Accessing Library Resources Off-Campus

by  Sarah Berry

Rohrbach Library offers a slew of resources through its electronic databases, which include Academic Search Complete, BrowZine, The Reading Eagle Archives and more. Accessing these resources on campus is simple, however many students are unsure of how to use these databases off campus.

So, how are these databases accessed off campus? Simple, by logging in.

Student ID card

A student ID features a library barcode beginning in 622001.

There are two forms of ID that can be used for logging in. The first requires your campus login and password, which is used for accessing MyKU and D2L, along with your KU email. The second requires your KU library barcode, which is found on your student ID card or your library card.

If using your student ID card, the barcode will be a 16-digit number located on the front and will begin in either 50392 or 622001. If using your gold library card, the barcode will be a 14-digit number and will begin in 20506.

After choosing your ID, you can proceed with logging in.

When trying to access the databases off-campus, you will encounter a screen similar to the one below, asking you to provide either a Library ID or a Username/Password to log on to the system. If opting to use your campus login and password, select the Username/Password option. Alternatively, if using your library barcode, choose the Library ID Logon option.

KU Login

Users using their campus ID to login will be taken to a separate login screen after selecting, “Login.”

If you receive an error when logging in with your library barcode, it is likely the barcode has not been validated by the library. To validate the card, contact the library by phone  at 610-683-4480 or by visiting the Information Commons desk the next time you are on campus. If you are unable to reach the library by phone, try using your campus login and password instead.

If you receive an error when logging in with your campus login and password, double-check your spelling and ensure your password has not expired. If your password has expired, contact the IT Help Center at 610-683-1511 for assistance.

If you fail to receive any errors, then congratulations, you now have off-campus access to the library’s electronic databases.

“Eclectic little libraries” pop up in Reading PA!

Some of us in Rohrbach have fond memories of the time Daniel Egusquiza and his crew transformed the library into an ecstatic scene of salsa, bachata, and hip-hop dance, and now that energetic genius is busy converting the summer sidewalks of Reading into libraries:

Eclectic little libraries, created from containers of all shapes and sizes donated by Goodwill Keystone Area and decorated with original designs by children from the Art Lab at Albright College, these little libraries will hold a variety of children’s and adult books. The children’s selections will include books donated by Taylor Swift…

(Exciting ‘Little Book Swaps’ Appearing Throughout the City, BCTV)

Daniel Egusquiza looks out the window and envisions a better futureSee, the supermultitalented Daniel earlier this year became an ace outreach coordinator at Reading Public Library. An artist at everything he does, this guy’s beautiful spirit is in the right place at the right time.

Daniel says that art is solving problems. Learn what he means by that

Avast Ye Hearties! Save the date!

Avast ye Hearties! Rohrbach Library’s annual fall open house will take place on September 22nd from 10-4. Come explore our building and our resources (human, physical, and digital) and have some fun with giveaways, food, and a pirate-themed photo booth area.

Last year’s treasure chest held over $700 in prizes including a GoPro Hero camera as our grand prize! This year we will again scour the local region for some great prizes, including another GoPro Hero camera! All KU student who complete the open house orientation form will have a chance at winning the prizes. Local businesses wishing to contribute can contact Dan Stafford at or Karen Wanamaker at

Watch later this summer and fall for bookmarks (seen below) and posters around campus. Professors wishing to require attendance can contact Dan Stafford or your favorite KU librarian for more information. There will be a place on the students’ orientation forms for professor names and course numbers so that we can compile attendance information. We hope to see you there in the fall!


Pirate Captain image source:

Enjoy a Free Breakfast From APSCUF-KU!

By Danielle Gentile

As a thanks to all of those who dealt with the uncertainty during the budget impasse, APSCUF-KU is offering a free breakfast for all KU students.

On Thursday, April 28th, come and enjoy a free breakfast from 8:30am – 11:00am on the upper half of the DMZ.

