%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 16 0 R /I2 17 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250717134814+00'00') /ModDate (D:20250717134814+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 6375 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 109.346 521.469 637.388 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 109.721 520.719 636.638 re S 0.773 0.773 0.773 rg 61.016 125.096 m 550.984 125.096 l 550.984 125.846 l 61.016 125.846 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(EXAM ACCESS APP A RESOUNDING SUCCESS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Until recently granting access to examinations for students has been a manual and time-consuming process of checking-)] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(off access lists. However, thanks to new technology developed by Information Technology in collaboration with the )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(Examination Office in the Registrars Division, this is no longer the case.??)] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(Since June this year,the identification of students for access to examination venueshas beenfacilitatedwith the use of )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(cell phones at each venue.)] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(Astudent's student cardis held against theback of the cell phone, and on the screen, it is indicated whether the student is )] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(supposed to write the examination in the specific module in the specific venue. The screen will display a green mark if the )] TJ ET BT 61.016 542.497 Td /F4 9.0 Tf [(student is at the correct exam venue \(see image right\) and a red cross if not. If the student is at the wrong venue, the )] TJ ET BT 61.016 531.508 Td /F4 9.0 Tf [(screen will indicate where the student should?be for the exam or test.?)] TJ ET BT 61.016 511.519 Td /F4 9.0 Tf [(This will result in access to examination venues being easily and swiftly controlled and will certainly simplify and improve )] TJ ET BT 61.016 500.530 Td /F4 9.0 Tf [(the function of access controlwith regard toexamination venues.)] TJ ET BT 61.016 480.541 Td /F4 9.0 Tf [(This easier scanning process is made possible by theNFC \(near-field communications\) chip on Android phones which )] TJ ET BT 61.016 469.552 