Can’t print a full CATS Report from MyUVM?

We’ve heard some reports of people having trouble printing CATS reports from MyUVM.  In a nutshell, the problem is that the  report is around 13 pages long but when printed from MyUVM they only get the first page.

This is because MyUVM uses a website structure called a frameset, which basically means that the single web browser window is broken up into two or more separate windows.  If a part of the screen contains anything longer than one screenful, thenit has to be printed in a special way.

So, how do you tell if you are inside the MyUVM frameset?  Is the MyUVM logo in the upper left hand corner of the screen?  Yes? then you’re in frames.

Printing CATS from MyUVM – Internet Explorer

Log into MyUVM

Bring up the CATS report

Right click in on the CATs report and select “Print Preview” from the pop up menu.

At the top of the Print Preview screen, change “As laid out on screen” to “Only selected frame”

Click the Printer button to print


Printing CATS from MyUVM – Firefox

Log into MyUVM

Bring up the CATS report

Right click in the CATS report area and from the pop up menu select “This Frame” and then “Print Frame”

Set the printer the way you want (e.g. copies, duplex, page range, etc.)

Click Ok


Printing CATS from MyUVM – Safari

Safari is very friendly towards this sort of thing

Log into MyUVM

Bring up the CATS Report

Control click in the report area and select “Print Frame”


Select “Print Largest Frame” from the File menu.

Do you know what “University Protected Information” is?

I’m guessing that you probably don’t know exactly what we mean when we say “University information” in a security related discussion.  This is because the definitions are buried in the fairly recently published University Information Security Policy and just like End User License Agreements, nobody likes to read policy statements until we have to.

Those of you involved in human subject research, anything HIPAA related, etc are, I’m sure, much more conscious of protecting things like patient information, health records, etc.  Or at least I sincerely hope you are.  But those of you routinely doing “other UVM business” may not be as familiar.

So, extracted from this policy document:

The following definitions apply to UVM information, and not to information about yourself or your friends or family that is unrelated to UVM. 

“Personally Identifiable Information” is any information about an individual that (i) can be used to distinguish or trace an individual’s identity, such as name, social security number, date and place of birth, mother’s maiden name, motor vehicle operator’s license number or non-driver identification card number, or biometric records; and (ii) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.

“Protected Health Information” refers to individually identifiable health information transmitted or maintained by electronic media or maintained in any other form or medium, but excludes certain education-related records and certain employment records held by an employer.

“Protected Student Information” is student education records maintained by the University, whether by academic or administrative units, and protected under the Family Educational Rights and Privacy Act (FERPA) and as described more fully in the UVM FERPA Rights Disclosure policy.

[FERPA Rights Disclosure document is here]

“Confidential information” is sensitive information about individuals, the University, or University property, including, without limitation, Personally Identifiable Information, Protected Health Information, information involving certain legal matters, or business and financial transactions, grant applications, student records, pending patent applications, institutional electronic security architecture, and information about security breaches or other events.

Protected Library Records – means patron registration records that contain the information a University library patron must provide to be eligible for library privileges and patron transaction records that contain personally identifiable information related to an individual’s activities within the University libraries.

In order to easily protect UVM from a data breach, which admittedly would be very costly to the institution both financially and in reputation, UVM now requires that all UVM owned laptops be encrypted using our licensed PGP encryption.  UVM also requires that home computers used for “UVM business” be encrypted as well.

It’s my opinion that vastly increased security could come from less drastic measures, such as educating the people performing the work of exactly what constitutes sensitive information. Which brings us to this post.

Takeaways from the above:

It would be wise to consider NOT using your personal devices and home computers for UVM related business

If you do choose to do so, it would be wise to:

  • Store UVM related documents containing protected information ONLY in UVM network storage (Zoofiles or Active Directory), not on Dropbox, Carbonite, iCloud or any form of personally available local or cloud storage and not on the local hard drive of the computer
  • Set your email programs NOT to cache your email on the local machine if you can (note that UVM webmail is NOT immune to caching since it stores snapshots of visited pages in the web browser temporary directory)
  • Make sure that all your devices are protected by a password, passkey or equivalent and where possible ensure that theft target, easy to lose devices such as smartphones and iPads are protected by remote location and erasure services, if any.  Apple offers a “find my device” service that is capable of locating a misplaced or stolen device (which in my experience works frighteningly well) and also remotely wiping the data off of it, if it cannot be retrieved.

If we all do our part to be aware of sensitive data and take fairly common sense steps towards protecting it, UVM will be protected from expensive and embarrassing data breaches.  It’s also a good idea to implement some of these measures to protect your personal property and information as well.


MacOS users: 10.7.3 update is out, install at your own risk

If you do not have a Macintosh computer and are running OS X version 10.7, this article does not pertain to you.  Please keep moving folks, nothing more to see here.

Macintosh users with the most recent version of OS X, 10.7, aka “Lion”, there is an updated version of the OS that adds some language support and claims to fix a few outstanding bugs.  Normally we recommend that Mac users install updates as they become available, but not this time.

Apparently there are enough people running into networking, and application crashing, problems that CNet has an article on the subject:

My advice would be to wait for an update to this update before installing.  The fixes described in the release notes for 10.7.3 will not improve the lives of most people anyway, so upgrading is not worth the risk of instability at this time.

The advice that the Cnet article gives for preventing the issues from occurring (which is not guaranteed to work please note) is pretty much what should be standard practice for all MacOS users:  make a backup, fix disk permissions using Disk Utility, download and install the Combo Fix version of the update rather than installing through Software Update.  Especially if you are an “early adopter” who installs everything as soon as it comes out, it’s a good idea to always follow the above routine.

