In-Room Connections
Ethernet Connections
Ethernet Availability in Meeting Spaces
Wireless Availability
Additional Services
Requirements
Minimum Security Requirements
Complimentary Internet connections in sleeping rooms and meeting spaces are available for all conference guests. To keep security risks at their lowest, all computers should meet UC Berkeley's minimum security requirements. Computers that do not meet the minimum security requirements may have their Internet connection disabled without notice. To activate Ethernet connections for your conference, please take the following steps:
- Notify your conference coordinator at least 3 weeks in advance if you would like Internet access in your guest sleeping rooms and/or meeting rooms.
- Choose a general login username and password for In-Room Connection registration. These will be used by all conference guests needing Internet access.
- Once your account is created and confirmed by your conference coordinator, please send computer registration instructions to your conference guests and staff. They should register their computers for Internet access before their arrival.
Computer Registration
Instructions
To register computer(s) for Internet access, please follow the steps
below:
- Visit http://rescomp.berkeley.edu/
conferences and log in using your chosen login username and password. - Review your conference information. If anything is incorrect, contact your conference coordinator or email the IT helpdesk at rssp-helpdesk@berkeley.edu.
- Be sure each individual's name, email, phone number (optional) and ethernet card address has been entered.
- Make sure computers are properly configured to receive an IP address through Dynamic Host Configuration Protocol (DHCP)
- Guests must bring their own Ethernet cable (we recommend one at least 25ft long).
Not completing the steps outlined above can result in a delay of Internet access for your guests. Check with your conference coordinator if you have questions regarding the Internet registration process.
For those meeting spaces that do not have wireless Internet available, wireless routers can be installed for a $50.00 fee per router. Please speak with your conference coordinator for more information.
Having trouble connecting? Our IT staff is happy to provide limited technical support free of charge for the first 30 minutes. After which, the standard rate of $75.00/hour will apply.
Because additional services will be posted to the Master Bill (not to the individual conference guests) all charges must be approved by the Conference Organizer before IT will extend the service.
Conference hosts are responsible
for all network traffic originating from machines that have registered
on our network. Conference participants must abide by Residential Computing's Appropriate Use
Policies. Conference
participants should not attempt any modification of the University's
network hardware. Requests for technical support should be made through
the conference coordinator.
In order to protect the network and to ensure efficient and reliable Internet service for all users, the University of California, Berkeley enforces the following minimum security requirements for any device connecting to our network to use the Internet. Any device, such as your laptop, that does not meet the minimum security standards may have its Internet access turned off and blocked from the Internet without notification. The minimum security standards are as follows:
- Install anti-virus
software that updates with regular virus definitions
The first security requirement is to have anti-virus software. Anti-virus software detects and eliminates malicious codes on your computer. It protects your documents and media by keeping viruses from spreading between your computer and others. We (UCB Conference Services) recommend the following anti-virus solutions: - Set strong passwords
for your computer.
Many administrator and regular user accounts on computers have blank passwords by default, giving hackers an easy way to compromise machines. Setting a strong password for these accounts closes this common security hole.
- Have a personal
firewall installed and running at all times.
It is a requirement that your computer have firewall software. A personal firewall protects your computer from potentially harmful network traffic. It prevents spammers and hackers from exploiting security holes on your computer. The built-in Windows and Mac firewalls are generally sufficient assuming you have anti-virus software.
- Install the latest
critical updates and enable automatic updates to get the latest software
patches for your computer.
Enable and run automatic updates for your operating system (ex. Windows or Mac OS X) to install the most latest critical updates for your computer. This will protect your computer from the newest security vulnerabilities as they are discovered.
-
Free: Microsoft Security
Essentials, AVG, Avira
AntiVir, Avast!, ClamWin
Not Free: Symantec, NOD32, Panda Antivirus, McAfee, Kaspersky

