digits. This code also works without any problems.

As suggested 20 digits appear upon opening the application. and the code is the ten digits following the first five. xxxxx-111-1111111-xxxxx (ten digit code)




Apple 10X Harddrive Cloning

We have have one iBook re-configured to our specs with 10.2.8. (We want to do Panther later.)

We want to clone that iBook to CDs or other methods.

The iBook does not have CD Burn capabilty.

The iBook image was transfered to a G4 laptop running OS 10.2.8.

Attempts were made to burn CDs. The CDs did not boot or install on iBooks.
(Does the burn need to be done on a host iBook?)

What methods are there to clone fully configured iBooks with 10.2.8 and 10.3?

The best way I know of to clone a known good system is to use Carbon Copy Cloner (available on to clone the pristine image,
and then use NetRestore to place the image on a new drive. There is no way to burn a multiple CD image in the field. That is something that's
done at the factory. The way I restore machines most of the time is via an external FireWire drive, or over the network using
NetBoot/NetInstall on OS X. Another option is to keep the image on an iBook and use that as the restore drive when you you need it.
Hope this helps,




KISS Computers


For all Apples from CTI, AB2882, AB1339.

For Lexmark printers from CTI, AB2882, AB1339.




Orlando H, Marlton School found an interesting site for XP Support and file recovery at:


Hard Drive Recovery Companies



Winnebago Support

Winebago was bought by Sagebrush:

Karen Lib at RHS

I manage Winnebago Spectrum v.5 on a W2K network. I'd be happy to assist.


Winebago was bought by Sagebrush:


D. V/W
Library Media Teacher/Network Administrator



Call to determine what remaining warantee is on the computer or peripheral before calling the LAUSD HelpDesk.
Have Service tag and Express Service Code ready.

Technical Support:
General Number:

Customer Care:

Home and Home Office:

Small Business:

Medium Business:

Purchase Programs
Employee Purchase Programs:

Student/Faculty & Staff Purchase Programs:

Before you call Dell:

If you suspect a problem with your system, write down any error messages or beep codes received, if applicable, and perform the diagnostic tests using the Dell Diagnostics Diskette provided with your system. See your system documentation for information about error messages, beep codes, and running the diskette-based diagnostics. Document the results of the diagnostic tests. Talking to a Technician:

*Explain your problem to the technician.

Be prepared to provide the technician with the following information:

*Your system's service tag number

*The names and versions of installed operating systems; the operating system that was running when the problem occurred

*Peripherals being used

*Any error messages and/or beep codes received and when they occurred

*What you were doing when the problem occurred

*What steps you have taken to resolve the problem, including the results from the diagnostic tests

*Cooperate with the technician to resolve the problem.

Cooperation is critical to a successful resolution. Listen carefully and follow the technician's suggestions. Tell the technician exactly what happens when you perform any suggested tasks.





Overhead Projectors
Contact for Overhead Projector repair:
C. Ramirez
1240 Maomi Avenue
Cross streets: Central and 14th
Equipment needs to be brought to the repair facility.




When E-mail does not Work (by R.J at RHS)

Try the "IP address" instead of the "name"..

Remember to change it back in case the numbers are changed.

These settings can be found in "Preferences" for Netscape Messenger.

[Incoming - POP]

[Outgoing - SMTP]

[Webmail - Webmail]|



3Com Network Mapping Software - Free

A sophisticated network software application is available from 3Com.

It is free for a 60 day trial. After registering it is yours with no charge.

It works on Windows.

It can provide warnings messages and produce a graphic map of the connections at your site. Find pathways to show hops. Errors and disconnects may be easy to see, too.

Quick way:

Go to 3Com Download page:

Enter "3C15100C" (no quotes) for a product search.

You should see:

3Com® Network Supervisor Version 3.5

Product # 3C15100C

Look over documentation.

Click on Network Management Software.

The first download would be the second from the bottom (unless you have a Win95 device -- then the bottom file needs to be installed).


Install, try it, add:


Adding 3com_network_supervisor_v3_5_sp4.exe is for 60 day evaluation. A Purchase of a CD is required to continue. Price: $495.




Fluke Network Products
Among the best in the industry. Some products are expensive.

Among the most powerful porducts are:

Portable devices by Fluke can point out the direction and strength to find them.

About $4000, I think.

The ultimate network troubleshooter, about $20000. (FBI bought a bunch of these recently)



Spyware and Ad-ware removal

Ad-ware and spyware are becoming a real nuisance for computer users. Very embarrassing pop-ups are appearing at random when using a browser. Here are articles about a not so nice bunch of guys responsible for a lot of the problem...

For PCs I used a ad-ware/spyware removal application from

Seeking removal programs for Apple.


Migrating e-mail lists to or from Netscape 7.0

E-mail Conversion


E-Mail Password and Password Control
Are you bothered by a list of rude searches performed on your computer by another(or yourself: you cant blame everything on someone else)?

On IE6, Tools > Internet Options > Content > AutoComplete

NS6/7/Mozilla, Edit > Preferences > Privacy&Security > Forms and passwords will allow you to clear the cache and allow/disallow a history of activty.. For student use and classroom computers these should be set to "off" by default.
-RJ Roosevely HS


Distributed Internet Backup System
Since disk drives are cheap, backup should be cheap too. Of course it does not help to mirror your data by adding more disks to your own computer because a fire, flood, power surge, etc. could still wipe out your local data center. Instead, you should give your files to peers (and in return store their files) so that if a catastrophe strikes your area, you can recover data from surviving peers. The Distributed Internet Backup System (DIBS) is designed to implement this vision.

Apple iBook Cart Wireless ITC String Feb. 5, 2003
Question: D. B.
We are about to roll out four mobile lab carts, each with 20 iBooks, all connected (wirelessly) to our Mac Manager network. Any words to the wise before the big deployment?