Since we image our Macs with our own image, booting to the Lion restore partition is not an option for you should something go seriously wrong.  Instead you will have to bring the machine to us to be rebuilt.

CAS Computing Services


After the Systems Architecture and Administration (SAA) group replaced the old active directory filing appliance with honest to goodness Windows 2008 Servers, went away.

Well, thanks to the SAA group,  it’s back and in a supercharged version.  Connect, log in using your UVM netID, and you not only can get at your personal active directory files, but you can also see any shared directory that you have rights to, and your Zoo files and your website on zoo.  All in one big happy intuitive drag and drop environment that allows right clicking, downloading, uploading, folder creation, file deletion, etc etc etc.  There’s no reason to use SFTP.

Screenshot of the Webfiles folder listing

More information here:  Accessing UVM’s Network Storage

Sharepoint useage tip: Don’t click on the name of a file

A pair of department administrators asked me for help with editing files in Sharepoint. It turns out that they were confused about the difference between clicking on the name of a file and selecting “Edit in Microsoft ” from the drop down menu.
They assumed that the two actions would give you the same results when in fact they do not.
Clicking on the name of a file a Sharepoint library will open that file in read only mode. If you then attempt to save that file, your only choice will be to save it on your local hard drive and then you’ll have to wrestle with Sharepoint to get the file uploaded, delete the original, etc. etc.
If you want to edit a file in Sharepoint, never click on the file name. Instead, just hold your mouse over the file name, which will give you a box with a golden down arrow at the far end. Then select “Edit in Microsoft “. This checks the file out to you so that nobody else can change it, opens the file straight from Sharepoint into the appropriate Microsoft Office application and allows you to simply select Save from the File or Office menu to save your changes. Click on this screen capture to see what I mean:
1) This only works in under Windows
2) This only works under Internet Explorer

Lots of phishermen, don’t fall for the bait

We’ve seen many UVM customized phishing scams recently, including one that mocked up our webmail login page exactly.
The only legitimate email regarding password or status changes to your UVM email account is the one that comes from David Todd and DOES NOT ask you to do anything but go to the UVM account page to change your password.
Please be alert when following links in any email and make sure that the URL of what you clicked on makes sense. For any UVM related service, the URL should end in “”. If it does not, then chances are high that the link is part of a scam.

Have you heard of UVM Guestnet?

Recently a CAS faculty member approached me with a problem; she was the designated escort for a visiting professor who had his own laptop and wanted to use UVM’s wireless network. Sure, she could have had him install the UVM VPN client software and then connect to Cat’s Paws using her UVM netID, but then she’d have to reveal her password (which is against UVM policy) or stick to him like glue the entire week he was on campus.
I suggested UVM Guestnet. UVM Guestnet is a special wireless network that allows UVM affiliates (faculty, staff, students, basically anyone with a valid UVM netID) to “sponsor” a non-UVMer and allow them to connect to the Internet. The catches are that the sponsor is responsible for the behavior of whomever they sponsor, plus the account expires in seven days.
To begin the process, connect to the UVM Guestnet page on any computer currently connected to a network. Enter your UVM netID and password.
Read the page of policies and instructions, then click Get Started.
After you fill in the three required fields and click Create, your guest will be able to connect to the “UVM Guest” wireless network and start up a web browser. Their browser will ask them for the ID and password created by the Guestnet web page and then allow them onto the Internet as usual.
Each UVMer may sponsor up to five people for a maximum of seven days each.
UVM Guestnet access basically gives the user access to the public side of UVM’s local network (, webmail, etc) as well as the broader public Internet. It is not intended for use by those who otherwise have an active UVM netID or who need access to restricted or secure UVM only resources.
As always, ask us here at CAS Computing Services if you have questions.

Announcing the CAS Computing Services blog

CAS Computing Services has a new blog! Check it regularly for news and timely information regarding computers and Information Technology within the College of Arts and Sciences.
Search the archives by tag, keyword or category for how-to postings and other information.
You can view the blog either on the Computing Services web page.
Directly via the blog page, or as an RSS/Atom feed in your email program.
Click here if you don’t know what an RSS feed is (no shame here, I didn’t know until very recently).
As a rule, we will only send out email notifications of the most important postings, so please check the blog often.

Vista activation issues

Pretty much every Optiplex GX755 desktop purchased and deployed by the College during January 2008 has had Vista activation issues. We believe that this issue was triggered by the recent deployment of Vista Service Pack 1 through Active Directory.
The version of Vista that we use here at UVM is Vista Enterprise. Vista Enterprise uses a centralized license server, called a KMS server, to provide authentication information back to Vista, “authenticating” Vista for another time period after which the computer will again look for the KMS server.
If the computer cannot find the KMS server, the original version of Vista would go into Reduced Functionality Mode (RFM) which is another way of saying that it becomes useless. As of Service Pack 1, Microsoft has eliminated RFM. Instead Vista Enterprise will become nagware, posting endless notices that you may be running pirated software and asking you for a product key. The product key on the sticker on your computer is, of course, for the OEM version of Vista which is NOT what’s currently installed on your computer
The fix for this is to simply provide the generic product key (VKK3X-68KWM-X2YGT-QR4M6-4BWMV), which tells Vista Enterprise to look for the server again and all is well.
Geoff Duke has more information on this on his Blog