%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 16 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250718221144+00'00') /ModDate (D:20250718221144+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 2413 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 372.137 521.469 374.597 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 372.512 520.719 373.847 re S 0.773 0.773 0.773 rg 61.016 387.887 m 550.984 387.887 l 550.984 388.637 l 61.016 388.637 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(DELL OPTIPLEX ALL-IN-ONE PCS FOR SALE)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(We currently have 20 Dell Optiplex All-in-One desktops in stock )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(for sale. These PCs are available immediately.)] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(The specifications are as follows:)] TJ ET BT 61.016 586.453 Td /F4 9.0 Tf [(Processor: i7-10700 \(8 Cores/16MB/16T/2.9GHz to 4.8GHz/65W\))] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(Hard drive: M.2 512GB SSD)] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(Memory: 16GB, 1x16GB)] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(Monitor: AIO 23.8" FHD 1920x1080 IPS Touch)] TJ ET 0.373 0.169 0.255 rg BT 61.016 533.497 Td /F4 9.0 Tf [(More information is also available on Dell's website.)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 532.346 m 266.801 532.346 l S 0.153 0.153 0.153 rg BT 61.016 513.508 Td /F4 9.0 Tf [(Price: R18,170.00 \(VAT inclusive\))] TJ ET BT 61.016 493.519 Td /F4 9.0 Tf [(These desktops are only for sale to SU departments. )] TJ ET BT 61.016 482.530 Td /F4 9.0 Tf [(Unfortunately no private sales are allowed.)] TJ ET BT 61.016 462.541 Td /F4 9.0 Tf [(If you department is interested in purchasing one of these )] TJ ET BT 61.016 451.552 Td /F4 9.0 Tf [(desktops, please log a request on )] TJ ET 0.373 0.169 0.255 rg BT 198.095 451.552 Td /F4 9.0 Tf [(servicedesk.sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 198.095 450.401 m 286.628 450.401 l S 0.153 0.153 0.153 rg BT 286.628 451.552 Td /F4 9.0 Tf [( with the )] TJ ET BT 61.016 440.563 Td /F4 9.0 Tf [(description: "AIO available".)] TJ ET BT 61.016 420.574 Td /F4 9.0 Tf [()] TJ ET 0.400 0.400 0.400 rg BT 61.016 402.085 Td /F2 9.0 Tf [(Posted in:News,Notices | | With 0 comments)] TJ ET q 225.000 0 0 198.750 325.984 447.461 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 532.6642 266.8007 541.8217 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://www.dell.com/za/enterprise/p/optiplex-7480-aio/pd) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 198.0947 450.7192 286.6277 459.8767 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://servicedesk.sun.ac.za) >> endobj 16 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 265 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 10403>> stream JFIFC    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ , L !1AQaq"2B#3CR$4br%&DStds1!1AQ"2#a3q$BCR ?k}9Oc>7Iiu2m\e^Ө+5+A+Y)Fn镫bZjH-5)IL@?PkLe釡g &y=Ѱ}n7Ϧ'=rT[ų Ֆ84i:lzp]hj} 'Lp# wcogJ\G,ԱssE?K-SC#㫧;O6j-~Q"yn55Ҏ(竑09ǒa@@@@@@@@@@@@@@@@@@@@@@@A&c n#84)F@QqڻM&1}-LcJ*=yſE_9=l_-;ݩˉ[>joMW;c-k%YT~ΪϦ^ЮVUI]MRήA586 ?iϸٛ LϕNcvu?