<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://itwiki.wpunj.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ta-arcaj</id>
	<title>William Paterson University - Information Technology&#039;s Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://itwiki.wpunj.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ta-arcaj"/>
	<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php/Special:Contributions/Ta-arcaj"/>
	<updated>2026-04-29T03:42:11Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Wireless&amp;diff=8497</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Wireless&amp;diff=8497"/>
		<updated>2020-06-04T13:13:33Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[file:wifi-icon.png|200px|right]]&lt;br /&gt;
==Coverage==&lt;br /&gt;
William Paterson University provides wireless access into its computing resources utilizing Cisco Aironet wireless equipment. This equipment support all wireless access radios (A,B,G,N, AC) and it utilizes Cisco Clean Access authentication to secure all access. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*More links about wireless here: [https://itintwiki.unv.campus.wpunj.edu/index.php/Wireless Internal Wiki: Wireless links]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Personal Devices (BYOD)==&lt;br /&gt;
Click on [[Getting Started: Wireless]] and select your operating system to connect to the &#039;&#039;&#039;WP Wireless&#039;&#039;&#039; Network&lt;br /&gt;
==University Machines==&lt;br /&gt;
There is no configuration necessary to connect University Machines to the wireless network.  If a University Laptop does not connect, follow the instructions below:&lt;br /&gt;
 &lt;br /&gt;
* Windows Domain computers need to be rebooted while plugged into an Employee Wired network segment in order to pick up the new GPO Policy&lt;br /&gt;
* Windows XP Machines must change the name of the ISE Certificate, as per step 14 of the following instructions: [[Windows XP]]&lt;br /&gt;
* MAC Laptop needs to run a manual software update from a wired faculty segment as per Wiki Instructions: [[Mac OS Managed Installs]]&lt;br /&gt;
&lt;br /&gt;
Steps to update GPO on UNV laptop (laptop will not join wireless)&lt;br /&gt;
# Plug an Ethernet cable into the laptop&#039;s Ethernet jack.&lt;br /&gt;
# Restart laptop (it may or may not pick up an IP in the BIOS)&lt;br /&gt;
# Wait about a minute on the Ctrl+Alt+Delete (login) screen&lt;br /&gt;
# Unplug the Ethernet cable from the laptop&lt;br /&gt;
# Have user login&lt;br /&gt;
# Check network status in the task bar to make sure it is connected to WP Wireless or WP Wireless 5Ghz&lt;br /&gt;
# Verify that internet is working by visiting a website like cnn.com.&lt;br /&gt;
&lt;br /&gt;
[[Category:Network Services]]&lt;br /&gt;
[[Category:Mobile]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Wireless&amp;diff=8496</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Wireless&amp;diff=8496"/>
		<updated>2020-06-04T13:13:04Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[file:wifi-icon.png|200px|right]]&lt;br /&gt;
==Coverage==&lt;br /&gt;
William Paterson University provides wireless access into its computing resources utilizing Cisco Aironet wireless equipment. This equipment support all wireless access radios (A,B,G,N, AC) and it utilizes Cisco Clean Access authentication to secure all access.&lt;br /&gt;
&lt;br /&gt;
*more links about wireless here: [https://itintwiki.unv.campus.wpunj.edu/index.php/Wireless Internal Wiki: Wireless links]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Personal Devices (BYOD)==&lt;br /&gt;
Click on [[Getting Started: Wireless]] and select your operating system to connect to the &#039;&#039;&#039;WP Wireless&#039;&#039;&#039; Network&lt;br /&gt;
==University Machines==&lt;br /&gt;
There is no configuration necessary to connect University Machines to the wireless network.  If a University Laptop does not connect, follow the instructions below:&lt;br /&gt;
 &lt;br /&gt;
* Windows Domain computers need to be rebooted while plugged into an Employee Wired network segment in order to pick up the new GPO Policy&lt;br /&gt;
* Windows XP Machines must change the name of the ISE Certificate, as per step 14 of the following instructions: [[Windows XP]]&lt;br /&gt;
* MAC Laptop needs to run a manual software update from a wired faculty segment as per Wiki Instructions: [[Mac OS Managed Installs]]&lt;br /&gt;
&lt;br /&gt;
Steps to update GPO on UNV laptop (laptop will not join wireless)&lt;br /&gt;
# Plug an Ethernet cable into the laptop&#039;s Ethernet jack.&lt;br /&gt;
# Restart laptop (it may or may not pick up an IP in the BIOS)&lt;br /&gt;
# Wait about a minute on the Ctrl+Alt+Delete (login) screen&lt;br /&gt;
# Unplug the Ethernet cable from the laptop&lt;br /&gt;
# Have user login&lt;br /&gt;
# Check network status in the task bar to make sure it is connected to WP Wireless or WP Wireless 5Ghz&lt;br /&gt;
# Verify that internet is working by visiting a website like cnn.com.&lt;br /&gt;
&lt;br /&gt;
[[Category:Network Services]]&lt;br /&gt;
[[Category:Mobile]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8435</id>
		<title>Windows File Recovery</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8435"/>
		<updated>2020-06-01T14:16:26Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When a user mistakenly deletes a file or files from a GROUP network folder, they can restore the files by following these steps:&lt;br /&gt;
&lt;br /&gt;
*Open Windows Explorer (file explorer)&lt;br /&gt;
*Right click on the appropriate folder&lt;br /&gt;
*Click properties&lt;br /&gt;
*Click previous versions - Carefully select the version of the file prior to the time that it was deleted. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Wfr2.PNG|center|thumb]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is what you should be seeing when you right click and click properties. &lt;br /&gt;
When you click properties, you should be able to see &amp;quot;previous versions&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This process allows the user to restore a file up to 24 hours prior to the deletion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Network Storage]]&lt;br /&gt;
[[Category: Software Guides]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8434</id>
		<title>Windows File Recovery</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8434"/>
		<updated>2020-06-01T14:12:48Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When a user mistakenly deletes a file or files from a GROUP network folder, they can restore the files by following these steps:&lt;br /&gt;
&lt;br /&gt;
*Open Windows Explorer (file explorer)&lt;br /&gt;
*Right click on the appropriate folder&lt;br /&gt;
*Click properties&lt;br /&gt;
*Click previous versions - Carefully select the version of the file prior to the time that it was deleted. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Wfr2.PNG|center|thumb]]&lt;br /&gt;
&lt;br /&gt;
This process allows the user to restore a file up to 24 hours prior to the deletion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Network Storage]]&lt;br /&gt;
[[Category: Software Guides]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8433</id>
		<title>Windows File Recovery</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8433"/>
		<updated>2020-06-01T14:12:26Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When a user mistakenly deletes a file or files from a GROUP network folder, they can restore the files by following these steps:&lt;br /&gt;
&lt;br /&gt;
*Open Windows Explorer (file explorer)&lt;br /&gt;
*Right click on the appropriate folder&lt;br /&gt;
*Click properties&lt;br /&gt;
*Click previous versions - Carefully select the version of the file prior to the time that it was deleted. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Wfr2.PNG|thumb]]&lt;br /&gt;
This process allows the user to restore a file up to 24 hours prior to the deletion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Network Storage]]&lt;br /&gt;
[[Category: Software Guides]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8432</id>
		<title>Windows File Recovery</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8432"/>
		<updated>2020-06-01T14:11:31Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When a user mistakenly deletes a file or files from a GROUP network folder, they can restore the files by following these steps:&lt;br /&gt;
&lt;br /&gt;
*Open Windows Explorer (file explorer)&lt;br /&gt;
*Right click on the appropriate folder&lt;br /&gt;
*Click properties&lt;br /&gt;
*Click previous versions - Carefully select the version of the file prior to the time that it was deleted. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Wfr2.png|500px|thumb|center|Example]]&lt;br /&gt;
&lt;br /&gt;
This process allows the user to restore a file up to 24 hours prior to the deletion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Network Storage]]&lt;br /&gt;
[[Category: Software Guides]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8431</id>
		<title>Windows File Recovery</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8431"/>
		<updated>2020-06-01T14:10:55Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When a user mistakenly deletes a file or files from a GROUP network folder, they can restore the files by following these steps:&lt;br /&gt;
&lt;br /&gt;
*Open Windows Explorer (file explorer)&lt;br /&gt;
*Right click on the appropriate folder&lt;br /&gt;
*Click properties&lt;br /&gt;
*Click previous versions - Carefully select the version of the file prior to the time that it was deleted. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Wfr2.png|thumb|center|Example]]&lt;br /&gt;
This process allows the user to restore a file up to 24 hours prior to the deletion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Network Storage]]&lt;br /&gt;
[[Category: Software Guides]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8430</id>
		<title>Windows File Recovery</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8430"/>
		<updated>2020-06-01T14:07:57Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When a user mistakenly deletes a file or files from a GROUP network folder, they can restore the files by following these steps:&lt;br /&gt;
&lt;br /&gt;
*Open Windows Explorer (file explorer)&lt;br /&gt;
*Right click on the appropriate folder&lt;br /&gt;
*Click properties&lt;br /&gt;
*Click previous versions - Carefully select the version of the file prior to the time that it was deleted. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Wfr2.png|example&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