Td /F4 9.0 Tf [(communicates with theMIFARE chip embedded in the studentcard, )] TJ ET BT 337.136 469.552 Td /F4 9.0 Tf [(and)] TJ ET BT 352.148 469.552 Td /F4 9.0 Tf [()] TJ ET BT 354.650 469.552 Td /F4 9.0 Tf [(the identification information)] TJ ET BT 469.202 469.552 Td /F4 9.0 Tf [(is then)] TJ ET BT 498.218 469.552 Td /F4 9.0 Tf [(used)] TJ ET BT 517.730 469.552 Td /F4 9.0 Tf [(by)] TJ ET BT 61.016 458.563 Td /F4 9.0 Tf [(the phone app)] TJ ET BT 123.566 458.563 Td /F4 9.0 Tf [(to look up the student's exam venue.)] TJ ET BT 269.870 458.563 Td /F4 9.0 Tf [()] TJ ET BT 272.372 458.563 Td /F4 9.0 Tf [(The exam venue and module information)] TJ ET BT 438.449 458.563 Td /F4 9.0 Tf [(come)] TJ ET BT 460.454 458.563 Td /F4 9.0 Tf [(from the Student )] TJ ET BT 61.016 447.574 Td /F4 9.0 Tf [(Information System.)] TJ ET BT 141.044 447.574 Td /F4 9.0 Tf [()] TJ ET BT 61.016 427.585 Td /F4 9.0 Tf [(Tests were first conductedon a small scale during the November 2017 examination andthe technology wasrolled out fully )] TJ ET BT 61.016 416.596 Td /F4 9.0 Tf [(for theJune 2018 examination.It wasa resounding success.?)] TJ ET BT 61.016 396.607 Td /F4 9.0 Tf [(EmceLouw, Head of the Exam Office experienced the impact first-hand as the process was driven from her office. This )] TJ ET BT 61.016 385.618 Td /F4 9.0 Tf [(included loading the cell phones, setting up data, training the convenors responsible for scanning at the venues and )] TJ ET BT 61.016 374.629 Td /F4 9.0 Tf [(collecting the phones after the exams.She received overwhelmingly positive feedback from invigilators and students alike:)] TJ ET BT 61.016 354.640 Td /F4 9.0 Tf [()] TJ ET BT 61.016 334.651 Td /F4 9.0 Tf [()] TJ ET BT 61.016 314.662 Td /F4 9.0 Tf [()] TJ ET BT 61.016 294.673 Td /F4 9.0 Tf [()] TJ ET BT 61.016 274.684 Td /F4 9.0 Tf [(")] TJ ET BT 64.211 274.684 Td /F2 9.0 Tf [(Scan)] TJ ET BT 84.722 274.684 Td /F4 9.0 Tf [( van studentekaarte is fantasties! Ek het gister 4de jaar Megatronika studente gehad. Hulle was vreeslik be)] TJ ET BT 509.927 274.684 Td /F4 9.0 Tf [()] TJ ET BT 512.429 274.684 Td /F4 9.0 Tf [(n)] TJ ET BT 517.433 274.684 Td /F4 9.0 Tf [(druk )] TJ ET BT 61.016 263.695 Td /F4 9.0 Tf [(met die )] TJ ET BT 93.029 263.695 Td /F2 9.0 Tf [(scanning)] TJ ET BT 129.047 263.695 Td /F4 9.0 Tf [(!")] TJ ET BT 61.016 243.706 Td /F4 9.0 Tf [(The development and successful completion of the