Welcome Back, Students!

Pirate Techs Student Computing Support Center and Other IT Help

Pirate Techs has two walk-in locations where students request help with network connectivity, mobile email setup, Microsoft software installation, virus/Trojan horse issues, spyware/malware infections and more. See this list of services.

Joyner Library 1101 Move-in Hours

Today and Saturday, August 19 8:00a to 5:00p
Sunday, August 20 10:00a to 10:00p

Residence Hall Support

West End Neighborhood Computer Lab (White Hall)
Legacy Basement (entrance close to Scott Hall)

Friday, August 18 – Sunday, August 20: 10:00a to 5:00p

IT Help Desk Phone Support – 252.328.9866 | 800.340.7081

Saturday, August 19: 8:00a to 5:00p
Sunday, August 20: 8:00a to 10:00p

Passphrase Resets – Walk-In IT Help Desk (Austin 103)

Saturday, August 19 – 8:00a to 12:00p
Sunday, August 20 – 12:00p to 4:00p

Find more IT resources on our New Students Website

  • Computer Labs
  • ECU Mobile App
  • Course tools like Blackboard, clickers and SabaMeeting
  • com Videos
  • Microsoft Office 2016
  • FREE Statistical Software
  • Virtual Computing

Connecting to the ECU Network is a Breeze


ECU’s eduroam wireless network is a secure, world-wide roaming access service that is easy to set up on all your devices—tablets, mobile phones and laptops.

See the eduroam page for step-by-step instructions or visit any Pirate Techs location for assistance.

Wired (Residence Hall)

Connect your desktop, laptop, TV or other internet-ready, non-wireless device to the residence hall wired network using an Ethernet cable. See these wired network instructions. Note that switches, routers and other networking hardware are not allowed in residence halls.

Free Windows 10 and Office 2016!

Windows 10 download

All enrolled students are eligible for a FREE Windows operating system download. The full license is yours to keep, even after you graduate. Macs require virtualization software such as Parallels or Bootcamp. See these instructions to get started.

Office 365 Downloads and More

And don’t forget all the goodies available through your Office 365 account. Load Office 2016 – the full client – to your computer – you have five free licenses. Mobile apps, OneNote, Office apps and OneDrive storage are available with new apps being added all the time. It’s easy to be productive.

Phishing Emails: How to Spot

Eventually, a phishing email will hit your inbox. However, proper Prevention, Reaction and Reporting are key to keeping ECU’s network safe for all users.


  • Never reveal your passphrase to anyone.
  • Keep software, operating system and antivirus up to date.


  • Delete any email that requests your personal information.
  • Remember that a legitimate business will NEVER ask for your personal information.
  • Mouse over links to check the URL.
  • If you do provide account information, change your passphrase immediately.


OneDrive vs. Piratedrive: Which is Best?

ECU provides two storage solutions for your classwork, projects and other assignments. Read on for the specifics of each.


All ECU users have a 125GB Piratedrive network storage folder on ECU servers. Piratedrive is approved for sensitive ECU information – good for research data or personal documents. Your folder is named the same as your PirateID and is always available when on campus as Piratedrive (U:). Piratedrive can also be accessed through Pirate Port. See the Piratedrive website for more information.


OneDrive is a feature of your ECU Office 365 subscription. This 1TB cloud storage folder is housed with Microsoft and is approved to store your FERPA data and academic schoolwork, etc. OneDrive is NOT approved for storage of sensitive information. OneDrive is different from Piratedrive in that you can share, edit and collaborate online – a good idea to use when you are working on class projects! You can also sync documents from your mobile or computer to your OneDrive folder. Everything in one place and available from anywhere. See the OneDrive website to learn more.

Macs and Windows Vulnerable to Ransomware

Infected ECU computers will be wiped

Unless you’ve been stranded on a desert island for the last few weeks, you know that ransomware is a global threat affecting vulnerable Windows and Mac computers. Yes, even the Macintosh OS can be infected by this insidious malware that locks your system, encrypts your data and infects the network to which you are connected. While this threat may seem scary and overwhelming, there are ways to circumvent being a victim. Read on to get started.

How Does Ransomware Work?

The user clicks on a malicious link or document that triggers the ransomware code. If the computer’s software is unpatched and unprotected, the worm finds its way in and looks for files to encrypt. After encrypting your files, it then moves on to the network to find other Mac or Windows targets.

If the ransomware cannot encrypt anything or access the network, it can go dormant until triggered.

Even if you pay the ransom, and the files are decrypted, the thieves may have left a way to reinfect your system at a later date in order to extort more money from you.

What Happens if Your ECU Computer Becomes Infected?

If your ECU computer becomes infected with ransomware, ITCS cannot recover your data. The hard drive will be wiped and all data will be lost.

How Can You Protect Yourself?

Following these tips for your ECU or personal computer will go a long way toward protecting your system from ransomware.

  1. Do not store ECU data on your computer.
  2. Create and manage a backup for data that is stored on the system.
  3. Do not open spam emails or emails from unknown senders.
  4. Do not download or open attachments from suspicious emails.
  5. Do not click links in suspicious emails.
  6. Keep your operating system up to date.
  7. Keep Symantec EndPoint Protection up to date. It is also available for your personal computer from the ECU Download Center.
  8. Turn off administrative privileges on your computer account. Use a separate account with higher level privileges if needed.
  9. Remove outdated plugins in your web browsers.

While not completely fool-proof, these actions go a long way toward keeping your data safe from hackers.

Need more help or have questions? Contact the IT Help Desk at 252.328.9866 | 800.340.7081.

Assistive Features Begin with Your Operating System

Both MacOS and Windows offer plenty of built-in assistive features so devices work specifically for YOU.

Here are a few options you can implement right now to make your devices more user friendly:


Open your laptop’s system preferences and choose Accessibility or tap your mobile’s Settings icon, then General to open the Accessibility category. Below are just a few of the features you’ll find:

  1. Display. Configure the display contrast that works best for you. There is also an option to “shake the mouse pointer” to make it easier to locate on the screen. The Display Preferences button allows quick access to your resolution settings.
  2. Zoom. Set your zoom range and configure keyboard shortcuts to zoom in or out as you need.
  3. VoiceOver. Provides spoken and brail descriptions of items on the screen. Try it out in the Apple Accessibility Support site’s Open Voiceover Training section to learn the basics.
  4. Dictation. Edit text and interact with your device using your voice.
  5. Use your mobile’s camera to magnify objects.

Visit the Apple Accessibility Support site to read about the featured topic or search an accessibility topic. You can also join the accessibility community to hear how others use these features. Apple Support is also available online to offer a suggestion or solution.


Like Apple, Windows offers a variety of assistive features to make your computing life richer. When you open the Windows Accessibility website, just choose your Windows version to find available features. Let’s take a look at a few options from Windows 10:

  1. Vision. Customize your display with high-contrast themes, text and pointer sizing and the option to turn off animations and backgrounds. Narrator, the Windows built-in screen reader, allows you to interact with apps and control your device without seeing the screen.
  2. Auditory. Replace audible alerts with visible alerts or customize your closed captions to make them easier to read.
  3. Physical. Your digital assistant, Cortana, can set reminders, open apps, search or send emails and texts or use speech recognition to dictate your documents.
  4. Cognitive. The Edge browser’s Edge Reading View option blocks distracting content from web pages so you stay focused.

To configure the Windows 10 assistive settings, open the device’s Settings area. Windows 7 and 8 systems can be accessed through the system’s Control Panel.