%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> /XObject << /I1 19 0 R /I2 20 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240522000427+00'00') /ModDate (D:20240522000427+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 11 0 R 13 0 R 15 0 R 17 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 5005 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 242.327 521.469 504.407 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 242.702 520.719 503.657 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(E-MAIL ON THE CLOUD)] TJ ET 0.373 0.169 0.255 rg BT 61.016 564.033 Td /F3 9.0 Tf [(At the end of July)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 562.882 m 130.559 562.882 l S 0.400 0.400 0.400 rg BT 130.559 564.033 Td /F3 9.0 Tf [( we announced that university e-mail will soon )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(be hosted in the cloud. Most of our Tygerberg staff were )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(successfully migrated and are already active on Outlook via )] TJ ET BT 61.016 531.066 Td /F3 9.0 Tf [(Office365. Next up is Stellenbosch.)] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(Benefits of cloud e-mail include:)] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [( Larger mailboxes and storage space.)] TJ ET BT 61.016 489.099 Td /F3 9.0 Tf [( E-mail and storage space are accessible from anywhere in the )] TJ ET BT 61.016 478.110 Td /F3 9.0 Tf [(world where there is internet access. )] TJ ET BT 61.016 467.121 Td /F3 9.0 Tf [( E-mail and storage space are backed up in the cloud.)] TJ ET BT 61.016 447.132 Td /F3 9.0 Tf [(The only consideration is dependability on internet quality, as the )] TJ ET BT 61.016 436.143 Td /F3 9.0 Tf [(service is hosted in the cloud.)] TJ ET BT 61.016 416.154 Td /F3 9.0 Tf [(Mailboxes will be moved per department and each department will be notified via e-mail ahead of time when their e-mail )] TJ ET BT 61.016 405.165 Td /F3 9.0 Tf [(will be moved. Little, if any disruption or downtime are anticipated during the migration period.)] TJ ET BT 61.016 385.176 Td /F3 9.0 Tf [(After your mailbox has been moved, Outlook will prompt you to enter a password. Please enter your full e-mail address )] TJ ET BT 61.016 374.187 Td /F3 9.0 Tf [(\(e.g. username@sun.ac.za\), password and select the )] TJ ET BT 276.746 374.187 Td /F3 9.0 Tf [(Remember credentials)] TJ ET BT 367.268 374.187 Td /F3 9.0 Tf [( option. There is a possibility that e-mail )] TJ ET BT 61.016 363.198 Td /F3 9.0 Tf [(settings on your mobile device might have to be changed. We have also compiled a selection of)] TJ ET 0.373 0.169 0.255 rg BT 441.698 363.198 