This process allows the user to restore a file up to 24 hours prior to the deletion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Network Storage]]&lt;br /&gt;
[[Category: Software Guides]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8429</id>
		<title>Windows File Recovery</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8429"/>
		<updated>2020-06-01T14:07:41Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When a user mistakenly deletes a file or files from a GROUP network folder, they can restore the files by following these steps:&lt;br /&gt;
&lt;br /&gt;
*Open Windows Explorer (file explorer)&lt;br /&gt;
*Right click on the appropriate folder&lt;br /&gt;
*Click properties&lt;br /&gt;
*Click previous versions - Carefully select the version of the file prior to the time that it was deleted. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Wfr2.jpg|example&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
This process allows the user to restore a file up to 24 hours prior to the deletion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Network Storage]]&lt;br /&gt;
[[Category: Software Guides]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8428</id>
		<title>Windows File Recovery</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Windows_File_Recovery&amp;diff=8428"/>
		<updated>2020-06-01T14:06:24Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;When a user mistakenly deletes a file or files from a GROUP network folder, they can restore the files by following these steps:&lt;br /&gt;
&lt;br /&gt;
*Open Windows Explorer (file explorer)&lt;br /&gt;
*Right click on the appropriate folder&lt;br /&gt;
*Click properties&lt;br /&gt;
*Click previous versions - Carefully select the version of the file prior to the time that it was deleted.&lt;br /&gt;
&lt;br /&gt;
[[File:Wfr2.png|200px|thumb|left|alt text]]&lt;br /&gt;
&lt;br /&gt;
This process allows the user to restore a file up to 24 hours prior to the deletion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Network Storage]]&lt;br /&gt;
[[Category: Software Guides]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=File:Wfr2.PNG&amp;diff=8427</id>
		<title>File:Wfr2.PNG</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=File:Wfr2.PNG&amp;diff=8427"/>
		<updated>2020-06-01T13:56:20Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=File:Wfr1.PNG&amp;diff=8426</id>
		<title>File:Wfr1.PNG</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=File:Wfr1.PNG&amp;diff=8426"/>
		<updated>2020-06-01T13:56:07Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=SPAM&amp;diff=8304</id>
		<title>SPAM</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=SPAM&amp;diff=8304"/>
		<updated>2020-05-22T23:42:24Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* SPAM 2020 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Types of Scam Emails==&lt;br /&gt;
===Phishing===&lt;br /&gt;
Phishing emails are fraudulent email messages that appear to be sent by legitimate sources (a friend or another student, the University IT department, a bank, etc.) These messages usually include a link to click on that directs you to malicious website made to look like a login page or a webform designed to get you to enter private information (for example, your username and password.) The attackers then use the information the information they&#039;ve collected from you to commit some form of malicious activity with your account or, worse, identity theft.&lt;br /&gt;
&lt;br /&gt;
Many phishing emails attempt to trick recipients by creating a sense or urgency with a threat that they will lose something unless they act quickly. Other phishing emails are designed to make it appear that the phishing email is part of a prior email communication, hoping the recipient will perceive the email as legitimate.&lt;br /&gt;
&lt;br /&gt;
Examples of wording using in Phishing emails include:&lt;br /&gt;
*&#039;Your account will be deactivated if you don&#039;t CLICK HERE.&#039;&lt;br /&gt;
*&#039;ACTION REQUIRED - MISSING FAFSA/Financial Aid Info. CLICK HERE for Document Review&#039;&lt;br /&gt;
*&#039;A file has been shared with you. ONEDRIVE Document.&#039;&lt;br /&gt;
*&#039;You have received a secure document from XXX. Click Here to access.&#039;&lt;br /&gt;
*&#039;Unable to display full message. CLICK HERE to show full message.&#039;&lt;br /&gt;
[[File:PhishingEmailExample1.png|frame|center|Phishing Email Example]]&lt;br /&gt;
For additional information on Phishing, visit one of these online resources:&lt;br /&gt;
* https://www.phishing.org/what-is-phishing&lt;br /&gt;
*https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams&lt;br /&gt;
&lt;br /&gt;
===Fake Part-Time Jobs &amp;amp; Fake Check Scams===&lt;br /&gt;
Many universities have been affected by students and employees receiving emails from other student emails or outside addresses that indicate that their company/friend/mother/uncle/etc. is hiring for a part-time job.&lt;br /&gt;
*These &#039;jobs&#039; range from pet or baby sitting to research or secret shopper jobs that students can do in their spare time to earn extra money.&lt;br /&gt;
*These are fake job scams that attempt to have individuals deposit a fake check.&lt;br /&gt;
*Students who reply and indicate interest receive responses asking to provide detailed contact information (address, date of birth, etc.)&lt;br /&gt;
*The scammers then indicate that you are &#039;hired&#039; and send a fake check or money order to &amp;quot;cover start up wages/supplies.&amp;quot;&lt;br /&gt;
*The check is often for $1,500-2,000, and the student is asked to keep some of the money as their payment and sent the larger remaining about of money from the check to someone else via gift card, wire transfer, or other means.&lt;br /&gt;
*A few weeks later, the initial check then does not clear and the individual who deposited the check is then out the money then sent on to someone else.&lt;br /&gt;
&lt;br /&gt;
[[File:FakeJob1.png|frame|center|Fake Part-Time Job Email]]&lt;br /&gt;
For more information on fake check scams, visit the following links:&lt;br /&gt;
*https://www.fraud.org/fake_check_scams&lt;br /&gt;
*https://www.ic3.gov/media/2017/170118.aspx&lt;br /&gt;
*https://www.bbb.org/pittsburgh/news-events/bbb-scam-alerts/2017/01/college-students-targeted-with-bogus-employment-offers/&lt;br /&gt;
&lt;br /&gt;
===Impersonation Emails &amp;amp; Gift Card Scams===&lt;br /&gt;
Impersonation emails are emails that seem be sent by a trusted colleague or friend and start with a simple question like &#039;Are you available?&#039;&lt;br /&gt;
*These emails are sent so that they look like they are coming from the email of someone you know, but are actually sent from another email account used by a scammer.&lt;br /&gt;
*If you reply to the email, you&#039;ll be asked if you can do a favor for that person.&lt;br /&gt;
*Usually, the request is to purchase gift cards for some urgent need they have and then scratch of the redemption codes and email or text pictures to them.&lt;br /&gt;
*Once the scammer has the redemption codes for the gift cards, the funds are immediate moved to another account and your money is now stolen.&lt;br /&gt;
[[File:ImpersonattionExample.png|frame|center|Impersonation Email Gift Card Scam Example]]&lt;br /&gt;
&lt;br /&gt;
For additional information on impersonation emails and gift card scams, please visit the following links:&lt;br /&gt;
*https://www.chronicle.com/article/Phishing-Scheme-Targets/245535/&lt;br /&gt;
*https://www.zdnet.com/article/beware-phony-gift-card-email-scams-heres-why-attackers-love-using-them/&lt;br /&gt;
&lt;br /&gt;
===Sextortion Emails===&lt;br /&gt;
Sextortion scams are scams in which you receive an email from a &#039;hacker&#039; that indicates the person has had access to your accounts and computers for several months and will release embarrassing photos/videos/search history to your friends, family, or coworkers unless you pay them some form of ransom (usually requested in Bitcoin.) The emails may even include part of a password you currently or previously used.&lt;br /&gt;
&lt;br /&gt;
These emails are rarely ever legitimate. In most cases, the emails are sent to individuals by the thousands using lists of emails - and possibly passwords - compiled from website hacks over the years.&lt;br /&gt;
&#039;&#039;&#039;While the emails may be scary to read, our recommendation is always to just ignore and delete the email.&#039;&#039;&#039; It&#039;s possible that you may receive several iterations of the email, but all can safely be ignored.&lt;br /&gt;
&lt;br /&gt;
[[File:Sextortion Email Example.png|frame|center|Sextortion Email Example]]&lt;br /&gt;
For more information on sextortion email scams, visit the following resources:&lt;br /&gt;
* https://www.eff.org/deeplinks/2018/07/sextortion-scam-what-do-if-you-get-latest-phishing-spam-demanding-bitcoin&lt;br /&gt;
*https://www.cnbc.com/2019/06/17/email-sextortion-scams-on-the-rise-says-fbi.html&lt;br /&gt;
&lt;br /&gt;
===SPAM 2020===&lt;br /&gt;
Often, the emails you receive in your university emails inbox come from a staff member, professor, or person affiliated to William Paterson, but it’s important to stay alert for any scam emails that potentially come through.&lt;br /&gt;
This year alone in 2020, we have had around 4 scam emails sent to people’s inboxes that have consisted of different styles of scamming such as phishing or an advertisement for a job offering. &lt;br /&gt;
The best way to combat a scam email is simply by ignoring it and deleting it. In the event that you click on any links within a scam email it’s essential that you reset the password for your university account and any other account you have with that same password immediately. &lt;br /&gt;
In the event that you suspect an email is a scam, but cannot be 100% sure, we highly suggest you contact the &#039;&#039;&#039;Help Desk at 973-720-4357&#039;&#039;&#039; to ensure the safety of your information. &lt;br /&gt;
Some examples of scam emails that have been sent out this year include:&lt;br /&gt;
&lt;br /&gt;
[[File:Spam.png|1000 × 500px|frame|center|A pet sitting job scam on April 16th ]]&lt;br /&gt;
&lt;br /&gt;
Notice that this scam email in particular asks you to contact a secondary email rather than just replying to the one that sent the email. In addition, job advertisement scamming will usually include unrealistic salaries for doing an easy job to make it look more enticing. These are some easy signs to look out for.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Spam3.png|1000 x 500px|frame|center|Another job advertisement scam email on May 8th]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Even though this job may not be for outside employment of the university, it still requests that you contact a secondary email for your response which should always raise suspicion.&lt;br /&gt;