Reply 1: J. G.
In short: Don't do it.

I worked for months trying to get this working. The airport hub was on the cart with printer and all you had to do was connect a cat 5 wire to the classroom outlet to connect to the network. The biggest problems were:

1. If there is a incorrect connection due to loose wire, wrong type of cable, or any other network problem, it would take over 10 minutes to restart the computers and get back on the network. I couldn't just leave a cart with a teacher for a couple of days. It required constant attention and wasted a great deal of class time.

2. The logons would apparently saturate the wireless network when all were logging on simultaneously (like in a class). Often it would take 5 minutes to log everyone one.

3. Classroom teachers often didn't want their classes on the Internet.

After several months of this, I backed every cart I had (we now have 14) and put them on the old version of mac manager that allowed for local accounts.

Apple even has an article on line that tells you how to downgrade to the old version of mac manager. Each laptop is set up with a local account for each of our 6 periods (no password) with icons and desktop patterns all color coded. This pretty much solved the problem of a kid messing with someone elses document. If a teacher wants Internet, we plug the cart into an outlet. If they don't want Internet, we don't connect the cart to the wall.

This set up is very much liked by our teachers because it is pretty foolproof. I wrote a simple apple script that runs at login that reconnects the laptop to the network if anything has happened.

Reply 2: J. M.
Be sure you have a good tracking system of who is using what! Stress the need for good security practices: ie equipment returned and locked in the cart, do not leave your classroom unlocked when the equipment is in there and you aren't in the room, etc. If there are adjoining rooms, be sure the neighbor's doors are locked too. (I know this sounds obvious, but the teacher next door to me left his room unlocked, I didn't know it and someone entered my room through his and took around $3,000 worth of equipment.)

Also, be sure you have someone who checks the lab cart when it is returned. Some teachers are very careful with things and insist that their students take good care of the equipment. Others don't.

This way you know who you can trust with the equipment and who you can't.

Also, I would have a very clear "rules" list that the borrowing teacher has to sign. Let them know that violations will result in loss of privileges. That way no one can claim that they didn't know the rules!

Reply 3: D. M.
We have one mobile lab with eleven iBooks. I tried to use it for the first time with Macintosh Manager last week. The problem I had was computers dropping off the network. Sometime 3 or 4 in one period, sometimes none. The symptom from the users point of view is the inability to save one's work.

Any work not previously saved is lost. This was very frustrating for the teacher and time consuming for me to try to make it work.

I was going to look closely at that setup in the next few days. I thought maybe I didn't have the optimum base station configuration or the latest versions of some software, but from what Jay says maybe it can't be made to work right now &emdash; a bug?

Ultimately this functionality is essential. A student needs to be able access at any Macintosh Manager workstation on campus the file which was started on a wireless laptop and visa versa.

Reply 4: L. C.
It might be useful for several of us to talk about this if we ever have an ITC meeting. Maybe different vantage points.

We've been using laptop carts with teachers who are introducing My Road to Life Skills classes. Yes, it demands some time from the tech team. It seems worth it to target technology support where it may do most good. Yes, it sometimes takes 5 minutes for all to log-on. But wireless allows students to pair up and take turns completing valuable portfolio applications, for example. There is something about the College Board's site that instantly fixes attention and garners respect...and even young students get the picture that this is a true investment.

Laptops in the classroom tend to be very popular with some teachers...not worth the effort for others. Ones who do use them establish protocols pretty quickly so that time spent on the computer accomplishes a purpose. We show teachers how to remove computers and replace and we have sign-out; sign-in sheets on top of the cart.

Probably be a great idea to bring a timer to the room. Unless teachers follow the protocol, the mess of a Medusa-cart is time-consuming for clean up. Encourage teachers to follow same procedure each time and demand rigor. One Science teacher who loved having kids work on PowerPts began to take things for granted. forgot to check the bottom lock on the cart; she also failed to return the cart to our agreed upon location. You know the story: someone reached in and stole the bottom laptop. I'd put time in at the get-go to make it work well and make teachers happy. But, I also tell them stories and encourage attention to the details.

Reply 5: J. S.
You might want to set up an "emergency folder" on the local hard drive that students have read/write access to. This can be done in the admin of Macintosh Manager. If, for some reason, a client loses connection to the server, they can save in this local folder, log out and then back in, so they can drag their work from the emergency folder to their documents folder. I have second grade classes using this method with no complaints. Also, what seems to be working with our mobile lab of 20 is to place two airport base stations on the cart and assign laptops to the base stations. Even though it is claimed to allow up to 50 users, there is no way even 20 can log in quickly at the same time on one station (or if there is a way, I haven't found it!). 10 per base station seems to work fine. Also, train teachers and students to not put the computers to sleep because then they lose their connection to Macintosh Manager. We train them to save and then log out before going to recess or lunch. That also helps them remember to recharge them. ;-)

Reply 6: R. C.
Our experiences with mobile labs are quite good, we have 15 mobile labs with two more on order. At our site the teachers love the mobile labs primarily because all students can access a computer (no rotating groups which they hate) and the equipment is working (not always the case in a year round school with multiple teachers in a class every day). Working out a protocol and providing frequent training for teachers on the labs has been key to the success.

We've been using students to send the carts out and collect them at the beginning and end of each day with great success, the only problem is making sure 15 labs reach 8 or 9 rooms by the start of period 1.

During the day we attempt to station student workers in the class with the teachers to handle computer problems that arise. Most teachers love this as it gives them a sense of security, when a problem arises they don't need to take care of it. For our students it is a real empowering situation to be the one who knows how to fix everything, plus at 13 I wish I knew 5% of what they do about fixing computers and computer networks. My advice is to train a good group of students to work with you and the laptops. When our students pick up the labs I try to send three to a room one per lab and one student who grabs the airports and moves them to the room for the following day. By setting up the airports the night before we are faced with less to do in the morning.

