%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240519002707+00'00') /ModDate (D:20240519002707+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 9675 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 123.937 521.469 622.797 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 124.312 520.719 622.047 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(HIGH INTERNET COSTS? HERES WHY.)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Occasionally we receive enquiries regarding seemingly high Inetkey costs, especially from students.Usually, the causes )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(are fairly straight-forward and can be easily prevented.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(It's very difficult to say what is causing or what the source of the traffic is without actually looking at yourInetkey logs. So, )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(to start, before contacting us about your Inetkey usage, first look at your logs on)] TJ ET 0.373 0.169 0.255 rg BT 380.687 522.066 Td /F3 9.0 Tf [(http://www.sun.ac.za/useradm)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 380.687 520.915 m 501.233 520.915 l S 0.400 0.400 0.400 rg BT 501.233 522.066 Td /F3 9.0 Tf [(and go to )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(the [View Internet Usage]tool and under "View Type" select "Source" and select USER to refresh the display. If you take )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(note of all the IP addresses and see if they are in fact your devices, you will get a better idea of which device is generating )] TJ ET BT 61.016 489.099 Td /F3 9.0 Tf [(the traffic and at which times.)] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(Keep in mind that Stellenbosch University has numerous times been rated as having the fastest internet in South Africa. )] TJ ET BT 61.016 458.121 Td /F3 9.0 Tf [(Current speed tests show that the download speed is 95.29 MB per second and an upload speed of 58.12 MB per second. )] TJ ET BT 61.016 447.132 Td /F3 9.0 Tf [(Subsequently, you can easily run up a massive Inetkey bill within minutes.)] TJ ET BT 61.016 427.143 Td /F3 9.0 Tf [(The following are a few potential causes for high Inetkey usage:)] TJ ET 0.400 0.400 0.400 RG 85.866 409.970 m 85.866 410.383 85.696 410.792 85.404 411.084 c 85.113 411.376 84.703 411.545 84.291 411.545 c 83.878 411.545 83.469 411.376 83.177 411.084 c 82.885 410.792 82.716 410.383 82.716 409.970 c 82.716 409.558 82.885 409.148 83.177 408.857 c 83.469 408.565 83.878 408.395 84.291 408.395 c 84.703 408.395 85.113 408.565 85.404 408.857 c 85.696 409.148 85.866 409.558 85.866 409.970 c f BT 91.016 407.154 Td /F3 9.0 Tf [(Windows 10 updates that cannot easily be switched off with traditional means. )] TJ ET BT 404.162 407.154 Td /F4 9.0 Tf [(However, if the device is on the )] TJ ET BT 91.016 396.165 Td /F4 9.0 Tf [(SU network and set up to receive updates from IT's WSUS server, updates will be downloaded locally and )] TJ ET BT 91.016 385.176 Td /F4 9.0 Tf [(not run via Inetkey.)] TJ ET 85.866 377.003 m 85.866 377.416 85.696 377.825 85.404 378.117 c 85.113 378.409 84.703 378.578 84.291 378.578 c 83.878 378.578 83.469 378.409 83.177 378.117 c 82.885 377.825 82.716 377.416 82.716 377.003 c 82.716 376.591 82.885 376.181 83.177 375.890 c 83.469 375.598 83.878 375.428 84.291 375.428 c 84.703 375.428 85.113 