Connecting an iPhone or iPod Touch to uabwifi-nac

The UAB wifi network supports iPhone and iPod touch devices running iPhone or iPod Touch OS version 2.2 or higher. Before attempting to connect to the UAB network, please ensure the device is up to date by connecting it to iTunes and performing a software update. You should then follow the steps below to connect your Apple wireless device to uabwifi-nac.

Note: You must be on campus and within range of the UAB wireless network to perform these steps.

1. Open the "Settings" application.

2. Select "Wi-Fi."

3. Select "uabwifi-nac" (Note: do not select 'uabwifi').

4. When prompted for username and password, enter your BlazerID & Password.

5. When prompted for an unverified certificate, click "Accept."

6. Press the Home button.

7. Open the "Safari" application.

8. If your device does not automatically load the UAB network registration page, attempt to open www.uab.edu in Safari.

9. You will be prompted for your BlazerID, Password, and a phone number.

10. After submitting the information the device will be registered on the uabwifi-nac network and will automatically connect any time it is in range.

We can retrieve your mailbox data if you make a request from the AskIT Help Desk within 21 days of the deletion.  You can keep your e-mail address as long as you have it forwarded to an outside e-mail service like Gmail, Hotmail, or Yahoo. You can recreate your mailbox once you are an active student or employee at the university.  If you have additional questions, please call 996-5555 or go to www.uab.edu/askit, where you can chat with an online agent

What is Outlook Web App Light?

Outlook Web App (OWA) Light is designed to aid those with low vision & to support web browsers that are not compatible with the Premium version.  There are fewer features in OWA Light.  These web browsers are listed by Microsoft as compatible with Outlook Web App Premium:

Windows XP & Later

  • Internet Explorer 7 & later
  • Firefox 3.0.1 & later
  • Chrome 3.0.195.27 & later

Mac OS X 10.5 & Later

  • Safari 3.1 & later
  • Firefox 3.0.1 & later

Linux

  • Firefox 3.0.1 & later

This is what OWA Light looks like:

OWA Looks Like

The easiest way to sign in to OWA Light is to check the box to “use the light version of Outlook Web App” when signing in to https://mail.ad.uab.edu

OWS Light login

If you find yourself using Outlook Web App Light, but wish to use Outlook Web Access Premium, there are 3 things to check:

  1. Are you using a compatible browser (as listed above)?
  2. Make sure the check box beside “Use the light version of Outlook Web App” is not checked when signing in. 
  3. Uncheck “Use the blind and low vision experience by performing the following steps:
    1.  While looking at your mailbox in OWA, click the “Options” button at the top.
    2. Click Accessibility on the left side
    3. Uncheck “Use the blind and low vision experience
    4. Click Save (just above the check mark)OWA Accessibility
    5. Click “Sign out” in the top right corner
    6. Sign back in to https://mail.ad.uab.edu

My Exchange mailbox has been deleted - Can I get it back?

We can retrieve your mailbox data if you make a request from the AskIT Help Desk within 21 days of the deletion.  You can keep your e-mail address as long as you have it forwarded to an outside e-mail service like Gmail, Hotmail, or Yahoo. You can recreate your mailbox once you are an active student or employee at the university.  If you have additional questions, please call 996-5555 or go to www.uab.edu/askit, where you can chat with an online agent.

Clients & Protocols

Popular Clients:

Outlook (MAPI, HTTPS), Outlook for MAC (EWS, POP3, IMAP), Mac Mail (EWS, IMAP, POP3), Outlook Web App (HTTPS), Windows Mail (POP3, IMAP), Mozilla Thunderbird (POP3, IMAP)

Supported Protocols:

Hypertext Transfer Protocol (HTTP) is the protocol used to display Web pages but it can also be used to read e-mail with Outlook Web App (OWA). The advantage to OWA is that you can read, send, etc. e-mail from any computer with an Internet connection and a modern Web browser capable of supporting a secure connection (SSL). The Web address for OWA is https://mail.ad.uab.edu.

For any troubleshooting concerning OWA, send an e-mail to the This email address is being protected from spambots. You need JavaScript enabled to view it. ">AskIT Help Desk or call them at 205-996-5555. Microsoft also offers many tutorials and guides on their Web site.

