%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 13 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 12 0 R /I2 15 0 R /I3 16 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250718210614+00'00') /ModDate (D:20250718210614+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 3306 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 78.170 521.469 668.564 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 78.170 l 565.984 78.170 l 565.984 745.984 l f 45.266 746.734 m 45.266 78.170 l 46.016 78.170 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(EXTRA LAYER OF SECURITY ADDED TO CAMPUS COMPUTERS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(February 08,2021)] TJ ET BT 177.584 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 192.092 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it's essential to stay )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(informed of the various risks that exist on the internet if you want to stay safe online. Here's a breakdown of the basics:)] TJ ET BT 61.016 606.442 Td /F1 9.0 Tf [(Malware)] TJ ET BT 96.530 606.442 Td /F4 9.0 Tf [(, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(common type of online threat.)] TJ ET BT 61.016 575.464 Td /F1 9.0 Tf [(Ransomware)] TJ ET BT 117.032 575.464 Td /F4 9.0 Tf [( is an emerging form of malware that locks the user out of their files or their device, then demands an )] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(anonymous online payment to restore access.)] TJ ET BT 61.016 544.486 Td /F1 9.0 Tf [(Adware)] TJ ET BT 93.524 544.486 Td /F4 9.0 Tf [( is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your )] TJ ET BT 61.016 533.497 Td /F4 9.0 Tf [(behaviour online so it can target you with specific ads.)] TJ ET BT 61.016 513.508 Td /F1 9.0 Tf [(Spyware)] TJ ET BT 98.033 513.508 Td /F4 9.0 Tf [( is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank )] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [(details and passwords.)] TJ ET BT 61.016 482.530 Td /F4 9.0 Tf [(The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.)] TJ ET BT 61.016 462.541 Td /F4 9.0 Tf [(You've probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop \(Figure 1\). Don't worry, this isn't a )] TJ ET BT 61.016 451.552 Td /F4 9.0 Tf [(brand-new type of malware. Stellenbosch University's IT department has added an extra