375.598 85.404 375.890 c 85.696 376.181 85.866 376.591 85.866 377.003 c f BT 91.016 374.187 Td /F3 9.0 Tf [(Updates stopping and restarting or not completing. Windows 10 1709 Creative Update is a little under 4Gb.)] TJ ET 85.866 366.014 m 85.866 366.427 85.696 366.836 85.404 367.128 c 85.113 367.420 84.703 367.589 84.291 367.589 c 83.878 367.589 83.469 367.420 83.177 367.128 c 82.885 366.836 82.716 366.427 82.716 366.014 c 82.716 365.602 82.885 365.192 83.177 364.901 c 83.469 364.609 83.878 364.439 84.291 364.439 c 84.703 364.439 85.113 364.609 85.404 364.901 c 85.696 365.192 85.866 365.602 85.866 366.014 c f BT 91.016 363.198 Td /F3 9.0 Tf [(Inetkey being left open on a device that is unattended overnight or during classes.)] TJ ET 85.866 355.025 m 85.866 355.438 85.696 355.847 85.404 356.139 c 85.113 356.431 84.703 356.600 84.291 356.600 c 83.878 356.600 83.469 356.431 83.177 356.139 c 82.885 355.847 82.716 355.438 82.716 355.025 c 82.716 354.613 82.885 354.203 83.177 353.912 c 83.469 353.620 83.878 353.450 84.291 353.450 c 84.703 353.450 85.113 353.620 85.404 353.912 c 85.696 354.203 85.866 354.613 85.866 355.025 c f BT 91.016 352.209 Td /F3 9.0 Tf [(Video streaming from sites not on the firewall exception list. Watching an HD streamedmovie during the day and )] TJ ET BT 91.016 341.220 Td /F3 9.0 Tf [(eveningcan generate 3Gb of data per hour.)] TJ ET 85.866 333.047 m 85.866 333.460 85.696 333.869 85.404 334.161 c 85.113 334.453 84.703 334.622 84.291 334.622 c 83.878 334.622 83.469 334.453 83.177 334.161 c 82.885 333.869 82.716 333.460 82.716 333.047 c 82.716 332.635 82.885 332.225 83.177 331.934 c 83.469 331.642 83.878 331.472 84.291 331.472 c 84.703 331.472 85.113 331.642 85.404 331.934 c 85.696 332.225 85.866 332.635 85.866 333.047 c f BT 91.016 330.231 Td /F3 9.0 Tf [(Using alaptop as a wifi hotspot for a cell phone to save on data costs.)] TJ ET 85.866 322.058 m 85.866 322.471 85.696 322.880 85.404 323.172 c 85.113 323.464 84.703 323.633 84.291 323.633 c 83.878 323.633 83.469 323.464 83.177 323.172 c 82.885 322.880 82.716 322.471 82.716 322.058 c 82.716 321.646 82.885 321.236 83.177 320.945 c 83.469 320.653 83.878 320.483 84.291 320.483 c 84.703 320.483 85.113 320.653 85.404 320.945 c 85.696 321.236 85.866 321.646 85.866 322.058 c f BT 91.016 319.242 Td /F3 9.0 Tf [(Using filesharing protocols like BitTorrent. Remember that uploads and downloads both generate traffic. If you use )] TJ ET BT 91.016 308.253 Td /F3 9.0 Tf [(BitTorrent you are also seeding and will also pay for someone downloading your own files.)] TJ ET 85.866 300.080 m 85.866 300.493 85.696 300.902 85.404 301.194 c 85.113 301.486 84.703 301.655 84.291 301.655 c 83.878 301.655 83.469 301.486 83.177 301.194 c 82.885 300.902 82.716 300.493 82.716 300.080 c 82.716 299.668 82.885 299.258 83.177 298.967 c 83.469 298.675 83.878 298.505 84.291 298.505 c 84.703 298.505 85.113 298.675 85.404 298.967 c 85.696 299.258 85.866 299.668 85.866 300.080 c f BT 91.016 297.264 Td /F3 9.0 Tf [(Syncing files to DropBox.)] TJ ET 85.866 289.091 m 85.866 289.504 85.696 289.913 85.404 290.205 c 85.113 290.497 84.703 290.666 84.291 290.666 c 83.878 290.666 83.469 290.497 83.177 290.205 c 82.885 289.913 82.716 289.504 82.716 289.091 c 82.716 288.679 82.885 288.269 83.177 287.978 c 83.469 287.686 83.878 287.516 84.291 287.516 c 84.703 287.516 85.113 287.686 85.404 287.978 c 85.696 288.269 85.866 288.679 