%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250606150645+00'00') /ModDate (D:20250606150645+00'00') /Title (Report 06-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4062 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 279.203 521.469 467.531 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 279.578 520.719 466.781 re S 0.773 0.773 0.773 rg 61.016 294.953 m 550.984 294.953 l 550.984 295.703 l 61.016 295.703 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(HIGH INTERNET USAGE PROBLEMATIC)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Our service desk has been inundated with calls regarding high internet accounts over the past two weeks.)] TJ ET BT 61.016 617.431 Td /F4 9.0 Tf [(In one incident unusually high traffic on a user's account was detected. When investigated it came to light that someone )] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(else saw him type his password and used it to download illegal series from the internet.)] TJ ET BT 61.016 586.453 Td /F4 9.0 Tf [(Information Technology can't safeguard users in against incidents like these. Unfortunately it remains your sole )] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(responsibility to keep your password safe,)] TJ ET BT 61.016 555.475 Td /F4 9.0 Tf [(Sharing of usernames and passwords are still commonplace on campus, as is writing passwords down on post-its and )] TJ ET BT 61.016 544.486 Td /F4 9.0 Tf [(leaving them on desks.)] TJ ET BT 61.016 524.497 Td /F4 9.0 Tf [(It's just as important to keep your network password safe as it is to keep your bank card's PIN number safe and surely you )] TJ ET BT 61.016 513.508 Td /F4 9.0 Tf [(won't share your PIN with someone?)] TJ ET BT 61.016 493.519 Td /F4 9.0 Tf [(With your password someone can not only access your internet, but also your e-mails containing bank and other private )] TJ ET BT 61.016 482.530 Td /F4 9.0 Tf [(information, as well as human resources information - including your salary information! The risk remains the same.)] TJ ET BT 61.016 462.541 Td /F4 9.0 Tf [(Make sure you use a strong password. )] TJ ET 0.373 0.169 0.255 rg BT 218.084 462.541 Td /F4 9.0 Tf [(Microsoft)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 218.084 461.390 m 254.588 461.390 l S 0.153 0.153 0.153 rg BT 254.588 462.541 Td /F4 9.0 Tf [( has some clear guidelines on this.)] TJ ET BT 61.016 442.552 Td /F4 9.0 Tf [(Always close Inetkey when leaving your PC or lock your PC \(ctrl+alt+del\). If it's open, anyone can use it and there's no )] TJ ET BT 61.016 431.563 Td /F4 9.0 Tf [(way for IT to establish who really used the account if you logged in.)] TJ ET BT 61.016 411.574 Td /F4 9.0 Tf [(Regularly check your internet usage and make sure you don't get any nasty surprises. Your internet balance is displayed )] TJ ET BT 61.016 400.585 Td /F4 9.0 Tf [(on the Inetkey prompt box and can also be checked at )] TJ ET 0.373 0.169 0.255 rg BT 279.644 400.585 Td /F4 9.0 Tf [(www.sun.ac.za/useradm.)] TJ ET 0.18 w 0 J [ ] 0 d 279.644 399.434 m 380.174 399.434 l S 0.153 0.153 0.153 rg BT 61.016 380.596 Td /F4 9.0 Tf [(Keep in mind that the university internet speed and your ADSL line at home aren't the same speed. You might assume )] TJ ET BT 61.016 369.607 Td /F4 9.0 Tf [(because you're spending the same amount of time online, it will cost you the same, but downloading is much faster on the )] TJ ET BT 61.016 358.618 Td /F4 9.0 Tf [(university network.)] TJ ET BT 61.016 338.629 Td /F4 9.0 Tf [(If you notice a sudden increase in your internet usage, lodge a query at IT at the cost of R200-00. More information on )] TJ ET BT 61.016 327.640 Td /F4 9.0 Tf [(internet usage on the SU network can be found in our )] TJ ET 0.373 0.169 0.255 rg BT 276.638 327.640 Td /F4 9.0 Tf [(service catalogue.)] TJ ET 0.18 w 0 J [ ] 0 d 276.638 326.489 m 349.169 326.489 l S 0.400 0.400 0.400 rg BT 61.016 309.151 Td /F2 9.0 Tf [(Posted in:Internet | | With 2 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 218.0837 461.7082 254.5877 470.8657 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://windows.microsoft.com/en-za/windows-vista/tips-for-creating-a-strong-password) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 279.6437 399.7522 380.1737 408.9097 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://www.sun.ac.za/useradm.) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 276.6377 326.8072 349.1687 335.9647 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www0.sun.ac.za/itservices/help/internet.htm) >> endobj xref 0 18 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000568 00000 n 0000004682 00000 n 0000004794 00000 n 0000004909 00000 n 0000005029 00000 n 0000005137 00000 n 0000005265 00000 n 0000005401 00000 n 0000005529 00000 n 0000005610 00000 n 0000005738 00000 n trailer << /Size 18 /Root 1 0 R /Info 5 0 R >> startxref 5840 %%EOF Internet « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Internet