&lt;br /&gt;
[[File:Spam2.png|1000 x 500px|frame|center|A phishing scam email on May 7th]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A characteristic to watch out for when it comes to phishing scams is the amount of urgency that is repeated throughout the email’s entirety. The likelihood of the university to require all staff and students to migrate to a new Microsoft Outlook within 24 hours is extremely unlikely.&lt;br /&gt;
&lt;br /&gt;
==Reporting SPAM email==&lt;br /&gt;
Students, faculty and staff can report SPAM messages to Microsoft for analysis. If you are ever unsure if an email message is legitimate or SPAM, please contact User Services by submitting a request online at https://www.wpunj.edu/helpdesk or by calling 973-720-4357. &lt;br /&gt;
&lt;br /&gt;
===Junk and Phishing===&lt;br /&gt;
# Compose a new email&lt;br /&gt;
# Address the email to the Microsoft team that reviews messages as follows:&lt;br /&gt;
## For junk messages, address your email to [mailto:junk@office365.microsoft.com junk@office365.microsoft.com]&lt;br /&gt;
### Junk messages may contain disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware.&lt;br /&gt;
## For phishing scam messages, address your email to [mailto:phish@office365.microsoft.com phish@office365.microsoft.com]&lt;br /&gt;
### Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.&lt;br /&gt;
# Leave the body of the new message empty (remove any auto-populating signatures)&lt;br /&gt;
# Insert the junk or phishing scam message into your new blank email as an attachment. Note: Do not simply forward the junk or phishing message.&lt;br /&gt;
# Delete the original message &lt;br /&gt;
===False Positives===&lt;br /&gt;
Sometimes email messages are incorrectly identified as SPAM. To submit emails identified in this way:&lt;br /&gt;
# Compose a new email&lt;br /&gt;
# Address the email to [mailto:not_junk@office365.microsoft.com not_junk@office365.microsoft.com]&lt;br /&gt;
# Leave the body of the new message empty (remove any auto-populating signatures)&lt;br /&gt;
# Attach the email message that was incorrectly identified. Note: Do not simply forward the message.&lt;br /&gt;
# Delete the original message&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Sources:&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The State of Vermont, Department of Information and Innovation, &amp;quot;Instructions for reporting spam and phishing scam messages to Microsoft for Analysis&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Phishing&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Email_spam&lt;br /&gt;
[[Category:Email]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=SPAM&amp;diff=8303</id>
		<title>SPAM</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=SPAM&amp;diff=8303"/>
		<updated>2020-05-22T23:41:44Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* SPAM 2020 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Types of Scam Emails==&lt;br /&gt;
===Phishing===&lt;br /&gt;
Phishing emails are fraudulent email messages that appear to be sent by legitimate sources (a friend or another student, the University IT department, a bank, etc.) These messages usually include a link to click on that directs you to malicious website made to look like a login page or a webform designed to get you to enter private information (for example, your username and password.) The attackers then use the information the information they&#039;ve collected from you to commit some form of malicious activity with your account or, worse, identity theft.&lt;br /&gt;
&lt;br /&gt;
Many phishing emails attempt to trick recipients by creating a sense or urgency with a threat that they will lose something unless they act quickly. Other phishing emails are designed to make it appear that the phishing email is part of a prior email communication, hoping the recipient will perceive the email as legitimate.&lt;br /&gt;
&lt;br /&gt;
Examples of wording using in Phishing emails include:&lt;br /&gt;
*&#039;Your account will be deactivated if you don&#039;t CLICK HERE.&#039;&lt;br /&gt;
*&#039;ACTION REQUIRED - MISSING FAFSA/Financial Aid Info. CLICK HERE for Document Review&#039;&lt;br /&gt;
*&#039;A file has been shared with you. ONEDRIVE Document.&#039;&lt;br /&gt;
*&#039;You have received a secure document from XXX. Click Here to access.&#039;&lt;br /&gt;
*&#039;Unable to display full message. CLICK HERE to show full message.&#039;&lt;br /&gt;
[[File:PhishingEmailExample1.png|frame|center|Phishing Email Example]]&lt;br /&gt;
For additional information on Phishing, visit one of these online resources:&lt;br /&gt;
* https://www.phishing.org/what-is-phishing&lt;br /&gt;
*https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams&lt;br /&gt;
&lt;br /&gt;
===Fake Part-Time Jobs &amp;amp; Fake Check Scams===&lt;br /&gt;
Many universities have been affected by students and employees receiving emails from other student emails or outside addresses that indicate that their company/friend/mother/uncle/etc. is hiring for a part-time job.&lt;br /&gt;
*These &#039;jobs&#039; range from pet or baby sitting to research or secret shopper jobs that students can do in their spare time to earn extra money.&lt;br /&gt;
*These are fake job scams that attempt to have individuals deposit a fake check.&lt;br /&gt;
*Students who reply and indicate interest receive responses asking to provide detailed contact information (address, date of birth, etc.)&lt;br /&gt;
*The scammers then indicate that you are &#039;hired&#039; and send a fake check or money order to &amp;quot;cover start up wages/supplies.&amp;quot;&lt;br /&gt;
*The check is often for $1,500-2,000, and the student is asked to keep some of the money as their payment and sent the larger remaining about of money from the check to someone else via gift card, wire transfer, or other means.&lt;br /&gt;
*A few weeks later, the initial check then does not clear and the individual who deposited the check is then out the money then sent on to someone else.&lt;br /&gt;
&lt;br /&gt;
[[File:FakeJob1.png|frame|center|Fake Part-Time Job Email]]&lt;br /&gt;
For more information on fake check scams, visit the following links:&lt;br /&gt;
*https://www.fraud.org/fake_check_scams&lt;br /&gt;
*https://www.ic3.gov/media/2017/170118.aspx&lt;br /&gt;
*https://www.bbb.org/pittsburgh/news-events/bbb-scam-alerts/2017/01/college-students-targeted-with-bogus-employment-offers/&lt;br /&gt;
&lt;br /&gt;
===Impersonation Emails &amp;amp; Gift Card Scams===&lt;br /&gt;
Impersonation emails are emails that seem be sent by a trusted colleague or friend and start with a simple question like &#039;Are you available?&#039;&lt;br /&gt;
*These emails are sent so that they look like they are coming from the email of someone you know, but are actually sent from another email account used by a scammer.&lt;br /&gt;
*If you reply to the email, you&#039;ll be asked if you can do a favor for that person.&lt;br /&gt;
*Usually, the request is to purchase gift cards for some urgent need they have and then scratch of the redemption codes and email or text pictures to them.&lt;br /&gt;
*Once the scammer has the redemption codes for the gift cards, the funds are immediate moved to another account and your money is now stolen.&lt;br /&gt;
[[File:ImpersonattionExample.png|frame|center|Impersonation Email Gift Card Scam Example]]&lt;br /&gt;
&lt;br /&gt;
For additional information on impersonation emails and gift card scams, please visit the following links:&lt;br /&gt;
*https://www.chronicle.com/article/Phishing-Scheme-Targets/245535/&lt;br /&gt;
*https://www.zdnet.com/article/beware-phony-gift-card-email-scams-heres-why-attackers-love-using-them/&lt;br /&gt;
&lt;br /&gt;
===Sextortion Emails===&lt;br /&gt;
Sextortion scams are scams in which you receive an email from a &#039;hacker&#039; that indicates the person has had access to your accounts and computers for several months and will release embarrassing photos/videos/search history to your friends, family, or coworkers unless you pay them some form of ransom (usually requested in Bitcoin.) The emails may even include part of a password you currently or previously used.&lt;br /&gt;
&lt;br /&gt;
These emails are rarely ever legitimate. In most cases, the emails are sent to individuals by the thousands using lists of emails - and possibly passwords - compiled from website hacks over the years.&lt;br /&gt;
&#039;&#039;&#039;While the emails may be scary to read, our recommendation is always to just ignore and delete the email.&#039;&#039;&#039; It&#039;s possible that you may receive several iterations of the email, but all can safely be ignored.&lt;br /&gt;
&lt;br /&gt;
[[File:Sextortion Email Example.png|frame|center|Sextortion Email Example]]&lt;br /&gt;
For more information on sextortion email scams, visit the following resources:&lt;br /&gt;
* https://www.eff.org/deeplinks/2018/07/sextortion-scam-what-do-if-you-get-latest-phishing-spam-demanding-bitcoin&lt;br /&gt;
*https://www.cnbc.com/2019/06/17/email-sextortion-scams-on-the-rise-says-fbi.html&lt;br /&gt;
&lt;br /&gt;
===SPAM 2020===&lt;br /&gt;
Often, the emails you receive in your university emails inbox come from a staff member, professor, or person affiliated to William Paterson, but it’s important to stay alert for any scam emails that potentially come through.&lt;br /&gt;
This year alone in 2020, we have had around 4 scam emails sent to people’s inboxes that have consisted of different styles of scamming such as phishing or an advertisement for a job offering. &lt;br /&gt;
The best way to combat a scam email is simply by ignoring it and deleting it. In the event that you click on any links within a scam email it’s essential that you reset the password for your university account and any other account you have with that same password immediately. &lt;br /&gt;
In the event that you suspect an email is a scam, but cannot be 100% sure, we highly suggest you contact the Help Desk at 973-720-4357 to ensure the safety of your information. &lt;br /&gt;
Some examples of scam emails that have been sent out this year include:&lt;br /&gt;
&lt;br /&gt;
[[File:Spam.png|1000 × 500px|frame|center|A pet sitting job scam on April 16th ]]&lt;br /&gt;
&lt;br /&gt;