85.866 289.091 c f BT 91.016 286.275 Td /F3 9.0 Tf [(Weak passwords allowing neighbours and friends to share internet connections from adjacent rooms.)] TJ ET 85.866 278.102 m 85.866 278.515 85.696 278.924 85.404 279.216 c 85.113 279.508 84.703 279.677 84.291 279.677 c 83.878 279.677 83.469 279.508 83.177 279.216 c 82.885 278.924 82.716 278.515 82.716 278.102 c 82.716 277.690 82.885 277.280 83.177 276.989 c 83.469 276.697 83.878 276.527 84.291 276.527 c 84.703 276.527 85.113 276.697 85.404 276.989 c 85.696 277.280 85.866 277.690 85.866 278.102 c f BT 91.016 275.286 Td /F3 9.0 Tf [(Passwords being leaked to a friend or partners and then abused at a later stage.)] TJ ET 85.866 267.113 m 85.866 267.526 85.696 267.935 85.404 268.227 c 85.113 268.519 84.703 268.688 84.291 268.688 c 83.878 268.688 83.469 268.519 83.177 268.227 c 82.885 267.935 82.716 267.526 82.716 267.113 c 82.716 266.701 82.885 266.291 83.177 266.000 c 83.469 265.708 83.878 265.538 84.291 265.538 c 84.703 265.538 85.113 265.708 85.404 266.000 c 85.696 266.291 85.866 266.701 85.866 267.113 c f BT 91.016 264.297 Td /F3 9.0 Tf [(Viruses or malware included in BHO that spam and generate traffic. Often compromised e-mail accounts will cause )] TJ ET BT 91.016 253.308 Td /F3 9.0 Tf [(high internet usage, because InetKey and email use the same password.)] TJ ET 85.866 245.135 m 85.866 245.548 85.696 245.957 85.404 246.249 c 85.113 246.541 84.703 246.710 84.291 246.710 c 83.878 246.710 83.469 246.541 83.177 246.249 c 82.885 245.957 82.716 245.548 82.716 245.135 c 82.716 244.723 82.885 244.313 83.177 244.022 c 83.469 243.730 83.878 243.560 84.291 243.560 c 84.703 243.560 85.113 243.730 85.404 244.022 c 85.696 244.313 85.866 244.723 85.866 245.135 c f BT 91.016 242.319 Td /F3 9.0 Tf [(Inetkey accountsbeing used on multiple devices.)] TJ ET BT 61.016 222.330 Td /F4 9.0 Tf [(If none of these seemsto be causing yourhigh Inetkey usage, you can ask Information Technology to investigate )] TJ ET BT 61.016 211.341 Td /F4 9.0 Tf [(your internet usage \(or issues\).If you have a query send a complaint within 14 days to)] TJ ET 0.373 0.169 0.255 rg BT 432.635 211.341 Td /F4 9.0 Tf [(helpinfo@sun.ac.za)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 432.635 209.912 m 516.929 209.912 l S 0.400 0.400 0.400 rg BT 61.016 200.352 Td /F4 9.0 Tf [(. The cost of an enquiry is R200.00 per enquiry. If an error is found, the administrative fee will not be levied.)] TJ ET BT 402.934 180.363 Td /F3 9.0 Tf [([Information supplied by David Wiles])] TJ ET BT 61.016 160.374 Td /F3 9.0 Tf [()] TJ ET BT 61.016 141.885 Td /F3 9.0 Tf [(Posted in:Internet,Students | Tagged:Inetkey,Internet | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 380.6867 521.2336 501.2327 530.3911 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://www.sun.ac.za/useradm) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 432.6347 210.5086 516.9287 219.6661 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (mailto:helpinfo@sun.ac.za) >> endobj xref 0 16 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000469 00000 n 0000000558 00000 n 0000010285 00000 n 0000010397 00000 n 0000010504 00000 n 0000010620 00000 n 0000010740 00000 n 0000010868 00000 n 0000010948 00000 n 0000011076 00000 n trailer << /Size 16 /Root 1 0 R /Info 5 0 R >> startxref 11153 %%EOF Students « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Students