|tQb[l r׷y;Vw9=FԶ SjM[99i9-0O(r-v JxDzzw%NڴVAܱI|U;l4zO4t l&AHǏJy8[2Jʙx]qRo%1䪪AZ*WEMSvԐILeP*lW*QH :Fy?7392rGRwyrOFuR^nrꪞ1U]g趟z.4$5_豾r3] DGAOTQHOaW _ԧgzTwUnշJIlz+Qӏi.9H>D,:kSǕԯkMKePZț4{t@@@@@@@@@@@@@A*bծw5/UQNImx]ӑrE_G5;jo5h@qVBmS^}9V Z6U6E*t`)VDʑQN)U aX8ʴAMY8v`7_ vg$QsY}7 8\a=#ҳYMZqٵ9%2}h\H*#UoE ވzS/.z@a$T•_B2(ܟ{O&:98n&8,4ު4pR`eLM UPp}r{Z&shT <)I#, wUhᄈ:x [Lu+5 }kA8QSndv@?V$gWr:?Z[}cSrrlp{ȬIi$l|zETEx[ZM4@8' \2~'&]a 8'vֺ8g]'p-l˟uToטTs߯qn9)MKShV1 GەhT`WʬQp M36KmZrZs983ssc759 ';˰&g`&餐5f=3mԈ:WKry*[=zQjloϴKV^I#k*y_5.k6Lq̻Sr爘\x~9x}//9(U)BAY!Z*ZsrLO-f",topnr>#>-v̾/6K=Yf}DLjG2̳]'jMLfejMV}i!U #{3V&KK]G9HX {_M29Ӄˏ,gi AoA,sn qNJiqU)9HϏw.$+;vZMbj*U6CJ(~|\-?q+t6@#/Nud{Ddpwͼʌ+lǀ'ZJT*aY do6>+#:?Wo> ΑڐVTڥ &9+kUGJU]Q9d.{E'<¾]˓Yl*gK@cޝ /v8ez^;'>w0%Mn5Q:9d2e8q n3o[='08tب1AJ'O*|y?W8sD&0S IOYWO$E|W0X< s}=8gh[یn#&UW4wkbg7rVrL~g`ⳋmZMl[r723aW2y]pa))]#ewV1vefR^ S NVҟu)V2U[.SfCF}U.^Lxʮj)(|lpϒoH8|wK{y?-ݫih*$G4W;vWAYj~zQ?xL#'IsǞ2|V7z~>a+vA@rIJ֗70ޚ8,[UBm$ +AtE 3Sl#^Y5_O]DW`] dz<.JEoK)ASG(co;BqrtY^I˕<9yYv7U[뻉TKK iKO]ECtGԑ[t{su}?qVss-sgEgxx8qp^7G?q6xzs:GN Etygh#i|G[t=S:)h$|M܋xv;@w\q3>L'w6^֥t.oIKrwAǛ_5nKfR tu qnÌ[aac^d]Xu.C0W//GoOR0:1«sxoǘ@W֕_D=< -WRL.pOFwSX-9]]qMUjgHz _z'O/[XW7wn\/D@@@@@@@@@@@@A.D)Ers#7b1gvo.*֗.s'6{r ,ho]T qF&3[q/y0)YjZzRj1{g=uru8anjpc啳;^Ti5CLֺN54 m=ӇY߇s˦?_R+p6ڒd)ZK8n~o.Y]3gĺJ}H3-/e\xsS]*.Tչ|L+|9x'4-ݫuL2 vܦpUސ\ʫ#*bZwoE#{_1Ld!Ti.:C{x9-1^ryb$sIvQ L4pR}M]>&?y+Q~,uzBnة}9a&A?Hk˞{x'z_O3XMn[^m.KSvp9~jnmgoryyMM!ԏ%2$^]LJǛl7N;)LJ?WoQύj3Sӻ3ة]VgSqm=/T,n߄pU zi{*_ةЪN{[)WHFG%4GDNk~ w{0}GSPH3Vbr{ΎfUɐ$o0aQGS.sY7^SCs z^ x7Ki3QOOLruaǟy-I9L2+41ר8h=ml߬[V[(,u/b{[d+8zy~v^3+?1p<|s^%8YO#NC谜_n kM fhz*[O|xL>F˻ql#nnGGSFfOW/ ;'~Jus3qVFHtd,̲}o6GSNꊉ%qnLdEZjߍ<ܩ~ tNҧ,~2I;ԡF VvUT3 ;}tL$/6[彘zQQ-TY^̕Y\c1`5yK] 뵔ǺoöWDҲQt3 ݨ8ч,K ɟUMԡrF󸿰+F{S|~vO Ǵ4oHqS%i4UѾJYHjۇ,gxr9qY7q5"& LP3 ߟwnzjլJ)t3aØ.Mxܴ\'ßٴ&ۭ@RzL2-\@@@@@@@@@@@@@A)`88֍ )]LR*laix9O}G +mF#) gO *,c#>JvEVPNȨ A};gTPP1ꝓhqu;%\r;;VR6xF33׆vI 䚮#KvQo9!iAZ::m%A>.b$eT?r Luv[ ftRI g㆙>{2y}J ]1r c:Ңt#$c<|0N3Y?HCv38A5iqnjSe;G#}H1ji]E$ԕ0 F`o]4sq?AyEH.ѳȆ |.w܂vQ8CJf0 60XT\5[/4{tIv#kv`X95{.;ss<9#2؃v& jA?r@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@##8si ^ן4w`el"w]4oE#Op c?YAm(/܃3Fal^:]}ktq{}PNY])hߎR5>㬻8܌ cWh{I5+I`as qwY]"bwg?8};b+ٝwnd18<7t՗:{w+)< o&^J:AWQ-l.zCH'A\6ɳXb%ԔR ծdL=lp`$=]}b]'TOE>o SQA֙ѓŎ4Ţ'.;y3!k1ӺNs#ǐ(1n3V2/-`!OF|1^:KvlǶcp;q0;Ⲟg.wY]Ƣb#;G$g-[t 29<< #U,~JC>=m8XAsSqc*$<`d0O ډPd_Vfa1͎]ܦ!uc{U GY"z4}*5_ju ;qՑ7yԀ snqMnntU?[SN揪"5(︽nƞ#Ψ3:g< ^p9GP\DI(l w]䂬NyK9e,QVudn KO~F O$J^[⑦V=dC?EnR.`u+kb)]1? x#WS>H$Woɾ TGe-DDp#=ȜݳuwPTHU2Whoexpf=;iTàpp#D2h{mWV[ky1Rvg52"ZpXϟUWgm-1 %n) 2+! ?b 1DRBBRlK㉿MBȜC!#zR;@Gf4*/vk1(29DACKc6 5w +gXfa8ei kn}lu,O1FY w6"ʓ5ȂCf?7gsQƺCL g+QAq_ |;#PfmKKAeaAL|C7O+c/6Q#vD4{"i{DϥTuoPwQ3=wCH矨DF^ \dǤjËiS>QuO@AcN%Zv{(3;74tgi? as#ho&Bllo&ؖ@@@@@@@@@@@@@@@@@@@@@AB` (,$۩e,w\^Ab\6&=FF̠w[} endstream endobj xref 0 17 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000596 00000 n 0000003061 00000 n 0000003173 00000 n 0000003288 00000 n 0000003408 00000 n 0000003516 00000 n 0000003643 00000 n 0000003752 00000 n 0000003880 00000 n 0000003960 00000 n trailer << /Size 17 /Root 1 0 R /Info 5 0 R >> startxref 14532 %%EOF News « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

