Every computer on a network has a unique identifier. Just as you would address a letter to send in the mail, computers use the unique identifier to send data to specific computers on a network. Most networks today, including all computers on the Internet, use the TCP/IP protocol as the standard for how to communicate on the network.

Connecting to our wireless network through Windows is easy with your UIC NetID and password. Windows 8 requires no external software, it's just a simple login. For Windows XP / Vista / 7, we have a UIC-WiFi Installer that can be downloaded and used to automatically configure your connection. We also have manual instructions at the bottom for people who would prefer to do that.

To connect to UIC Virtual Private Network (VPN) on a Windows computer, download and install AnyConnect from the WebStore. Visit for instructions.

Virtual Machine (VM) is a guest server hosted on a VM host. The ACCC VM service includes maintenance of the physical environment such as power, cooling, physical security and networking, system monitoring, patches and upgrades, backups, business continuity and disaster recovery, and performance tuning.

Audience: Faculty, Staff, IT

SSH (Secure Shell) and SFTP are two network protocols used for secure exchange of data between a local and remote computer. To use either SSH or SFTP to connect to a remote server, download SecureFX and SecureCRT from the WebStore (free to members of the UIC community).  

Tags: windows

To change a file's extension, you must first enable file extension display in Windows. It is disabled by default. Once file extensions are displayed, you can use the file rename functionality to change a file's extension.

Display file extensions

The process of telling Windows Explorer to display file extensions is pretty much the same, regardless of what version of Windows you are using.

Service: Backups

Restoring Files

This page explains how to restore files with Tivoli Storage Manager (TSM) for Windows. ADSM TSM Network Backup for Windows: Installation explains how to install the TSM backup client and set up the backup client to make regular backups.

If you're having trouble with being able to access your restored files or folders on your new PC, even on an administrator account, you may need to take ownership of the file.

Service: Backups

After you create the scheduler, you should check to make sure it will automatically start when you reboot your computer. Because the scheduler runs as a service, you have to start the Services Administrative Tool to do this.

Service: Backups

We have seen several cases where people have restored files from one Windows PC to another Windows PC (both of which use NTFS file systems) and then they can not access the restored files or folders on the new PC, even if they are logged in on an administrator account. The problem is small but important difference between the administrator accounts on the two PCs.

Service: Backups

The TSM manual says: "When the [TSM] client scheduler ... runs as a Windows service, the options in the registry are used instead [of the options in the dsm.opt file]. If you are using the scheduler service and change an option in the dsm.opt file, you must update the corresponding value in the registry as well."

Service: Backups

If you're using a new computer, the problem is that the Network Backup Service is trying to connect to your original computer and isn't finding it. You can not select "Restore to Original location". Instead, you must select "Restore to Following location" and specify where to restore the files to since the original location does not exist on your new computer.

Service: Backups

While in TSM on your computer, from the Utilities menu, select Set Authorization (Windows) or Node Access List (Macs), then select Add. Fill in the Add authorization information. Click OK.

You can authorize others for the whole drive, selected directories, or just selected files.

Service: Security

As you are most likely aware, Microsoft is discontinuing support for Windows XP after the patches released on April 8, 2014 and it is widely anticipated that hackers will begin to target machines running Windows XP soon after.

Network security liaisons have been notified about any devices connected to the network still running Windows XP. To ensure the security of your data and your network, devices running Windows XP need to be remediated immediately.

Browse by tag