Extended Library Hours For Finals Week

By Danielle Gentile

It’s that time of year already! Get some extra study hours in with the Rohrbach Library’s finals week extended hour schedule.

Friday, April 29: 7:30 am – 8:00 pm

Saturday, April 30: 9:00 am – 5:00 pm

Sunday, May 1: 10:00 am – 2:00 am

Monday-Wednesday, May 2-4: 7:00 am – 2:00am

Thursday, May 5: 7:00 am – Midnight

Friday, May 6: 7:30 am – 5:00 pm

Stress Relief Week at Rohrbach Library

By Danielle Gentile
Starting Wednesday, April 27th, come visit the Rohrbach Library and participate in some of our fun stress relieving activities.

Wednesday, April 27th
VIP Study Room Giveaway
KU Writing Center, 6:00 pm – 9:00 pm, first floor
Pet Therapy, 7:00 pm, second floor
SGB Snacks in the Lobby, 8:00pm

Thursday, April 28th
KU Writing Center, 6:00 pm – 9:00 pm, first floor
VIP Study Room Giveaway Winners

Monday, May 2nd
Massage Therapy, 5:30 pm – 7:30 pm
KU Writing Center, 11:00 am – 3:00 pm, first floor

Tuesday, May 3rd
Massage Therapy, 5:30 pm – 7:30 pm
KU Writing Center, 11:00 am – 3:00 pm, first floor

Wednesday, May 4th
Relaxation Yoga, 4:30 pm, RL 100B

Continuous Activities Throughout Stress Relief Week
Study Break Corner
Bubble Wrap Bows
Takeout Stress Relief Kits
Free Coffee Coupons, 4:00pm – 6:00pm
Soup Drive for Students
Free Scantrons and Blue Books
Make Your Own Stress Balls at STEAMworks, RL 18

Research Librarians will be available during the following times:
Mon-Thurs 10:00 am – 8:00pm
Friday 10:00 am – 4:00 pm
Sunday 2:00 pm – 8:00 pm

Hackers and Hacktivism- KU Conversation 6

By: Courtney Aaron

Good morning and welcome to our sixth KU Conversations post! This week’s topic is about hackers and hacktivism. For those of you who don’t know what hacktivism is we found an accurate description by the Oxford English Dictionary website. Hacktivism is defined as “The practice of gaining unauthorized access to computer files or networks in order to propagate a social or political message.” We are going to start our conversation by using an article from CQ Researcher (may require KU ID). This article gives an overview of the multiple topics we will be discussing including the changing nature of computer hacking, cybercrime, hacktivism, and hacker ethics.


Photo provided by Barn Images (Flickr)

There are many different kinds of hackers out in the world and their numbers are increasing as time goes on. Hackers have varying motivations as to why they learn their skills. Some do it for criminal reasons and others for social and political protests. Others may do it for reputation or money. This study from IEEE Computer Society Digital Library (may require KU ID) focuses on the motivations of hackers and sorts them into four different cultures: Clan Culture, Market Culture, Hierarchy Culture, and Adhocracy Culture (currently the most popular of the four). Each has an individual motive and attitude towards hacking. The study is based on the oldest running website for hackers called “Cult of the Dead Cow”, a place where hackers go to communicate with each other and share information. We also have an E-book from the KU library catalog written by Douglas Thomas called “Hacker Culture.” (Thomas, Douglas 1966-). The book focuses on hacker culture and subculture as well as how it’s changed throughout history. It also discusses both how hackers view themselves and how the public views hackers.

Hacktivism is a relatively new term and topic. Currently, the most highly regarded hacktivist group is Anonymous, a loosely connected group of hackers that use their skills to protest or promote social and political views. Their main goal is to promote academic freedom and prevent censorship. Here is an article from the Computer and Applied Science Complete database (may require KU ID) that talks about Anonymous and their involvement with the Ferguson issue.


