First, Open up the Network settings on your PC by selecting the Network icon in the lower right corner next to the time and date. Click on "Wi-Fi"



Once on the Wi-Fi tab, make sure Wi-Fi is turned on and select "Show available networks



Click on your desired network. For example, GC-Wireless secured. Enter your GC-Wireless Network Key, sent to your GCSC email from Extreme Networks, in the network security key field.



Once you enter your Network Key and click next you will be logged into the GC-Wireless Network. If you can not find the Extreme Networks email with your Network Key, please contact Gulf Coast Technical Support at (850)913-3303. 
_________________________________________________________________________________________________________________________________________________________

Wireless Acceptable Use Policy
_________________________________________________________________________________________________________________________________________________________


Wireless Acceptable Use Policy. For your protection, sites visited on GCSC's wireless network are being monitored. Continued usage of this system and your signature on this access request form constitutes awareness and acceptance of this fact. When using the wireless network, you agree to refrain from the following: Using the campus network resources for any illegal activity; Violating the conditions of those codes relating to student rights to privacy; using profanity, obscenity, or other offensive language; Deliberately displaying obscene pictures of text on the monitor or allowing such images or text to be printed on the institution's printer; Copying commercial software of other commercial materials (including music and movie files) protected by copyright law; Using the institution's network resources for financial gain; Engaging in activities designed to deliberately obstruct other's work, excessively using available network resources; Deliberately causing a machine to crash; Attempting to gain access to areas of any system for which authorized access has not been granted, i.e. “hacking"; Engaging in activities that give simulated sign-off messages, public announcements, or other fraudulent system resources; Engaging in activities that do not have academic merit, such as: storing files not related to academic activities, using peer-to-peer file sharing software and/or deliberately executing files that excessively utilize the system; Giving away your user ID and/or password for any reason under any circumstance; Fraudulently using someone else's ID or password; Having or attempting to change system control information, such as program status, protection codes, and accounting information; Sending others material and then requesting them to send additional messages to others, i.e. chain letters; Sending bulk 'spam' email or intentionally utilizing system resources to send such messages; Unauthorized installation of any drivers, software, or hardware on campus computers; Using the institution's network to launch denial-of-service attacks against any computer or network. Violation of these policies can add and will result in disciplinary action and/or prosecution. You are responsible for all activity that occurs on your user account. Gulf Coast State College and its employees disclaim any responsibility for anything that happens to your personal hardware and/or software while using our services. Accept Button

Surf responsibly!