As to the drop-offs, we experience very few and most seem to be when we make a mistake.

The first time a teacher uses the labs I try to be in the room to start things off and model the use protocol. Inevitably, however, the first day with the laptops is hard, but most teachers really seem to take to them. Or largest problem recently is that we can't accommodate all of the requests for the labs. At minimum our schedule is filled 2 weeks ahead and inevitably somebody needs to wait up to a month to use the computers (which can causes some hard feelings-but what is new for tech people!). It is wonderful to finally have 220 computers being used everyday, every period, and now the demand and support for more are there, quite an amazing situation. And if someone does figure out the maddening tangle of power cables please let me know.




Subnet Classes
Here is the method I'm familiar with:

Subnet mask - one Class C IP - two Class C IPs - four Class C IPs - eigth Class C IPs - sixteen Class C IPs - thirty two Class C IPs - sixty four Class C IPs
by T.S.


Outside Webservices for Schools...

From: P.L.

Hello Everyone!

I hope this email finds you all well. I re-joined the ITC for three reasons: 1) Because I miss you all and

2) I miss the thrill of inconveniencing hundreds of people with brutally long email messages and

3) I wanted to answer this thread. The original email in this thread from Ban was forwarded to me by approximately 1.6 bizillion people, so I felt compelled to re-join and answer personally. In July, I moved from the E-rate office to Security, as many of you know from Bulletin K-24, which has brought me so many adoring fans. Here are some answers (I hope) to the questions that have been discussed in response to the original message to the ITC:

1. Ban wrote:

Is there any school out there that has a public web server outside the firewall so teachers or student can reach it and access or download files? Can this be possible, and who might be the contact person? Or does ITD have strict rules to having a system outside the firewall?


There are a handful of schools that have public web servers outside the firewall. The District does not have a current policy that explicitly restricts this. However, it is my instinct that this will be corrected when the Acceptable Use Policy is next updated. The environment on the Internet is becoming increasingly hostile, both in terms of technical security and the litigious nature of information exchange. It is most likely in the District's best interest to keep our information systems internal to the District. The Office of the General Counsel had a hand in developing our current AUP. I have discussed the issue of schools using external services on their own, and they have expressed concern. I am sure they will weigh in with an opinion when the AUP is revised.

That being the case, if you do not have an external service, my honest suggestion is to not get one, for a few reasons. First of all, although security is of great concern to me, I wince every time I have to discuss removing an instructional service that is currently operational. I go out of my way to NOT do this when I can. However, my instinct is that the District will restrict the use of external web services in the near future, or at a minimum greatly enhance the requirements for using one.

My opinion is that if you get an outside hosting service tomorrow, it is highly likely that someone from the District will require that you stop using it in the future, or make the bar so high for using it that you won't want to bother. At that point, the service may be instructionally viable, and a royal inconvenience to stop. Consequently, I suggest you not start. Also, there are a myriad of laws with respect to the privacy of student and employee information that have a great deal of teeth. I now specialize in security, and I am not overwhelmingly familiar with them. Most of the people I have talked to about privacy are completely unfamiliar with them. If you take it upon yourself to host information services outside the District, I do not know the extent to which the District can protect you if something goes wrong, especially when we have a written policy explaining how to avail yourself of services internally.

As DL pointed out, Bulletin K-24 explains how to host services locally, and make them available to the Internet in a manner that protects the District's network and you. It requires that the District be allowed to scan your server for security issues, and require that you correct them. This is to protect the entire District - if your server is compromised, it could be used as a launching point to attack other servers on the District network. Therefore, we need to do our own due diligence to protect our students and ourselves.

Now folks, here is my honest fear that was raised by the original BM email. (This is the sharing and caring part, which all makes us feel just a little closer at the end!) Since Bulletin K-24 has come out, the number of schools asking for a server to be accessible to the Internet has DRASTICALLY declined. Basically, the procedure usually goes like this:

1. Someone sends me a form saying "Let the world see my email server".

2. I do a security scan of the server, and find 342 security holes that allow a script kiddie to shred your server like a cat through tissue paper. Consequently, they can now use your server to try and attack other District systems.

3. I send the person an email saying "Fix these 342 problems and we are in business!"

4. The person installs Service Pack 3, and tells me to scan again.

5. I rescan the server, and find 329 security holes that allow a script kiddie to shred your server like a cat through tissue paper.

6. I send an email back saying "Fix these 329 problems and we are in business!"

7. I am still waiting for step 7; usually I never hear from the person again.

Here's my concern: There are several applications that allow a very busy teacher to point and click their way to a web server or an email server.

There are no applications that allow you to point and click your way to a secure server. Several people have tried to get a point and click server through the firewall, and when the issue of security is presented, it becomes apparent that "the District is just going to make this hard." Here is another interpretation: The District put a policy in place that is an effort to protect the privacy of our students and staff, the privacy of our information, the integrity of the District's network, and the exposure of legal risk to our employees. This policy makes things hard, because ensuring privacy is hard. However, it is trivially easy to go to a third party hosting service that doesn't care about the privacy of students, doesn't care about the privacy of employees, doesn't care about your legal risk, and has no clue what FERPA, HIPPA, or CIPA are. They care about your $29.99 a month. They can make claims about your privacy all they want, but if they fail, your neck is on the line, not theirs. (Read their privacy policies; I have yet to see one that does not place the entire burden for any legal action on YOU. The District Policy was written out of concern for our students and YOU.)