Td /F3 9.0 Tf [( FAQs)] TJ ET 0.18 w 0 J [ ] 0 d 441.698 362.047 m 467.204 362.047 l S 0.400 0.400 0.400 rg BT 467.204 363.198 Td /F3 9.0 Tf [( if you have any)] TJ ET BT 61.016 352.209 Td /F3 9.0 Tf [(problems. More technical instructions, if needed, are available on the )] TJ ET 0.373 0.169 0.255 rg BT 337.640 352.209 Td /F3 9.0 Tf [(IT self-help site.)] TJ ET 0.18 w 0 J [ ] 0 d 337.640 351.058 m 401.162 351.058 l S 0.199 0.195 0.195 rg 0.199 0.195 0.195 RG 61.016 341.011 m 511.016 341.011 l 510.266 340.261 l 61.766 340.261 l f 0.000 0.000 0.000 rg 0.000 0.000 0.000 RG 61.016 289.055 m 511.016 289.055 l 510.266 289.805 l 61.766 289.805 l f 511.016 341.011 m 511.016 289.055 l 510.266 289.805 l 510.266 340.261 l f 0.199 0.195 0.195 rg 0.199 0.195 0.195 RG 61.016 341.011 m 61.016 289.055 l 61.766 289.805 l 61.766 340.261 l f 0.070 0.070 0.070 rg 0.070 0.070 0.070 RG 63.266 338.761 m 508.766 338.761 l 507.766 337.761 l 64.266 337.761 l f 0.560 0.560 0.560 rg 0.560 0.560 0.560 RG 63.266 291.305 m 508.766 291.305 l 507.766 292.305 l 64.266 292.305 l f 508.766 338.761 m 508.766 291.305 l 507.766 292.305 l 507.766 337.761 l f 0.070 0.070 0.070 rg 0.070 0.070 0.070 RG 63.266 338.761 m 63.266 291.305 l 64.266 292.305 l 64.266 337.761 l f 0.400 0.400 0.400 rg BT 65.016 328.220 Td /F3 9.0 Tf [(User support might be necessary for devices with outdated software and our support team is ready to deal )] TJ ET BT 65.016 317.231 Td /F3 9.0 Tf [(with these cases. However, please note that standard SU devices with Windows and asset numbers have to )] TJ ET BT 65.016 306.242 Td /F3 9.0 Tf [(be attended to first and will be given priority. Non-standard devices, for example, Apple and Linux operating )] TJ ET BT 65.016 295.253 Td /F3 9.0 Tf [(systemsor private devices withoutasset numberscan only be attended to once we're done with them.)] TJ ET BT 61.016 280.264 Td /F3 9.0 Tf [(If you have any questions or feedback, please contact the IT Service Desk at 021 808 4367 or )] TJ ET 0.373 0.169 0.255 rg BT 437.225 280.264 Td /F3 9.0 Tf [(help@sun.ac.za)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 437.225 279.113 m 501.890 279.113 l S 0.400 0.400 0.400 rg BT 61.016 260.275 Td /F3 9.0 Tf [(Posted in:Communication,E-mail | | With 0 comments)] TJ ET q 225.000 0 0 119.250 325.984 453.574 cm /I2 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Annot /Subtype /Link /A 12 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 563.2006 130.5587 572.3581 ] >> endobj 12 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/en/2016/07/office-365-is-here/) >> endobj 13 0 obj << /Type /Annot /Subtype /Link /A 14 0 R /Border [0 0 0] /H /I /Rect [ 