News

New e-waste bins at IT

Monday, October 4th, 2021

 As part of the campus “Going Green” project Facilities Management will be placing e-waste bins at selected spots on campus. We encourage staff and students to use these bins for any non-asset e-waste.

Two of these yellow bins (see example right) will also be located at IT. A bin will be placed at the IT HUB by the entrance and a second one will be placed at the IT Main building in Hammanshand Rd at the service entrance (facing IT the door on your right) Both bins will be just inside the buildings by the doors. 

WHAT IS E-WASTE?

Electronic waste (e-waste) or Waste Electrical and Electronic Equipment (WEEE) are the terms used to describe old, end-of-life or discarded appliances using electricity. It includes computers, consumer electronics, batteries etc. which have been disposed of by their original users.  More on e-waste.

We encourage all staff and students to use these bins for any non-asset e-waste. Bins will be serviced by Wasteplan and weekly inspections will be made by the university’s Wasteplan site supervisor to assess when a collection is needed.

For assistance and enquiries please email fmhelpdesk@sun.ac.za.

 

Get rid of your e-waste

Monday, October 4th, 2021

Do you have old computers, monitors, cell phones or batteries lying around or clogging up cupboards? Are you concerned enough to dispose of them responsibly and not simply consign them to the dump?

There is a responsible campus solution. Facilities Management implemented e-waste bins on campus where e-waste can be disposed of and will then be picked up by contractors who specialise in the refurbishment, reuse and safe disposal of e-waste.

Electronic waste (e-waste) or Waste Electrical and Electronic Equipment (WEEE) are the terms used to describe old, end-of-life or discarded appliances using electricity. It includes computers, consumer electronics, etc. which have been disposed of by their original users. It can also include batteries.

E-waste is of concern largely due to the toxicity of some of the substances such as lead, mercury, cadmium and a number of other substances which are harmful to human health and ecosystems if not disposed of properly. The unsustainably rapid turnover of discarded electronics and computer technology is another reason for the need to recycle – or even better, re-use – e-waste.

What will happen to the e-Waste?

The contractors will separate the waste into items that

  • can be refurbished,
  • can be recycled and
  • must be safely disposed of.

Refurbishment of appliances and computers provides jobs and these items are then reused in needy schools and communities. Useful, scarce and valuable metals and other substances are extracted by recycling, while toxic e-waste is disposed of at special hazardous waste facilities. Examples of potentially toxic items include the old type of computer screens (CRT) and fluorescent tubes.