Notice that this scam email in particular asks you to contact a secondary email rather than just replying to the one that sent the email. In addition, job advertisement scamming will usually include unrealistic salaries for doing an easy job to make it look more enticing. These are some easy signs to look out for.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Spam3.png|1000 x 500px|frame|center|Another job advertisement scam email on May 8th]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Even though this job may not be for outside employment of the university, it still requests that you contact a secondary email for your response which should always raise suspicion.&lt;br /&gt;
&lt;br /&gt;
[[File:Spam2.png|1000 x 500px|frame|center|A phishing scam email on May 7th]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A characteristic to watch out for when it comes to phishing scams is the amount of urgency that is repeated throughout the email’s entirety. The likelihood of the university to require all staff and students to migrate to a new Microsoft Outlook within 24 hours is extremely unlikely.&lt;br /&gt;
&lt;br /&gt;
==Reporting SPAM email==&lt;br /&gt;
Students, faculty and staff can report SPAM messages to Microsoft for analysis. If you are ever unsure if an email message is legitimate or SPAM, please contact User Services by submitting a request online at https://www.wpunj.edu/helpdesk or by calling 973-720-4357. &lt;br /&gt;
&lt;br /&gt;
===Junk and Phishing===&lt;br /&gt;
# Compose a new email&lt;br /&gt;
# Address the email to the Microsoft team that reviews messages as follows:&lt;br /&gt;
## For junk messages, address your email to [mailto:junk@office365.microsoft.com junk@office365.microsoft.com]&lt;br /&gt;
### Junk messages may contain disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware.&lt;br /&gt;
## For phishing scam messages, address your email to [mailto:phish@office365.microsoft.com phish@office365.microsoft.com]&lt;br /&gt;
### Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.&lt;br /&gt;
# Leave the body of the new message empty (remove any auto-populating signatures)&lt;br /&gt;
# Insert the junk or phishing scam message into your new blank email as an attachment. Note: Do not simply forward the junk or phishing message.&lt;br /&gt;
# Delete the original message &lt;br /&gt;
===False Positives===&lt;br /&gt;
Sometimes email messages are incorrectly identified as SPAM. To submit emails identified in this way:&lt;br /&gt;
# Compose a new email&lt;br /&gt;
# Address the email to [mailto:not_junk@office365.microsoft.com not_junk@office365.microsoft.com]&lt;br /&gt;
# Leave the body of the new message empty (remove any auto-populating signatures)&lt;br /&gt;
# Attach the email message that was incorrectly identified. Note: Do not simply forward the message.&lt;br /&gt;
# Delete the original message&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Sources:&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The State of Vermont, Department of Information and Innovation, &amp;quot;Instructions for reporting spam and phishing scam messages to Microsoft for Analysis&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Phishing&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Email_spam&lt;br /&gt;
[[Category:Email]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=SPAM&amp;diff=8302</id>
		<title>SPAM</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=SPAM&amp;diff=8302"/>
		<updated>2020-05-22T23:35:19Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* SPAM 2020 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Types of Scam Emails==&lt;br /&gt;
===Phishing===&lt;br /&gt;
Phishing emails are fraudulent email messages that appear to be sent by legitimate sources (a friend or another student, the University IT department, a bank, etc.) These messages usually include a link to click on that directs you to malicious website made to look like a login page or a webform designed to get you to enter private information (for example, your username and password.) The attackers then use the information the information they&#039;ve collected from you to commit some form of malicious activity with your account or, worse, identity theft.&lt;br /&gt;
&lt;br /&gt;
Many phishing emails attempt to trick recipients by creating a sense or urgency with a threat that they will lose something unless they act quickly. Other phishing emails are designed to make it appear that the phishing email is part of a prior email communication, hoping the recipient will perceive the email as legitimate.&lt;br /&gt;
&lt;br /&gt;
Examples of wording using in Phishing emails include:&lt;br /&gt;
*&#039;Your account will be deactivated if you don&#039;t CLICK HERE.&#039;&lt;br /&gt;
*&#039;ACTION REQUIRED - MISSING FAFSA/Financial Aid Info. CLICK HERE for Document Review&#039;&lt;br /&gt;
*&#039;A file has been shared with you. ONEDRIVE Document.&#039;&lt;br /&gt;
*&#039;You have received a secure document from XXX. Click Here to access.&#039;&lt;br /&gt;
*&#039;Unable to display full message. CLICK HERE to show full message.&#039;&lt;br /&gt;
[[File:PhishingEmailExample1.png|frame|center|Phishing Email Example]]&lt;br /&gt;
For additional information on Phishing, visit one of these online resources:&lt;br /&gt;
* https://www.phishing.org/what-is-phishing&lt;br /&gt;
*https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams&lt;br /&gt;
&lt;br /&gt;
===Fake Part-Time Jobs &amp;amp; Fake Check Scams===&lt;br /&gt;
Many universities have been affected by students and employees receiving emails from other student emails or outside addresses that indicate that their company/friend/mother/uncle/etc. is hiring for a part-time job.&lt;br /&gt;
*These &#039;jobs&#039; range from pet or baby sitting to research or secret shopper jobs that students can do in their spare time to earn extra money.&lt;br /&gt;
*These are fake job scams that attempt to have individuals deposit a fake check.&lt;br /&gt;
*Students who reply and indicate interest receive responses asking to provide detailed contact information (address, date of birth, etc.)&lt;br /&gt;
*The scammers then indicate that you are &#039;hired&#039; and send a fake check or money order to &amp;quot;cover start up wages/supplies.&amp;quot;&lt;br /&gt;
*The check is often for $1,500-2,000, and the student is asked to keep some of the money as their payment and sent the larger remaining about of money from the check to someone else via gift card, wire transfer, or other means.&lt;br /&gt;
*A few weeks later, the initial check then does not clear and the individual who deposited the check is then out the money then sent on to someone else.&lt;br /&gt;
&lt;br /&gt;
[[File:FakeJob1.png|frame|center|Fake Part-Time Job Email]]&lt;br /&gt;
For more information on fake check scams, visit the following links:&lt;br /&gt;
*https://www.fraud.org/fake_check_scams&lt;br /&gt;
*https://www.ic3.gov/media/2017/170118.aspx&lt;br /&gt;
*https://www.bbb.org/pittsburgh/news-events/bbb-scam-alerts/2017/01/college-students-targeted-with-bogus-employment-offers/&lt;br /&gt;
&lt;br /&gt;
===Impersonation Emails &amp;amp; Gift Card Scams===&lt;br /&gt;
Impersonation emails are emails that seem be sent by a trusted colleague or friend and start with a simple question like &#039;Are you available?&#039;&lt;br /&gt;
*These emails are sent so that they look like they are coming from the email of someone you know, but are actually sent from another email account used by a scammer.&lt;br /&gt;
*If you reply to the email, you&#039;ll be asked if you can do a favor for that person.&lt;br /&gt;
*Usually, the request is to purchase gift cards for some urgent need they have and then scratch of the redemption codes and email or text pictures to them.&lt;br /&gt;
*Once the scammer has the redemption codes for the gift cards, the funds are immediate moved to another account and your money is now stolen.&lt;br /&gt;
[[File:ImpersonattionExample.png|frame|center|Impersonation Email Gift Card Scam Example]]&lt;br /&gt;
&lt;br /&gt;
For additional information on impersonation emails and gift card scams, please visit the following links:&lt;br /&gt;
*https://www.chronicle.com/article/Phishing-Scheme-Targets/245535/&lt;br /&gt;
*https://www.zdnet.com/article/beware-phony-gift-card-email-scams-heres-why-attackers-love-using-them/&lt;br /&gt;
&lt;br /&gt;
===Sextortion Emails===&lt;br /&gt;
Sextortion scams are scams in which you receive an email from a &#039;hacker&#039; that indicates the person has had access to your accounts and computers for several months and will release embarrassing photos/videos/search history to your friends, family, or coworkers unless you pay them some form of ransom (usually requested in Bitcoin.) The emails may even include part of a password you currently or previously used.&lt;br /&gt;
&lt;br /&gt;
These emails are rarely ever legitimate. In most cases, the emails are sent to individuals by the thousands using lists of emails - and possibly passwords - compiled from website hacks over the years.&lt;br /&gt;
&#039;&#039;&#039;While the emails may be scary to read, our recommendation is always to just ignore and delete the email.&#039;&#039;&#039; It&#039;s possible that you may receive several iterations of the email, but all can safely be ignored.&lt;br /&gt;
&lt;br /&gt;
[[File:Sextortion Email Example.png|frame|center|Sextortion Email Example]]&lt;br /&gt;
For more information on sextortion email scams, visit the following resources:&lt;br /&gt;
* https://www.eff.org/deeplinks/2018/07/sextortion-scam-what-do-if-you-get-latest-phishing-spam-demanding-bitcoin&lt;br /&gt;
*https://www.cnbc.com/2019/06/17/email-sextortion-scams-on-the-rise-says-fbi.html&lt;br /&gt;
&lt;br /&gt;
===SPAM 2020===&lt;br /&gt;
Often, the emails you receive in your university emails inbox come from a staff member, professor, or person affiliated to William Paterson, but it’s important to stay alert for any scam emails that potentially come through.&lt;br /&gt;
This year alone in 2020, we have had around 4 scam emails sent to people’s inboxes that have consisted of different styles of scamming such as phishing or an advertisement for a job offering. &lt;br /&gt;
The best way to combat a scam email is simply by ignoring it and deleting it. In the event that you click on any links within a scam email it’s essential that you reset the password for your university account and any other account you have with that same password immediately. &lt;br /&gt;
In the event that you suspect an email is a scam, but cannot be 100% sure, we highly suggest you contact the Help Desk at 973-720-4357 to ensure the safety of your information. &lt;br /&gt;
Some examples of scam emails that have been sent out this year include:&lt;br /&gt;
&lt;br /&gt;
[[File:Spam.png|thumb|left|A pet sitting job scam on April 16th ]]&lt;br /&gt;
&lt;br /&gt;
