What word-processing software is the Campus using?

The Campus has standardized on the Microsoft Office suite of applications. These applications will be loaded in all Computer Labs. Computers and Software can be purchased at educational discounts from the vendors on this page.

How do I get a Wilson email account?

All Wilson students will be asked to complete a Student Internet Account Application. When this has been completed, signed and processed, she will be given an email account. In almost all cases, her email address will consist of her first name, then a period, and then her last name with “@wilson.edu” added to the end. Example: Jane Doe will become jane.doe@wilson.edu.

I will not be bringing a computer to campus. How many computers are available for student use and how can I access my email?

There are 86 computers that are available for student use in the following locations: 18 computers located in the various Residence Hall Computer Lounges, 8 computers located in the Library, 20 computers in Warfield Hall and 40 computers located in the Science Center. For those students not bringing computers to campus, they will be able to access their email via the Wilson Web-Based Email from any computer on or off campus that has Internet access and a web browser.

How long are the Computer Labs open?

Any student in possession of a Wilson College ID may gain access to the Labs virtually 24 hours per day. However, we do require the students to travel with a buddy after the buildings are locked. 

What will I need to connect to the Campus Network?

All residence halls and the majority of public spaces have free high-speed wireless service available, and each residence hall room is equipped with two high-speed wired network connections. We can supply a free 25 foot network cable if needed

*NOTE* - Wireless Routers or Access Points are NOT PERMITTED anywhere on the student network.

I plan to puchase a computer to use at college. What should I buy?

This is your preference. However, there are a few things you will need to know. We would prefer that student computers be less than 1 year old. Prices can vary, but a desktop computer minimum should be in the $400-600 range and Laptop minimum should be in the $600-800 range. A 3 or 4 year warranty is also recommended as well as an accidental damage plan for Laptops. Computers and Software can be purchased at educational discounts from the vendors on this page.

What if I have problems with my personal computer while at Wilson College?

Although we have a very small computer staff, we will provide network support and try to help with other problems as time permits. However, if your computer is still under warranty, we will advise you to call the manufacturer for assistance.

The purpose of this bulletin is to give a brief overview of the problem of “spam”. Spam is email that you may receive from a completely unknown source, almost always unwanted, and very often potentially dangerous. It is important to be aware of the dangers of spam, because it is often used by individuals with criminal intent to perpetrate identity fraud.

Spammers’ Objectives

Most spammers are legitimate, albeit obnoxious, business people who are merely trying to make a profit selling goods and services. However, there is also a significant sector of the spammer world that is composed of criminal elements. Organized criminal elements from various parts of the world are often involved in the spam business. For this reason, it is important to understand that spam can be very dangerous.

Spammers’ Methods – Mailing List Builders and Sellers

Legitimate businesses exist worldwide which compile and sell mailing lists of email addresses. Email mailing lists are very valuable because for the cost of a few pennies, it is possible to email potential customers or victims numbering in the millions located in all 200+ countries worldwide—something which would cost millions of dollars to implement using conventional “snail” mail.

Emailing list companies harvest email addresses legitimately, illegitimately, and also “methodically”. For example, emailing list companies will take a known email address and run a computer program to generate “educated guesses” about email addresses within the home institution from which the email address originated.

The method works like this:

If the email address for John Smith at Wilson College or the SuperBizzie.com company is known to be:

jsmith@wilson.edu                john.smith@superbizzie.com

The email list company will send out a blastogram that would span a range of addresses such as:

asmith@wilson.edu              ann.smith@superbizzie.com

bsmith@wilson.edu              anne.smith@superbizzie.com

csmith@wilson.edu               annette.smith@superbizzie.com

….. etc ….                              ….. etc ….

zsmith@wilson.edu               zoe.smith@superbizzie.com

Addresses that generate “unknown address” messages are simply crossed off their list. Those that don’t are addedautomatically to their list.

PLEASE NOTE - For safety and security reasons, the Wilson College email server DOES NOT respond AT ALL to messages sent to invalid addresses. These messages are just deleted. More and more administrators are adopting this policy to block these types of attacks.

As you can imagine, if it is your business to generate emails, and you have the technical means, it is not hard to generate emailing lists with literally millions of email addresses.

Email mailing list vendors also routinely troll websites to harvest email addresses. So, for example, we must take for granted that any email address posted on the Wilson College website will inevitably end up on emailing vendors’ lists. Then, those vendors will generate “educated guesses”, as described above, to add names to their lists.

Legitimate vendors are genuinely respectful of those wishing to be crossed off of their lists. However, the illegitimate vendors merely use “unsubscribe” messages to confirm vulnerable victims! Therefore, if you receive spam from an unknown source, it is best NOT to follow the “unsubscribe” process offered by the spammer. More about this later.

Such spammer emailing lists can be bought on the open market. Their price will depend on their size, quality, and reputability.

Spam Filters – How They Work, How They Fail

In a good year, the problem of spam can cost US businesses millions of dollars per year. Spam clogs up circuits and storage space, both of which cost money to make available for legitimate usage. Furthermore, spam is often also the “infectious pathogen” for criminal schemes, and computer viruses. Businesses keep their cases of victimization confidential, because it does not make them look good. However, it should be noted that some spam-propagated viruses in the past few years have brought the Fortune 500’s email systems to their knees for periods of up to 48 hours.

Spam filtering companies work on principles similar to those used by email address list builders. Filtering companies harvest spam and build databases that identify: (1) senders (originating email addresses) (2) subject lines, and (3) message content. This database data is then constantly fed to the customers of the spam filtering companies. Spam filtering software scans incoming email messages for patterns matching the spam filtering database records, and eliminates those that match the identified patterns.

Spammers try to get around filtering software by varying the “patterns” of their spam. Spammers will constantly change their “sender” email address, using legitimate and illegitimate methods. Then, they will inject characters, digits, and text randomly into the subject lines and message text fields to degrade the identifiable patterns used by spam filtering software. This explains why much spam today contains seemingly bizarre or nonsensical characters or strings of text (often classical poetry) that seems completely unrelated to the purpose of the message.

Worldwide Spam Problem

A December 6, 2006 article in the New York Times noted that in 2003, Bill Gates had predicted that the spam problem would be solved by 2006. Spam received by businesses was significantly reduced in early 2006. However, in the second half of 2006 there was a resurgence of spam received by businesses even greater than before. Currently, the problem of spam is seen in terms of crisis proportions, because spammers’ techniques for evading spam filtering technologies are in ascendancy.

The most successful current technique that spammers are using is to transfer their messages to picture formats (jpg or gif files) and embed them in emails containing random and meaningless text. This type of spam is known as image spam. Spam filtering companies are working on new ways to filter this type of spam, but have not yet developed a way to filter out image spam.

Spam-filterers (the Good Guys) are constantly chasing a moving target. Right now, the bad guys are winning. We’ll keep you posted.

You can view a recent chart of the global spam epidemic published by Commtouch Software by clicking here .

Bulletin Date: 10 April 2007


Contact Kevin Gallagher or

Alan Shoop at

(717) 262-2014.