Forgot to reactivate?

Tuesday, April 3rd, 2018

To have access to internet, email and any other network service, you need to reactivate your username annually. If you haven’t reactivated for 2018, your access will have expired on 4 April. What do you do now?

  1. You will not be able to access the network from your devices. In order to reactivate, use a colleague’s PC or laptop.
  2. Browse to the following address: www.sun.ac.za/useradm.
  3. You will see three options:
    Sign on 
    Forgot password
    Reactivate expired username

    Select Reactivate expired username.

4. You will be asked to sign in with your username and ID number or Passport number. See example below.

5. After signing in, you will see a list of options for your username, as well as the appropriate cost points options. 

6. Select the usernames you want to activate and fill in the correct cost point. This is very important. Rather make sure which cost point you should use from your department’s financial officer. If it’s incorrect it will result in a delay of your activation. 

7. Your request for activation will be forwarded to your cost centre manager. 

8. As soon as they approve it, you will have access to the SU network again.

 

 

OneDrive for Business: Anonymous file sharing

Monday, January 22nd, 2018

Information Technology recently assessed our OneDrive for Business platform to ensure that no security risks exist for our users and network. During this assessment we identified a number of users who are currently using the anonymous sharing function (“Anyone with the link can view and edit”) on OneDrive.

With anonymous file sharing there is no control or record of who has access to the shared files. Anybody who has the link can access and/or edit the files. This poses a security risk for the University and our users. For this reason we are compelled to switch off anonymous usage.

From Thursday, 1 February 2018 you will no longer be able to share files anonymously on OneDrive. Sharing will still be possible with internal and external users, but at a higher security level.

Guides on best practices for sharing files on OneDrive is available www.sun.ac.za/itselfhelp under the Office365 section or directly on this page. If you are have any enquiries, please contact the IT Service Desk by emailing help@sun.ac.za or calling our Service Desk at 808 4367.

OneDrive: 5TB just for you

Monday, July 31st, 2017

Since June staff members have full access to the online Office365 applications. Besides Outlook email, SharePoint Online, access to the MS Office apps (for example Word, Excel, PowerPoint, etc.) and being able to download Office 2016, there is one significant advantage of using the Office365 suite – OneDrive.

OneDrive provides 5TB of cloud storage space for each staff member and student. This means you now have ample space to store your documents and your data will be available from anywhere, anytime, on any device with an internet connection.

What are the advantages of cloud services? 

  • More storage space available, up to 5TB on OneDrive and 50GB on Outlook.
  • Your data is available from anywhere, anytime, on any device. You’ll always have access to your data if you have an internet connection.
  • Your information is also safely stored, even if you lose one of your devices.  

What are the disadvantages of cloud services?  

  • Familiarise yourself with copyright regulations. Make sure you know what you are allowed to store and share online.  SU copyright agreements do not extend to storing of documents protected under the copyright law on OneDrive for business or any other public store space.
  • You are entirely responsible for your own information. Be careful who you give rights and access to, as it will compromise your information if it’s visible to other people.
  • You are responsible for synchronisation between online and local data. Synchronisation between online and local information needs to be set up correctly and done on a regular basis.
  • Keep in mind that access to cloud services when on campus will not incur any costs, but if you work from home your own data will be utilised.
  • It is very important that you keep your private usernames, passwords and information separate from your official work, to prevent your data from getting mixed up.
  • Having access to the cloud from any computer makes your digital identification vulnerable, do not use computers you do not trust to access your cloud services.