441.6977 362.3656 467.2037 371.5231 ] >> endobj 14 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/en/2016/09/office-365-faqs/) >> endobj 15 0 obj << /Type /Annot /Subtype /Link /A 16 0 R /Border [0 0 0] /H /I /Rect [ 337.6397 351.3766 401.1617 360.5341 ] >> endobj 16 0 obj << /Type /Action /S /URI /URI (http://www1.sun.ac.za/itselfhelp/office365guides.htm) >> endobj 17 0 obj << /Type /Annot /Subtype /Link /A 18 0 R /Border [0 0 0] /H /I /Rect [ 437.2247 279.4316 501.8897 288.5891 ] >> endobj 18 0 obj << /Type /Action /S /URI /URI (mailto:help@sun.ac.za) >> endobj 19 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 159 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 1 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceGray /BitsPerComponent 8 /Length 347>> stream xA 7 !Stk:'fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffkb endstream endobj 20 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 159 /SMask 19 0 R /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 3 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceRGB /BitsPerComponent 8 /Length 12832>> stream x}yEtޖ=!$;Qq :(:n#3'ꌎ(: @XC $$!{ݥ۷5/$uW:uΩ:]է03AR@M?r#DZF]_SQ/.Q=fȐap 2L 3dX-@pCmc<" .EhR9OeI/BCV:r5hDn S/LAMdPM#j!W)HOl2L}g9ڍӶ-`jS ʄȣ ئ5 ʚuGHFDTaJ81K~vuHd8r*5,HF~y`Q]2i}DMIZZ:״ؕS y>;=oo܋ZZ534P2ҮE!}u=VqA4:'F8Xtcmsݺ4Ʈ9ʮKS#sCkׯ\[4 4'Ks2|׷U1.ݳ-t#sC7mc]AJ&oYi~alB ҹ3cWC愇dzPf_>R25aOo>Ym@č^4>bLLv' BGSeѡnҢ1vîOO qq3"pRKGXc9Ht(N&W URjie c2C_|lLk.ۥʊ '@i|*71/<<cHeh zrO+Ȅ%\ x]&V^ER($$?Bo|ShzOdP /#(+({Q =mS?mTu-Is>l5 ߱C +' nSL veZqвT= dhs)L\Nvܾ5UZ6[KW-xG{vgbdߤLjl*oz0IY/C @yB9aH C7C1q'! uU}1tͺ; kG`hT3& A9uqj$',B <ߠӻ eU&0^sqo0&'S?tulƢ뮛h2W?RYwIҒq6b1-gL/vxl|ެ\bš}we=ȞuPvHPMstiQ9$Vq" ϝT4}ߦ=]MȦ'^<3u-0I2Eça }FVVnE8}D<񃸂c!C{wZ #+r^VdkDGq0}Ռ M/?쩻i L d򤘢 U3U+8-7J[GΟ~\,);.3*ګZMJEE]l@A&T7 jy J>U GMSmZĝfVpà{.'̖w fƑܛh/ _d+(#Hl#U0707Z푰o^R@F|`y!hg6RM4p aAhw/RV^yn^MQL<R2GOnyB({'Ҥ@hM[M._`On@J`l> ' [!8sz;`*)0zνY;kW>fIE!'; 䁆A~㎽#i*u2FL&ewQSu,QfMhf۹wȀLur QB<-)UjU&Z2OI3R>e+4–*o7KMD1ЇIN687(NVd-+Ġ}Íh_nKfi6 5'4CikDa#yD:o&ݵ_ovܙ`2FfNK_ӕFz-Wֻ}gūOc^ឆD0 {ق\Km_:dhY`ftc_x[n;!y>k5blA<"׸!i U= Xc]5Upc[7Lx~ sT4޶ ݆^:41Fz_Lr,kEq4k~pR?D ?}Gk;hF\(gΘF/k7+w4cn4Wu۪޺Ejv$kOEs'(u0T=_<'wق܅sVhs8Z39J`O1q#UWӅa!MZ2u7] o=*%]&Pxj֔Lx{%kępQʛq)WBیTfN/I'5ݱi 쫻[[cOiE7>2ŢBޠR [8Վ C0.pYAI#OFYj}`y4ΐA;o!P02"+LB:ɞ-!UܗS^?LFJ_ln)ϜPbqA<1`߽ypy= 88kyIbH愝`g+ {퍆^88k$۫=w{ ϔ݇^jB5?==ow5,?+Nˉ Sc{}O { GWX9˒ 2;mXmֳ{K+O5(omqJ!V3޳,wBn.sttKz`xnLL& l?t;l mz9s-\`+Nv' G&\u xzɅJ>D0h_= ap-h+`13a7&93'N>1y:_UAoE<\"N+scMyē>ٶP__o;t|!D11<yeEQ,#,Q1k݈`,3ųsgN75u}Se0ݿw hc܀BQL֞ ꧏOڌ qO{*N04"~NEs ̧u&g5 FdP[c~|kv~8s:ZyD!C_Me[93ZeZ Pa;u!H 3t(oeiBw;8FRɜV:Y+ߵן(CM.W;Sm !9rv٭lF*儇9놾CŻ6n8'x]5;g}93_'|,ލXT!zm03kϻt4hf8zW/e׻Tw_௞R09a<ࢻ޳9O ҉}Y8t 7j`ug)L7NՑ#ǡj8[zϾ /e8U⹅5wևK7.G?1VK(ė%S*)B1i@26 65oȁT0xfhey44ː Or1~0Ȍch%E|KKxU] o#RI)2TA!