I am sure this was not the intention of the original question from BanuelosM. I also apologize for continually referring to him or her as BanuelosM. Not one of the 1.6 bizillion people who sent me the email told me his or her real name. However, I am still very concerned for your welfare. Therefore, I would like to work as a team to ensure that our operations do not jeopardize our core business; serving our students.

There have been a few tangents to the original thread:

2. JM wrote:

This reminds of when the question of using of "Tapped In" at school sites came up. It isn't allowed because of port security issues. I don't know if the problem was ever resolved.

Tapped-in uses a port in common with Napster (now defunct more or less), the tini trojan, and two IRC trojans. They were contacted about the issue, and did not apparently wish to change. I do not know if they have resolved the issue. To my knowledge, tapped-in is the only educational service I have come across that is blocked by the firewall. They are also the only service that uses a well-known restricted port. (We are obviously not the only District with the same policy; when I last checked their website this morning, they had a FAQ section that described the modifications that YOUR firewall administrator has to make. When there are enough Districts that have this issue that require them to put that information in a FAQ, does it not become THEIR issue? Yahoo and AOL certainly don't have a problem with pesky firewall administrators!) In my opinion, the issue is clearly theirs.

3. RJ wrote:
I'd give a $50 to the first person who runs( & keeps it), does an installer and a simple howto for a Jabber Server for internal use on LAUSDnet.

For those of you who do not know, Jabber is an internal Chat client. The District has blocked (or made it highly inconvenient) to use Yahoo, AOL, MSN, IRC, and ICQ messaging services. Here is the answer why: All of those services are ANONYMOUS services. You can go to Yahoo, give false information, and get an account. If you now use that service to stalk a student at LAUSD, you can be UNTRACEABLE. There is no positive instructional use of these services that outweighs this risk.

That being said, the District does not (currently) restrict internal services of this nature. Jabber is an open-source tool for doing the same thing. However, it is far from easy to set up (Which you know has to be the case if Ruwan is asking for help!) If you do choose to set it up for internal use, the question is should you? What efforts do you need to make to ensure that one child is not harassed by another child (or an adult!) using your service? If it does happen and you cannot find out who did it, what is your protection? What is your personal liability? Is instant messaging something you feel strongly enough about to take a chance and find out? How many people are deliberately bypassing the District's protection from Yahoo, AOL, etc. and encouraging their students to do the same? (I hope the answer is not many, but I know for a fact it is more than zero). What is your protection if something goes wrong?

I hope this response was of some use to you in understanding the District's position. Please feel free to contact me with any questions or concerns!



Rogue Users Identification
From a windows PC,

Start >> Run >> Command >> Enter

In the MSDOS box,

C:\windows\Desktop>ping IP.of.#$%^&*.machine

C:\windows\Desktop>arp -a
will show the MAC address used by the IP.of. #$%^&*.machine

Email that to ITD with the E-Rate Serial numbers of **all** your switches. They should be able to tell you which switch port is being used by the #$%^&*.



Synchronizing Files

Does anyoneknow of a shareware or pay program that can sychronize a folder from on computer to another over a network? I want to sync my grades from my laptop to a folder on a computer at school while I am there but I would like the process to be automated so that every time I enter a change into my GradeQuick program it happens on my school desktop computer.
by CS
Grant High School

See page 6 of the Easy Grade Pro clipboard manual available here:
basic procedure for sync is: if gradebook user names match on palm and desktop, copies changes on the handheld to the desktop (if id's match) copies all selected classes' info from the desktop to the handheld to make sure both gradebooks are the same a few words of advice for teachers: change first two master attendance categories to Absences and Tardies (class options) otherwise export will be incorrect, make attendance markings with LAUSD guidelines add Work Habits and Cooperation columns to Score sheet for grade printouts make sure teachers are importing using their ID96 disk and not adding students manually
by AD
Fleming MS

Isn't a Palm Pilot with Easy Grade Pro supposed to do this? I use a Pocket PC, so I can't use it for grading. However, whenever I make a change to my Outlook calendar or address book, whether I make the change on my Pocket PC or on my desktop - it all gets synched to the most recent file. I'm hoping that Easy Grade Pro will work the same way.
by Pat

It's been a a very long time since I've used it, but try the Microsoft Briefcase. As long as your laptop can connect to the desktop over the network (it would have to be shared somehow), you can drag/drop files into the briefcase and then you can do an "update" from inside the briefcase folder. That should check and get any new updated files. It's not exactly "automatic" but it's basically a 2-click operation, not exactly time consuming (click Update All -> click OK).
by DL

In Win2K and WinXP there is a very nice feature built-in called "Offline Files". It is very handy. I use it on my personal laptop to make a copy of my documents from home. I was always frustrated because I needed something but never had it with me and realized it was on my home PC. Or, I would have several different copies of the same document and had to figure out which one was the most current. The feature makes a copy of the folder and its contents on the localhard drive. (If you map a drive it is much easier to administer.) It allows you to modify documents while away from home. You can even add new ones. Once you get back home (or in the office) you can have it sync manually or automatically. I always had trouble with the Briefcase feature. The "Offline Files" feature in Win2K is so much easier. They made it even better in WinXP.
by M P

Second Copy works great for folder synchronization/backup
by GL
Poly H.S.

I use Synchronize! for Mac. i used to use it to synchronize all the computers in my lab. pretty handy utility, not to use over airport though. It takes too long.The shareware price is very reasonable.
by TH
Western ES


Network Security

Edited from PL
Privacy concerns that are one of the primary driving forces of the District's network security policies. It is true that protection of our students' is highly regulated by legislation, including:
The Federal Education Rights andPrivacy Act (FERPA),
The Health Information Portability and Accountability Act (HIPAA - This covers adults as well), The California Education Code,
The Children's Online Protection Act (COPA - not specific to schools),
The Children's Internet Protection Act (CIPA),
The Elementary and Secondary Education Act (ESEA),
The No Child Left Behind Amendment, and the
USA Patriot Act (It outlines disclosure rules for student records used in the investigation of terrorism).
While it is a fundamental goal of our network policy to comply with legislation, it is a more important goal to protect privacy because it is the right thing to do.

