The campus will remain closed until 12 noon Thursday, 02/13/25. Students should log into Canvas for specific class information from their instructors. Please contact event organizers for information on specific activities. Normal operations will resume at 12pm on Thursday.

Safe Computing

Safe Computing

Using computers is a useful and necessary activity, but it can also involve risks to your computer and your personal information. Safe computing practices are a combination of computer software and security settings. To keep your computer safe use up to date antivirus, use the Internet safely, protect your data by using secure connections, and keep your computer and information safe by using strong passwords and controlling access to your computer.

Contact Us

Trouble logging in?
Contact the  Help Desk  at 248-204-2330 .

Trouble using the databases?
Contact the Library at 248-204-3000 or  refdesk@ltu.edu

What is phishing?

Phishing:   The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. Identify theft can be devastating to the victim and is difficult, costly, and time-consuming to fix.

How to identify a potentially dangerous email

There are many websites which can help explain phishing tactics and what you can do to protect yourself.  For more information, look at these sites:

To help the Lawrence Tech community recognize a legitimate email message, please remember:

  • Messages sent from Lawrence Tech IT Services will always be signed by name .
  • You will never be asked to send personal information in an email message. 
    • Personal Information: passwords, social security number, name, email address, residential address, credit card number, mother’s maiden name, etc.
  • Any email message which indicates that you are over your email storage quota is almost always  a phishing attempt.
  • There are often grammatical or typographical errors. You may notice something just seems wrong with the grammar.
  • The return address is unknown to you. If you were able to see the “reply to” address, which was visible in some cases, you would have seen that if you had replied it was going to an unknown email address, and not an ltu.edu address.
  • Never click on any links in phishing emails.

» Document Viewer

Use Your Cell Phone as a Document Camera in Zoom

  • What you will need to have and do
  • Download the mobile Zoom app (either App Store or Google Play)
  • Have your phone plugged in
  • Set up video stand phone holder

From Computer

Log in and start your Zoom session with participants

From Phone

  • Start the Zoom session on your phone app (suggest setting your phone to “Do not disturb” since your phone screen will be seen in Zoom)
  • Type in the Meeting ID and Join
  • Do not use phone audio option to avoid feedback
  • Select “share content” and “screen” to share your cell phone’s screen in your Zoom session
  • Select “start broadcast” from Zoom app. The home screen of your cell phone is now being shared with your participants.

To use your cell phone as a makeshift document camera

  • Open (swipe to switch apps) and select the camera app on your phone
  • Start in photo mode and aim the camera at whatever materials you would like to share
  • This is where you will have to position what you want to share to get the best view – but you will see ‘how you are doing’ in the main Zoom session.