technology was a)] TJ ET BT 338.153 243.706 Td /F4 9.0 Tf [(cross-functional)] TJ ET BT 401.171 243.706 Td /F4 9.0 Tf [(team)] TJ ET BT 426.182 243.706 Td /F4 9.0 Tf [(effort)] TJ ET BT 446.693 243.706 Td /F4 9.0 Tf [(. Hendrik le Roux from )] TJ ET BT 61.016 232.717 Td /F4 9.0 Tf [(Information Technology's Access Control Division was the project manager and?Guzelle?Hendricks was responsible for )] TJ ET BT 61.016 221.728 Td /F4 9.0 Tf [(business analysis for the twothree-monthphases of the project which ran from the end of 2017 to June 2018.)] TJ ET BT 61.016 201.739 Td /F4 9.0 Tf [(In addition toHendrik andGuzelle?the following staff played a key role in getting the project off the ground - Phillip Greeff )] TJ ET BT 61.016 190.750 Td /F4 9.0 Tf [(\(TAS\), Gregory Isaacs \(TAS\), Anna-Mari du Toit, Marc-Allen Johnson,Jeremy van Rooyen,Charles Hopkins,who wrote )] TJ ET BT 61.016 179.761 Td /F4 9.0 Tf [(the app andElmar Mattheewho was responsible for the back-end development. On the side of the functional )] TJ ET BT 61.016 168.772 Td /F4 9.0 Tf [(stakeholders, besides for Emce, Neels Fourie \(Deputy Registrar\), and Jan du Toit and Helene Nieuwoudt \(both from )] TJ ET BT 61.016 157.783 Td /F4 9.0 Tf [(SISS\) participated in the project.)] TJ ET 0.400 0.400 0.400 rg BT 61.016 139.294 Td /F2 9.0 Tf [(Posted in:Apps,Students | | With 0 comments)] TJ ET q 126.000 0 0 225.000 61.016 421.211 cm /I1 Do Q q 225.000 0 0 72.750 61.016 290.681 cm /I2 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 421.2109 187.0157 646.2109 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/files/2018/08/exam_app-approved-new.jpg) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 290.6809 286.0157 363.4309 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/files/2018/08/exam_app_comment.jpg) >> endobj 16 0 obj << /Type /XObject /Subtype /Image /Width 168 /Height 300 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 9079>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 82 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?@5Nu p"ߝs> h>H4X!]nGN"6覚6|I,f$;zdQ^}-CR*._| Z4*Hdsdunr1>P񀽞Vx`QH1{ 㞞ju #v1Q\ U'׻W(:r{e>y5f)s=Z{OO4ܳ'M36?+4ge}WZǽ?6?) Dǽ?6?(2m3c޴ab=L{1G$rʏ"$Gpy \͇?ab& SxC했.lauYr, as"tnXA:zSZ(i%` }ќ~$t Q${5sUy\L]9J6~<TF:r s7gT3.:5G6?(͇a*]HN,~qi ;IטOeM88zŰ ;^o][=Ė$wB@dF7,H#@kB_ZKq+2_KG}F `$lSq l[KMm׿Ȯ\5޺_Ͽ5n^GvS2f|z*[q]YY6Hxq]չ}J|J( ^R=ᲄcΖ^Aq*E|)+>:\#}IaL.