Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Communication

IT takes to the airwaves

Friday, August 30th, 2013

The days when the Information Technology department was an unreachable, distant entity on the other side of Banghoek Road, are long gone. Since 2010 we’ve been pulling out all the stops and making an extra effort to ensure that there’s ample communication and interaction with all our clients and users on campus.

At the beginning of September (i.e. next week) we’re shaking winter’s dust from our shoes and entering yet another new era of communication. In future IT will no longer only reach you by e-mail, but also through MFM’s radio waves.

With an audience of 30 000 listeners between the ages of 14 and 28, there’s no doubt that IT will reach a much younger market, in particular students. This new means of communication provides us with the opportunity to speak to a larger portion of our users on campus and to get more involved with student issues.

So, from next week Tuesday at 11:45 there will be a bi-weekly special IT slot on MFM during the AM-PM-show. Since Bits & Bytes is steadily becoming an established brand, the slot will also be known as Bits & Bytes.

Bits & Bytes on air won’t merely be another institutional mouthpiece to promote IT, but rather an opportunity to discuss all kinds of technological developments. Students and staff will also be given the opportunity to ask questions via our Twitter feed and we’ll do our best to answer them on air.
 
We’re looking forward to our debut in radio coming Tuesday and hope you lend us your ears on 3 September at 11:45. Click here to listen to MFM live.
 

 

 

Have your say about IT’s services

Friday, August 30th, 2013

In an attempt to improve Information Technology’s services, we’d like to ask you, our users, clients and colleagues for your assistance.

If you have a gap in your busy day, we’d appreciate it if you would fill in the survey below and let us know if you’re happy with IT’s services and also which of those services you find useful and which you don’t.

This is your opportunity to air your opinion. Just click on the appropriate link below.

Staff Survey
Student survey

 

What does Rumplestiltskin and spam have in common?

Friday, August 16th, 2013

Once of the most common questions we get asked by users is “How do these spammers get my e-mail address?” 

There are a number or methods that these spammers use, but today we will focus on one of the methods,  The “Rumplestiltskin” attack.

A dictionary or Rumplestiltskin attack is an attack where the spammer floods e-mail servers with usernames selected from a dictionary. The name of course, comes from the old Grimm’s fairytale.

Long, long ago when the university’s e-mail system was still very primitive and e-mail addresses were limited to 8 characters, most personnel at the university had simple names like ab@sun.ac.zaaa1@sun.ac.za, bv@sun.ac.za. It is relatively easy to make up a list of common letter combinations and just add @sun.ac.za onto it to create a e-mail list. Add to that common  role-based accounts, such as admin, help and support, as well as adding the latest Baby Names list and you have a list that can be used to launch a Rumplestiltskin attack.

If you send  E-mail to Unknown Users or address that do not exist, Why bother?

Firstly rather than spammers buying a list from other spammers, they can just spam to any possible name they can generate. It might seem rather inefficient but sending email is cheap.

The second reason – which is far more sinister – is that spammers use these techniques to generate lists of valid email accounts. They first send to a generated list and when they do get a response or the receiving mail server doesn’t answer back and say“unknown e-mail address”, this allows them to either sell these lists of “verified” emails or be more accurate in their other spamming activities.

With this second reason in mind, you should be able to see the danger of replying to these mails or filling in the “opt-out” option, that is commonly included in such mails, or by setting your “Send delivery receipt” to automatic on your e-mail. As soon as these spammers realize that there is a real person at the other end of the e-mail, they will increase their spam. They get paid to send out the mail, not for how many people respond to them.

In our next edition we will focus on a second way spammers harvest e-mail addresses in – Part 2 – Trojan Horses, Bots and Zombies

[ARTICLE BY DAVID WILES]

eduroam: internet without fuss

Friday, August 2nd, 2013

If you’re a regular visitor to universities, particularly in Europe, you’re most likely aware of eduroam and how it simplifies travelling for academic purposes. We’re happy to announce that eduroam will henceforth also be available at Stellenbosch University.

But what for those of us who don’t know – what is eduroam exactly? eduroam (education roaming) is the secure, world-wide roaming access service developed for the international research and education community. It started as a project of the  Trans-European Research and Education Networking Association (TERENA) in Europe and has gained momentum throughout the research and education community.

eduroam is now available in 54 countries, including South Africa and provides an easy way to get internet access without any fuss. It allows students, researchers and staff from participating institutions to obtain internet connectivity across campus and when visiting other participating institutions by simply opening their device.

Users can move between campuses and visit other participating institutions at home or abroad and get instant, secure network access, without having to arrange and use guest accounts or extra passwords. The visiting user is authenticated using the same credentials (username and password)  they use at their home institution, the institution or organisation they are affiliated with.

To activate eduroam for your department, please e-mail help@sun.ac.za with your details and  see www.eduroam.org for more information. More information on eduroam in South Africa can be found at http://eduroam.ac.za/

[SOURCES: www.wikipedia.org and www.eduroam.org]

 

Beware of suspect phone calls

Tuesday, July 9th, 2013

If you receive a call at home from someone who claims to be a Microsoft representative, the odds that it’s a variation of the Indian phone scam is most likely.

These fraudsters target phone numbers everywhere to try and con computer users into installing malware and spyware on their pc’s by claiming they’re ridding the said pc of all kinds of viruses and threats.

The caller claims that the security settings on their pc has to be updated and after this is done, they ask your credit card number for payment of their service.

Do not fall for these scam artists. Ask yourself how they know know you have a pc? Did they address you on your name and have your details (contact numbers, etc)? Did they specifically state their company’s name? The odds that someone will call you out of the blue to assist you with computer updates are in all probability less than zero.

More info on this scam:

http://answers.microsoft.com/en-us/protect/forum/mse-protect_scanning/phone-call-scams/aefc50a4-d7a4-4c79-8db5-2fafcd6ad196

http://fullcomment.nationalpost.com/2013/03/21/joe-oconnor-microsoft-windows-scam-a-grift-that-keeps-giving-for-cyber-crooks/

 

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.