The procedure is as follows:

  1. Ensure that the items have been properly written off and dealt with in line with the University’s policy regarding the handling of redundant assets.
  2. Remove all your data, private and work related, from the devices. IT does not take responsibility for deleting or backing up any data or for any risk that your data might be accessible after disposal. Your device should be completely devoid of data.
  3. Dispose of e-waste in the yellow bins at the IT HUB (at the entrance) and IT Main Buiding (inside the service entrance on the right-hand side of the main entrance)
  4. For any further enquiries contact Clive Layman at Stellenbosch campus, Le Roux Franken at Belpark campus or Kevin Vermaak at Tygerberg. 

More information: www.ewasa.org

 

Spear phishing attack using a staff email

Monday, September 20th, 2021

If you receive an e-mail from Prof. Wolfgang Preiser – Head of the Department of Virology asking about a “PAYMENT”, you might be tempted to quickly answer and offer your assistance.

However, this was a spear-phishing scam designed to fool its victims into thinking the mail was sent out by someone like Prof Preiser.

We are getting several reports from personnel within his department saying that they are getting e-mail from Prof. Preiser and were concerned if his e-mail account has been compromised and if this is a phishing attack.

Here is what the phishing scam looks like.

An example of the spear phishing email using Prof Preiser's details

Click for a larger image.

Please note that the name, has been forged and that a “throwaway” execs.com e-mail address has been used with forged details inserted. The Professor’s account has not been compromised. 

The message below also serves as a warning and should give you an indication that this is not an email from an @sun address. Do not click links or open attachments unless you recognise the sender and know the content is safe.

CAUTION: This email originated from outside of the University. 

Additionally there is a standard warning from Microsoft to also warn you.

This is a spear-phishing attack where an institution is attacked by impersonating prominent or public figures within the enterprise to gain access to the enterprise. The targets in this method of attack are usually subordinates of high-ranking personnel, to fool them into sending money or obtaining personal details of these personnel members.

Keep an eye open for this scam, and please report it to IT Cyber Security if you find it in your inbox by logging it on the ICT Partner Portal. Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.​​

If you accidentally clicked on the link and already gave any personal details to the scammers it is vitally important that you immediately go to the USERADM page (either http://www.sun.ac.za/password or www.sun.ac.za/useradm) and change your password immediately.

Make sure the new password is completely different and a strong password that will not be easily guessed. Also change the passwords on your social media and private e-mail accounts, especially if you use the same passwords on these accounts.

Contact the IT Service Desk if you are still unsure.

[ARTICLE BY DAVID WILES]

Phishing scam: “Proof of Payment”

Friday, August 27th, 2021

Over 2 billion people worldwide have purchased goods or services online during the pandemic. The danger of all this convenient shopping with Takealot, Checkers or any online store is that people provide their credit card number without diligence.

One of the most prevalent scams NOW is called POP or Proof of Payment Receipt. There are a number of new phishing scams with the subject “Proof of Payment” or “Suspicious Bank transaction” at the moment. 

Here is one such scam that is currently being reported by personnel and students at Tygerberg. 

Click for larger image

Click for larger image

The way that this scam works is that the scammers are trying to get their victims to click on the link and go to a specially engineered site to steal passwords and login credentials. Often bank account details and cell phone numbers are asked for, and this is how the scammers get access to bank accounts and can do SIM swaps, to steal money and personal details.

Notice how the mail details have been forged to make the sender and the recipient the same. This is to disguise the true sender and to bypass the mail filters which would normally accept mail from within an organisation. In this case this sender used a “throw-away” Outlook.com e-mail address and then forged the headers to change the sender. In this case there is a possibility that the government address has been compromised.

If you get one of these e-mails or one similar looking (scammers change tactics very quickly) please report it to IT on the ICT Partner Portal. Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.​​

Secondly blacklist the sender under Junk mail, and perhaps even block the entire domain. You can do this by using the Report Message add-in on Outlook (available on your toolbar on the far right) More about the add-in on our blog or you can find the instructions on this .PDF

 

[ARTICLE BY DAVID WILES]

Extra layer of security added to campus computers

Monday, August 2nd, 2021

Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it’s essential to stay informed of the various risks that exist on the internet if you want to stay safe online. Here’s a breakdown of the basics: 

Malware, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most common type of online threat.

Ransomware is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behaviour online so it can target you with specific ads.

Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.

The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.

You’ve probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop (Figure 1). Don’t worry, this isn’t a brand-new type of malware. Stellenbosch University’s IT department has added an extra layer of security to campus computers.

Figure 1

Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart (Figure 2).

Figure 2

This is because the malware will sync to your browsers profile and will be synced back to your device after it has been removed.  If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on the ICT Partner Portal for a technician to assist with further remediation.

[ARTICLE BY BRADLEY VAN DER VENTER]

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.