|tSV$8s/S:ROV~.,qk7gL&)~ӷ?Zmyg[ r8ֲo5YtXtxna9YSb^?}擣E+wpL2*sϊخcik~} uCyN#.J08hA 6wm2-y$Ǹ/bK~~'ĸ|M ipUmb:"bDaN#ClS-|u ̖ɾ^ AսZϯ=~~*-* tmqRKMRWSy^0%'C8pK?-mIX~@%N9BY^9W]UT8bPuĊI#fTbBJ赯[m Ӟb0+g d|ñ zd𕔑MHF0Z8P7^RZ)?Ik&cE+}k5y}fȗVpJV"kNIrg9XZeͅL*r03һORZ%KO֞gI/+[3[m8е" גH-Ŕq7.? X.[چL#7}3Ѝ KY4’%M9xYMIW@[\]uEz/)-gZ? KY591Q^ KY4’%MxϷuK^ KY4’%MxϷwע’%M𤵟 iG~/?1G5𤵟 iG)-gZ?g|z')-gZ? KY4mC#>y4W’%MmC#>{.=ǽ-0Pcތ{@ z1KE&=ǽ-PQ\o_ d3oEIό#ӵunP{UT#ӡkaJ9=#|=UJo^^ѸOH>COgeY#ҮbiҌcތ{Lbcތ{@ z)hOƏƀOƏƀOƏƀ5iҞNV(T7||NNM5[RtpC! 6o9V>gia}%|:i{.Mj ?~DUNjENkBJnq~"Y"blSq~m ~>2=?oE6z5=͹ݻ70_fٲïeI;fk{s= Tcn#gRyVϑB&$5o:O-uĉ\tw=: +j8 (P0 _]iwаxoQ+IPR~4~4R~4PEQF(Q1@-VzJ />Kn'q g{WWsu v_ N.#r:b{}}ɸxXR2CAg.~ÿذ?vGgӱC)Tl]'xu4xہѮH??+X#(P0 K{xm #HB" P:*N+a#Y`0c (+ ((( (((u˧_Dj 9el5iu}nM1a˴wpqu#%l8S^Es>0y#т*ω76*\%%}]uY7!|b67hvŻ϶"ݙ#1*K(fX],Sp#?Y:'Ҁ:z+?bZ)&Y+sgNjd(pot\v::+.Cr-g <(q}2M=w 3؁V9s222z(; XC!f.thHݳS^rjif-•gaxLF9硠 j+7̖,Pc<֕s65ЪGII *0H8ր4(((κЬ/y.#̖O5nv4M>wy-kw>x^KFsmTܛz⠒3"(P, =h7mQ ]8U?a"ʬ.'.$>Ikopn#k1!02 ֱ+ۆ"1;#IPcMz7In[s!؜|=̾µ__ms5tWIcmǿӵ#xOi|wlMvnۜgo1ky BV -#i 7% t!9:TP2&}|rn};t֣1Bn#Ǘ>N=+Nζll0!Fԝ8>):=Q.9R@8=PO#oْ˜ĊozhkgN? ( ( ((j:iP{;BC."w?Y܋wZD "X"g esq<0JQ93,>ޔԵ( ۆ@I~*v!uC9' i/䷎$PH| ns]3G  @I%r޿Zu5=fOm?>ǯ#9[l0p(U"Uw1%EPEPEPEE{a$*ȗC&UFq [OJ)e i`ϥ^ּH5Xf 1e@G+TW(\kT1h޻*(-IrA&[$|%zfd@n"3*0pߧ֭z~P!6v_G%hHG }Nɫ:^}yWPhN#ϘQlۜȮ(((Š(((Š(((Š(((((((((((((k/?Oo+Z(k/?Oo+Z(k/?Oo+ CX]M$*%PAF®{ le/ln[J 5 j'Q eZW5 j'Q eZW5 j'Q eZut|lnR!u&$L܌,d' )W5 j'Q eZW5 j'Q eZj6]+PW7?g䑞MRX0068V(+v[k~y5z[ mK.uu$f{O!Q'Lr$r4Q@Q@Q@ endstream endobj 17 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 97 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 8572>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 82 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$a," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?~ QE[9%Ȫd>GT~#֮tX`K#8dX׽fi>9mN[f8;KF^9aP񪲄 q4 {!ǘ2 92rq@]|l}ի'pn"1ɘɟUq\?umo2\"=m}$g5-u >%+Sʕ62T9sE曥ߵb$v:ֹ=FkQY%l\5+Cϵh7(n!x ۝'t$hEcX,B)?MIe*O7J-gPwǹB@*H@< \W/-*x 9B ]ʶ:9Ŭ#|+;J=Z:Nas/r1jC+mE1ɵ$ #٣O[bMJK'_A:f5mΈ!m& 2зVDR/w>4~ĢIc8WeNQ @^wߵ9uE/`"[yd 4˔ AKsfM]OI/!jQzuJ擩ڤZDcH(lB1@5.qV.Fi\8>jֶv3桧[^u(@|vxn+Ujz.L"B(8f '~֧t'KE[yt`zMGt41Y7ٸ`g+Ϥuٴ?+[IbdVkR2qqlfM$S9<-C:jn71$b ~瞵]A"W14(crO5 RCĉmghX<$˕%=2GpPh22Ȣi5X%/Ocp@7>NZIĒ$\S{zޢ_䙭#'8YR 5[Krٯ%:K r0PFT6zjͨji68F8xFHao`? ز\Cjaж1v~Jr[H' !g"Q*VݹwȰ]Fúk-rlFp;p}ri:Ėw2MktUUY.x[BӒ2N+(rv_/Y2?xdĚ5gQ%YNP[[ǽFv=15iQ4זm8weaCi-@Dr.zsؑޫGE($@a *:]-ʧ}8$5RM!8a#<:2G?F.bGf<(Å<ۃ&bMs6XP# ˶5<tP*PP0KEQEQEWΟ__ F_Eah;B 7 p6Dx$x'YdxVbv3‘zڼm4u:BKwGV֧ s $B;t 4y"N":la28%h[xN'$l6n{t3J+yTxXmr NIϭW[/$fխ-<_*0 >q)ќ+ B0 <{O|oaiX\gpV5gI+rgH*FĪ.