Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

General

New procedures for setting up Outlook on Android causes confusion

Friday, October 26th, 2012

Since the recent Exchange upgrade a few people have been confronted with a few unusual questions when trying to set up Outlook on their Android phones.Fortunately the process is less intimidating than it seems at first glance.

After the standard Outlook setup on your Android (click here for the full instructions),  Activate device administrator” will appear, prompting you to select a long list of options, for example Erase all dataChange Screen unlock passwordPassword recovery . Do not be alarmed as this is standard for setting up Exchange/Outlook on any Android phone. This just indicates what the app is capable of doing. Other cell phone operating systems include the same settings, but it’s not always displayed to the user when the programme is being installed.

The text being displayed is therefore standard for the specific Android application – IT has no control over the text it displays. It is also standard practice at various universities using MS Exchange.

One of the options is – Erase all data: Perform a factory reset, deleting all of your data without any confirmation. This option in particular led to many questions. If we look at the Exchange implementation, it’s very clear that the only person who has access to this function and can actually wipe the device, is the mailbox owner himself.

These and other advantages  and additional e-mail functionality, is available to Android users on www.sun.ac.za/webmail. In webmail, under Options -> See All Options -> Phone -> Mobile Phones there are various functions available:

Sync Logging: Enables you to look at the synchronisation of your phone, to select what you want synchronised, which servers should be used, etc.

Remote Wipe: With this option, you can wipe your phone’s data (contacts, photos, etc.) if it ever gets into the wrong hands. The phone will then be reset to it’s default factory settings. ONLY the registered e-mail user will have access to this function, no one else has access.

Details: Shows exactly which devices is linked, model, software versions, etc. 

Delete Device: This removes the connection between the Exchange and the selected device. If you initiate this via webmail, the person who has your phone will not be able to reinstall the mailbox. Your data stays protected.

(INFORMATION SUPPLIED BY FRANCOIS DE KOKER)

How to save battery life on you cell phone

Friday, October 26th, 2012

In a previous post we gave you some tips on saving your cell phone’s battery life and received such a positive response, we decided to continue with a follow-up.

The demand and expectation to be available and connected at all times, is constantly increasing. However, few things are as frustrating as having to make an important call or send an e-mail and our phone suddenly dies on you.

A dead cell phone battery is inevitable, but you can take small measures to ensure that it does last a little bit longer.

1. Wi-fi, 3G and Bluetooth

If any of these functions are activated by default they will constantly try to connect to any available service or device in the area. If you do need to be connected all the time, disable them and connect when needed.

2. Back light

Do you really need a bright back light on your screen in the middle of the day? Your phone needs energy to generate the light and the brighter the screen, the more battery life you sacrifice. Rather set the light less bright.

3. Apps

Sure, it’s very cool having all the latest apps giving you all sorts of information. Just keep in mind that apps need a lot of power to run.Power you might need to make an important call.

4. GPS

Using your GPS for checking in on Twitter or other social networks may be handy, but it will make a huge dent in your battery life. And when your GPS fails and you get lost, how will you make that call?

5. Alerts

Are you one of those forgetful people who has to reminded of every appointment and task on your list every hour? Notifications on cell phones are very handy, but putting your phone on vibrate and receiving regular notifications take up a substantial amount of power.

(SOURCE: http://www.makeuseof.com)

 

 

Quick tips and tricks: Cell phones

Friday, October 12th, 2012

Out of power?

  • Find out where to switch off 3G on your smart phone. If you disable this function, you’ll save a huge amount of power  – power you might need in case of an emercency.
  • Buy an extra USB cable and store it in your office. If your cellphone battery is out of power or your charger is lost, you can still charge your phone with your pc. These chargers cost less than R80-00 at most shops.
  • A protective cover for your cell phone will prevent it from heating up too fast, using unnecessary energy and battery power.
  • When you charge your battery, place it on a cold or neutral surface and not on a warm area where it will build up heat.

Drive safely

  • All of us aren’t great multitaskers, especially when it comes to driving. Rather get yourself a bluetooth headpiece before you’re fined, or worse, cause an accident. You don’t have to buy the most expensive model on the market, even a basic model, like  this, will do the job.

Keep in contact

  • Save all your contacts in one central place online, for example in a Google account. Smart phones can sync your contacts from the account and you don’t have to struggle to get hold of people when your phone is stolen or decides not to work anymore.

INFORMATION SUPPLIED BY  JURGEN MOOLMAN, IT SERVICE CENTRE

What is ransomware?

Friday, October 12th, 2012

The term ransomware will leave most people flabbergasted. How can software hold something ransom or is technology becoming so clever it can take over anything?

However, this description isn’t as far-fetched as it seems. Ransomware forms part of a group of malicious computer software called malware,  which cunningly installs itself on your pc and then has t he audacity to demand data or money from you. This type of programme can be installed by means of an e-mail attachment, an infected programme or unsafe website with malware installed on it. Ransomware” is also known as a a cryptoviruscryptotrojan or cryptoworm.

The software indeed “kidnaps” your data by encrypting or limiting your access to it and then sending you a message demanding money to regain your access.  The only way access is possible again, is by acquiring an encryption key from the creator of the ransomware at a fee.

A more recent version of the software will not notify the user that ransomware has been installed, but will merely block all access to the data and depend on the victim to search the internet for information on their “problem”. This search will then lead them to legit websites selling software to remove the ransomware, which of course is sold by the creator of the original culprit.

Ransomware is nothing new. In 1996 security experts at Columbia University and IBM wrote an essay called “Cryptovirology: Extortion-Based Security Threats and Countermeasures” to describe the software. At that time businesses were the main targets of ransomware and not individuals.

In March 2006 ransomware called Crypzip of Zippo was sent to a group of internet users. Those who received the programme also received an e-mail demanding a ransom of $300 if they wanted to access their data again.

Most antivirus vendors have ways of detecting and blocking the most known ransomware. However, no data is 100% safe. To ensure you don’t find yourself in this tricky situation, try to back up data regularly, be cautious when browsing the internet and under no circumstances open e-mail attachments from unknown sources.

More info on the latest ransomware targeting Skype users.

SOURCE: Wikipedia, Microsoft en Techtarget.

QVT Terminal makes way for Tera Term

Wednesday, October 10th, 2012

The current administrative programme, QVT Term was outomatically upgraded to the new Tera Term this week and university staff now have a brand new administative tool at their disposal.

The icon for Tera Term looks slightly different than the previous QVT icon, (see image to the right), but do not despair, it’s functionality is the same. Apart from the programme’s general functionality, Tera Term also has added security –  a necessity for the type of work done by the software. Another advantage is it’s ability to print directly to your default printer as set up in Windows. Extra set-up for is printing no longer needed.

To start using Tera Term, go to Start, All Programs, Tera Term and select Sentrale Rekenaars. The log in screens look slightly different, but just follow the instructions. If you still struggle with logging in, more detailed instructions can be found here.

We’d recommend you to start using Tera Term as soon as possible as the outdated QVT system will be phased out shortly.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.