۽>?\u\\q ZCm<,k:0T} ;worf(p >w-i[( u|ȣfJvP(Rkqd5(W5BB KήC´s{/o׻Xt5U1`Er 5_Va=C"DM/Wv7loBoU)Vp(^‰}9Eeotv=ۣ>Y_]AAgNǚLÐ1T+6=PB 1{"C5qb Lxj?>li >~xNҩzkD RШT{f`6\h#mv#^?9qI Į}]Ou~h'̼󶇇)6r .ky,}s݆-Ly]zx݋|2LU0c tO4ky^st_:)c>Q4$ksptZ5F-T2}ws6gXTWϚXٺ`户.흑?V4 r-09WdNP?eAǻ쾡;v/es̏[8{fM>)2cg.W,;ޫ ~/7 Q]F=uoSm&qtF3j, ,izt x-pttNEle ݻGwᆓ /?u(`gͻl8m[_PwJnmKro\l8-߹v.g*#)$PD\!D>:qĻRA*8Z[^O+yI3ˇON.F^v. aSrFo|#^Տawp EgN*-Xtw\AH] \NAqi1ιpX/'i%'XCͫ foz`~F 0 >>w.K!k*"xRKKM :7;k6ktjDwu 0χ_A7Q]Q@"=]9 ⯝ҒOy`ygPhu acMpsO ծLc߳'cks_TDE_}Zo#a>"=z˒RS  >mx݀#339*u6N̽nQF @3-Xi)Cb~aEwЊ{k}\ rr|滖ua,]6 5_8̐ڦn8JO_=G?Fy*6=œ@3t7,uk{O}$n8㵺4k/]%7޲x^~u}"CM/Z/czWY_8qkp/w^coYi* tpRayϸa/X'vz#S5 gїf&2L,.g)(` Ssywu̝ၶwWͰƺp~cȍ'LdhA;E)+?;쁂ϔf[ u@LR\ XE4UԧPL;jIvP@D:dTHʴ U!0]Hӓ#@ TvHn]3lS0+s m _r֦c n uFeE "KQE-2'DǒB e ¤r ԸO\~a:P~aΆAo[lww-XӞ>4 3m 䯟QhwGa5uAl uRSA!?iCh_j&UM -p-ηn}y E/DK5#6~bڂ.3>dn6)O>BDɘ!}ߵyZQj.dp(bB]MM:V\O |G<4J#L20u0`u}޿lpyׯ~`s;fE m2dcwC=p:_bhyC+ڣ>3!wksPh#1VtcVm:m,{=t#uzYABqM(*ҙ;(N\p% oxdJ(THPi {tݟyŖ Rpnp  ڵՊK%V/̌g+2 #’N5#V70qH̀qa"F؆YEz8E<) P(W'qUkl{ /cwt/(Z,_M߹5aOhcv@kCx!ɣ3KTHT$NMQDb0fW @9~p*{k8ntJ/'p|W&xf>{ZTw(\8mX "ēuF5t*w] |isl? 9_쨿K3~*EjMQ0o'oYP4( 9`OWp ̄kleWxMvhsfl!C"zOO UC'df}tsY\T2̐!sY$>kB;k^~1&BV_!NR'=.FbD G"W蔫i8PO$ q)VVS}b=dgOO=]LI,)៎"LL {88:]MaΉLfI)#PsSKK!$T$A : =`jR!,s8xvFb W[ ;h߹+]f^iH4DSY>rEdW #c8r~31]&աXDM*456: aons-- U cC򚷭C]MDV)p݀j]Z-ۏ% qRLck3r*:~{[ FM]\2dY$KTNvQN[DODS6!J] `^67h<{OBj y43-(,>bDB8},n`jKF2&VQntA %3'0I,tp\8j99d$,ZVP ;N4e\ee*6("]VoLdrjB!8saT ;*ba)  [:Q Vnkæ]Wp~Emy`nXaӬua2㌣.P̀PD_-,hBeF.1sr= U=!]Ŝ|Ž`6Fui5XqPD]tM qj}oԼ}ϖ<8|~Fhٳ#/'ZHXe,͐}j}6#웷7nu5$xzavބyAϥݦ^wm7 &W>P\!^ɠǎ8i? N̽t4(@:E1=g,*.G\Cυ$ÔW0W iȅEљϝ{ϲ.5 çgs O;De)i`G6OP  ,z#zB-৫D[_QQ gs/wBYyt}Z>qK%f _VŒB}E g9Z';‚5A#r]4Z' ƭF&|iЗ [_3#oQ+H?8eZ 1nnZ ,]x a VNoHAi׬au*Hf(埖!f~tfqՑVq}O7=gy 3A uE'3EIfYQ)2 9PȠiV!QGAbL ѫJ=y |`yQ&HgJ"ZT>u| .:KȪhCL)WP-QT5%LTP@Ӽn*3YW~`<{RkqI:͞娢DziGP]u~꽵 S-mcJ+KuЊ  hv0@F Ӈ (;a |:x~d;\V`lF1`Q4d5ZbTd2|tՑGf(ae Ji mج˶a>kFkJm~,tJ3ۇ܍eVͲf區pAhIjQB!4hY\0(O<-gBvqjM$BYyy| Ip>Cu Oƽ1^,E-2o4!f6M05ٝS߯)LKNo i! H9A^.τ ,PLl2FL 1fȐL'ƽ uDטdW#qO1:T")pb`x: D#tW);34j' Lשb Z@G#tVq[dS_*Y]8LD2> y) &2eP$_mIᩎaV 0b$.m endstream endobj xref 0 21 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000504 00000 n 0000000607 00000 n 0000005664 00000 n 0000005776 00000 n 0000005883 00000 n 0000005999 00000 n 0000006126 00000 n 0000006234 00000 n 0000006362 00000 n 0000006467 00000 n 0000006595 00000 n 0000006699 00000 n 0000006827 00000 n 0000006900 00000 n 0000007492 00000 n trailer << /Size 21 /Root 1 0 R /Info 5 0 R >> startxref 20584 %%EOF Communication « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Communication