ꮷkiC *ӏsttF>i-% 2gfK-iQ<Uq~6].K.PK9DH=*h7Veԡ),7 Y #iGq|IH>]_No+[xc5 ҡlo o* Ǡ'{P}Z#iڝ%X'q<8#wAϥk]Z@$h*<5ǧ.uagwZE][ |e9$r@y=4utqX>S]`@>09$zr%5[%ūΪK'ǥR L%=?q4̀rkK}3~˫^]W'NEߌ%Wyrz(Έ:i _F@r4 }_ K}VиSPXP6c6C0^ckJlo4mLC4'2܊$i˟D#|bL%jN= i ]0'T=xTzN!gbJt1Gw8??BHǰ'}; Δ:[Ƹo ơw3\^E3GϷr(R+R{DoajSl@5C9(4>1Q`P? )-jC7@|9e7q'@ޛs$~~u/R?ӿp>2T+(%YfB3-7 !R|Z@Uq}~NvہQ@|F,h6Ch蛛K-7}5隋gL<h"D U3Q'ms4մhs2)߃sjkJt/S?4g_lb4)6VMlJSiGe~)`~DìO_ѻiv?›և@}?wO>Џ?H4 t,n!_h.?š<1M*}"Ftli)dcP֊?g~ ev ?ҳn?wN]J?j:68PF\=HѤFF  5^?zC2sCO6ЬMbB"IƎE@dZ_G?羥 OGS];7AS4L2@D_Gw~#r1/! yzkO%H7M E?ڗaGCR|;hÙ?ZH3<Q/֥==DQnmq\*;-˖ay>4+KӵD/!yHI} <{Om2DТCQf^?1~dSmi7rksF{]]$bH9څNp(o @zWQ[P[Xu]I^M/ʧ;qUE-[=c]TTHmMF NFrqӱWcX& |O FHV$9PWzv8 ZgVyR>^<ƥ}GWڥkPr1(!SzbsakƬ|8٠ ri/ l9,Z09TwztZΪ[G H^q~U_eu+e۳*FBl8u\Ηkzo.O۬Q!Hc*3ȠE:T:ɏ:M?oxf/=3/5km*}JI-!X*7B `X~"еY4zFGD0#bEODW#seܨ'fGs]}[۴ ye]JA,3s\RY50I/&s‹ms R~IPk2ݦk*%$c(pT#ȣ>'OF[xu@C K zcX+{dxm f^69oG&]ĚLH#$2v$nq:Ankks2ļO~]>P_ 4y6eTCw=vMŬڴGn7x#5I@p̂MBЦF1Ja Y;d[f }q&rmkc7P6*,T`{SwK*1O{b(3 l]qQns6.#w9|sb(*SͥZ[[ ps~O[˦ ®Bwr gW_(MGb2X[0gE*mBĒ 6t9wWM!"f6?1#k;Ws_'m5gkhOQ ѿH`*ί⨴kkv[Frg8>+Nܚ5l{,YP' |I IoAD>TĿ6*JqI@Mο-ʮ-3$۳{@8.\鷑%& ;@䎼bQxsZյ!Ԡ`$qϯAg}^Nˡ颎Epdo svlJpxS3m ?.Rgx=)|Oj[ la&UHZF+LZR4BQK@ߊ8.J+_-وxʓ9EW>=i)ϼWs0?/{g+ĺnˆf˹t/Ԑ1@MQGM u8h+յ5N,^R1qO\g2{(*r\3а}zQxOnZtGI# }+t8ms1u=,<Ǝ8ٗzx^)xiT咈0*lXZ6}m5Wyhc&֭dXKy ޫʦpd{d{^fDV2}_'k[FIJ/-}dۼMm䯛?j 2/%}AyiqpSȾns@_D5{>uo3΀ɟqSoG@ Ʒ&} AiOƔEza[8ڔ|A],9@ lr+<' ]tOO?[F?熘4FA 7uq)<}tE'.zi(vk[g?j1U]ah?`&xZa?Kkí~(N?b~EֳK/@ K_?\l7Ho5Iw((::ݸOSq }[A'ޛ 9_Uzܑ<_Ujggk_ #@o79Aկ]Q?GP kl? _w.(yе1(VCj} }R_#kMz@#@@Yhӿ.h?ߟc?Rw9Ix::_9r0plc@/9G/9Hu5,לG?$@ s@MKӬ?ri/,NխFE{xֺQI?“ aR)K@-ֆ_]N=lXa݀Ӟ4-PP.o͍0dT 8=@~xj7G?o&9*D̉X9'7Lu5%xOkqIw~凑 QHqHlZOQ\op.H(=@F@nUmN9orKP,u9b/JF~ok<*'o5ҩXhZcyF_8I8|9V>mo0Ymg83_?ԏ2/%}_;Wɿ3cM!ђP%EPEPEPEPEPEPEPEPEPEPEP)EPQEQEQE(( ?Oͨ? endstream endobj xref 0 18 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000343 00000 n 0000000380 00000 n 0000000518 00000 n 0000000607 00000 n 0000007034 00000 n 0000007146 00000 n 0000007261 00000 n 0000007381 00000 n 0000007489 00000 n 0000007616 00000 n 0000007733 00000 n 0000007860 00000 n 0000007972 00000 n 0000017219 00000 n trailer << /Size 18 /Root 1 0 R /Info 5 0 R >> startxref 25958 %%EOF Students « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Students

