%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250613052945+00'00') /ModDate (D:20250613052945+00'00') /Title (Report 06-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4062 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 279.203 521.469 467.531 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 279.578 520.719 466.781 re S 0.773 0.773 0.773 rg 61.016 294.953 m 550.984 294.953 l 550.984 295.703 l 61.016 295.703 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(HIGH INTERNET USAGE PROBLEMATIC)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Our service desk has been inundated with calls regarding high internet accounts over the past two weeks.)] TJ ET BT 61.016 617.431 Td /F4 9.0 Tf [(In one incident unusuallyhigh traffic on a user's account was detected. When investigated it came to light that someone )] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(else saw him type hispassword and used it to download illegal series from the internet.)] TJ ET BT 61.016 586.453 Td /F4 9.0 Tf [(Information Technology can't safeguard users in against incidents likethese.Unfortunately it remains your sole )] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(responsibility to keep your passwordsafe,)] TJ ET BT 61.016 555.475 Td /F4 9.0 Tf [(Sharing of usernames and passwords are still commonplace on campus, as is writing passwords down on post-its and )] TJ ET BT 61.016 544.486 Td /F4 9.0 Tf [(leaving them on desks.)] TJ ET BT 61.016 524.497 Td /F4 9.0 Tf [(It's just as important to keep your network password safe as it is to keep your bank card's PIN number safe and surely you )] TJ ET BT 61.016 513.508 Td /F4 9.0 Tf [(won't share your PIN with someone?)] TJ ET BT 61.016 493.519 Td /F4 9.0 Tf [(With your password someone can not only access your internet, but also your e-mails containing bank and other private )] TJ ET BT 61.016 482.530 Td /F4 9.0 Tf [(information, as well as human resources information - including your salary information! The risk remains the same.)] TJ ET BT 61.016 462.541 Td /F4 9.0 Tf [(Make sure you use a strong password. )] TJ ET 0.373 0.169 0.255 rg BT 218.084 462.541 Td /F4 9.0 Tf [(Microsoft)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 218.084 461.390 m 254.588 461.390 l S 0.153 0.153 0.153 rg BT 254.588 462.541 Td /F4 9.0 Tf [( has some clear guidelines on this.)] TJ ET BT 61.016 442.552 Td /F4 9.0 Tf [(Always close Inetkey when leaving your PC or lock your PC \(ctrl+alt+del\). If it's open, anyone can use it and there's no )] TJ ET BT 61.016 431.563 Td /F4 9.0 Tf [(way for IT to establishwho really used the account if you logged in.)] TJ ET BT 61.016 411.574 Td /F4 9.0 Tf [(Regularly check your internet usage andmake sure you don't get any nasty surprises. Your internet balance is displayed )] TJ ET BT 61.016 400.585 Td /F4 9.0 Tf [(on the Inetkey prompt box and can also be checked at)] TJ ET 0.373 0.169 0.255 rg BT 279.644 400.585 Td /F4 9.0 Tf [(www.sun.ac.za/useradm.)] TJ ET 0.18 w 0 J [ ] 0 d 279.644 399.434 m 380.174 399.434 l S 0.153 0.153 0.153 rg BT 61.016 380.596 Td /F4 9.0 Tf [(Keep in mind that the university internet speed and your ADSL line at home aren't the same speed. You might assume )] TJ ET BT 61.016 369.607 Td /F4 9.0 Tf [(because you're spending the same amount of time online, it will cost you the same, butdownloading is much faster on the )] TJ ET BT 61.016 358.618 Td /F4 9.0 Tf [(university network.)] TJ ET BT 61.016 338.629 Td /F4 9.0 Tf [(If you notice a sudden increase in your internet usage, lodge a query at IT at the cost of R200-00. More information on )] TJ ET BT 61.016 327.640 Td /F4 9.0 Tf [(internet usage on the SU network can be found in our )] TJ ET 0.373 0.169 0.255 rg BT 276.638 327.640 Td /F4 9.0 Tf [(service catalogue.)] TJ ET 0.18 w 0 J [ ] 0 d 276.638 326.489 m 349.169 326.489 l S 0.400 0.400 0.400 rg BT 61.016 309.151 Td /F2 9.0 Tf [(Posted in:Internet | | With 2 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 218.0837 461.7082 254.5877 470.8657 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://windows.microsoft.com/en-za/windows-vista/tips-for-creating-a-strong-password) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 279.6437 399.7522 380.1737 408.9097 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://www.sun.ac.za/useradm.) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 276.6377 326.8072 349.1687 335.9647 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www0.sun.ac.za/itservices/help/internet.htm) >> endobj xref 0 18 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000568 00000 n 0000004682 00000 n 0000004794 00000 n 0000004909 00000 n 0000005029 00000 n 0000005137 00000 n 0000005265 00000 n 0000005401 00000 n 0000005529 00000 n 0000005610 00000 n 0000005738 00000 n trailer << /Size 18 /Root 1 0 R /Info 5 0 R >> startxref 5840 %%EOF Internet « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Internet