Whatsapp scams

Wednesday, November 23rd, 2016

WhatsApp is a popular communication tool, used by students and personnel every day. On the downside, it provides cyber criminals with another way to convince you to part with your well-earned money and unfortunately it’s usually quite convincing.

WhatsApp scams come in many different forms and are often very convincing. Just make sure that you stay vigilant and don’t fall for anything that seems too good or too worrying to be true. Just because a friend or a family member sends you something, it doesn’t mean that it is safe.

Voucher scams

A message arrives in your WhatsApp from someone who looks like your friend, recommending a deal they’ve found. The messages usually come with a link that actually takes you to another website and tricks you into giving your personal information. Don’t ever click a link you’re not sure of and certainly don’t ever hand over personal information to a website you haven’t checked.

WhatsApp shutting down

There are many fake messages claiming that WhatsApp is going to end unless enough people share a certain message. The messages often look convincing, claiming to come from the CEO or another official. They’re written using the right words and phrases and look like an official statement. Any official statement wouldn’t need users to send it to everyone like a round robin. You would either see it in the news or it’ll come up as a proper notification in the app from the actual WhatsApp team.

WhatsApp threatening to shut down your account

This is very similar to the previous scam. It looks like an official message that claims that people’s WhatsApp accounts are being shut down for being inactive. Sending the message on will prove that it’s actually being used and often instructs people to pass it along.

WhatsApp forcing you to pay

Similar to the previous scam, with the only difference being that the message supposedly exempts you from having to pay for your account – if you send it on to other people.

WhatsApp Gold or WhatsApp Premium

The claim suggests that people pay for or download a special version of WhatsApp, usually called Gold or Premium. It offers a range of exciting-sounding features, like the ability to send more pictures, use new emoji or add extra security features. The problem is that it is far from secure. Downloading the app infects people’s phones with malware that use the phone to send more fake messages at the cost of the original victim.

Emails from WhatsApp

Spam e-mails are bad enough. E-mails plus WhatsApp is even worse. There’s a range of scams out there that send people e-mails that look like they’ve come from WhatsApp, usually looking like a notification for a missed voice call or voicemail. But when you click through, you will end up getting tricked into giving over your information, passphrases etc. Don’t ever click on an e-mail from a questionable sender. WhatsApp doesn’t send you e-mails including information about missed calls or voicemails.

Fake WhatsApp spying apps

Currently, it is not possible to let people spy on other’s conversations on WhatsApp, because it has end-to-end encryption enabled, which ensures that messages can only be read by the phones that send and receive them. These scam apps encourage people to download something that isn’t actually real and force people to pay money for malware, or actually read your chats once they’ve got onto your phone.

Lastly – 

Hopefully, you have  already blocked sharing your WhatsApp details with Facebook (telephone number, name etc. and allowing Facebook to suggest phone contacts as friends) and Facebook will not be able to  make your WhatsApp account accessible to the 13 million South African Facebook users.

There are some details about this controversial policy change by WhatsApp on the following page: http://www.mirror.co.uk/tech/you-can-stop-whatsapp-sharing-8893949

 

[ARTICLE BY DAVID WILES]

 

 

Beat the cyberbully

Friday, November 11th, 2016

bully-655659_960_720Cyberbullying is deliberately and repeatedly harming or harassing someone using electronic technology  – this includes devices and equipment such as cell phones, computers, and tablets, as well as communication tools including social media sites, text messages, chat, and websites. 

With the increased use of communication technology, cyberbullying has become increasingly common, especially among teenagers. While the term cyberbullying is used predominantly for children or teenagers, cyberstalking or cyberharassment is when the same behaviour occurs in adults. 

What is cyberbullying or -stalking?

The main goal of this harassment is to threaten a person’s reputation, employment, earnings, safety or try to turn people against them. Cyberbullies aim to intimidate, hurt, control, manipulate, humiliate or falsely discredit someone. Their actions are deliberate, hostile, usually repeated and intended to harm.

Cyberstalkers use public forums, social media or online information sites to launch their attacks on. Online platforms provide anonymity and bullies can remain ignorant of the consequences their attacks have on the victims. According to the National Council on Crime Prevention’s survey, 81% of teenagers thought others cyberbully because it’s funny. 