“Office 365 verification” phishing scam from compromised student account

Monday, September 3rd, 2018

Please be on the lookout for the following phishing scam coming this morning from a compromised student account:

The subject will be “Office365 E-mail Verification” (or a variation) and says that “you recently made a request to terminate your Office365 mail” and to click on a link to cancel this termination.

The mail should be immediately suspicious to most people with common sense and awareness of phishing scams, but here are a few signs:

  1. Why is a student account sending you mail about your “termination” of an Office365 account?
  2. Why are they threatening you to verify or lose your account?
  3. Why does the link point to a site that is not in the university network and is in Brazil of all places?
  4. Why is something as “important” as this being sent in a non-secure email? 

Here is an example of one of these phishing emails that several observant students and colleague have sent me this morning already!

If you have accidentally clicked on the link and given your login details to the phishers it is vitally important that you immediately go to the USERADM page (either http://www.sun.ac.za/password or www.sun.ac.za/useradm and change your password immediately. (Make sure the new password is completely different and is a strong password that will not be easily guessed, as well as changing the passwords on your social media and private e-mail accounts, especially if you use the same passwords on these accounts.)

If you have received mail that looks like the one above, please immediately report it to the Information Technology Security Team using the following method: (especially if it looks like it comes from a university address) Once you have reported it, delete it immediately.

  1. Start up a new mail addressed to csirt@sun.ac.za (CC: sysadm@sun.ac.za)
  2. Use the Title “SPAM” (without quotes) in the Subject.
  3. With this New Mail window open, drag the suspicious spam/phishing mail from your Inbox into the New Mail Window. It will attach the mail as an enclosure and a small icon with a light yellow envelope will appear in the attachments section of the New Mail.
  4. Send the mail.

[ARTICLE BY DAVID WILES]

 

Exam access app a resounding success

Thursday, August 30th, 2018

Until recently granting access to examinations for students has been a manual and time-consuming process of checking-off access lists. However, thanks to new technology developed by Information Technology in collaboration with the Examination Office in the Registrar’s Division, this is no longer the case.    

Since June this year, the identification of students for access to examination venues has been facilitated with the use of cell phones at each venue. 

A student’s student card is held against the back of the cell phone, and on the screen, it is indicated whether the student is supposed to write the examination in the specific module in the specific venue. The screen will display a green mark if the student is at the correct exam venue (see image right) and a red cross if not. If the student is at the wrong venue, the screen will indicate where the student should be for the exam or test.  

This will result in access to examination venues being easily and swiftly controlled and will certainly simplify and improve the function of access control with regard to examination venues.  

This easier scanning process is made possible by the NFC (near-field communications) chip on Android phones which communicates with the MIFARE chip embedded in the student card,  and the identification information is then used by the phone app to look up the student’s exam venue. The exam venue and module information come from the Student Information System. 

Tests were first conducted on a small scale during the November 2017 examination and the technology was rolled out fully for the June 2018 examination. It was a resounding success.  

 Emce Louw, Head of the Exam Office experienced the impact first-hand as the process was driven from her office. This included loading the cell phones, setting up data, training the convenors responsible for scanning at the venues and collecting the phones after the exams. She received overwhelmingly positive feedback from invigilators and students alike: 

 

 

 

 

Scan van studentekaarte is fantasties! Ek het gister 4de jaar Megatronika studente gehad. Hulle was vreeslik beïndruk met die scanning!”

The development and successful completion of the technology was a cross-functional team effort. Hendrik le Roux from Information Technology’s Access Control Division was the project manager and Guzelle Hendricks was responsible for business analysis for the two three-month phases of the project which ran from the end of 2017 to June 2018.  

In addition to Hendrik and Guzelle the following staff played a key role in getting the project off the ground – Phillip Greeff (TAS), Gregory Isaacs (TAS), Anna-Mari du Toit, Marc-Allen Johnson, Jeremy van Rooyen, Charles Hopkins, who wrote the app and Elmar Matthee who was responsible for the back-end development. On the side of the functional stakeholders, besides for Emce, Neels Fourie (Deputy Registrar), and Jan du Toit and Helene Nieuwoudt (both from SISS) participated in the project.