layer of security to campus )] TJ ET BT 61.016 440.563 Td /F4 9.0 Tf [(computers.)] TJ ET BT 61.016 420.574 Td /F4 9.0 Tf [(Figure 1)] TJ ET q 57.000 0 0 69.000 61.016 340.376 cm /I1 Do Q BT 61.016 322.585 Td /F4 9.0 Tf [(Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the )] TJ ET BT 61.016 311.596 Td /F4 9.0 Tf [(current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart \(Figure )] TJ ET BT 61.016 300.607 Td /F4 9.0 Tf [(2\).)] TJ ET BT 61.016 280.618 Td /F4 9.0 Tf [(Figure 2)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /XObject /Subtype /Image /Width 76 /Height 92 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 3 /Columns 76 /BitsPerComponent 8>> /ColorSpace /DeviceRGB /BitsPerComponent 8 /Length 5185>> stream x\ktSǵF/ےmɶdlW` !Y-)I [+5Y -mr聾N&8i5$-4ʦI'8i`2`C#[3[XG6v[gyIsf={{F&uI$ Pp䶒\5jWi@B*- tO oi0G&yb^:HP!1Ji2t49_\ `N-S7$ܨ&_BBB+/z5=%oo)$ @BX844$WBV ~63;Z#~IL %#-l+~BBEzNJT"MK$ݓa͕8^}ڝϪX*qGfDmA1]H;b9%8R(7g4{d4CGFud”rN#ҧʋ0ҲYgtag7,.LONە̒XR27Ǽ[H`F,}pм +Id D+ՊېKʒu0LxM$^z2BG _ b$ԗ 0ⳋi1%9)&NS3$gV/glJIʍSsf'4_LDZd}n?1gMXi"BI]-H_)wҢNK2'-AQRX~cK/ydFi+I'pVkO:6^v;thP:4(jzިڬ '~Q$BS2w o2zu,]-, kj;lK+#Eܼ! p,^̟| A њ4H} ~w֝ ]9a9KRuNX 9xo=hvh_dU9" zc+|cKK q._3;b夾Ǽd J˩p/g- 4n;pS Pb/[38c^i`CDJ3U{23.!B`Lÿ yhv`KBiO%Υ`Y/REfDH %äX!. v+Ҍa!yy Z*lqWw.Iі^Z=sftЃLU29< q,_'?zWD_]DB9T"_udB9TJ]ۋ̞ cg N;4aXF!^4g%Aʲl)eYJYJ)Rʲl\_韟CĜ^&.N`Ǚˑ|)0h5lIp¼3|1:sLӇ@PշGC vNR.\q>Bzn\.gGw={`;iꫣs҄ v8sYʔR<(,YէBǛ9[5J F%)FJA6kdHU_q3GF*BP6Ɏks1QM&'N?4V vZvyk7?FU9C A!)&d>u1> -T,JcC?zdy)U4IVeѣӯ;pC C))sPEʫ.&q sL^}˩<~Tyť3ڎAeN`BI eӆ%եޑA&7' !O?;)B)e6v-\Z}Wd.˻%ސB _JUa8$RRtΔ/~?xV&M&q*WO0n^KДLYeYR69lO3C-H_ ycqL/{K\A F;_IҌE=ۤV4` 9 q4*54P+W *J5=oF&샍?Ku mWe7wZa9a5n* Xhw'8RE ijaYmrw7@H^zZA{3_fcp?z0؁!\hC\;!k[*m-J lt*#lp9IE,R*ƞySVزIͨPjӁ^=Gu}O~a]ຮSljP-Zni.{n-O2-YmdfC۪K7ͥ[n5qql cݲnYDVwBqkGv]OYgCߺ\ԊzltF"}*ηAU$I4sJm)C'3*gmG0>孚x?q .R_G­f[|ӹ-ƭ9}W`5pY6 /, եc~GX-~kZ~!m=J $_Ye|4PiZcg`~4QjҼkJ歷6>ZE}We. 9T um tr)dejRJʬ1, Z(5pM+a~TNa <5G^:Iw%)ң5ͿL^@ NJ5؟7l贄mG[+:s a:Tgs*+PizGҷA ӡNftzCLsRO A듊h5 YHgK(%l_ͥ0C*5 9z4b[? Gw]k>ኚh 0:$q@C'2_.D0N0NIvR f@ErPKƫf00(c#_x>)J J5tz U dswI$gWҤRQ@*2MHxrKT/gzqIq%jt?n\$Pr-K/X?y^Q1)ܺS{Ɋ=MZr#_pvp⦲ڀvSJʲ_X_8|X;[7G)\]H8AN3K'J/;O⮏[o١2L9+w=ʍǁ"S XSR/0w,+yi0La ػ0e*@uӠ%CQN",=oXs>,Ӟmy~vli+?e}=s}sy~cVkOCI vzdӰY)t_f@48R ]); "@t0#4gd3&Ju$ WXNa:J5-$@$+DPJbDE*(Չ!JOB A@W\3u,8cU!9WMt"@^d IB̂aըo?0BS-6̓ )(⠗2$td Y c`&iLt endstream endobj 13 0 obj << /Type /Page /Parent 3 0 R /Annots [ 17 0 R ] /Contents 14 0 R >> endobj 14 0 obj << /Length 1413 >> stream 0.153 0.153 0.153 rg 0.773 0.773 0.773 RG 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 458.539 521.469 299.445 re f 0.773 0.773 0.773 rg 45.266 458.539 m 566.734 458.539 l 565.984 459.289 l 46.016 459.289 l f 566.734 757.984 m 566.734 458.539 l 565.984 459.289 l 565.984 757.984 l f 45.266 757.984 m 45.266 458.539 l 46.016 459.289 l 46.016 757.984 l f 61.016 474.289 m 550.984 474.289 l 550.984 475.039 l 61.016 475.039 l f q 225.000 0 0 182.250 61.016 566.734 cm /I3 Do Q 0.153 0.153 0.153 rg BT 61.016 548.943 Td /F4 9.0 Tf [(This is because the malware will sync to your browsers profile and will be synced back to your device after it has been )] TJ ET BT 61.016 537.954 Td /F4 9.0 Tf [(removed. If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on )] TJ ET BT 61.016 526.965 Td /F4 9.0 Tf [(the )] TJ ET 0.373 0.169 0.255 rg BT 76.028 526.965 Td /F4 9.0 Tf [(ICT Partner Portal)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 76.028 525.814 m 148.550 525.814 l S 0.153 0.153 0.153 rg BT 148.550 526.965 Td /F4 9.0 Tf [( for a technician to assist with further remediation.)] TJ ET BT 367.438 506.976 Td /F4 9.0 Tf [([ARTICLE BY BRADLEY VAN DER VENTER])] TJ ET 0.400 0.400 0.400 rg BT 61.016 488.487 Td /F2 9.0 Tf [(Posted in:News,Notices,Phishing,Security,Tips,Training | | With 0 comments)] TJ ET endstream endobj 15 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 243 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 1 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceGray /BitsPerComponent 8 /Length 515>> stream xA 0 =fy9뀟\- endstream endobj 16 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 243 /SMask 15 0 R /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 3 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceRGB /BitsPerComponent 8 /Length 31839>> stream xwt]ǙYU72^~D$, l===gwfgfsf{LmwOo-K,+ T(b3$2rjx EْaIwx$n}K}XU!Gbbių]Z*9B|W EKDb21:AQz.0뎩&&sgPB G1N侉pC۫~B]T}DkM=R#WjA-Yl0)j䗿P1낏>θDQ=kβ\Bay!SC]UKH;΍pJr﹗W QѹKsBHQa Mw.BmK1nKA SV$a yXA4}U=sPȶt^44ڗ.g7?d9_7[nWX!0&Kcdة!GR щMe*<BIJ|Md>" Db3jPoT~{FTd!ǂR8޶ݶlJ'Fl ޼־LfSv BB!HSQcPgMܗ˿8! EDAY7Bz .\y3Ô#,_B&*x@[[6OM‹8Ftx$B EAa.w₀MIIJt^;o2 Ҍ:߹~CiMZydX.L !`JC^" 9|aS'lKڃ? 2JcO0^ojGZ&=5S>] !