2. As a very large District with a very large budget, we are an exponentially larger liability target than small Districts, and an exponentially larger target for scrutiny of our actions. (Witness -ed.,) major District movements such as the "Chandra Smith Consent Decree", and the "Rodriguez Consent Decree,". Therefore, when determining network security policies (such as the AUP, or the Firewall Policy) we need to assume that our actions will be under intense scrutiny.


Windows 95 Upgrade Ideas
In my opinion memory upgrades for the most part always improve the performance of a PC (even more then a processor upgrade.) But, as the reply below indicates, if the system is using a motherboard with the slower bus speeds, you may not see a speed increase.

You might want to try this experiment on one machine. Add RAM to get the total amount to 64MB. (I don't believe that Win95 uses more then 64MB of physical RAM. In other words, using more then that is a waste.)

Reinstall Win95 from scratch. Update it to all the latest SPs and Driver versions, etc. Reinstall all your apps. You might also what to specify a PERMENANT swap file of 2 times the physical RAM.

Two things that I remember about Win95 -

1. It constantly needs to be reinstalled because of all the misc. items that get installed in the Registry, WINDOWS\SYSTEM directory, etc. With a clean install you notice a tremendous speed increase. (I never really have seen this with Win98 and beyond.)

2. Care needs to be given to what TSRs and Screen Saver/Backgrounds that get installed. In Win9x, in general, those really bog down the system.

I redid a machine for a family member and showed them the speed of the system after the reload (including Windows startup). They were just blown away with the difference.

With the very old systems you reach the point of diminishing returns on your upgrade investment very fast. Memory for the older systems is harder to find and often costs much more then the newer chips. If you can get away with a system board replacement, you will get a faster data bus and the ability to add a faster CPU and RAM. But then you have a nice new system with old drives and power supply.

by M.P.


C-2 Insurance Coverage for School Computers
C-3 Equipment Replacement Fund
(details from phone conversation, April 28, 2003)

Schools have to send the list because it requires the principal's signature. The serial numbers are registered with the software compliance unit.

No revision of either doc is planned until a new supervisor is in place.

Contact numbers:
Mildred M. - 213 241-3125, fax is 213 241-8993 Claims Supervisor (little need to contact
her on any claims or inventories - send to Rosalie) I would be happy to hear from you. However, if you have questions regarding coverage for damage to District or employees' property (including computers) caused by vandalism, theft, fire, or water, you may want to contact Rosalie L., Claims Processing Supervisor for property claims.

Rosalie L. -
Phone: 213.241.3124 fax        
Fax: (213) 241-8993 Claims Processing Supervisor (send inventories her in hard copy;
preferred with no extra information; see the sample page; signed by the principal)

Ana C., Assistant

Fax: 213.241.8993

Beaudry Building
20th Floor
Insurance Services


the $1000 deductible continues
Call to get form faxed to you or school

Claim forms - call 213.241.3127
$500 or 5% deductible remains
Call to get form faxed to you or school

Inventory form


XP and SIS installations

Problem 1: (by KB) Quick Advice: If you receive a new IBM SIS package computer, and it is giving you problems, remove the regular NIC card so that it doesn't conflict with the 16/4 turbo combo token ring card or vice versa. The two NIC cards conflict.

I hope one of these groups can help with a permanent district wide solution for this problem.

I recently received a new IBM computer from Arey Jones that was from their SIS package. It did not work out of the box. It froze, got errors, and went into safe mode. ITD came out to load SIS and said they couldnt do anything with it and said that they have had this problem on all new SIS token ring configurations from Arey Jones.

Arey Jones came out and the repair man said that these computers come with two NIC cards, regular ethernet and the token ring / ethernet cards. Hes said the two cards conflict. He disabled the regular NIC card so that we could use the token ring combo card.

He said he believes these computer are configured by ITD and sent to the schools. If this is true, I believe we need one of two things to happen.

1. ITD if they do set up these computers, needs to disable the regular NIC cards since the combo card does both ethernet and token ring anyway, thus these new computers will work right out of the box.


2. These need to be configured and ordered by Arey Jones custom SIS package with only the combo card or with the regular card sent in a separate box.


3. Schools need to be able to request the card they want installed depending on whether or not they have token ring SIS or ethernet SIS.

4. Other solutions???

I hope ITD, IBM and/or Arey Jones can work together on a solution so that all new SIS computers will work right out of the box.


Problem 2: Another problem related to XP machines needing Accuterm installations, according to SIS:

Accuterm comes in two versions:
-Version E
_Version F

Both will work with XP but Version F will print with fewer glitches, according to an SIS contact.
SIS has a machine XP with Version F at their location and the recommended setup for schools buying new computers is XP with version F.
In making a call for installations through the HelpDesk 866.633.8110 confirm the need for Version F.



AOL Mail within LAUSD

Netscape use or

Explorer: use

Persons complain they can't get AOL mail. It is not blocked. It is an Explorer Netscape issue.

If you login to the page using Netscape it works fine.

If you use Explorer it doesn't ... Wonder if it is because AOL and NETSCAPE have a very close relationship and that AOL now uses Netscape as their embedded browser.

I have an email address on AOL and have no problem getting to it from Netscape.