Cyberbullying can come in various forms. It can be someone repeatedly sending e-mails or text messages even when the person clearly stated they don’t want them. It can include repeated threats, sexual remarks, hate speech, false accusations or ridiculing someone.

Some bullies/stalkers will even go so far as to hacking into a site and changing information or posting false statements to humiliate or discredit a person. They may also publicise a victim’s personal data or create a fake account to use to defame, discredit or humiliate them.

The 8 most common cyberbullying tactics used by teens according to www.wikipedia.org are the following:

  1. Exclusion: Teenagers intentionally exclude others from an online group.
  2. Cyberstalking: Teens will harass others by constantly sending emails, messages, or tagging others in posts they don’t want to be tagged in.
  3. Gossip: Post or send cruel messages that damage another’s reputation, relationships, or confidence.
  4. Outing/Trickery: Trick another teen into revealing secrets or embarrassing information which the cyberbully will then share online.
  5. Harassment: Post or send offensive, insulting, and mean messages repeatedly.
  6. Impersonation: Create fake accounts to exploit another teen’s trust. They may also hack into an account and post or send messages that are damaging to the person’s reputation or relationships.
  7. Cyber Threats: Threaten or imply violent behaviour toward others to make them feel uncomfortable.
  8. Flaming: Fights online that involve hateful or offensive messages that may be posted on various websites, forums, or blogs.

More definitions of cyberbullying can be found on The Centre for Justice and Crime Prevention’s website.

Who are the bullies?

The root of cyberbullying is the same as face-to-face bullying. The only difference is the convenience and anonymity of technology which makes it even easier.

Usually, a bully will know their victim and attack them because of their own prejudice, whether it’s race, religion or sexual orientation. Or merely because they’re “not cool” or they didn’t like something they said on social media. 

It’s important to keep in mind that, in general, a bully’s behaviour stems from their own problems or issues. According to Stopbullying.gov, there are two main groups who harass others. Popular kids or teens bully because they think it will make them more popular or hurting others give them a false perception of power. At the other end of the spectrum are those who bully because they are victims of bullying themselves and it’s their way to lash out. 

How to beat cyberbullying or cyberstalking

In most countries, cyberstalking has the same consequences as physical stalking. South Africa does not have specific legislation dealing with cyberbullying. The victims of cyberbullying, therefore, have to rely on criminal law and/or civil law. More information on these laws can be found on The Centre for Justice and Crime Prevention’s website.

For this reason, it’s important to deal with cyberbullying as soon as it rears its head. The video below provides some valuable hints in this regard.

 

[SOURCES: http://www.bullying.co.uk/cyberbullying/, http://www.deletecyberbullying.org/why-do-people-cyberbully/, http://www.cyberbullying.org.za/south-african-law.html]

 

Google says Allo

Friday, September 30th, 2016

alloWe’ve seen Google grow from a small company developing a search engine to one known for its groundbreaking work, developing not only technology for today but also self-driving cars and virtual reality platforms for the future. 

Rich Miller of Data Centre Knowledge estimated that in 2011 Google was running more than one million data centres around the world. Not bad for a company that started off as a research project by two PhD Stanford University students, Larry Page and Sergey Brin, in 1996.

On 21 September they added a new phone-based chat application, Allo, to their list of innovations. 

Much speculation has been made as to why Google would launch a stand-alone app that can only be used on mobile devices and can’t be integrated with other devices. Some claim Allo is their attempt at breaking into the Indian market, the 3rd largest in the world after China and the US. And as we all know, censorship in China doesn’t allow much in the line of western technology, hence Google’s focus on India. 

One of the advantages of using Google products is that it can be accessed over all platforms with your Google account. This is not the case with their latest brainchild.  Allo won’t recognise you as a Google user. In fact, you have to register anew, without an option to register with your Gmail address. Allo, like Whatapp, uses your mobile number as a form of recognition instead of an e-mail address. 

Allo does not replace the less-than-perfect Google Hangouts. It doesn’t do video chat or send SMSs. Another app, Duo, which is used exclusively for video, was released at the same time as Allo. So why install Allo at all? There are some positive points to be made. 

Google’s machine learning technology might be the main reason why Allo downloads passed the million mark this week. Allo introduces Google Assistant, an integrated, smart search bot embedded in your chat. It enables access to information without opening an additional tab or alternatively, you can start a private conversation by typing @google and asking a question. Think of it as Siri for Android, only more efficient. 

