Skip to Content

    Information Technology

    The Information Technology Department strives to provide access to teaching, learning, research, administrative, and communication technologies through a commitment to excellence in infrastructure, customer support, end user professional development opportunities, and technical leadership in fulfillment of the institutional mission and core values. Please refer to our menu on the left for further information.

    Online Support Center

    Students, Faculty and Staff can also get help here:

    Help with getting connected to the RWU wireless networks will be available in the Main Library for all students during Library hours.


    media•tech Support Center Walk-In Hours of Operation

    Sun. Apr. 19  - 10:00am to 2:00am
    Mon. Apr. 20 -  7:30am to 2:00am
    Tue.  Apr. 21 -  7:30am to 2:00am
    Wed. Apr. 22 -  7:30am to 2:00am
    Thu.  Apr  23 -  7:30am to 2:00am
    Fri.   Apr.  24 -  7:30am to 6:00pm
    Sat.  Apr.  25 -  10:00am to 8:00pm

    We are located on the first floor of the Main Library

    You can contact media•tech by phone at (401) 254-6363

    Purchase Computer Equipment For Class

    Apple Back to School Offer

    Gov Connection

    InfoTech Happenings This Week:

    April 19, 2015 - April 25, 2015 

    The SQL Migration path continues.......


    Technology Definition of the Week:

    Evil Twin


    A fake Wi-Fi access point that masquerades as a legitimate one to allow an attacker to gather personal or corporate information from mobile device users.

    An attacker can easily create an evil twin with a smartphone or other Internet-capable device and some readily-available software. The attacker positions himself in the vicinity of a legitimate hot spot and lets his device discover what service set identifier (name) and radio frequency the legitimate access point uses. He then sends out his own radio signal, using the same name as the legitimate access point.

    To the end-user, the evil twin looks like a hot spot with a very strong signal; that's because the attacker has not only used the same name and settings as the "good twin" he is impersonating, he has also physically positioned himself near the end-user so that his signal is likely to be the strongest within range. If the end-user is tempted by the strong signal and connects manually to the evil twin to access the Internet, or if the end-user's computer automatically chooses that connection because it is running in promiscuous mode, the evil twin becomes the end-user's Internet access point, giving the attacker the ability to intercept sensitive data such as passwords or credit card information.