Mon - Thurs - 8:00 a.m. - 8:00 p.m.
Friday - 8:00 a..m. - 5:00 p.m.
Saturday and Sunday- Closed
Located on the second floor of the Academic Center Building
TASC Lab 210
POLICIES & PROCEDURES - Click here for Ohio University-Southern Computer Labs policies.
Here for the students offering:
Students who need a computer to work on their assignments can come to the
Open Computer Lab.
Requirement to use the Open Lab: You must be current student with a valid OU ID .
- Friendly and knowledgeable lab assistants to help students
- Laser Printing for 5 cents
- Color Laser Printing for 25 cents
- Machine Transcription Machines
These programs are available for students, staff, and
faculty to purchase through the computer lab
- Microsoft Office 2010 for Windows
- Microsoft Windows 7
- Microsoft Office: MAC 2011
For pricing information click here
Please remember to make a purchase you need your OU ID and cash.
Sharing OU accounts and/or passwords
If you share your username and password with someone who uses a computer for illegal purposes, you will be considered a suspect during the investigation of those activities. OHIO University uses several different programs to ensure legal usage of computers that access our network, including port scanners, which constantly monitor the activities of users on the OHIO network. You can prevent involvement in these activities by using a strong, private password for your OHIO account.
Leaving workstations unattended and saving passwords
Leaving your workstation unattended while logged in can be just as dangerous as sharing your username and password. In addition to all of the same repercussions for sharing your login information, you could potentially lose data on your local and shared drives if someone accesses your computer with malicious intent. You can press Ctrl+Alt+Delete to lock your workstation any time you're stepping out of your office or away from your workstation. Saving your e-mail passwords or wireless login information in your browser will only increase the likelihood of the loss of personal data.
Torrents and other Peer to Peer programs
While Peer to Peer (P2P) applications are legal, most of the content downloaded through these applications is not. Most data provided to users through P2P networks is compromised copyrighted data that could result in hefty fines and other legal action. In order to combat software, video, and audio piracy, OHIO University has banned all P2P applications, such as uTorrent, Bittorrent, and other popular torrent programs. While scanning for security vulnerabilities, the OHIO network is also monitored for these types of applications. Computers running these applications will have their network capabilities disabled until OHIO Information Security has gathered necessary user information and is provided with the necessary information to ensure all programs of these types have been removed.
Facebook, Twitter, and other Social Media sites
Social media websites are one of the primary outlets for distributing worms, trojans, and other forms of malware to computers. While most users have no need to access these programs during the workday, those who do should be especially careful of links, pop-ups, and browser redirection. Shortened URLs using websites such as bitly.com and TINYUrl.com can further complicate matters, as these links can make potentially dangerous websites indistinguishable from safe ones until the user has already visited the site.
Phishing scams and e-mail attachments
Should you receive a suspicious e-mail from a friend, fellow employee, or a complete stranger - avoid opening the message. These messages generally involve topics such as account activation or deactivation (especially with websites such as PayPal where money can be transferred), online lotteries, inheritance, investments, job offers, healthier living, or bogus petitions against non-existent laws. You should avoid any e-mails of this type unless you're expecting a message in regards to one of these specific topics from someone you know.
If browsing the web is a necessary component of your job details, please avoid installing any free software or web browser plug-ins. Many times these programs and plug-ins include additional worms, trojans, and other forms of malware. If you require a specific piece of software that you have not been provided with, please contact the IT department for assistance in locating and installing the correct software on your machine.
Sensitive and personal information on workstations
A savvy computer user can often recover sensitive information that you believe you've removed from your computer. Traces of files are left on your hard drive, even after they have been deleted. Data that has been deleted from hard drives for several years has been recovered in many cases. In order to reduce the likelihood of your private information being compromised, avoid using your work computer to access personal accounts, banking, and other non-work related websites.