Post Office Protocol (POP3) can be used by almost any client including Windows Mail and Mozilla Thunderbird. The difference between IMAP and POP3 is that POP typically pulls your e-mail messages off the server and stores them locally on your hard drive. This is fine unless a problem arises with your hard-drive, which may cause you to lose all messages stored on your machine. Your POP3 client will need to be capable of providing secure authentication.

Messaging Application Programming Interface (MAPI) is used by the full version Outlook client in conjunction with an Exchange mail server. MAPI is very much like IMAP but provides extended features within Outlook. This is only available in Outlook on a machine running Windows. You choose this protocol by selecting Microsoft Exchange Server within the Outlook e-mail account configuration.

The Exchange Web Services (EWS) protocol serves as the critical link in enabling secure synchronization between Microsoft Exchange Server 2010 systems and Snow Leopard-powered Macs.

Internet Message Access Protocol (IMAP) is the most common way to configure the Outlook for MAC mail clients. The benefit of using this protocol is that your e-mail messages remain on the server. When configured this way, you do not lose any e-mail messages should a problem arise with your personal computer and have the option of using Outlook Web Access when you so desire. Your IMAP client will need to be capable of providing secure authentication

What types of files are blocked by the UAB email system?

Blocked Extensions

Below is a list of blocked file extensions.  Please note that any compressed file (such as .zip or .rar) containing files with blocked extensions will be blocked.  If you need to send a file with one of these extensions, please use the UAB Drop Box.

*.001

*.002

*.386

*.3GR

*.acm

*.adt

*.app

*.arc

*.arj

*.art

*.asd

*.asp

*.ax?

*.bat

*.bin

*.bo?

*.cab

*.cbt

*.chm

*.cla

*.cmd

*.cnv

*.com

*.cpl

*.cpt

*.csc

*.d?b

*.dev

*.dif

*.dl?

*.drv

*.exe

*.fo?

*.gms

*.gz?

*.hlp

*.ice

*.im?

*.inf

*.ini

*.job

*.js?

*.lib

*.lzh

*.mb?

*.mod

*.mpd

*.mpt

*.mrc

*.ms?

*.msg

*.mso

*.obd

*.obj

*.obt

*.ocx

*.olb

*.ole

*.otm

*.ov?

*.pci

*.pdr

*.pif

*.prc

*.qlb

*.rar

*.reg

*.scr

*.shb

*.shs

*.sis

*.smm

*.sys

*.tdo

*.tlb

*.tsp

*.vbe

*.vbs

*.vbx

*.vwp

*.vxd

*.wbk

*.wiz

*.wpc

*.ws?

*.xlb

*.xsl

*.xtp

Why does the login page want to know if I'm on a public or private computer?

The network wants to know if someone could access your email account (and any personal information located there) and the security measures it needs to take to protect it. In OWA 2010, your information will be stored in a cookie, not in the browser. This means that your login information will be cleared when you log out of OWA - there is no "Remember my password" option.

Secondly, your session will expire (and you will have to login again) if the account is inactive for a period of time. If you are on a public or shared computer, timeout occurs after fifteen minutes of inactivity. You will have more time on your private computer. When timeout does occur, the page will remain the same until you try to perform another action. At this point, you will be prompted to log on again.

These measures help to protect your privacy, but they are not a replacement for the personal security measures you should already be taking:

  1. Never walk away from a public computer without logging off completely.
  2. Always log off of OWA and close the browser before you move on to a website that might not be secure. In OWA 2010, the Log Off button is located in Navigation pane, on the right-hand side. You will be prompted to close the browser window.
  3. Never disclose your password to anyone. With your BlazerID and password, they will have access more than just your email.
  4. The Internet Privacy setting ( Tools>Internet Options>Privacy ) should be at Medium or higher.

Even if you are on your personal computer, think of everyone who could have access to it (colleagues and roommates included).

Can we track down who sent an offensive email message?

In most cases we are able to determine at least the point of origin.  If you receive an inappropriate email, please do not delete the email and contact AskIT (www.uab.edu/askit) within 3 days of receipt.  There are ways for a sophisticated hacker to disguise the original location of email messages; in those cases, we can at least contact the Internet service provider involved and request that they prevent a recurrence or be blocked from sending messages onto campus.

January 01, 2012

Defrag - Windows

This section will show you how to defrag your hard drive in order to correct problems with files and folders.


*While Windows Vista is shown in the following video, the steps can be used for both Windows XP or Windows Vista platforms.