Notice that this scam email in particular asks you to contact a secondary email rather than just replying to the one that sent the email. In addition, job advertisement scamming will usually include unrealistic salaries for doing an easy job to make it look more enticing. These are some easy signs to look out for.&lt;br /&gt;
&lt;br /&gt;
[[File:Spam3.png|thumb|left|Another job advertisement scam email on May 8th]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Reporting SPAM email==&lt;br /&gt;
Students, faculty and staff can report SPAM messages to Microsoft for analysis. If you are ever unsure if an email message is legitimate or SPAM, please contact User Services by submitting a request online at https://www.wpunj.edu/helpdesk or by calling 973-720-4357. &lt;br /&gt;
&lt;br /&gt;
===Junk and Phishing===&lt;br /&gt;
# Compose a new email&lt;br /&gt;
# Address the email to the Microsoft team that reviews messages as follows:&lt;br /&gt;
## For junk messages, address your email to [mailto:junk@office365.microsoft.com junk@office365.microsoft.com]&lt;br /&gt;
### Junk messages may contain disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware.&lt;br /&gt;
## For phishing scam messages, address your email to [mailto:phish@office365.microsoft.com phish@office365.microsoft.com]&lt;br /&gt;
### Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.&lt;br /&gt;
# Leave the body of the new message empty (remove any auto-populating signatures)&lt;br /&gt;
# Insert the junk or phishing scam message into your new blank email as an attachment. Note: Do not simply forward the junk or phishing message.&lt;br /&gt;
# Delete the original message &lt;br /&gt;
===False Positives===&lt;br /&gt;
Sometimes email messages are incorrectly identified as SPAM. To submit emails identified in this way:&lt;br /&gt;
# Compose a new email&lt;br /&gt;
# Address the email to [mailto:not_junk@office365.microsoft.com not_junk@office365.microsoft.com]&lt;br /&gt;
# Leave the body of the new message empty (remove any auto-populating signatures)&lt;br /&gt;
# Attach the email message that was incorrectly identified. Note: Do not simply forward the message.&lt;br /&gt;
# Delete the original message&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Sources:&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The State of Vermont, Department of Information and Innovation, &amp;quot;Instructions for reporting spam and phishing scam messages to Microsoft for Analysis&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Phishing&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Email_spam&lt;br /&gt;
[[Category:Email]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=SPAM&amp;diff=8301</id>
		<title>SPAM</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=SPAM&amp;diff=8301"/>
		<updated>2020-05-22T23:33:28Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* SPAM 2020 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Types of Scam Emails==&lt;br /&gt;
===Phishing===&lt;br /&gt;
Phishing emails are fraudulent email messages that appear to be sent by legitimate sources (a friend or another student, the University IT department, a bank, etc.) These messages usually include a link to click on that directs you to malicious website made to look like a login page or a webform designed to get you to enter private information (for example, your username and password.) The attackers then use the information the information they&#039;ve collected from you to commit some form of malicious activity with your account or, worse, identity theft.&lt;br /&gt;
&lt;br /&gt;
Many phishing emails attempt to trick recipients by creating a sense or urgency with a threat that they will lose something unless they act quickly. Other phishing emails are designed to make it appear that the phishing email is part of a prior email communication, hoping the recipient will perceive the email as legitimate.&lt;br /&gt;
&lt;br /&gt;
Examples of wording using in Phishing emails include:&lt;br /&gt;
*&#039;Your account will be deactivated if you don&#039;t CLICK HERE.&#039;&lt;br /&gt;
*&#039;ACTION REQUIRED - MISSING FAFSA/Financial Aid Info. CLICK HERE for Document Review&#039;&lt;br /&gt;
*&#039;A file has been shared with you. ONEDRIVE Document.&#039;&lt;br /&gt;
*&#039;You have received a secure document from XXX. Click Here to access.&#039;&lt;br /&gt;
*&#039;Unable to display full message. CLICK HERE to show full message.&#039;&lt;br /&gt;
[[File:PhishingEmailExample1.png|frame|center|Phishing Email Example]]&lt;br /&gt;
For additional information on Phishing, visit one of these online resources:&lt;br /&gt;
* https://www.phishing.org/what-is-phishing&lt;br /&gt;
*https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams&lt;br /&gt;
&lt;br /&gt;
===Fake Part-Time Jobs &amp;amp; Fake Check Scams===&lt;br /&gt;
Many universities have been affected by students and employees receiving emails from other student emails or outside addresses that indicate that their company/friend/mother/uncle/etc. is hiring for a part-time job.&lt;br /&gt;
*These &#039;jobs&#039; range from pet or baby sitting to research or secret shopper jobs that students can do in their spare time to earn extra money.&lt;br /&gt;
*These are fake job scams that attempt to have individuals deposit a fake check.&lt;br /&gt;
*Students who reply and indicate interest receive responses asking to provide detailed contact information (address, date of birth, etc.)&lt;br /&gt;
*The scammers then indicate that you are &#039;hired&#039; and send a fake check or money order to &amp;quot;cover start up wages/supplies.&amp;quot;&lt;br /&gt;
*The check is often for $1,500-2,000, and the student is asked to keep some of the money as their payment and sent the larger remaining about of money from the check to someone else via gift card, wire transfer, or other means.&lt;br /&gt;
*A few weeks later, the initial check then does not clear and the individual who deposited the check is then out the money then sent on to someone else.&lt;br /&gt;
&lt;br /&gt;
[[File:FakeJob1.png|frame|center|Fake Part-Time Job Email]]&lt;br /&gt;
For more information on fake check scams, visit the following links:&lt;br /&gt;
*https://www.fraud.org/fake_check_scams&lt;br /&gt;
*https://www.ic3.gov/media/2017/170118.aspx&lt;br /&gt;
*https://www.bbb.org/pittsburgh/news-events/bbb-scam-alerts/2017/01/college-students-targeted-with-bogus-employment-offers/&lt;br /&gt;
&lt;br /&gt;
===Impersonation Emails &amp;amp; Gift Card Scams===&lt;br /&gt;
Impersonation emails are emails that seem be sent by a trusted colleague or friend and start with a simple question like &#039;Are you available?&#039;&lt;br /&gt;
*These emails are sent so that they look like they are coming from the email of someone you know, but are actually sent from another email account used by a scammer.&lt;br /&gt;
*If you reply to the email, you&#039;ll be asked if you can do a favor for that person.&lt;br /&gt;
*Usually, the request is to purchase gift cards for some urgent need they have and then scratch of the redemption codes and email or text pictures to them.&lt;br /&gt;
*Once the scammer has the redemption codes for the gift cards, the funds are immediate moved to another account and your money is now stolen.&lt;br /&gt;
[[File:ImpersonattionExample.png|frame|center|Impersonation Email Gift Card Scam Example]]&lt;br /&gt;
&lt;br /&gt;
For additional information on impersonation emails and gift card scams, please visit the following links:&lt;br /&gt;
*https://www.chronicle.com/article/Phishing-Scheme-Targets/245535/&lt;br /&gt;
*https://www.zdnet.com/article/beware-phony-gift-card-email-scams-heres-why-attackers-love-using-them/&lt;br /&gt;
&lt;br /&gt;
===Sextortion Emails===&lt;br /&gt;
Sextortion scams are scams in which you receive an email from a &#039;hacker&#039; that indicates the person has had access to your accounts and computers for several months and will release embarrassing photos/videos/search history to your friends, family, or coworkers unless you pay them some form of ransom (usually requested in Bitcoin.) The emails may even include part of a password you currently or previously used.&lt;br /&gt;
&lt;br /&gt;
These emails are rarely ever legitimate. In most cases, the emails are sent to individuals by the thousands using lists of emails - and possibly passwords - compiled from website hacks over the years.&lt;br /&gt;
&#039;&#039;&#039;While the emails may be scary to read, our recommendation is always to just ignore and delete the email.&#039;&#039;&#039; It&#039;s possible that you may receive several iterations of the email, but all can safely be ignored.&lt;br /&gt;
&lt;br /&gt;
[[File:Sextortion Email Example.png|frame|center|Sextortion Email Example]]&lt;br /&gt;
For more information on sextortion email scams, visit the following resources:&lt;br /&gt;
* https://www.eff.org/deeplinks/2018/07/sextortion-scam-what-do-if-you-get-latest-phishing-spam-demanding-bitcoin&lt;br /&gt;
*https://www.cnbc.com/2019/06/17/email-sextortion-scams-on-the-rise-says-fbi.html&lt;br /&gt;
&lt;br /&gt;
===SPAM 2020===&lt;br /&gt;
Often, the emails you receive in your university emails inbox come from a staff member, professor, or person affiliated to William Paterson, but it’s important to stay alert for any scam emails that potentially come through.&lt;br /&gt;
This year alone in 2020, we have had around 4 scam emails sent to people’s inboxes that have consisted of different styles of scamming such as phishing or an advertisement for a job offering. &lt;br /&gt;
The best way to combat a scam email is simply by ignoring it and deleting it. In the event that you click on any links within a scam email it’s essential that you reset the password for your university account and any other account you have with that same password immediately. &lt;br /&gt;
In the event that you suspect an email is a scam, but cannot be 100% sure, we highly suggest you contact the Help Desk at 973-720-4357 to ensure the safety of your information. &lt;br /&gt;
Some examples of scam emails that have been sent out this year include:&lt;br /&gt;
&lt;br /&gt;
[[File:Spam.png|thumb|left|A pet sitting job scam on April 16th ]]&lt;br /&gt;
&lt;br /&gt;
==Reporting SPAM email==&lt;br /&gt;
Students, faculty and staff can report SPAM messages to Microsoft for analysis. If you are ever unsure if an email message is legitimate or SPAM, please contact User Services by submitting a request online at https://www.wpunj.edu/helpdesk or by calling 973-720-4357. &lt;br /&gt;
&lt;br /&gt;
===Junk and Phishing===&lt;br /&gt;
