Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

General

Suffering from password fatigue?

Friday, November 9th, 2012

According to a study conducted in America in August of this year nearly 3 in 5 adults have 5 or more unique online passwords to remember. It’s no wonder we struggle to remember them all.

Believe it or not, there’s even a recognised psychological explanation for your inability to remember all your passwords and the subsequent effect it has on your psyche. Yes, indeed, you might be suffering from password fatigue. This “disorder” can be defined as the feeling experienced by people who have to remember a large amount of passwords as part of their daily routine. This could include any password or code – from the code for your bicylcle’s lock to your pc or atm pin code. Read more on password fatigue here..

However, if you can’t remember your average 5 passwords, don’t panic, there’s hope for you yet. There’s software to help you remember on the days your grey matter struggles to keep up with all the information.

The most popular and possibly best of these is KeePass Password Safe.

KeePass is free open source software enabling you to manage all your passwords in a safe and secure manner. With this programme, you store all your passwords in one central database and lock it with only one secure master key or password. Storing your passwords in one central place behind a secure password is much safer than using the same password for all your programmes and applications, because you’re worried you might forget them!

Another additional advantage of KeePass is it’s usability on most platforms. Although it was originally intended for usage on Microsoft Windows, it can also be used with ease on Linux, Mac OS and various cell phone platforms.

The software has various functions, amongst others one able to generate passwords automatically – handy when you’ve run out of ideas for a strong password. Read more on KeePass here.

If you’re interested in other software available for password management, www.smashingapps.com has a few suggestions.

Virtual classrooms become reality at Worcester campus

Friday, November 9th, 2012

Although use of visualised desktops has been in use at the Main Campus CUAs for several years, with considerable success, smaller campuses like Tygerberg and the Business School, have been unable to adopt the technology because of the prohibitive costs of the infrastructure that is required in the background. (network and storage) However in 2012 a new company, Pivot3 entered the market with a decidedly innovative solution to provide VDI for smaller enterprises.

But what is VDI or Virtual Desktop Integration?

Wikipedia describes VDI as the storing of a “virtualized” desktop on a remote central server, so that when users work from their local machine, all of the programs, applications, processes, and data used are kept on the server and run centrally.”

VDI allows users to run an operating system and execute applications from a smartphone or “thin client” where the processing power and capacity is delivered by the server and not the user’s own computer. The most obvious benefit is that there is no longer any need for huge, power-hungry and expensive workstations or personal computers.

Secondly, the “desktops” are managed centrally and thus can be updated and patched without the need for technicians to go from computer to computer, updating and managing patches, repairing broken operating systems.

With the completion of Stellenbosch University’s Worcester Campus – the hub of the Ukwanda Rural Clinical School, the Faculty of Medicine and Health Sciences identified VDI as a solution to deliver “virtual classrooms” and desktops to the students and personnel based at Worcester Campus. Although the Worcester Campus can permanently accommodate 50 students, there are large numbers of “visiting” students that are hosted at the Worcester Campus. Meeting the needs and requirement of this “passing traffic” on this small campus (with a single personnel member to run the ICT infrastructure) was an enormous challenge.

Fortunately, the FMHS was introduced to the Pivot3 VDI appliance solution – a blend of highly-tweaked Dell servers and VMWare’s VMView virtualization software – being introduced at a fraction of the cost of the equivalent VDI solution running at the Stellenbosch University Main Campus – SAN/Citrix/XenDesktop.

The FMHS recognised the potential and cost-effectiveness of Pivot3’s VDI appliance solution, and purchased the first unit on the continent to be used in an academic environment.

The immediate benefit of Pivot3-VDI is that custom and standardised desktops can be delivered to students and personnel on the Worcester Campus, on demand and literally in seconds, without the need for extensive IT personnel to personally set up and configure individual computers. Old computers, laptops, tablets, Android cellphones can all receive and operate the same desktop and software.

However Pivot3 did not anticipate another possible use of their product – as a delivery mechanism for secure electronic exams! Stellenbosch University makes considerable use of e-assessment and LMS systems like WebCT/Blackboard and Moodle, but accommodating large numbers of students at the same time to write these online exams is a challenge. With a product like Pivot3, the FMHS will be able to allow students to use their own devices (BYOD) to write electronic exams, by delivering preconfigured and secure desktops on demand for the exams increasing the capacity of the FMHS for electronic exams.

Worcester Campus and FMHS is currently engaged in extensive trials of its new VDI solution, and by the middle of 2013 will have a fully deployed VDI solution for desktops and electronic exams to approximately 100 students and personnel.

ARTICLE BY DAVID WILES

Vaccinate your pc

Friday, November 9th, 2012

Every year you have to go to your doctor to get an anti-flu injection. You have to get one every year because the influenza virus mutates and adapts every year into a new strain. Computer viruses are exactly the same! Here are a few handy tips and hints to ensure the whole process is as painless as possible. But first things first –

  • Use an AntiVirus Software – It is very important that your computer has an antivirus software running on your machine. By having an antivirus program running, files and emails will be scanned as you use them, download them, or open them. If a virus is found in one of the items you are about to use, the antivirus program will stop you from being able to run that program and therefore infect yourself.