Other nice-to-haves include whisper/shout, a tool enabling you to change the size of your text by holding down the Send button and dragging your finger upwards. Not revolutionary, but possibly useful if you’re in a hurry. 

If verbal communication is not your strength, Allo has a large collection of sticker packs you use to express yourself with visually. The new Ink feature also allows you to draw on or add text to photos.

On a practical level, Allo uses Smart Replies, a tool which apparently thinks for you. By tracking your most used phrases and words, it predicts what your replies might be. Almost like autocorrect, only more clever and less embarrassing.

Lastly, there’s Incognito mode

Initially, when Allo was announced earlier this year, Google claimed that conversations would automatically be deleted after a specific time, as set by you. 

However, when Allo was released this week, Google changed their mind. They announced that the current version of Allo will store messages indefinitely on Google’s servers to enable them to collect data to improve their products. Unless you decide to delete your messages, they will stay on Google’s servers.  It’s this announcement that prompted Edward Snowden to warn the world against installing Google Allo.

The good news is you can still use Incognito Mode, which is end-to-end encrypted and will not store your messages. A good thing if you are sensitive about your data being potentially accessible to a third party or if you are Edward Snowden.

Google Allo can be downloaded from the Google Play store.

SOURCES:

https://en.wikipedia.org/wiki/Google_Allo
http://arstechnica.com/gadgets/2016/09/google-allo-is-incomplete-but-assistant-is-the-companys-future/
http://www.pcadvisor.co.uk/new-product/google-android/what-is-google-allo-what-is-google-duo-google-allo-available-now-3640590/
http://arstechnica.com/gadgets/2016/09/google-allos-limitations-explained-in-one-word-india/
http://www.androidauthority.com/google-allo-717745/
http://www.techradar.com/how-to/phone-and-communications/mobile-phones/how-to-use-google-allo-1329437

E-mail on the cloud

Thursday, September 29th, 2016

cloudAt the end of July we announced that university e-mail will soon be hosted in the cloud. Most of our Tygerberg staff were successfully migrated and are already active on Outlook via Office365. Next up is Stellenbosch.

Benefits of cloud e-mail include:
• Larger mailboxes and storage space.
• E-mail and storage space are accessible from anywhere in the world where there is internet access.
• E-mail and storage space are backed up in the cloud.

The only consideration is dependability on internet quality, as the service is hosted in the cloud. 

Mailboxes will be moved per department and each department will be notified via e-mail ahead of time when their e-mail will be moved. Little, if any disruption or downtime are anticipated during the migration period. 

After your mailbox has been moved, Outlook will prompt you to enter a password. Please enter your full e-mail address (e.g. username@sun.ac.za), password and select the Remember credentials option. There is a possibility that e-mail settings on your mobile device might have to be changed. We have also compiled a selection of FAQs if you have any problems. More technical instructions, if needed, are available on the IT self-help site.

User support might be necessary for devices with outdated software and our support team is ready to deal with these cases. However, please note that standard SU devices with Windows and asset numbers have to be attended to first and will be given priority. Non-standard devices, for example, Apple and Linux operating systems or private devices without asset numbers can only be attended to once we’re done with them.

If you have any questions or feedback, please contact the IT Service Desk at 021 808 4367 or help@sun.ac.za

Play and learn: apps for children

Friday, July 22nd, 2016

kids-appsAfter watching Barney, the dinosaur, or Lollos, the unidentifiable creature with the big ears, sing the same song for the twenty-seventh time this week, most parents would be desperate to find something else. Even if it’s only to preserve their own sanity. 

Gone are the days when television and videos were the only available options for frustrated parents. Today technology provides another platform for distraction and one which also has the ability to educate. Phones and tablets can conveniently be loaded with apps, games, and movies. 

The biggest challenge for parents is choosing the best, most appropriate, safest and most educational apps, which will also hold their child’s attention for as long as possible.

PC Advisor, one of the United Kingdom’s leading technology and media companies, attempted to make this choice easier. With the help of a group of parents, they compiled and published a list of 46 apps on their website. The apps are divided into sections for babies, toddlers, primary school scholars and teenagers. Don’t feel left out, there’s also a section for kids of all ages. That means you can also play along.

Do you have any suggestions for fun and educational apps? Let us know at bits.bytes@sun.ac.za and we’ll add your suggestions to our next article. 

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.