Need for speed?

Friday, May 25th, 2012

We always need more time and want to do everything faster. To find something fast on the internet is just one way to save time.

Here are a few fast ways to make sure you get the most out of your browser’s functionality.

1. Use a fast browser

Fairly obvious isn’t it? In a previous article we looked at the various browsers and their performance. By now you know that all browsers are faster than others and Google Chrome is currently winning the race when it comes to speed.

2. Disable Flash

Flash websites are all over the web and extremely popular.  Although they look impressive, they also slow down your browsing experience considerably. Rather turn off Flash by default and reactivate it when you really want to see the Flash animations. Some browsers require an add-on to block Flash. For Chrome, you need the extension Flashblock. There’s also a Flashblock extension for Firefox. Internet Explorer has a built-in tool you can access by clicking Tools | Manage Add-ons.

3. Get rid of all those toolbars

More  toolbars, slower speed. As simple as that. And do you really need all those toolbars? Some toolbars  take up computer memory while others are eating away on your bandwidth and sending and receiving data in the background. (and you thought they were just sitting there doing nothing!)

4.  Use tabs, not windows

Too many tabs can cause problems, but they’re very handy when it comes to browsing efficiency. How do tabs speed up your experience? The first is all about organization. With multiple tabs in a single window, it becomes quite a bit faster to locate the page you need to work on. You don’t have to maximize a window, discover that it’s not the right one, minimize it, maximize a new window… until you find the correct one. A single window open with multiple tabs is far easier to search. This is not the only way tabs can help you. Browsers like Chrome treat each tab as an individual process (instead of a child process of a parent). So when a Web site causes a tab to crash, you can close that one tab and not lose all the other tabs. This behavior is not a standard at the moment, so you’ll need to switch over to the Chrome browser to take advantage of it.

SOURCE: http://www.techrepublic.com/


Money gone phishing?

Friday, May 11th, 2012

The second you connect to the internet you put yourself at risk. Scary thought, but we tend to forget just how vulnerable we are and the easy targets we become when we’re not careful about our safety on the internet.

As an internet user you expose yourself on a daily basis to malicious software and the possibility of data theft. This includes phishing. Phishing scams use bogus e-mails and Web sites that seem legitimate but are actually designed to trick users into revealing personal and financial information. Computer criminals can then use the data to spy on or blackmail users, hijack their online accounts (including bank accounts), spread rumors, or operate under the victim’s identity.

According to our local Stellenbosch ABSA branch there are still some Stellenbosch University staff who fall prey to cybercriminals by clicking on phishing emails. To make sure you don’t become a victim, read more on phishing on IT’s self help wiki.

SOURCE: www.cnet.com

What To Do When The Internet Is Down?

Friday, May 11th, 2012

SOURCE: http://www.makeuseof.com

Let the search begin!

Friday, May 4th, 2012

Have you ever tried looking for something on a search engine only to get 1267 results totally unrelated to your initial query?

Internet search engines have the ability to search through a huge amount of web pages by means of titles, key words or text. But to find the correct results fast and effectively, you need to know how to use search engines to your advantage.

We’ve compiled a few basic hints to help you with your searches.

–         Use more than one keyword

On average most people use 1.5 words per search –  not enough for a successful search. The suggested amount of words are 6 to 8, preferably nouns.  Articles and pronouns are mostly ignored by search engines. Avoid verbs and adjectives unless it helps to define the topic.

