%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250719005550+00'00') /ModDate (D:20250719005550+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 2712 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 394.115 521.469 352.619 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 394.490 520.719 351.869 re S 0.773 0.773 0.773 rg 61.016 409.865 m 550.984 409.865 l 550.984 410.615 l 61.016 410.615 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(WIFI ACCESS VIA EDUROAM)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(August 04,2021)] TJ ET BT 170.069 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 184.577 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Since the beginning of this year the MatiesWiFi service is no longer available for any staff or students for access to WiFi )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(on campus. Instead you will be required to use eduroam for wireless connections. This change was mainly made to )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(ensure better security. )] TJ ET 0.373 0.169 0.255 rg BT 152.555 615.442 Td /F4 9.0 Tf [(More information.)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 152.555 614.291 m 222.575 614.291 l S 0.153 0.153 0.153 rg BT 222.575 615.442 Td /F4 9.0 Tf [()] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(To further improve security and comply to eduroam's )] TJ ET 0.373 0.169 0.255 rg BT 273.308 595.453 Td /F4 9.0 Tf [(GEANT)] TJ ET 0.18 w 0 J [ ] 0 d 273.308 594.302 m 304.313 594.302 l S 0.153 0.153 0.153 rg BT 304.313 595.453 Td /F4 9.0 Tf [( guidelines we had to implement a new security certificate. )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(This certificate will lead to better performance and speed up the sign-on process in future.)] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(If you connect and sign on to eduroam on a Windows device, depending on the versions, you will be prompted with a )] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(messages This will happen only once. Click on )] TJ ET BT 249.584 553.486 Td /F1 9.0 Tf [(Connect)] TJ ET BT 285.584 553.486 Td /F4 9.0 Tf [( and continue working as usual. Similar messages will appear if )] TJ ET BT 61.016 542.497 Td /F4 9.0 Tf [(you work on devices with Linux or Apple operating systems.)] TJ ET BT 61.016 522.508 Td /F1 9.0 Tf [(NB. Please take note that you need to enter your full sun email address when signing on to eduroam.)] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [()] TJ ET BT 61.016 482.530 Td /F4 9.0 Tf [()] TJ ET BT 61.016 462.541 Td /F4 9.0 Tf [()] TJ ET BT 61.016 442.552 Td /F4 9.0 Tf [()] TJ ET 0.400 0.400 0.400 rg BT 61.016 424.063 Td /F2 9.0 Tf [(Posted in:Connectivity,Internet,News,Notices | | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 152.5547 614.6092 222.5747 623.7667 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/en/2020/11/matieswifi-discontinued-at-the-end-of-2020/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 273.3077 594.6202 304.3127 603.7777 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://eduroam.org/eduroam-and-geant/) >> endobj xref 0 16 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000561 00000 n 0000003325 00000 n 0000003437 00000 n 0000003552 00000 n 0000003672 00000 n 0000003780 00000 n 0000003908 00000 n 0000004041 00000 n 0000004169 00000 n trailer << /Size 16 /Root 1 0 R /Info 5 0 R >> startxref 4259 %%EOF Internet « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Internet

Heartbleed wreaks havoc

Friday, May 9th, 2014

If you read about a computer bug in the YOU, it has to be serious. This is exactly what happened with Heartbleed last week.

The now already infamous bug surfaced last month and wreaked havoc and many popular websites. You also might have received an e-mail by now requesting you to change your password for certain websites.

Heartbleed indicates a vulnerability in security in OpenSSL software commonly for web encryption. The vulnerability allows a hacker access to the memory of data servers. According to Netcraft, a company specialising in interne research, 5000 websites might have been infected by it.

Unlike some viruses infiltrating your computer via e-mail, Heartbleed targets a weakness on web servers. This implies that someone using a compromised website, runs the risk of having his username, password or credit card details intercepted. Without too much effort your data can be obtained and also access to your account.

With Heartbleed hackers can also gain access to the digital keys responsible for encryption on servers and thereby access a company’s confidential, internal documents.

According to Vocativ, the term Heartbleed was chosen by Ossi Herrala, a systems administrator at Codenomicon. The technical name is CVE-2014-0160 and refers to the line of code where the bug is located. Heartbleed refers to an extension in OpenSSL called heartbeat. The protocol is used to keep connections open, even if data is not transmitted between connections.

If you haven’t changed your password for the affected sites, rather play it safe and change it anyway. It still remains good practice to change your passwords on a regular basis. If you want to know which sites have been targeted or what their current status is, you can do so here.