Netscape use or

Explorer: use

by DA

another solution:

Try another browser. This often solves the problem. We use Mozilla. It's open source and doesn't require a license. It works better than IE on most sites. It's definately better on Win NT/200/XP machines than IE 6.x. It handles active X better and has much less trouble with most incription. You can get it by download at:

There are many others as well, but this one is easy, compact, and free.



LAUSD Exchanger Server and winmail.dat problems


What are the issues with the Exchange server affecting attachments?

We have a few persons on our staff that use Exchange that are unable to open attachments now.

The Local Office gets converted in late May, so I have not been affected too much, yet.

winmail.dat file attachments are un-openable using Netscape pop e-mailclient and Webmail.

Are there setting configuration solutions?


My guess, is that they are using Macintoshes? And they are not using OUTLOOK or Entourage. J__ will have to tell you how to set up the mail to POP to Netscape. Netscape does not however support the EXCHANGE. The new version of Entourage for the Macintosh or all versions of OUTLOOK for the PC support the Exchange and you shouldn't have that problem.

If you double click the winmail.dat in the Mac Version of OUTLOOK 2001 it will open up the attachment.

Questions were also being refered to VF and JM.



-----Original Message-----

From: KB

Sent: Tuesday, April 29, 2003 8:42 PM


Subject: [itc] winmail.dat server? Outlook?

Hi All,

Thanks for your advice, but I still don't seem to have a good solution for someone who receives a winmail.dat  and can't open it.  All winmail.dat files are not the same. And although some can be opened by notepad or Word's "recover text from any file" many can't be opened at all. My principal recieved another winmail.dat file today about a Principal's Forum., and I could not find a way to open it in a useable format. It did contain a microsoft mail tag and all bad files have been from addresses.

1.Is there any way to open these files on a consistant basis, especially ones with macros?

2. If as was suggested we need to always use webmail, do we need to make a policy that no one use Outlook and all need to use webmail.

3. I read that problems can be caused by improper settings on Exchange Servers or Improper settings on Outlook, and all emails came from addresses to an address, could there be an email server problem?

I hope we can find a solution, this is harming intradistrict communications.




The problem lies in the recipient's mail program, or in their mail server through which the message must pass to reach the recipient.  All of the coding for colors, bullets, indentations, or other features, cannot be ready by the recipient's mail program are contained in a file called winmail.dat which is attached to the email message. The attachment itself is useless as it contains those items which were filtered out from the original email message, so the recipient can read the plain text of the message.


Reply by VF
How to Fix (Sender)

Always send mail to that recipient in Plain Text so that he or she does not get the extra attachments. There are three ways to do this:

1. Make Plain Text your default message format so that everyone gets plain text messages. (On the Outlook Tools menu, click Options, click the Mail Format tab, and in the Send In This Message Format box, click Plain Text.)

2. Change the message format for that recipient when you create the message. (In the open message, on the Format menu, click Plain Text.) This is only used when sending to a single recipient.

3. On a recipient's Contact form, below the E-mail Address box, select the Send Using Plain Text check box. Any message sent to that recipient will be formatted as plain text.

[Text extracted from "Troubleshooting Microsoft Outlook".]

Reply MORE by RJ
But to make one thing absolutely clear: the rule about not sending HTML or attachments has nothing to do with capabilities of the server. In fact, the mail server doesn't distinguish between alphanumeric characters coded as standard English words vs. alphanumeric characters coded in such manner as to render "fun" colors in web browsers. It doesn't care about attachments, either (and attachments are specially-coded text, anyway.)

The reason we Just Say No to HTML and attachments has everything to do with email client capabilities, efficiency, bandwidth and security (just for starters.)

To wit:

1) client capabilities: have you ever seen two browsers render a web page the same way? Have you ever seen a web page that is all black? Ever seen two objects on top of each other? I see it on the Web all the time. I've never seen it as part of this information-based ITC list (then again, I use a text-only client with this list.)

2) efficiency: why send a 4.7 megabyte attachment to all 4 billion members of the ITC list when you could send a URL, and then all three people that are actually interested in that document could go look?

3) bandwidth: pity the poor dialup users who have to sit through endless waiting for 4.7 megabyte attachments to download, especially when they have no interest in that particular topic. Not everybody is on cable or DSL (at least, not that I know of.) Am I wrong in suspecting that there are at least some users on this list who still use 56K modems to download mail at home?


4) security: this one easily trumps all. I am pretty much of the mindset, "put a Windoze machine online, and you are defenseless against virii,

Trojan horses, worms, and all the others of that ilk." Go to web site A, and if you have Javascript turned on, you machine downloads a Trojan. Go to web site B, and the HTML will screw your machine if you are using Explorer 5.x or 6.x. Use the Preview Panel of Outlook and simply previewing specially-crafted HMTL will seriously compromise your machine.

Etc., etc., etc.

Issue #4 comes up particularly due to Micro$loth. Micro$loth, Purveyors of All Things Crap (this has always been Bill's business's called "co-dependency" and has been his approach since the pre Home Brew Computer Club days), in its stealthy way, propagates insecure computing by turning all email into attachments. You know the warning: "never open attachments unless they're from someone you know." Well, that doesn't work. Virii outsmarted that one a long time ago. But by making everything attachments, Micro$loth pretty much guarantees that people will be totally screwed if they have any contact with Micro$loth products at all.

This leads us to winmail.dat (???) and the myriad headaches that come with such a system. The way I read this thread, inclusion of winmail.dat renders LAUSDNet partially useless for email. What was that answer...the client needs to be configured correctly? Was that for *sending* mail, or for *receiving* mail. Have you called your local administrator and told him how to configure his client for sending mail to you (vs. how to configure it for sending mail to somebody else?) Huh???

Of course, you could just do plain text, and the problems that multiply exponentially when using HTML mostly become non-existent.