–          Use phrases

A phrase is a combination of one or more words found in the exact order in the text you’re looking for. Make sure you use quotation marks, for example “get results fast”.

–          Caps and punctuation

Most search engines are sensitive to case. However if you use small caps, most search engines will recognise both capital letters and small caps. To play it safe, rather use small caps.

–          Boolean searches

The “Boolean” search was named after George Boole, a 19th century mathematician. A Boolean search is a handy took which gives the best results for a search. The three most used options are AND, OR and AND NOT.

AND means you’re looking for documents containing both/all words. For example if you serach for “search engines” AND “Google” AND “Boolean”, you will get results containing all three words.

OR means you’re looking for results containing one of the two words – it doesn’t matter which one. Preferably use synonyms for this option. For example  “small caps” OR “lower case”.

AND NOT means you are looking for results containing one word, but not if the document also contains another word. The search for “Google” AND “search engines” AND NOT “Boolean” will give you all the documents with “Google en “search engines”, but they won’t have “Boolean”.

Most search engines support the AND NOT option, but they sometimes use the words BUT NOT or NOT instead. In these cases they are indicated by placing a minus in front of the word or phrase.

–          Take note of your spelling and also consider the alternative spelling of words. 

–          Use specific words/phrases rather than generic categories. Rather search for “laptop” than “computer”.

–          Only search one specific website or domain. To do this, type the subject you’re looking for, followed by  “site:” and the webaddress. (For example inetkey site:www.sun.ac.za/infoteg)

–          Use a specialist search engine, for example an image search engine to search for your images and photos. Many websites have their own subcategories which makes it easier to conduct a serach.  Wikipedia has a very extensive list of specialist search engines.

Just remember there are between 200 and 800 million documents online! Refine your search as much as possible and you’ll be guaranteed better results.

Rumour has Amazon became the number one online shopping website before Google existed because Yahoo listed all the sites in their directory alphabetically! Luckily times have changed.

For more about the various search engines, how they work and tips, read more on Search Engine Watch.

Did you know?

Friday, May 4th, 2012

You could fit the whole Internet on just 200 million Blu-Ray disks and the first webcam was used to monitor a coffee maker?

The technology behind the Internet began back in the 1960′s at MIT. The first message ever to be transmitted was LOG. Why? The user had attempted to type LOGIN, but the network crashed after the enormous load of data of the letter G. It was to be a while before Facebook would be developed…

The Internet began as a single page at the URL http://info.cern.ch/hypertext/WWW/TheProject.html, which contained information about this new-fangled “WorldWideWeb” project, and how you too could make a hypertext page full of wonderful hyperlinks. Sadly, the original page was never saved, but you can view it after 2 years of revisions here.

Other interesting internet trivia:

  • The first webcam was deployed at Cambridge University computer lab – its sole purpose to monitor a particular coffee maker and hence avoid wasted trips to an empty pot.
  • Although the MP3 standard was invented in 1991, it wouldn’t be until 1998 that the first music file-sharing service Napster, would go live, and change the way the Internet was used forever.
  • Ever since the birth of the Internet, file sharing was a problem for the authorities that managed it. In 1989, McGill University shut down their FTP indexing site after finding out that it was responsible for half of the Internet traffic from America into Canada. Fortunately, a number of similar file indexing sites had already been made.
  • Sound familiar? Even today file sharing dominates Internet traffic with torrent files accounting for over 50% of upstream bandwidth. However, a larger proportion of download bandwidth is taken up by streaming media services such as Netflix.
  • Google estimates that the Internet today contains about 5 million terabytes of data (1TB = 1,000GB), and claims it has only indexed a paltry 0.04% of it all! You could fit the whole Internet on just 200 million Blu-Ray disks.
  • Twenty hours of video from around the world are uploaded to YouTube every minute. The first ever YouTube video was uploaded on April 23rd 2005,by Jawed Karim (one of the founders of the site) and was 18 seconds long, entitled “Me at the zoo”. It was quite boring, as is 99% of the content on YouTube today.

SOURCE: http://www.makeuseof.com

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.