Anonymous protesting ACTA in Munich- photo by Usien

It also gives some information about other companies Anonymous has targeted. We also have two articles from the New York Times about Anonymous. The first one is about how Anonymous is currently targeting ISIS after the Paris attacks. One of the ways they are doing this is by finding ISIS recruitment twitters and websites and then taking them down. They are also teaching other hackers how identify and take down recruitment websites. They are still refining this process and sometimes mistake journalist twitters for ISIS recruitment twitters, one of the weaknesses to Anonymous’ methods. Next we have a New York Times article that discusses both their and their multiple factions strengths and weaknesses.

Their main weaknesses is also the same as their strength, their anonymity. Since the members are unknown to the public and to each other it is hard for them to get caught for their actions. Unfortunately, there are hackers within the group that also commit crimes for their own gain instead of for the group’s political statements. Also if hackers within the group are caught doing illegal hacking for political statements they still run the risk of being caught. One unforeseen issue is that members who are arrested for their hacking protests can be used to track and help arrest other hackers within the group. This article from Reuters discusses how a hacker named Hector Xavier Monsegur from the Anonymous offshoot faction LulzSec was arrested for targeting private and government sector websites. After he was arrested he worked with prosecutors to help catch 5 other hackers within his group. This next article from Gale Virtual Reference Library (may require KU student login), explains that Monsegur continued to work for the FBI to prevent other hackers from hacking the government in exchange for reducing his sentence.

There are a lot of varying opinions about hacktivsm and hackers and how they should relate to the law. Monsegur isn’t the only hacker to switch sides and do work for cyber security. There are people who believe both good and bad hackers should be recruited and utilized by governments and computer security businesses. We have a TED Talk through Youtube by Misha Glenny explaining how hiring hackers can be the key to improving cyber security. There is also debate over whether hacktivists should be held legally accountable for their actions. We have an Academic Search Complete article (may require KU student login) that discusses  hacktivism and criminal liability. People also raise the question whether or not hacktivism should be support due to its use of criminal activity. We have a study also provided by Academic Search Complete discusses whether or not STEM (Science, Technology, Engineering, and Math) students are likely to support hacktivism. It also explains predictors as to which students would support hacktivism and how students’ perceptions of hacktivism affects their viewpoints.

The changing natures and abilities of hackers have caused major reevaluations of cybersecurity the past few years. We have a great article from CQ Researcher that gives an overview of cybersecurity and major topics that are being explored today. The article goes into both national and international cybercrime and the difficulties in apprehending cybercriminals. We also have an article from Web of Science (may require KU ID student login) that talks about cybercrime markets that now exist online. These online markets are used by cybercriminals to sell and to buy malicious software. The article also talks about the interactions between the buyers and the sellers.


Cybersecurity Awareness Month Interview with CCommand Sgt. Maj. Rodney Harris of U.S. Army Cyber Command- Photo by Gary Sheftick

Finally we have an article from IEEE Computer Social Digital Library (may require KU student login) that discusses the idea of hackers, hactivists, and cybermilitias being used as cyber warriors or used by politicians. It goes in-depth on how using hackers and hacktivists were advantageous since they could claimed that they acted on their own, avoiding government accountability. It also discusses how certain major cyber activities could be classified as war crimes.

There are a lot of varying opinions about hacktivists and hackers. Should hacktivism be tolerated even though hacking is illegal? Should hackers be hired and used for improving cybersecurity? Is it worth the risk to try? Feel free to post your opinions either here or in the comments section on the Rohrbach Library’s Facebook page!







Enter your email address to follow this blog and receive notifications of new posts by email.

Join 89 other followers

Rohrbach Library

The Elusive Sea Cow Tweets

Rohrbach Library Tweets



Blog Stats

  • 1,366,595 hits


Kutztown University is part of the Pennsylvania State System of Higher Education.


Get every new post delivered to your Inbox.

Join 89 other followers

%d bloggers like this: