Author Archives: Nathan Burt

To upgrade your mac or NOT

Apple is currently offering macOS 10.12 (Sierra) as an update.  ITS does not currently support Sierra and recommends against installing this new operating system at this time.  “Sierra” hasn’t been around long enough to have been thoroughly tested with all applications in use on campus.  Please see http://go.middlebury.edu/sierra for more information.

We recommend upgrading to OS X 10.11 (El Capitan) if you are not already running it; this is currently the preferred operating system for college-owned Macintosh computers.  Older operating systems are not updated; they also may not be able to browse to secure websites, and cannot run the latest version of Microsoft Office.

Caution: Back up your important data before upgrading your operating system!  While we should always keep our information secure, upgrades pose an extra risk of data loss due to the sheer amount of work a hard drive goes through during this process.  Performing an upgrade while on campus, using your Ethernet cable and power supply will provide best results.  To upgrade your system, open the Self Service utility on college-owned Macs, then click on the OS category on the right.

If you have any questions or need help, please create a ticket at http://go.middlebury.edu/whd, and provide the “Property of Middlebury College” number for the computer you are using.

Now’s the Time to Update Your OS & Apps: New Vulnerabilities Announced

burglarApple recently released software updates to iOS, Mac OS 10.7 and higher, as well as for Safari & QuickTime for Windows.  These updates address a vulnerability found in Apple’s implementation of SSL (secure sockets layer), a protocol computers use extensively for secure communications online.  While we are not aware of any specific information breaches at Middlebury College, and the steps necessary for someone to compromise these secure communications are far from trivial, we should all apply these important security patches to our Apple hardware and Windows computers running Apple software to mitigate these risks.  Please check your Apple software for available updates (especially iOS, Mac OS, Safari, and QuickTime updates).  Run your updates now and check again after the installation as some may have prerequisites.  For more information, links to specific updates for the SSL vulnerability and others are available at http://support.apple.com/kb/HT1222.