More detailed information on Heartbleed is available at:

http://www.cnet.com/news/how-to-protect-yourself-from-the-heartbleed-bug/
http://www.cnet.com/news/heartbleed-bug-what-you-need-to-know-faq/
http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/
http://www.vocativ.com/tech/hacking/behind-scenes-crazy-72-hours-leading-heartbleed-discovery/

BRON: www.cnet.com

 

 

Internet Explorer vulnerability disclosed

Thursday, May 8th, 2014

Recently security vendor FireEye publicly disclosed a vulnerability in all versions of Internet Explorer. Government security response teams urged users to rather use an alternative browser until a security fix was released. After Microsoft released the update this week, it”s no longer needed to use an alternative browser.

This high risk vulnerability, if exploited by an attacker, would allow him to gain the same user rights as the current user. The security breach could be achieved by an attacker hosting a specially crafted website that is designed to exploit this vulnerability through IE and then convince a user to view the website.

He would then entice the user the attacker enticing a user to view the attacker-controlled content by getting them to click a link in an e-mail or IM message or by opening an attachment in an e-mail.

Updating your Internet Explorer (versions 6, 7, 8, 9, 10 and 11) is critical on Windows clients. The security update addresses the vulnerability by modifying the way IE handles objects in its memory.

Microsoft has released update KB2964358 and KB2964444 to prevent this vulnerability. (More information on Microsoft’s security update can be found here.)

Campus assets running Microsoft Windows OS have the WSUS configuration installed, automatic updating enabled and users will not need to take any action. The security update will be downloaded and installed automatically.

FireEye noted that attacks rely on Flash and advised users to disable the Flash plugin in IE. Also always ensure that your antivirus software is current and updated regularly to avoid future security attacks.

SOURCE: http://www.zdnet.com en www.mirosoft.com

IE & my.sun not playing along?

Friday, February 28th, 2014

Recently we introduced a brand new my.sun interface (read the article here). As with most new developments, there are bound to be some hiccups.

One of the problems recently experienced by some users when they browse to the staff portal are either that their version of Internet Explorer has to be upgraded or only a blank screen is displayed.

There reason for this glitch is Internet Explorer’s compatibility mode. This function of Internet Explorer has the tendency to recognise the wrong versions of the software. For example, with compatibility mode Internet Explorer 8 and 9 thinks it’s running 7, while version 10 and 11 recognises it as 9.

However, there is an easy solution. By deselecting “Display intranet sites in Compatibility View” (see picture) Internet Explorer will report the correct version of the browser and not request an upgrade of the browser.

If Internet Explorer requests an upgrade, first check the version of the browser (see above ) and deselect compatibility view. Internet Explorer version 10, Mozilla Firefox and Google Chrome are recommended internet browsers.

1. How to find out which version of IE is installed on your pc
Click:  Help, About Internet Explorer

 

 

 

 

 

 

 

 

 

 

 

 

 

2. How to check if compatibility mode is enabled
Click: Tools, Compatibility View  Settings

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Send an email to help@sun.ac.za or contact IT ’s Service Desk on 0218084367 if you need assistance or experience problems. More information can be found on the my.sun help page. 

Download the mobile Inetkey application

Friday, February 14th, 2014

With the growing amount of mobile applications used on a daily basis, a need arose for a simple, effective Inetkey application that can be used on all devices and platforms – including Android, iOS, Blackberry and Windows.

After extensive testing on most available platforms, the official Inetkey app was launched on iOS, Android, Windows and Blackberry. You can download the appropriate version by clicking on the links below.

downloadandroid2
downloadblackberry
Download_on_the_App_Store_Badge_US-UK_135x40
downloadwindows

Non-official Inetkey mobile applications exist, but have been developed by independent individuals and are not supported or endorsed by Information Technology. Unofficial Inetkey apps carry the risk that they may intercept users’ credentials, which could be abused or stolen.  A user keys credentials into an app and does not know how or where they are stored or communicated, or even if it’s secured.

We can accept no responsibility if users download these apps and experience problems.

FOR MORE INFORMATION ON INTERNET AND INETKEY, PLEASE CONSULT OUR SERVICE CATALOGUE

Cell C offers now available for students and staff

Friday, January 31st, 2014

Students, as well as staff, can now obtain cheaper cellular data offerings through a joint offering by the University and Cell C.

These deals brings the cost per MB from 15c a megabyte down to around 3.3 cent/meg. The offer includes 3GB of data per month for six months at R600-00, but there are also deals available for 12 months.

Cell C will be on site on the Rooi Plein under the bridge between Admin A and B until 7 February, so make use of this opportunity! You need to take basic RICA documents: ID and proof of residence to the Cell C stall to make use of these special deals.

Telkom mobile will also introduce their offerings during the month of February, in case you miss out.

For more information e-mail the IT HUB at student@sun.ac.za​, visit them (entrance below the bridge on the Rooi Plein) or visit the Cell C stall.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.