See this link for a listing of some online/stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software –  There is no point running an antivirus program if you do not make sure it has all the latest updates available to it. If you do not update the software, it will not know about any new viruses, trojans, worms, etc that have been released into the wild since you installed the program. Then if a new infection appears in your computer, the antivirus program will not know that it is bad, and not alert you when you run it and become infected. Therefore it is imperative that you update your Antivirus software at least once a week (Even more if you wish) so that you are protected from all the latest threats. If you are lucky then you will have an anti-virus product that will update itself automatically via the internet, but never blindly trust this. A large number of the more virulent viruses and trojans can deactivate your anti-virus software’s updating functions.
  • Install an Anti-Spyware Program – Just as you installed and use an antivirus program, it is essential these days to use a Spyware protection and removal program. These programs can be used to scan your computer for spyware, dialers, browser hijackers, and other programs that are malicious in nature. The 4 program that I recommend are SuperAnti-SpywareSpybot – Search and Destroy, andLavasoft’s Ad-Aware, and Windows Defender.A tutorial on using some of these programs can be found below:

Using Spybot – Search & Destroy to remove Spyware , Malware, and Hijackers

Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Commercial Spyware Removal/Protection Programs – If you feel more comfortable installing a commercial Spyware removal program then I recommend WebRoot’s Spysweeper or Lavasoft’s Ad-Aware Professional. Both are fair products and a worthy addition to the arsenal of software protecting your computer.

Spysweeper Product Information

  • Occasionally Run Online Virus Scans – Unfortunately not all antivirus programs are created equal. Each program may find infections that other antivirus programs do not and vice-versa. It is therefore recommended that you occasionally run some free online antivirus scanners to make sure that you are not infected with items that your particular antivirus program does not know how to find. Three online scanners that we recommend are:

Every once in a while, maybe once every 2 weeks, run one or both of these scanners to see if they find anything that may have been missed by your locally installed antivirus software. Believe me, you will not regret it!

ARTICLE BY David Wiles, GERGA

For regular updates on the latest spam, malware and ransomware threats, please check or blog regularly.

HUAWEI consulted about network instability

Thursday, November 1st, 2012

Since this weekend, access to the residential segment on the SU network has been extremely unstable.

IT’s network engineers have been working since Monday on finding a solution to the problem. HUAWEI and First Tech have also been consulted to assist with the trouble shooting process.

We are well aware of the inconvenience caused by this network instability, especially at such a critical time of year.

Be assured that we are doing everything within our power to resolve the situation as soon as possible.

Lost your cell phone?

Friday, October 26th, 2012

You know that sinking feeling when you realise you’re lost your wallet/phone/keys? Well, we can help you with the lost phone …

If your cell phone has been stolen, there are ways to prevent whoever has your phone from accessing your data and personal information. Some applications can even track the location of your phone.

Which method you use, depends on the phone you use.

1. BlackBerry

BlackBerry Protect is a free application able to assist you with locating your BlackBerry and to ensure that your data is safe.

If you lose your BlackBerry, you can log on to the BlackBerry Protect website and lock your device to make sure the person who has it, can’t use it. If you’re pretty sure you won’t be seeing your phone again, you can remove your data and SD card via the website.

If you are registered on Blackberry’s Enterprise Server, the device can also be wiped on the server side.

If you merely lost your phone, there’s also the option to lock your phone and display a message on the screen for whoever finds your phone. By means of GPS, it’s possible to establish your phone’s location and find it again. Or, if you suspect the device is within hearing distance, just adjust the volume to it’s loudest setting and you’ll be able to find your phone,

Apart from these functions, you can also backup your contacts, calender and bookmarks wirelessly. This can be done automatically and as frequently as you prefer (daily, weekly or monthly)

If you’ve replaced your old BlackBerry with a new one, you also can get your backed up settings, contacts and calender items back with BlackBerry Protect.

2. iPhone

Apple users can user Find My iPhone via the iCloud-fasiliteit.

Sign on at  iCloud.com or use the Find My iPhone app on a different phone to locate your phone on a map, display a message on the screen, lock the phone and display a message or wipe your data.

With iOS 6, iCloud also provides a Lost Mode, which makes it even easier to lock your phone with a four digit password and send a message to the phone with a contact number. If the phone is in Lost mode, it will continuously keep track of where the phone was and you’ll be given a report when you sign on to p iCloud.com or on the Find My iPhone app.

3. Android

If  Google Sync is configured on your phone or the Google Apps Device Policy application on your  Android, your data and personal information can be wiped from another device. Use this function when you phone has been stolen or lost. Just keep in mind the remote wipe function will remove ALL device based data  – e-mail, calendars and contacts and reset your phone to it’s initial default factory settings. It will not, however, remove data stored on the SD card.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.