You may get the impression that I'm opposed in whole to HTML and attachments with email. I'm not...but when it comes to a mailing list being read by billions, plain text is just a whole lot better. That's why the ITC list, along with about 99.874% of the mailing lists online, go with plain-text only.

writer's ability to control his/her formatting

See #1 above.
I've only touched upon the tip of the iceberg here, and I know I'm not near as elegant in my speech as Patrick (see his excellent post from 5/13/03), but I do hope I've made at least a few people here aware of the issues involved with using HTML and attachments with mailing lists.






E-mail Account blockage
District policy precludes the use of anonymous email services from within the District. These services potentially allow an adult or a student to provide fictitious information to the provider, and obtain an email account. If the email account is abused from within the District, it is extremely difficult (if not impossible) to trace the offender. Therefore, in the interest of student safety and the prevention of abuse, anonymous services are blocked.

Mac Mail is a pay service, but it allows a user to have anonymous access to an email account for 60 days before paying for the service. Therefore, anonymous access can be maintained by continually rolling demonstration accounts.

Providers such as Earthlink and AOL provide pay services. Email accounts are tied to user credit card information. AOL provides tree trails, but even these require proof of identity. Macmail requires no such proof,and 60 days is a very long time to provide anonymous access to emailservices. Therefore, it will continue to be blocked.



SPAM - How some e-mails are collected
I figure your recurring problem is from the fact that a lot of the spammers use LDAP to gather tons of email addresses. So, when you remove yourself from their database, and they go on another address hunt, your email once again gets sucked into their vacuum. LDAP stands for Lightweight Directory Access Protocol, which is similar to the Yellow/White pages for email (just in case anyone was wondering).



 Outlook Spam reduction

From Microsoft - Outlook SPAM reduction tips

Outlook Express making Rules



WEP Key Maker (OS X and Carbon) OS 9 and OS X

File sit from

WEP Key Maker v1.1 WEP Key Maker generates a hexadecimal WEP key from a pass phrase. IEEE 802.11b (aka Airport, Wi-Fi) uses a 104- or 40-bit (aka 128- and 64-bit) key to encode packets with WEP encryption. Third party devices typically use a hexadecimal key, which WEP Key Maker helps create. Generating such a key from a pass phrase makes it easy to create and reproduce a key without writing it down. The key can be copied from WEP Key Maker's dialog and pasted directly into Airport dialogs and third-party software. WEP Key Maker also creates keys of other lengths.



Reading First Modem access to LAUSDnet fix

For complete details and screen shots see

In the iBook's "network settings" "System Preferences" (found in the pop-up tray), "Network", "Location", LAUSD numbers "modem", "ppp", each of the phone numbers will need the following information:

DNS server

Search Domain

You would add your user name - don't add - and your password.

Connected to a regular phone line - not an office/or school phone system line - you will be able to dial out.



TeachScape Contact for Account Concerns


Tonikiaa Orange
Project Manager Education Services
Office: 323-660-6829
Cell:   323-896-3616




XP, AOL and PopUp Blocking -- go through entire string

Whenever I log on to the net with AOL on my PC at home I get a bunch of these pop ups that claim they are coming in because my messenger program is broadcasting my info. over the net.

I don't get these problems on my MAC, nor did I get it when I was running Win 98.  I am assuming it is something to do with Win XP Pro that I am running but can't seem to figure out what to turn off in order to prevent this function.  I have popup blocker turned on in AOL but keep getting these messages that claim to be coming through the Messenger program.
I have tried to turn that program off and even uninstall it but I continue to get these popups from message and and other similar websites.
Can anyone tell me if you've had this problem and if you know a fix.
From RL

KB replies: had the same problem. This is due to win2000 and xp messenger service.  I went to the sites below and found AOL had a fix , which I believe needs to be done on an administrator account.  I think it shuts off the operating service messenger service. 
After using the AOL fix, I havn't had any problems.
Keyword Fix It: Main
AOL Search: Results for "fix"
AOL Help


XP Popup Blocking

SL wrote:

Hi, Here it is, I am so happy. This really made my day :)

Here is the link


Getting "Messenger Service" popups out of nowhere?

Tips & Tricks By NB


Recently, the new wave in advertising has been using the Windows 2000/XP Net Send service to broadcast advertisements through the operating system's native messaging function instead of through a Web browser window or spyware. I for one am getting fed up with it. I find it an extreme violation of my privacy, so I've done something about it: I've disabled the Messenger system service (note: this is not the same as Windows Messenger or any other IM program out there) so that I'll never see another one of those popups again.

Getting Started

But first, a few caveats:

1. You need administrator rights to follow this procedure.

2. If you are in a business environment, chances are your system administrator may use the Messenger service to broadcast important server messages. In that case, you should not follow this procedure; hopefully, in a business environment, the company firewall should keep out unauthorized requests like that anyway. If you do get popups like that, talk to your administrator, and he/she should configure the firewall to block out those requests.

Steps to Stop Service

With that out of the way, let's get started:

1. In Control Panel, go to Administrative Tools.

2. Once inside Administrative Tools, go to Services.

3. In Services, scroll down some until you see "Messenger" - you'll want to right-click on that and hit Properties.

4. Before you do anything else in that box, go to the Dependencies tab. It will take a few seconds, but verify that nothing currently installed requires that service to run. Any dependencies for other programs will be in the bottom; ignore the top pane.

5. Chances are you won't have any dependencies; if this is indeed the case, your next step will be to go to the General tab.

