%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250608084233+00'00') /ModDate (D:20250608084233+00'00') /Title (Report 06-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4062 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 279.203 521.469 467.531 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 279.578 520.719 466.781 re S 0.773 0.773 0.773 rg 61.016 294.953 m 550.984 294.953 l 550.984 295.703 l 61.016 295.703 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(HIGH INTERNET USAGE PROBLEMATIC)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Our service desk has been inundated with calls regarding high internet accounts over the past two weeks.)] TJ ET BT 61.016 617.431 Td /F4 9.0 Tf [(In one incident unusuallyhigh traffic on a user's account was detected. When investigated it came to light that someone )] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(else saw him type hispassword and used it to download illegal series from the internet.)] TJ ET BT 61.016 586.453 Td /F4 9.0 Tf [(Information Technology can't safeguard users in against incidents likethese.Unfortunately it remains your sole )] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(responsibility to keep your passwordsafe,)] TJ ET BT 61.016 555.475 Td /F4 9.0 Tf [(Sharing of usernames and passwords are still commonplace on campus, as is writing passwords down on post-its and )] TJ ET BT 61.016 544.486 Td /F4 9.0 Tf [(leaving them on desks.)] TJ ET BT 61.016 524.497 Td /F4 9.0 Tf [(It's just as important to keep your network password safe as it is to keep your bank card's PIN number safe and surely you )] TJ ET BT 61.016 513.508 Td /F4 9.0 Tf [(won't share your PIN with someone?)] TJ ET BT 61.016 493.519 Td /F4 9.0 Tf [(With your password someone can not only access your internet, but also your e-mails containing bank and other private )] TJ ET BT 61.016 482.530 Td /F4 9.0 Tf [(information, as well as human resources information - including your salary information! The risk remains the same.)] TJ ET BT 61.016 462.541 Td /F4 9.0 Tf [(Make sure you use a strong password. )] TJ ET 0.373 0.169 0.255 rg BT 218.084 462.541 Td /F4 9.0 Tf [(Microsoft)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 218.084 461.390 m 254.588 461.390 l S 0.153 0.153 0.153 rg BT 254.588 462.541 Td /F4 9.0 Tf [( has some clear guidelines on this.)] TJ ET BT 61.016 442.552 Td /F4 9.0 Tf [(Always close Inetkey when leaving your PC or lock your PC \(ctrl+alt+del\). If it's open, anyone can use it and there's no )] TJ ET BT 61.016 431.563 Td /F4 9.0 Tf [(way for IT to establishwho really used the account if you logged in.)] TJ ET BT 61.016 411.574 Td /F4 9.0 Tf [(Regularly check your internet usage andmake sure you don't get any nasty surprises. Your internet balance is displayed )] TJ ET BT 61.016 400.585 Td /F4 9.0 Tf [(on the Inetkey prompt box and can also be checked at)] TJ ET 0.373 0.169 0.255 rg BT 279.644 400.585 Td /F4 9.0 Tf [(www.sun.ac.za/useradm.)] TJ ET 0.18 w 0 J [ ] 0 d 279.644 399.434 m 380.174 399.434 l S 0.153 0.153 0.153 rg BT 61.016 380.596 Td /F4 9.0 Tf [(Keep in mind that the university internet speed and your ADSL line at home aren't the same speed. You might assume )] TJ ET BT 61.016 369.607 Td /F4 9.0 Tf [(because you're spending the same amount of time online, it will cost you the same, butdownloading is much faster on the )] TJ ET BT 61.016 358.618 Td /F4 9.0 Tf [(university network.)] TJ ET BT 61.016 338.629 Td /F4 9.0 Tf [(If you notice a sudden increase in your internet usage, lodge a query at IT at the cost of R200-00. More information on )] TJ ET BT 61.016 327.640 Td /F4 9.0 Tf [(internet usage on the SU network can be found in our )] TJ ET 0.373 0.169 0.255 rg BT 276.638 327.640 Td /F4 9.0 Tf [(service catalogue.)] TJ ET 0.18 w 0 J [ ] 0 d 276.638 326.489 m 349.169 326.489 l S 0.400 0.400 0.400 rg BT 61.016 309.151 Td /F2 9.0 Tf [(Posted in:Internet | | With 2 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 218.0837 461.7082 254.5877 470.8657 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://windows.microsoft.com/en-za/windows-vista/tips-for-creating-a-strong-password) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 279.6437 399.7522 380.1737 408.9097 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://www.sun.ac.za/useradm.) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 276.6377 326.8072 349.1687 335.9647 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www0.sun.ac.za/itservices/help/internet.htm) >> endobj xref 0 18 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000568 00000 n 0000004682 00000 n 0000004794 00000 n 0000004909 00000 n 0000005029 00000 n 0000005137 00000 n 0000005265 00000 n 0000005401 00000 n 0000005529 00000 n 0000005610 00000 n 0000005738 00000 n trailer << /Size 18 /Root 1 0 R /Info 5 0 R >> startxref 5840 %%EOF Internet « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Internet

Heartbleed wreaks havoc

Friday, May 9th, 2014

If you read about a computer bug in the YOU, it has to be serious. This is exactly what happened with Heartbleed last week.

The now already infamous bug surfaced last month and wreaked havoc and many popular websites. You also might have received an e-mail by now requesting you to change your password for certain websites.

Heartbleed indicates a vulnerability in security in OpenSSL software commonly for web encryption. The vulnerability allows a hacker access to the memory of data servers. According to Netcraft, a company specialising in interne research, 5000 websites might have been infected by it.

Unlike some viruses infiltrating your computer via e-mail, Heartbleed targets a weakness on web servers. This implies that someone using a compromised website, runs the risk of having his username, password or credit card details intercepted. Without too much effort your data can be obtained and also access to your account.