# Compose a new email&lt;br /&gt;
# Address the email to the Microsoft team that reviews messages as follows:&lt;br /&gt;
## For junk messages, address your email to [mailto:junk@office365.microsoft.com junk@office365.microsoft.com]&lt;br /&gt;
### Junk messages may contain disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware.&lt;br /&gt;
## For phishing scam messages, address your email to [mailto:phish@office365.microsoft.com phish@office365.microsoft.com]&lt;br /&gt;
### Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.&lt;br /&gt;
# Leave the body of the new message empty (remove any auto-populating signatures)&lt;br /&gt;
# Insert the junk or phishing scam message into your new blank email as an attachment. Note: Do not simply forward the junk or phishing message.&lt;br /&gt;
# Delete the original message &lt;br /&gt;
===False Positives===&lt;br /&gt;
Sometimes email messages are incorrectly identified as SPAM. To submit emails identified in this way:&lt;br /&gt;
# Compose a new email&lt;br /&gt;
# Address the email to [mailto:not_junk@office365.microsoft.com not_junk@office365.microsoft.com]&lt;br /&gt;
# Leave the body of the new message empty (remove any auto-populating signatures)&lt;br /&gt;
# Attach the email message that was incorrectly identified. Note: Do not simply forward the message.&lt;br /&gt;
# Delete the original message&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Sources:&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The State of Vermont, Department of Information and Innovation, &amp;quot;Instructions for reporting spam and phishing scam messages to Microsoft for Analysis&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Phishing&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Email_spam&lt;br /&gt;
[[Category:Email]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=SPAM&amp;diff=8300</id>
		<title>SPAM</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=SPAM&amp;diff=8300"/>
		<updated>2020-05-22T23:30:19Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* Types of Scam Emails */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Types of Scam Emails==&lt;br /&gt;
===Phishing===&lt;br /&gt;
Phishing emails are fraudulent email messages that appear to be sent by legitimate sources (a friend or another student, the University IT department, a bank, etc.) These messages usually include a link to click on that directs you to malicious website made to look like a login page or a webform designed to get you to enter private information (for example, your username and password.) The attackers then use the information the information they&#039;ve collected from you to commit some form of malicious activity with your account or, worse, identity theft.&lt;br /&gt;
&lt;br /&gt;
Many phishing emails attempt to trick recipients by creating a sense or urgency with a threat that they will lose something unless they act quickly. Other phishing emails are designed to make it appear that the phishing email is part of a prior email communication, hoping the recipient will perceive the email as legitimate.&lt;br /&gt;
&lt;br /&gt;
Examples of wording using in Phishing emails include:&lt;br /&gt;
*&#039;Your account will be deactivated if you don&#039;t CLICK HERE.&#039;&lt;br /&gt;
*&#039;ACTION REQUIRED - MISSING FAFSA/Financial Aid Info. CLICK HERE for Document Review&#039;&lt;br /&gt;
*&#039;A file has been shared with you. ONEDRIVE Document.&#039;&lt;br /&gt;
*&#039;You have received a secure document from XXX. Click Here to access.&#039;&lt;br /&gt;
*&#039;Unable to display full message. CLICK HERE to show full message.&#039;&lt;br /&gt;
[[File:PhishingEmailExample1.png|frame|center|Phishing Email Example]]&lt;br /&gt;
For additional information on Phishing, visit one of these online resources:&lt;br /&gt;
* https://www.phishing.org/what-is-phishing&lt;br /&gt;
*https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams&lt;br /&gt;
&lt;br /&gt;
===Fake Part-Time Jobs &amp;amp; Fake Check Scams===&lt;br /&gt;
Many universities have been affected by students and employees receiving emails from other student emails or outside addresses that indicate that their company/friend/mother/uncle/etc. is hiring for a part-time job.&lt;br /&gt;
*These &#039;jobs&#039; range from pet or baby sitting to research or secret shopper jobs that students can do in their spare time to earn extra money.&lt;br /&gt;
*These are fake job scams that attempt to have individuals deposit a fake check.&lt;br /&gt;
*Students who reply and indicate interest receive responses asking to provide detailed contact information (address, date of birth, etc.)&lt;br /&gt;
*The scammers then indicate that you are &#039;hired&#039; and send a fake check or money order to &amp;quot;cover start up wages/supplies.&amp;quot;&lt;br /&gt;
*The check is often for $1,500-2,000, and the student is asked to keep some of the money as their payment and sent the larger remaining about of money from the check to someone else via gift card, wire transfer, or other means.&lt;br /&gt;
*A few weeks later, the initial check then does not clear and the individual who deposited the check is then out the money then sent on to someone else.&lt;br /&gt;
&lt;br /&gt;
[[File:FakeJob1.png|frame|center|Fake Part-Time Job Email]]&lt;br /&gt;
For more information on fake check scams, visit the following links:&lt;br /&gt;
*https://www.fraud.org/fake_check_scams&lt;br /&gt;
*https://www.ic3.gov/media/2017/170118.aspx&lt;br /&gt;
*https://www.bbb.org/pittsburgh/news-events/bbb-scam-alerts/2017/01/college-students-targeted-with-bogus-employment-offers/&lt;br /&gt;
&lt;br /&gt;
===Impersonation Emails &amp;amp; Gift Card Scams===&lt;br /&gt;
Impersonation emails are emails that seem be sent by a trusted colleague or friend and start with a simple question like &#039;Are you available?&#039;&lt;br /&gt;
*These emails are sent so that they look like they are coming from the email of someone you know, but are actually sent from another email account used by a scammer.&lt;br /&gt;
*If you reply to the email, you&#039;ll be asked if you can do a favor for that person.&lt;br /&gt;
*Usually, the request is to purchase gift cards for some urgent need they have and then scratch of the redemption codes and email or text pictures to them.&lt;br /&gt;
*Once the scammer has the redemption codes for the gift cards, the funds are immediate moved to another account and your money is now stolen.&lt;br /&gt;
[[File:ImpersonattionExample.png|frame|center|Impersonation Email Gift Card Scam Example]]&lt;br /&gt;
&lt;br /&gt;
For additional information on impersonation emails and gift card scams, please visit the following links:&lt;br /&gt;
*https://www.chronicle.com/article/Phishing-Scheme-Targets/245535/&lt;br /&gt;
*https://www.zdnet.com/article/beware-phony-gift-card-email-scams-heres-why-attackers-love-using-them/&lt;br /&gt;
&lt;br /&gt;
===Sextortion Emails===&lt;br /&gt;
Sextortion scams are scams in which you receive an email from a &#039;hacker&#039; that indicates the person has had access to your accounts and computers for several months and will release embarrassing photos/videos/search history to your friends, family, or coworkers unless you pay them some form of ransom (usually requested in Bitcoin.) The emails may even include part of a password you currently or previously used.&lt;br /&gt;
&lt;br /&gt;
These emails are rarely ever legitimate. In most cases, the emails are sent to individuals by the thousands using lists of emails - and possibly passwords - compiled from website hacks over the years.&lt;br /&gt;
&#039;&#039;&#039;While the emails may be scary to read, our recommendation is always to just ignore and delete the email.&#039;&#039;&#039; It&#039;s possible that you may receive several iterations of the email, but all can safely be ignored.&lt;br /&gt;
&lt;br /&gt;
[[File:Sextortion Email Example.png|frame|center|Sextortion Email Example]]&lt;br /&gt;
For more information on sextortion email scams, visit the following resources:&lt;br /&gt;
* https://www.eff.org/deeplinks/2018/07/sextortion-scam-what-do-if-you-get-latest-phishing-spam-demanding-bitcoin&lt;br /&gt;
*https://www.cnbc.com/2019/06/17/email-sextortion-scams-on-the-rise-says-fbi.html&lt;br /&gt;
&lt;br /&gt;
===SPAM 2020===&lt;br /&gt;
&lt;br /&gt;
==Reporting SPAM email==&lt;br /&gt;
Students, faculty and staff can report SPAM messages to Microsoft for analysis. If you are ever unsure if an email message is legitimate or SPAM, please contact User Services by submitting a request online at https://www.wpunj.edu/helpdesk or by calling 973-720-4357. &lt;br /&gt;
&lt;br /&gt;
===Junk and Phishing===&lt;br /&gt;
# Compose a new email&lt;br /&gt;
# Address the email to the Microsoft team that reviews messages as follows:&lt;br /&gt;
## For junk messages, address your email to [mailto:junk@office365.microsoft.com junk@office365.microsoft.com]&lt;br /&gt;
### Junk messages may contain disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware.&lt;br /&gt;
## For phishing scam messages, address your email to [mailto:phish@office365.microsoft.com phish@office365.microsoft.com]&lt;br /&gt;
### Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.&lt;br /&gt;
# Leave the body of the new message empty (remove any auto-populating signatures)&lt;br /&gt;
# Insert the junk or phishing scam message into your new blank email as an attachment. Note: Do not simply forward the junk or phishing message.&lt;br /&gt;
# Delete the original message &lt;br /&gt;
===False Positives===&lt;br /&gt;
Sometimes email messages are incorrectly identified as SPAM. To submit emails identified in this way:&lt;br /&gt;
# Compose a new email&lt;br /&gt;
# Address the email to [mailto:not_junk@office365.microsoft.com not_junk@office365.microsoft.com]&lt;br /&gt;
# Leave the body of the new message empty (remove any auto-populating signatures)&lt;br /&gt;
# Attach the email message that was incorrectly identified. Note: Do not simply forward the message.&lt;br /&gt;
# Delete the original message&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Sources:&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The State of Vermont, Department of Information and Innovation, &amp;quot;Instructions for reporting spam and phishing scam messages to Microsoft for Analysis&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Phishing&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Email_spam&lt;br /&gt;
[[Category:Email]]&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=File:Spam3.png&amp;diff=8299</id>
		<title>File:Spam3.png</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=File:Spam3.png&amp;diff=8299"/>
		<updated>2020-05-22T23:27:47Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=File:Spam2.png&amp;diff=8298</id>