6. First, stop the service by clicking "Stop."

7. Give Windows a few seconds to shut down the service.

8. Then, in the dropdown list labeled "Startup type," select the Disabled option.

9. Click OK. At this point, you should have no more of those annoying popups.

JS Webmaster -

The User-Friendly Windows Support Forums


Roosevelt High School


Yeah...and if you don't disable the students' access to the message service, they get into it and start broadcasting nasty messages all over the school.  At first, they forget to mask their computer name, so you can just go to that classroom and pick the student up.  Later, they figure out how to hide the computer name and then it's impossible to trace the origin of the message. 


If you are wary of installing adblockers..
1. Start >> search/find >> "lmhosts.sam"
2. Open this file using notepad
3. Go to this site..
4. Open this link
5. Select/Copy all the lines
6. Paste into file "lmhosts" opened in step 2 then save
7. Clear broweser cache (IE:tools > options > delete > files)
(found on
Enjoy - RJ
PS: To undo..
1. Find and then open lmhosts.sam and delete all lines after..
"# This Hosts file has been altered to block ad servers."
2. Save "lmhosts.sam" exactly and to the same location.




Grades on teh Web - NOT

A discussion has appeared from time to time regarding whether student grades may be posted, and we provide the same warnings. Generally speaking, it is a very poor idea. The information of which you have been speaking is protected by Federal laws. The District has an explicit policy (Bulletin K-24) that disallows having any server available to the Internet that has information protected by the Federal Education Rights and Privacy Act (FERPA) unless the server has a
security plan that has been approved by our legal counsel. The Bulletin does not specifically cover servers hosted by contractors or servers housed on school sites that contain this type of information - that situation will be rectified shortly in newer policies.

In the meantime, the District has a contract to overhaul the Student Information Systems, which includes making the system available via the
web. In the meantime, it is HIGHLY UNADVISABLE to contract with any outside service to perform this function until the District has a
specific policy (which should be shortly) on how to do this while protecting the Students privacy adequately. is a classic example of how NOT to do it with a third party. Look at the Disclaimer and indemnity clause found at:

It essentially says that they have absolutely no liability whatsoever if they completely screw up and release legally protected student
information accidentally, and that you agree to hold them harmless for EVERYTHING. If their security is poor, you can be held PERSONALLY LIABLE
in the event that one of your students sues you, them, and the District. Who do you think will come out the loser in that case?

Also, there frequently seems to be some general idea that "my server is password protected and therefore provides adequate protection for the
information I choose to put on that server, even though the information is protected by Federal laws with which I can be personally sued if I am
wrong." While we applaud the sentiment in doing what you can to personally help children, we continue to be amazed that employees would continue to take such a deep personal risk with little knowledge of the underlying security. Note this statement one more time: THE FACT THAT A SITE IS PASSWORD PROTECTED IS MEANINGLESS TO SOMEONE WHO WANTS TO DO YOUR SERVER HARM. Think of a password as a lock on a door. This is meaningless if your house has no windows. Burglars don't use the front door, and neither do hackers. Most people know just enough to put up an application and password protect it, but have no idea that the service that hosts the password (as long as a myriad of other services) don't require passwords, and allow people access to ALL information. If you do not have a comprehensive knowledge of computer security, you should not even dream of housing sensitive information on your own server.

While it may be frustrating to wait for the new SIS system, it is in the best interest of your students and YOU to wait for a programmed, disciplined approach. Your students and parents will understand.
If not, remember this:
"The parent who is most likely to criticize you because they don't have
web access to their child's personal information will be the same parent
who will be the first to show up with a lawyer if someone ELSE views
their child's personal information."
-edited from an e-mail from PL




Hardware Finding Software for Setting Up a Computer Bootable CD

If you go to their site, Knoppix is now defunct. They closed their
distribution pending European legislation regarding software patents.
The word is today that the European courts have weighed in, and they
Look for Slackware Live

More specifically: (homepage: is generally known as the best "live" CD.  Pop it in,
it should auto-detect just about all your hardware, and you're sitting
at a shiny desktop in under 3 minutes.  It can be a great learning
experience if you've always been curious and wanted to try Linux but
been too afraid to mess with your computer.

Here is a way to explore without touching your hard drive.

This site under CD based distributions has a long listing of cd's that
boot and load a complete Linux OS with Office, E-mail, Internet apps run
directly from the cd. No hard drive required.  Some can be can be
transfered to HD and run from their. They all have been made for various

It's not for everyone, however you might just want to have a look. These run only on Intel boxes.


Read180 Support

HelpDesk for Network SIS problems 866.633.8110
Read180 direct support 800.927.0189


Secure POP on MacOSX
Secure POP on MacOS9
(use Nifty Telnetto portforward any client)
Secure POP on Unix
Secure POP on Win32
(Use Eudora or Terraterm/Putty to portforward any client)

from RJ



Adding and Deleting names from Active Directory

I have found four ways to add/delete users in Active Directory
(with a bulk import from SIS):
MS Resource Kit "addusers"
All with varying levels of ease and capability.  Does anyone have a
recommended favorite or an alternative?



RAIDs Explained



iPhoto Text inclusion
Problem: How to I add text to an image for titling in iPhoto?
You can use the book option and Grab, a built-in utility in Mac OS X to
add text to your slideshow photos. Open Grab from the Utilities in
Applications. Then in iPhoto, click on the book option, arranging all
the pages the way you like, typing in the captions, and determining how
many pictures and what layout you want for each page. Then double click
on the first book page you would like to use, uncheck Show Guides, then
change to the Grab utility and use the Capture - Selection from the
menu bar. After you have captured all the pictures, re-import them into
iPhoto and put them in a new album. Now they are ready with captions
for a slide show.
BTW, I got this suggestion from EW, an Apple Distinguished
Educator recommended by SB, when I asked a similar question.
The cool thing about this solution is that you can then make Quicktime
movies of your slide show book, just like on the iLife sites.

Janice Stearns
Technology Resource Teacher
San Miguel Ave. Elementary School