The MSB Tech Center (MSBTC) offers support services for any number of different hardware and software issues. MSBTC should be the first choice when MSB students have problems with network access or personal computing. MSBTC can arrange hardware support from quick troubleshooting to warranty support through our contract with Computerware.
We provide Windows and Microsoft Office for free. We can provide and install all MSB standard applications such as iPrint, Minitab, and the Decision Tools. We can install Windows 10 on students' Mac computers. The Tech Center is also responsible for the maintenance of the printers in Hariri.
If you are having any problems, stop by!
Here are our basic PC requirements:
- Operating System: Windows 8.1 or 10
- Minimum Specs: Intel Core i5 or i7 Processor, 8GB RAM, 256GB SSD
- Suggested Vendor: ComputerWare
- Microsoft Office: Available from office.com/student
- You are also required to have administrative access to your computer. If your computer is provided to you by your workplace, you likely won't have this access!
- Microsoft Surface Pros are good computers assuming they meet minimum specifications. The Microsoft Surface RT does not meet minimum specifications and should be avoided.
- iPads and other "tablet" computers whether Android or Apple do not meet minimum specifications.
- Chromebooks are not compatible with the software you need for your classes.
All new student computers must be capable of running the 64-bit version of Windows 8.1 or Windows 10. We recommend Windows 10. The Tech Center provides support for all Mac computers; however, some of the classes you will be taking require software that is only available for Windows. If you choose to purchase a Mac computer, MSBTC will assist you to install Windows 10 as a secondary operating system. Your Mac computer can be a MacBook Pro or Air and must have at least 256 GB of storage. The Tech Center offers two ways to install Windows on your Mac:
- Bootcamp: Bootcamp allows you to select either your Mac OS or your Windows OS upon boot up. Bootcamp runs without slowing your computer. To bootcamp your computer, you MUST have at least 80 GB of free space on your computer, a laptop charger, an available USB/USB-C port, a computer released during or after 2012, and have the latest Mac OS installed.
- VMWare Fusion: This is a software offered for free by Georgetown to all Georgetown students. It allows you to run both your Apple OS and Windows OS at the same time, but it will slow down your computer.
MSBTC will provide MSB students with a free copy of Windows 10 and Microsoft Office for Windows. It is not necessary for Mac users to purchase this software.
In order to bootcamp your computer, you HAVE to book an appointment. Find the link to sign-up here: https://bit.ly/2ZvZXPq
Be prepared to spend at least 2 hours in the Tech Center with your computer if you choose to install Windows on a Mac computer. You must be with your computer at all times. If you have any questions, drop by the Tech Center in Hariri and we can explain this further.
If you still have questions, feel free to contact the Tech Center at (202) 687-4721.
Business school students are allowed to use most of the large network printer/copiers in Hariri. These printers offer a variety of printing and copying options, including color and scan to e-mail.
Printing services are included as a part of every student's semester Technology Fee. Each student receives 1500 pages of printing at the beginning of each semester. A "print" is a single sheet of paper which can be printed on both sides. Should a need for more printing arise, students can request additonal prints from us if they demonstrate a legitimate academic need.
To print from your computer to a MSB printer, you must be connected to Saxanet and have the iPrint client installed. If you do not have your print card, you can also use the printers by signing in manually on the touch pad with your NetID and MSB password or by printing from the PaperCut website under 'Jobs Pending Release'.
If you would like to see a tutorial on how to install the iPrint client onto your computer, visit the iPrint Installation section on the Tutorials page.
If you are having trouble printing, take a look at our troubleshooting tips for printers on the Troubleshooting page. If you are still having trouble, feel free to give us a call at (202) 687-4721 or stop by the Tech Center in Hariri so our computer professionals can take a look.
Computerware can provide both warranty and vendor hardware repair services for most computer brands. Computerware offers warranty support for Lenovo, HP, Toshiba, and Fujitsu. If your computer is not under warranty, there is a fee to use their services. To use Computerware's services, please fill out the online form before bringing in your computer.
For more information, click here.
Security is a top priority for the MSBTC. The MSB requires every computer on its network to have up-to-date anti-virus software to protect both users and our network from any potential attacks.
The best way to deal with malware is to prevent it from occurring in the first place. There are many ways you can take preventive measures against Malware:
- Firewalls: A Firewall is an essential part of any set of computer security measures. Windows comes with its own Firewall by default, but you should ensure that it's working and enabled.
- Updates: Malware typically exploits vulnerabilities in software to install itself on to machines. By keeping a computer regularly updated, security vulnerabilities can be fixed. Windows update is available through the control panel under the System and Security category. Mac updates can be conducted by going to System Preferences and clicking on Software Update under "System".
- Anti-Virus Software: The MSBTC requires every computer on our network to have up-to-date anti-virus software to protect both your computer and our network from any potential attacks. We recommend using Windows Defender for Windows computers and Malwarebytes for Mac computers. Always use non-standard username/password combinations.
As a business student, you can assume a "Reasonable Expectation of Privacy" with regards to your interactions on the Georgetown network. Unless authorities specifically request data with proper documentation, no one but you will have access to your network folders or email transcripts.
Quick Security Tips
- Realize that you are an attractive target to hackers. Don’t ever say, “It won’t happen to me.”
- Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor.
- Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time, no matter how short, lock it up so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to lock it up as well.
- Always be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it. Double check the URL of the website the link takes you: bad actors will often take advantage of spelling mistakes to direct you to a harmful domain.
- Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a cafe’s free WiFi, your data could be copied or stolen.
- Back up your data regularly, and make sure your anti-virus software is always up to date.
- Be conscientious of what you plug in to your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones.
- Watch what you’re sharing on social networks. Criminals can befriend you and easily gain access to a shocking amount of information including where you go to school, where you work, when you’re on vacation, etc. that could help them gain access to more valuable data.
- Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information, it’s okay to say no. You can always call the company directly to verify credentials before giving out any information.
- Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.