With Heartbleed hackers can also gain access to the digital keys responsible for encryption on servers and thereby access a company’s confidential, internal documents.

According to Vocativ, the term Heartbleed was chosen by Ossi Herrala, a systems administrator at Codenomicon. The technical name is CVE-2014-0160 and refers to the line of code where the bug is located. Heartbleed refers to an extension in OpenSSL called heartbeat. The protocol is used to keep connections open, even if data is not transmitted between connections.

If you haven’t changed your password for the affected sites, rather play it safe and change it anyway. It still remains good practice to change your passwords on a regular basis. If you want to know which sites have been targeted or what their current status is, you can do so here.

More detailed information on Heartbleed is available at:

http://www.cnet.com/news/how-to-protect-yourself-from-the-heartbleed-bug/
http://www.cnet.com/news/heartbleed-bug-what-you-need-to-know-faq/
http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/
http://www.vocativ.com/tech/hacking/behind-scenes-crazy-72-hours-leading-heartbleed-discovery/

BRON: www.cnet.com

 

 

Internet Explorer vulnerability disclosed

Thursday, May 8th, 2014

Recently security vendor FireEye publicly disclosed a vulnerability in all versions of Internet Explorer. Government security response teams urged users to rather use an alternative browser until a security fix was released. After Microsoft released the update this week, it”s no longer needed to use an alternative browser.

This high risk vulnerability, if exploited by an attacker, would allow him to gain the same user rights as the current user. The security breach could be achieved by an attacker hosting a specially crafted website that is designed to exploit this vulnerability through IE and then convince a user to view the website.

He would then entice the user the attacker enticing a user to view the attacker-controlled content by getting them to click a link in an e-mail or IM message or by opening an attachment in an e-mail.

Updating your Internet Explorer (versions 6, 7, 8, 9, 10 and 11) is critical on Windows clients. The security update addresses the vulnerability by modifying the way IE handles objects in its memory.

Microsoft has released update KB2964358 and KB2964444 to prevent this vulnerability. (More information on Microsoft’s security update can be found here.)

Campus assets running Microsoft Windows OS have the WSUS configuration installed, automatic updating enabled and users will not need to take any action. The security update will be downloaded and installed automatically.

FireEye noted that attacks rely on Flash and advised users to disable the Flash plugin in IE. Also always ensure that your antivirus software is current and updated regularly to avoid future security attacks.

SOURCE: http://www.zdnet.com en www.mirosoft.com

IE & my.sun not playing along?

Friday, February 28th, 2014

Recently we introduced a brand new my.sun interface (read the article here). As with most new developments, there are bound to be some hiccups.

One of the problems recently experienced by some users when they browse to the staff portal are either that their version of Internet Explorer has to be upgraded or only a blank screen is displayed.

There reason for this glitch is Internet Explorer’s compatibility mode. This function of Internet Explorer has the tendency to recognise the wrong versions of the software. For example, with compatibility mode Internet Explorer 8 and 9 thinks it’s running 7, while version 10 and 11 recognises it as 9.

However, there is an easy solution. By deselecting “Display intranet sites in Compatibility View” (see picture) Internet Explorer will report the correct version of the browser and not request an upgrade of the browser.

If Internet Explorer requests an upgrade, first check the version of the browser (see above ) and deselect compatibility view. Internet Explorer version 10, Mozilla Firefox and Google Chrome are recommended internet browsers.

1. How to find out which version of IE is installed on your pc
Click:  Help, About Internet Explorer

 

 

 

 

 

 

 

 

 

 

 

 

 

2. How to check if compatibility mode is enabled
Click: Tools, Compatibility View  Settings

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Send an email to help@sun.ac.za or contact IT ’s Service Desk on 0218084367 if you need assistance or experience problems. More information can be found on the my.sun help page. 

Download the mobile Inetkey application

Friday, February 14th, 2014

With the growing amount of mobile applications used on a daily basis, a need arose for a simple, effective Inetkey application that can be used on all devices and platforms – including Android, iOS, Blackberry and Windows.

After extensive testing on most available platforms, the official Inetkey app was launched on iOS, Android, Windows and Blackberry. You can download the appropriate version by clicking on the links below.

downloadandroid2
downloadblackberry
Download_on_the_App_Store_Badge_US-UK_135x40
downloadwindows

Non-official Inetkey mobile applications exist, but have been developed by independent individuals and are not supported or endorsed by Information Technology. Unofficial Inetkey apps carry the risk that they may intercept users’ credentials, which could be abused or stolen.  A user keys credentials into an app and does not know how or where they are stored or communicated, or even if it’s secured.

We can accept no responsibility if users download these apps and experience problems.

FOR MORE INFORMATION ON INTERNET AND INETKEY, PLEASE CONSULT OUR SERVICE CATALOGUE

Cell C offers now available for students and staff

Friday, January 31st, 2014

Students, as well as staff, can now obtain cheaper cellular data offerings through a joint offering by the University and Cell C.

These deals brings the cost per MB from 15c a megabyte down to around 3.3 cent/meg. The offer includes 3GB of data per month for six months at R600-00, but there are also deals available for 12 months.

Cell C will be on site on the Rooi Plein under the bridge between Admin A and B until 7 February, so make use of this opportunity! You need to take basic RICA documents: ID and proof of residence to the Cell C stall to make use of these special deals.

Telkom mobile will also introduce their offerings during the month of February, in case you miss out.

For more information e-mail the IT HUB at student@sun.ac.za​, visit them (entrance below the bridge on the Rooi Plein) or visit the Cell C stall.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.