		<title>File:Spam2.png</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=File:Spam2.png&amp;diff=8298"/>
		<updated>2020-05-22T23:27:37Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=File:Spam.png&amp;diff=8297</id>
		<title>File:Spam.png</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=File:Spam.png&amp;diff=8297"/>
		<updated>2020-05-22T23:27:16Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8296</id>
		<title>Outlook Calendar Sharing</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8296"/>
		<updated>2020-05-22T23:05:27Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* Windows Users */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; &lt;br /&gt;
==Windows Users==&lt;br /&gt;
If you are a Windows User and are looking to share your calendar with a friend or college, you need to follow a few simple steps. Please see the steps below. &amp;lt;br&amp;gt;&lt;br /&gt;
1.Open outlook – Select Calendar in bottom left corner.  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 1.png|thumb|left]] &amp;lt;br&amp;gt;&lt;br /&gt;
2. Right-click your calendar that you want to share on the left side list of calendars. &amp;lt;br&amp;gt;&lt;br /&gt;
3. Click on Share  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 2.png|thumb|Click Share Calendar]]&lt;br /&gt;
4. Then Share Calendar  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 3.png|thumb|left]]&lt;br /&gt;
5. Then enter or search the name/email of the person you want to share with  &lt;br /&gt;
6. You have the option of allowing your recipient to see your Availability Only, See Limited details or Full details  &lt;br /&gt;
7. You can also request permission to view their calendar &lt;br /&gt;
6.Then click Share/Send, and then yes to confirm to share your calendar  &lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/video-share-your-calendar-2fcf4f4f-8d46-4d8b-ae79-5d94549e531b |here]].&lt;br /&gt;
&lt;br /&gt;
==Mac Users==&lt;br /&gt;
&lt;br /&gt;
1 . At the bottom of the navigation pane, select the Calendar icon. &lt;br /&gt;
[[File:Mac Calender 1.png|thumb]]&lt;br /&gt;
    Select and view the calendar you want to share. &lt;br /&gt;
    On the &#039;&#039;&#039;Organize&#039;&#039;&#039; tab, choose &#039;&#039;&#039;Calendar Permissions&#039;&#039;&#039;. &lt;br /&gt;
[[File:Mac Calender 3.png|thumb|Calendar Permissions]]&lt;br /&gt;
    In the Calendar Properties box, choose Add User. &lt;br /&gt;
[[File:Mac Calender 4.png|thumb]]&lt;br /&gt;
Add user button on Calendar Permissions tab &lt;br /&gt;
In the Search box, enter the name of the person you want to share your calendar with. When you see their name appear in the list, select it and then choose Add. &lt;br /&gt;
[[File:Mac Calender 6.png|thumb]]&lt;br /&gt;
Click Add &lt;br /&gt;
&lt;br /&gt;
Tip: Their name will show up in the Calendar Properties box. &lt;br /&gt;
In the Calendar Properties box, select the Permission Level down arrow, and choose the permission level to assign to the person you added. Note that the settings for Read, Write, Delete, and Other options change based on the permission level you choose. &lt;br /&gt;
[[File:MAc Calender 8. png.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/share-your-calendar-in-outlook-for-mac-1534a3e9-b6d1-420f-88ae-89abb17ad57e |here]].&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8295</id>
		<title>Outlook Calendar Sharing</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8295"/>
		<updated>2020-05-22T23:05:13Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* Windows Users */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; &lt;br /&gt;
==Windows Users==&lt;br /&gt;
If you are a Windows User and are looking to share your calendar with a friend or college, you need to follow a few simple steps. Please see the steps below. &amp;lt;br&amp;gt;&lt;br /&gt;
1.Open outlook – Select Calendar in bottom left corner.  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 1.png|thumb|left]] &amp;lt;br&amp;gt;&lt;br /&gt;
2. Right-click your calendar that you want to share on the left side list of calendars. &amp;lt;br&amp;gt;&lt;br /&gt;
3. Click on Share  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 2.png|thumb|Click Share Calendar]]&lt;br /&gt;
4. Then Share Calendar  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 3.png|thumb|left]]&amp;lt;br&amp;gt;&lt;br /&gt;
5. Then enter or search the name/email of the person you want to share with  &lt;br /&gt;
6. You have the option of allowing your recipient to see your Availability Only, See Limited details or Full details  &lt;br /&gt;
7. You can also request permission to view their calendar &lt;br /&gt;
6.Then click Share/Send, and then yes to confirm to share your calendar  &lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/video-share-your-calendar-2fcf4f4f-8d46-4d8b-ae79-5d94549e531b |here]].&lt;br /&gt;
&lt;br /&gt;
==Mac Users==&lt;br /&gt;
&lt;br /&gt;
1 . At the bottom of the navigation pane, select the Calendar icon. &lt;br /&gt;
[[File:Mac Calender 1.png|thumb]]&lt;br /&gt;
    Select and view the calendar you want to share. &lt;br /&gt;
    On the &#039;&#039;&#039;Organize&#039;&#039;&#039; tab, choose &#039;&#039;&#039;Calendar Permissions&#039;&#039;&#039;. &lt;br /&gt;
[[File:Mac Calender 3.png|thumb|Calendar Permissions]]&lt;br /&gt;
    In the Calendar Properties box, choose Add User. &lt;br /&gt;
[[File:Mac Calender 4.png|thumb]]&lt;br /&gt;
Add user button on Calendar Permissions tab &lt;br /&gt;
In the Search box, enter the name of the person you want to share your calendar with. When you see their name appear in the list, select it and then choose Add. &lt;br /&gt;
[[File:Mac Calender 6.png|thumb]]&lt;br /&gt;
Click Add &lt;br /&gt;
&lt;br /&gt;
Tip: Their name will show up in the Calendar Properties box. &lt;br /&gt;
In the Calendar Properties box, select the Permission Level down arrow, and choose the permission level to assign to the person you added. Note that the settings for Read, Write, Delete, and Other options change based on the permission level you choose. &lt;br /&gt;
[[File:MAc Calender 8. png.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/share-your-calendar-in-outlook-for-mac-1534a3e9-b6d1-420f-88ae-89abb17ad57e |here]].&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8294</id>
		<title>Outlook Calendar Sharing</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8294"/>
		<updated>2020-05-22T23:04:34Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* Windows Users */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; &lt;br /&gt;
==Windows Users==&lt;br /&gt;
If you are a Windows User and are looking to share your calendar with a friend or college, you need to follow a few simple steps. Please see the steps below. &amp;lt;br&amp;gt;&lt;br /&gt;
1.Open outlook – Select Calendar in bottom left corner.  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 1.png|thumb|left]] &amp;lt;br&amp;gt;&lt;br /&gt;
2. Right-click your calendar that you want to share on the left side list of calendars. &amp;lt;br&amp;gt;&lt;br /&gt;
3. Click on Share  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 2.png|thumb|Click Share Calendar]]&amp;lt;br&amp;gt;&lt;br /&gt;
4. Then Share Calendar  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 3.png|thumb|left]]&amp;lt;br&amp;gt;&lt;br /&gt;
5. Then enter or search the name/email of the person you want to share with  &lt;br /&gt;
6. You have the option of allowing your recipient to see your Availability Only, See Limited details or Full details  &lt;br /&gt;
7. You can also request permission to view their calendar &lt;br /&gt;
6.Then click Share/Send, and then yes to confirm to share your calendar  &lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/video-share-your-calendar-2fcf4f4f-8d46-4d8b-ae79-5d94549e531b |here]].&lt;br /&gt;
&lt;br /&gt;
==Mac Users==&lt;br /&gt;
&lt;br /&gt;
1 . At the bottom of the navigation pane, select the Calendar icon. &lt;br /&gt;
[[File:Mac Calender 1.png|thumb]]&lt;br /&gt;
    Select and view the calendar you want to share. &lt;br /&gt;
    On the &#039;&#039;&#039;Organize&#039;&#039;&#039; tab, choose &#039;&#039;&#039;Calendar Permissions&#039;&#039;&#039;. &lt;br /&gt;
[[File:Mac Calender 3.png|thumb|Calendar Permissions]]&lt;br /&gt;
    In the Calendar Properties box, choose Add User. &lt;br /&gt;
[[File:Mac Calender 4.png|thumb]]&lt;br /&gt;
Add user button on Calendar Permissions tab &lt;br /&gt;
In the Search box, enter the name of the person you want to share your calendar with. When you see their name appear in the list, select it and then choose Add. &lt;br /&gt;
[[File:Mac Calender 6.png|thumb]]&lt;br /&gt;
Click Add &lt;br /&gt;
&lt;br /&gt;
Tip: Their name will show up in the Calendar Properties box. &lt;br /&gt;
In the Calendar Properties box, select the Permission Level down arrow, and choose the permission level to assign to the person you added. Note that the settings for Read, Write, Delete, and Other options change based on the permission level you choose. &lt;br /&gt;
[[File:MAc Calender 8. png.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/share-your-calendar-in-outlook-for-mac-1534a3e9-b6d1-420f-88ae-89abb17ad57e |here]].&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8293</id>
		<title>Outlook Calendar Sharing</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8293"/>
		<updated>2020-05-22T23:04:16Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* Windows Users */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; &lt;br /&gt;
==Windows Users==&lt;br /&gt;
If you are a Windows User and are looking to share your calendar with a friend or college, you need to follow a few simple steps. Please see the steps below.  &lt;br /&gt;
1.Open outlook – Select Calendar in bottom left corner.  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 1.png|thumb|left]] &amp;lt;br&amp;gt;&lt;br /&gt;
2. Right-click your calendar that you want to share on the left side list of calendars. &amp;lt;br&amp;gt;&lt;br /&gt;
3. Click on Share  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 2.png|thumb|Click Share Calendar]]&amp;lt;br&amp;gt;&lt;br /&gt;
4. Then Share Calendar  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 3.png|thumb|left]]&amp;lt;br&amp;gt;&lt;br /&gt;
5. Then enter or search the name/email of the person you want to share with  &lt;br /&gt;
6. You have the option of allowing your recipient to see your Availability Only, See Limited details or Full details  &lt;br /&gt;
7. You can also request permission to view their calendar &lt;br /&gt;
6.Then click Share/Send, and then yes to confirm to share your calendar  &lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/video-share-your-calendar-2fcf4f4f-8d46-4d8b-ae79-5d94549e531b |here]].&lt;br /&gt;
