- Software Downloads
- Arena (free to students)
- Autodesk (free software)
- Bentley STUDENTserver
- FPST Hydraulics
- Keysight EEsof EDA - Student License Request
- MathWorks (Matlab/Simulink)
- Matlab on Tesla
- Microsoft DreamSpark - OSU IT
- National Instruments (Labview/Multsim)
- Simio Acadmic Software
- Classroom Software
- Software Downloads
- Web Services
- Contact Support
New Faculty/Staff Wi-Fi
On July 15, OSU-Stillwater and OSU-Tulsa are transitioning to the Eduroam global WiFi service, which will give students and employees secure and fast internet connectivity at any participating Eduroam campus.
What you need to do:
- Visit your network settings.
- If you were previously connected to OSUSTAFF, “forget” the network before connecting to Eduroam. To forget a network, visit your network settings, and select the option to forget the network.
- From the list of available networks, choose eduroam.
- When prompted, enter your okstate.edu email address and password, then click submit. You must use your full okstate.edu address; short names (without the @okstate.edu) will not work.
- Read and agree to the network acceptable use agreement. Choose to Trust the network.
For Android users:
- Choose PEAP for the EAP method drop-down menu
- Choose Do Not Validate from the CA Certificate drop-down menu
- Choose MSCHAPV2 from the Phase 2 authentication drop-down menu (On some Android phones this will be in the Advanced tap at the bottom. Also, you will need to save the settings after changing to MSCHAPV2)
- Enter Okey email address
- Enter password
- Connect to eduroam
Microsoft Remote Desktop Critical Vulnerability
Earlier this week, Microsoft announced the presence of a critical vulnerability with the Remote Desktop Protocol (RDP) service present in: Windows XP, Windows 7, Server 2003, Server 2008, and Server 2008 R2. Exploitation of this vulnerability could allow unauthorized users remote access to affected systems. Windows 8, Windows 10, Server 2012, Server 2016, and Server 2019 appear to be unaffected by this vulnerability.
In response, Microsoft has released patches for the affected operating systems. Currently supported operating systems (Windows 7, Server 2008, and Server 2008 R2) should be patched to the latest available version as soon as possible. Out-of-support systems (Windows XP and Server 2003) will also receive a patch dedicated to addressing this vulnerability.
Additional information regarding this vulnerability and where to obtain necessary patches are included in the following Microsoft TechNet article:
NOTE: If you have any questions regarding updating your machine please feel free to contact us at the Chat button below or at 405-744-1753.
Wed, Jun 26, 2019
Tue, Jun 25, 2019
Mon, Jun 24, 2019