“Office 365 verification” phishing scam from compromised student account

Monday, September 3rd, 2018

Please be on the lookout for the following phishing scam coming this morning from a compromised student account:

The subject will be “Office365 E-mail Verification” (or a variation) and says that “you recently made a request to terminate your Office365 mail” and to click on a link to cancel this termination.

The mail should be immediately suspicious to most people with common sense and awareness of phishing scams, but here are a few signs:

  1. Why is a student account sending you mail about your “termination” of an Office365 account?
  2. Why are they threatening you to verify or lose your account?
  3. Why does the link point to a site that is not in the university network and is in Brazil of all places?
  4. Why is something as “important” as this being sent in a non-secure email? 

Here is an example of one of these phishing emails that several observant students and colleague have sent me this morning already!

If you have accidentally clicked on the link and given your login details to the phishers it is vitally important that you immediately go to the USERADM page (either http://www.sun.ac.za/password or www.sun.ac.za/useradm and change your password immediately. (Make sure the new password is completely different and is a strong password that will not be easily guessed, as well as changing the passwords on your social media and private e-mail accounts, especially if you use the same passwords on these accounts.)

If you have received mail that looks like the one above, please immediately report it to the Information Technology Security Team using the following method: (especially if it looks like it comes from a university address) Once you have reported it, delete it immediately.

  1. Start up a new mail addressed to csirt@sun.ac.za (CC: sysadm@sun.ac.za)
  2. Use the Title “SPAM” (without quotes) in the Subject.
  3. With this New Mail window open, drag the suspicious spam/phishing mail from your Inbox into the New Mail Window. It will attach the mail as an enclosure and a small icon with a light yellow envelope will appear in the attachments section of the New Mail.
  4. Send the mail.

[ARTICLE BY DAVID WILES]

 

Exam access app a resounding success

Thursday, August 30th, 2018

Until recently granting access to examinations for students has been a manual and time-consuming process of checking-off access lists. However, thanks to new technology developed by Information Technology in collaboration with the Examination Office in the Registrar’s Division, this is no longer the case.    

Since June this year, the identification of students for access to examination venues has been facilitated with the use of cell phones at each venue. 

A student’s student card is held against the back of the cell phone, and on the screen, it is indicated whether the student is supposed to write the examination in the specific module in the specific venue. The screen will display a green mark if the student is at the correct exam venue (see image right) and a red cross if not. If the student is at the wrong venue, the screen will indicate where the student should be for the exam or test.  

This will result in access to examination venues being easily and swiftly controlled and will certainly simplify and improve the function of access control with regard to examination venues.  

This easier scanning process is made possible by the NFC (near-field communications) chip on Android phones which communicates with the MIFARE chip embedded in the student card,  and the identification information is then used by the phone app to look up the student’s exam venue. The exam venue and module information come from the Student Information System. 

Tests were first conducted on a small scale during the November 2017 examination and the technology was rolled out fully for the June 2018 examination. It was a resounding success.  

 Emce Louw, Head of the Exam Office experienced the impact first-hand as the process was driven from her office. This included loading the cell phones, setting up data, training the convenors responsible for scanning at the venues and collecting the phones after the exams. She received overwhelmingly positive feedback from invigilators and students alike: 

 

 

 

 

Scan van studentekaarte is fantasties! Ek het gister 4de jaar Megatronika studente gehad. Hulle was vreeslik beïndruk met die scanning!”

The development and successful completion of the technology was a cross-functional team effort. Hendrik le Roux from Information Technology’s Access Control Division was the project manager and Guzelle Hendricks was responsible for business analysis for the two three-month phases of the project which ran from the end of 2017 to June 2018.  

In addition to Hendrik and Guzelle the following staff played a key role in getting the project off the ground – Phillip Greeff (TAS), Gregory Isaacs (TAS), Anna-Mari du Toit, Marc-Allen Johnson, Jeremy van Rooyen, Charles Hopkins, who wrote the app and Elmar Matthee who was responsible for the back-end development. On the side of the functional stakeholders, besides for Emce, Neels Fourie (Deputy Registrar), and Jan du Toit and Helene Nieuwoudt (both from SISS) participated in the project.