What if I have been using OneDrive personal, Dropbox and other cloud storage options? 

You can keep on using them, but it is very important that you only use these storage options for your personal data.

OneDrive for business and SharePoint online are available under the US MS Licence agreement for storage and sharing of institutional data. The storage and sharing of institutional data are not allowed on Dropbox, OneDrive personal or any other cloud storage. 

How do I get access to my OneDrive storage space?

All staff automatically has access to OneDrive. Log on to Office365 with your email address and password. OneDrive is also accessible via the portal by clicking on the Office365 link or searching for Office365 in the search field.

IMPORTANT:

  • When using cloud-based services, you have to keep your private and work usernames, passwords and data separate. Never use the same username for private and work email accounts, storage spaces and applications.
  • SU copyright agreements do not extend to storing and sharing of documents protected under the copyright law on OneDrive for business, SharePoint online or any other public store spaces.

 

 

If you have any questions, please let us know by logging a request on ServiceNow or calling our Service Desk at 808 4367. For more information on the Office365 package, please consult our FAQs or have a look at the Office365 training videos.

Alternative facts, fake news or lies?

Wednesday, March 1st, 2017

If there’s one thing the US election taught us, it’s that “alternative facts” exist and any news which puts Trump in a negative light is, apparently, “fake news”. Fake news does exist, but it’s not what Trump wants it to be.

“Fake news, or hoax news, refers to false information or propaganda published under the guise of being authentic news. Fake news websites and channels push their fake news content in an attempt to mislead consumers of the content and spread misinformation via social networks.” (http://www.webopedia.com/TERM/F/fake-news.html)

During the US election, it became clear that most of the fake news generated, including sites that improved Donald Trump’s chances as a candidate, originated from outside the United States. In Macedonia, one teenager started a lucrative business spreading the pro-Trump fake news. Whether this played any role in Trump’s presidential win, we’ll never know. Speaking of Trump – Did you hear he signed a visa-free travel policy for South Africa? Not true! Fake news! Sad! Even in South Africa, it was suggested that the ANC used fake news to try and influence the local elections. 

It’s easy to get swept up when you read something upsetting or ludicrous and of course, your first instinct is “I have to tell someone!” So you share it on Twitter, you send it via e-mail and you post it on Facebook and you feel like you are involved in spreading the news. And so something that’s not true spreads like wildfire and fake news peddlers are laughing all the way to the bank.

The increase of fake news means that we have to be more careful and even suspicious of what we read on the internet. If it looks like a news website, it doesn’t mean it is. On the contrary, it’s remarkably easy to create fake websites. There are ways to spot fake news, but it will require you to be more vigilant and above all, read more critically. Local (real) news website EWN lists a few tips to help you to distinguish between the real and the ridiculous. Mybroadband goes into even more detail with their article “How to stop falling for fake news on Facebook.”

Fake news characteristics are easily recognisable if you take the time to read the article before sharing it. By reading, you will notice details which don’t fit. If a headline sounds sensationalistic, it’s probably a fake article attempting to lure you into clicking.  Remember Google is your friend and can indicate whether the same news is shared by legitimate news sources or if this is the only one. It will also show if the article is an old one recycled to generate new clicks.

Avoid getting trapped in an echo chamber. We prefer to only read information and opinions we agree with and inevitably search engines only suggest similar articles with similar views. Try to read a bit wider – even articles covering topics that don’t necessarily interest you or you don’t agree with. Challenge your own viewpoints. 

 

More articles on fake news: 

We can’t talk about ‘fake news’ if we can’t agree what it means
Google and Facebook partner for anti-fake news drive during French election
Fake news website (Wikipedia)
List of fake news websites
List of satirical websites

 

[SOURCES: http://ewn.co.za; https://mybroadband.co.za/]

Inetkey for staff and students

Friday, February 24th, 2017
 

 For detailed information on Inetkey for staff, please look at our SERVICE CATALOGUE.

For information on Inetkey/Internet for students, have a look at the information on www.sun.ac.za/ithub.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.