High internet costs? Here’s why.

Monday, April 9th, 2018

Occasionally we receive enquiries regarding seemingly high Inetkey costs, especially from students. Usually, the causes are fairly straight-forward and can be easily prevented. 

It’s very difficult to say what is causing or what the source of the traffic is without actually looking at your Inetkey logs. So, to start, before contacting us about your Inetkey usage, first look at your logs on http://www.sun.ac.za/useradm and go to the [View Internet Usage] tool and under “View Type” select “Source” and select USER to refresh the display. If you take note of all the IP addresses and see if they are in fact your devices, you will get a better idea of which device is generating the traffic and at which times.

Keep in mind that Stellenbosch University has numerous times been rated as having the fastest internet in South Africa. Current speed tests show that the download speed is 95.29 MB per second and an upload speed of 58.12 MB per second. Subsequently, you can easily run up a massive Inetkey bill within minutes.

The following are a few potential causes for high Inetkey usage:

  • Windows 10 updates that cannot easily be switched off with traditional means. However, if the device is on the SU network and set up to receive updates from IT’s WSUS server, updates will be downloaded locally and not run via Inetkey.
  • Updates stopping and restarting or not completing. Windows 10 1709 Creative Update is a little under 4Gb.
  • Inetkey being left open on a device that is unattended overnight or during classes.
  • Video streaming from sites not on the firewall exception list. Watching an HD streamed movie during the day and evening can generate 3Gb of data per hour.
  • Using a laptop as a wifi hotspot for a cell phone to save on data costs.
  • Using filesharing protocols like BitTorrent. Remember that uploads and downloads both generate traffic. If you use BitTorrent you are also seeding and will also pay for someone downloading your own files.
  • Syncing files to DropBox.
  • Weak passwords allowing neighbours and friends to share internet connections from adjacent rooms.
  • Passwords being leaked to a friend or partners and then abused at a later stage.
  • Viruses or malware included in BHO that spam and generate traffic. Often compromised e-mail accounts will cause high internet usage, because InetKey and email use the same password.
  • Inetkey accounts being used on multiple devices.

If none of these seems to be causing your high Inetkey usage, you can ask Information Technology to investigate your internet usage (or issues). If you have a query send a complaint within 14 days to helpinfo@sun.ac.za. The cost of an enquiry is R200.00 per enquiry. If an error is found, the administrative fee will not be levied.

[Information supplied by David Wiles]

 

Teach and Learn with MATLAB and Simulink

Wednesday, February 21st, 2018

Where Will MATLAB Take You Today?

Stellenbosch University has a Total Academic Headcount (TAH) license for MATLAB, Simulink, and add-on products. You may use these products for teaching, research, and learning. The license allows individuals to install the products on university-owned equipment, as well as personally owned computers.

Get Access Today: http://rga.sun.ac.za/firga/matlab.html

New SUNLearn mobile app available for download

Wednesday, April 26th, 2017

Information Technology has developed a new SUNLearn mobile app which is now available for download. The app can be downloaded for Android, as well as iOS devices. It can also be downloaded by scanning the QR code to the right.  

SUNLearn is Stellenbosch University’s blended-learning platform. It is an open source, powerful, flexible and mobile-ready blended learning platform for learning and teaching. The system is easy to learn and use for both staff and students and an extensive user guide is also available. 

The SUNLearn mobile app can be used to:

– browse the content of your courses, even when offline,
– receive instant notifications of messages and other events,
– quickly find and contact other people in your courses,
– upload images, audio, videos and other files from your mobile device,
– view your course grades, etc.

Full features can be seen here.

Students who are new to the system can go to the Student training link where they will find various resources, videos and self-help guides. Keep in mind that when you use the SUNLearn mobile app on campus via Maties WiFi or the network, you will not be charged for any data and you will not need Inetkey for access.

The SUNLearn support team can be reached at learn@sun.ac.za or 021-808 2222.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.