&lt;br /&gt;
==Mac Users==&lt;br /&gt;
&lt;br /&gt;
1 . At the bottom of the navigation pane, select the Calendar icon. &lt;br /&gt;
[[File:Mac Calender 1.png|thumb]]&lt;br /&gt;
    Select and view the calendar you want to share. &lt;br /&gt;
    On the &#039;&#039;&#039;Organize&#039;&#039;&#039; tab, choose &#039;&#039;&#039;Calendar Permissions&#039;&#039;&#039;. &lt;br /&gt;
[[File:Mac Calender 3.png|thumb|Calendar Permissions]]&lt;br /&gt;
    In the Calendar Properties box, choose Add User. &lt;br /&gt;
[[File:Mac Calender 4.png|thumb]]&lt;br /&gt;
Add user button on Calendar Permissions tab &lt;br /&gt;
In the Search box, enter the name of the person you want to share your calendar with. When you see their name appear in the list, select it and then choose Add. &lt;br /&gt;
[[File:Mac Calender 6.png|thumb]]&lt;br /&gt;
Click Add &lt;br /&gt;
&lt;br /&gt;
Tip: Their name will show up in the Calendar Properties box. &lt;br /&gt;
In the Calendar Properties box, select the Permission Level down arrow, and choose the permission level to assign to the person you added. Note that the settings for Read, Write, Delete, and Other options change based on the permission level you choose. &lt;br /&gt;
[[File:MAc Calender 8. png.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/share-your-calendar-in-outlook-for-mac-1534a3e9-b6d1-420f-88ae-89abb17ad57e |here]].&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8292</id>
		<title>Outlook Calendar Sharing</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8292"/>
		<updated>2020-05-22T23:03:16Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* Windows Users */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; &lt;br /&gt;
==Windows Users==&lt;br /&gt;
If you are a Windows User and are looking to share your calendar with a friend or college, you need to follow a few simple steps. Please see the steps below.  &lt;br /&gt;
    Open outlook – Select Calendar in bottom left corner  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 1.png|thumb|left]] &amp;lt;br&amp;gt;&lt;br /&gt;
2. Right-click your calendar that you want to share on the left side list of calendars. &amp;lt;br&amp;gt;&lt;br /&gt;
3. Click on Share  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 2.png|thumb|Click Share Calendar]]&amp;lt;br&amp;gt;&lt;br /&gt;
4. Then Share Calendar  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 3.png|thumb|left]]&amp;lt;br&amp;gt;&lt;br /&gt;
5. Then enter or search the name/email of the person you want to share with  &lt;br /&gt;
6. You have the option of allowing your recipient to see your Availability Only, See Limited details or Full details  &lt;br /&gt;
7. You can also request permission to view their calendar &lt;br /&gt;
6.Then click Share/Send, and then yes to confirm to share your calendar  &lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/video-share-your-calendar-2fcf4f4f-8d46-4d8b-ae79-5d94549e531b |here]].&lt;br /&gt;
&lt;br /&gt;
==Mac Users==&lt;br /&gt;
&lt;br /&gt;
1 . At the bottom of the navigation pane, select the Calendar icon. &lt;br /&gt;
[[File:Mac Calender 1.png|thumb]]&lt;br /&gt;
    Select and view the calendar you want to share. &lt;br /&gt;
    On the &#039;&#039;&#039;Organize&#039;&#039;&#039; tab, choose &#039;&#039;&#039;Calendar Permissions&#039;&#039;&#039;. &lt;br /&gt;
[[File:Mac Calender 3.png|thumb|Calendar Permissions]]&lt;br /&gt;
    In the Calendar Properties box, choose Add User. &lt;br /&gt;
[[File:Mac Calender 4.png|thumb]]&lt;br /&gt;
Add user button on Calendar Permissions tab &lt;br /&gt;
In the Search box, enter the name of the person you want to share your calendar with. When you see their name appear in the list, select it and then choose Add. &lt;br /&gt;
[[File:Mac Calender 6.png|thumb]]&lt;br /&gt;
Click Add &lt;br /&gt;
&lt;br /&gt;
Tip: Their name will show up in the Calendar Properties box. &lt;br /&gt;
In the Calendar Properties box, select the Permission Level down arrow, and choose the permission level to assign to the person you added. Note that the settings for Read, Write, Delete, and Other options change based on the permission level you choose. &lt;br /&gt;
[[File:MAc Calender 8. png.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/share-your-calendar-in-outlook-for-mac-1534a3e9-b6d1-420f-88ae-89abb17ad57e |here]].&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8291</id>
		<title>Outlook Calendar Sharing</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8291"/>
		<updated>2020-05-22T23:02:43Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* Windows Users */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; &lt;br /&gt;
==Windows Users==&lt;br /&gt;
If you are a Windows User and are looking to share your calendar with a friend or college, you need to follow a few simple steps. Please see the steps below.  &lt;br /&gt;
    Open outlook – Select Calendar in bottom left corner  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Calendar 1.png|thumb|left]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. Right-click your calendar that you want to share on the left side list of calendars. &amp;lt;br&amp;gt;&lt;br /&gt;
3. Click on Share  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Calendar 2.png|thumb|Click Share Calendar]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Then Share Calendar  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Calendar 3.png|thumb|left]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5. Then enter or search the name/email of the person you want to share with  &lt;br /&gt;
6. You have the option of allowing your recipient to see your Availability Only, See Limited details or Full details  &lt;br /&gt;
7. You can also request permission to view their calendar &lt;br /&gt;
6.Then click Share/Send, and then yes to confirm to share your calendar  &lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/video-share-your-calendar-2fcf4f4f-8d46-4d8b-ae79-5d94549e531b |here]].&lt;br /&gt;
&lt;br /&gt;
==Mac Users==&lt;br /&gt;
&lt;br /&gt;
1 . At the bottom of the navigation pane, select the Calendar icon. &lt;br /&gt;
[[File:Mac Calender 1.png|thumb]]&lt;br /&gt;
    Select and view the calendar you want to share. &lt;br /&gt;
    On the &#039;&#039;&#039;Organize&#039;&#039;&#039; tab, choose &#039;&#039;&#039;Calendar Permissions&#039;&#039;&#039;. &lt;br /&gt;
[[File:Mac Calender 3.png|thumb|Calendar Permissions]]&lt;br /&gt;
    In the Calendar Properties box, choose Add User. &lt;br /&gt;
[[File:Mac Calender 4.png|thumb]]&lt;br /&gt;
Add user button on Calendar Permissions tab &lt;br /&gt;
In the Search box, enter the name of the person you want to share your calendar with. When you see their name appear in the list, select it and then choose Add. &lt;br /&gt;
[[File:Mac Calender 6.png|thumb]]&lt;br /&gt;
Click Add &lt;br /&gt;
&lt;br /&gt;
Tip: Their name will show up in the Calendar Properties box. &lt;br /&gt;
In the Calendar Properties box, select the Permission Level down arrow, and choose the permission level to assign to the person you added. Note that the settings for Read, Write, Delete, and Other options change based on the permission level you choose. &lt;br /&gt;
[[File:MAc Calender 8. png.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/share-your-calendar-in-outlook-for-mac-1534a3e9-b6d1-420f-88ae-89abb17ad57e |here]].&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
	<entry>
		<id>https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8290</id>
		<title>Outlook Calendar Sharing</title>
		<link rel="alternate" type="text/html" href="https://itwiki.wpunj.edu/index.php?title=Outlook_Calendar_Sharing&amp;diff=8290"/>
		<updated>2020-05-22T23:00:17Z</updated>

		<summary type="html">&lt;p&gt;Ta-arcaj: /* Windows Users */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; &lt;br /&gt;
==Windows Users==&lt;br /&gt;
If you are a Windows User and are looking to share your calendar with a friend or college, you need to follow a few simple steps. Please see the steps below.  &lt;br /&gt;
    Open outlook – Select Calendar in bottom left corner  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 1.png|thumb|left]]&lt;br /&gt;
2. Right-click your calendar that you want to share on the left side list of calendars. &amp;lt;br&amp;gt;&lt;br /&gt;
3. Click on Share  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 2.png|thumb|Click Share Calendar]]&amp;lt;br&amp;gt;&lt;br /&gt;
4. Then Share Calendar  &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Calendar 3.png|thumb|left]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5. Then enter or search the name/email of the person you want to share with  &lt;br /&gt;
6. You have the option of allowing your recipient to see your Availability Only, See Limited details or Full details  &lt;br /&gt;
7. You can also request permission to view their calendar &lt;br /&gt;
6.Then click Share/Send, and then yes to confirm to share your calendar  &lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/video-share-your-calendar-2fcf4f4f-8d46-4d8b-ae79-5d94549e531b |here]].&lt;br /&gt;
&lt;br /&gt;
==Mac Users==&lt;br /&gt;
&lt;br /&gt;
1 . At the bottom of the navigation pane, select the Calendar icon. &lt;br /&gt;
[[File:Mac Calender 1.png|thumb]]&lt;br /&gt;
    Select and view the calendar you want to share. &lt;br /&gt;
    On the &#039;&#039;&#039;Organize&#039;&#039;&#039; tab, choose &#039;&#039;&#039;Calendar Permissions&#039;&#039;&#039;. &lt;br /&gt;
[[File:Mac Calender 3.png|thumb|Calendar Permissions]]&lt;br /&gt;
    In the Calendar Properties box, choose Add User. &lt;br /&gt;
[[File:Mac Calender 4.png|thumb]]&lt;br /&gt;
Add user button on Calendar Permissions tab &lt;br /&gt;
In the Search box, enter the name of the person you want to share your calendar with. When you see their name appear in the list, select it and then choose Add. &lt;br /&gt;
[[File:Mac Calender 6.png|thumb]]&lt;br /&gt;
Click Add &lt;br /&gt;
&lt;br /&gt;
Tip: Their name will show up in the Calendar Properties box. &lt;br /&gt;
In the Calendar Properties box, select the Permission Level down arrow, and choose the permission level to assign to the person you added. Note that the settings for Read, Write, Delete, and Other options change based on the permission level you choose. &lt;br /&gt;
[[File:MAc Calender 8. png.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information visit Microsoft&#039;s Support Page [[ https://support.office.com/en-us/article/share-your-calendar-in-outlook-for-mac-1534a3e9-b6d1-420f-88ae-89abb17ad57e |here]].&lt;/div&gt;</summary>
		<author><name>Ta-arcaj</name></author>
	</entry>
</feed>