High internet costs? Here’s why.

Monday, April 9th, 2018

Occasionally we receive enquiries regarding seemingly high Inetkey costs, especially from students. Usually, the causes are fairly straight-forward and can be easily prevented. 

It’s very difficult to say what is causing or what the source of the traffic is without actually looking at your Inetkey logs. So, to start, before contacting us about your Inetkey usage, first look at your logs on http://www.sun.ac.za/useradm and go to the [View Internet Usage] tool and under “View Type” select “Source” and select USER to refresh the display. If you take note of all the IP addresses and see if they are in fact your devices, you will get a better idea of which device is generating the traffic and at which times.

Keep in mind that Stellenbosch University has numerous times been rated as having the fastest internet in South Africa. Current speed tests show that the download speed is 95.29 MB per second and an upload speed of 58.12 MB per second. Subsequently, you can easily run up a massive Inetkey bill within minutes.

The following are a few potential causes for high Inetkey usage:

  • Windows 10 updates that cannot easily be switched off with traditional means. However, if the device is on the SU network and set up to receive updates from IT’s WSUS server, updates will be downloaded locally and not run via Inetkey.
  • Updates stopping and restarting or not completing. Windows 10 1709 Creative Update is a little under 4Gb.
  • Inetkey being left open on a device that is unattended overnight or during classes.
  • Video streaming from sites not on the firewall exception list. Watching an HD streamed movie during the day and evening can generate 3Gb of data per hour.
  • Using a laptop as a wifi hotspot for a cell phone to save on data costs.
  • Using filesharing protocols like BitTorrent. Remember that uploads and downloads both generate traffic. If you use BitTorrent you are also seeding and will also pay for someone downloading your own files.
  • Syncing files to DropBox.
  • Weak passwords allowing neighbours and friends to share internet connections from adjacent rooms.
  • Passwords being leaked to a friend or partners and then abused at a later stage.
  • Viruses or malware included in BHO that spam and generate traffic. Often compromised e-mail accounts will cause high internet usage, because InetKey and email use the same password.
  • Inetkey accounts being used on multiple devices.

If none of these seems to be causing your high Inetkey usage, you can ask Information Technology to investigate your internet usage (or issues). If you have a query send a complaint within 14 days to helpinfo@sun.ac.za. The cost of an enquiry is R200.00 per enquiry. If an error is found, the administrative fee will not be levied.

[Information supplied by David Wiles]

 

Teach and Learn with MATLAB and Simulink

Wednesday, February 21st, 2018

Where Will MATLAB Take You Today?

Stellenbosch University has a Total Academic Headcount (TAH) license for MATLAB, Simulink, and add-on products. You may use these products for teaching, research, and learning. The license allows individuals to install the products on university-owned equipment, as well as personally owned computers.

Get Access Today: http://rga.sun.ac.za/firga/matlab.html

New SUNLearn mobile app available for download

Wednesday, April 26th, 2017

Information Technology has developed a new SUNLearn mobile app which is now available for download. The app can be downloaded for Android, as well as iOS devices. It can also be downloaded by scanning the QR code to the right.  

SUNLearn is Stellenbosch University’s blended-learning platform. It is an open source, powerful, flexible and mobile-ready blended learning platform for learning and teaching. The system is easy to learn and use for both staff and students and an extensive user guide is also available. 

The SUNLearn mobile app can be used to:

– browse the content of your courses, even when offline,
– receive instant notifications of messages and other events,
– quickly find and contact other people in your courses,
– upload images, audio, videos and other files from your mobile device,
– view your course grades, etc.

Full features can be seen here.

Students who are new to the system can go to the Student training link where they will find various resources, videos and self-help guides. Keep in mind that when you use the SUNLearn mobile app on campus via Maties WiFi or the network, you will not be charged for any data and you will not need Inetkey for access.

The SUNLearn support team can be reached at learn@sun.ac.za or 021-808 2222.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.