_gRik}Aj"BDSٖ-O# V!hκE3T KN.Z#EAD3|u5i->8ξl9hHbK+cM+>I48־tu|Xz{`qQۢ|]=m6^ iڵ:,K6jsFh]z{M2  mKڱHSb̖<2K%$XVa^bY(eZ[5G.Z|z6GD N5n૪ђbW'xjc=id4U[,u%Dp s\e[h*F}en]R)bSs7Uqw7YhyHh+Ji-\F"\6@\ETEhh?F ùz evMYRZ[k7X!.\iiiQ}܇EbWq%@llV46i[KK{"+(Mv+傡AQQ}g c/a}bY``~^jLJZIJ'm[D*+mZ|smFDFKC.. yFg2|MMvO/9Ml\(z.A53 B_Yxk0\'{L@Q*w[lz\vFO$[XͯcVMĉ:Gs F6N+z.W:v:46CZ" ^:>wۃuGhTqmҲ[,Jg%EKhэĻoW,ͭB}(=o{m\2AbU[Z*#+Z"SC,g[DfǏ} ŬOt=#wS@R<00s\ (.hr3 e9׬BRo/qW NH=P%*쑃Ro!KwOt)R͹~Q,wbNJUz&8fH%Uk cGAz.D}:k'r9֮ffrWOis.e9; 5um CA5ײ@bg' ږ82+ie:h$h<$WƔhqHQ,ð-i{vnBX>iin>x߶l9+V:V2  C#)?ep7`UzTTFn4$ e"(--ƵzA\YQ(0.wyy_hlt-')dHe ^C!צ hXCxful`Rx`̸LEei`@RIv8 XHhT̾ݬcij47;:z+V&k8ζ=(Q}7FG ٷdȫ*hD KVU-NFvyxF_'茖`, +K=@uI; 禭|Mų]B:oJynJm0 .o;#uz*^zAOOڗnmRP`>56& W|N+Ů.RIz2ʉ?1 HѴӅ,X;o[[ZŲ "1 ıX>DGoY [[[ĖV)Zhh[v; iD! B7߰-^v˼56Ƹ+R;>*0!p˲cjd.Ay- 0q=6y-b{{ǝ;r_w}#Ӓ ->D;]ۗ-,%j$uߝw7]g_r7lFK%CR),K呰P?ϽiwLt`lj2%ݕxg.\7N.\ P}F> 3$۬[o'U55ep@OMÊ%T.\lm[iZM}]{sFXS^=K}=q<80;z.Ԓ-G~wW([Ƶ~ OF͔ڌ~<З?~lj X%P6;_Y%j,WWSV<88 cMC/vmKTjhU5cy+ _]CX `Y2)'Z!F WUM-Pq.\I[D 깜<4eC!C0JD7( !McE|n|~h  O|)Nyp"WUi22- ^@K&3:6|ef**z>Fl @Y,R_/4~X #T W"#( 4_UM;N3n7_]%IK&@q u, ) ERIFTۿ;u,I9 Y@g DiZE W`Y6J%Ţ<ЇU X@hR?ZΎ0;\?'l^`Οo_J/9aE,KY,F02T &fY"5#S|7[%l(d[z[S'G~/J4zYig0-*gN8gܿ!Ly .=3a\Po:k?(~ {%7)JxU2X*+?G;]RPSiL)c\+?mtwM1Ri}Ϛ+=Bp( k0gJe J 빜^('_"x=}z&2J)1t?@t=wPY,ˆ"ϵ8_;>gcg2z&D cK !Fd\qd8!D33V|-(Ǿ&&s\0d_B͓f&&s!EUiԳ&&&d̉9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB94l'F;!i{9IJu'!z> w$_g3z6KU. Xd~3}V+F5ulCә!V3{vR [h|}|B>+z*A.tG ;&3ec0rM:rB t\zK"`]W"#QC2{?a F9/sQ,|n/#Df3uʏjZ3gQ,I7<V.s9@ du'!xv,B^)ɗHK Ӟum] 2~5MlOY,SCv[ljSR|QcBuͦO?Ʌ+ gmKmcelTňaP i(~? DK1^i8`YƲ,#~tB IRGZ& !d<>.eJب@h hTK%`(tJjJdKSQa\Vh>?(-w_U2iyhqh%]8%S'$5LZFP6;7^ BX!E utZ..(#FUVbIŠ f,uexH/`HK$DZ @i@xY41 -P1( pJ-*>% zs' iCKʾDzS:6xDQ Y.RTI~&$McE){d**DK%++%ݿ\z1 L BW;Vݝٿ׺hqfn(׵ B=olS##0e?x={ú;rh_s]wķf[.pd]%>x/#G,k_*wp'|ryou&2wJk5+?GYm;ܑCJ4WV]%sCcq\l G; ?oRN鏝6xn5+Rig/]|[jl,5d[+nڊKVdKCc[=Z.sZ*yITO7SI}旎k+Cȯ}?7K/vo>ouOO}@ У₶sZ"=҅ssΝS>yXm CO| {v>sZB)a䗿p|1jB b!x?@yI5[[K)(]U~J ,+шקbI@~ W`̀ 6D}:rd޾T<}q{ACv|8o<@t 1^a`E%!rӖ%TĻo&67;XS;?JuuXUn%-[A ek;oGζݳb ڀR}ֹÏϟK}~❷@QTb-ԒC^yY~''?ܞxWbUQF)ŵZqA2g<4DV9X\kji:QE5=ʟ찵/.^R:=Y?hd7ovznնxJ~?`IkFǚF=ÕU)%'m =[o%nf낅ֶ6>4捏D%XSLXSȰ0oλKSڹC\FW/3UBiRυ}XQ(EL>)Jl]\^lmE?k e֧v~=|r]2jD-Ħ&yh({'pЭmBO|@41Db**BO|Ghht*o/| al8wضiƹ~gj"Q:%7_XFo(Pjbso^mrypt[&&6J܆$ٖsp™3+mK Np~?R;A 3YQ:Az.S"rWF 6 rM9VM@S0r9=@yxà6J`]R6kxLK$EaEGUXW>) ҌmRDi)`\nm ĦٳJdJkXU^|^KVٗd~JXX3wܰqj wY߱jsAli44k8yRvXWB\"ٌ\|=<΢X  yd>uBmEyK)Ҩ M: iiFa\刮cY,X<,wAz]F4CYD.A,] B BbU:%X!B(r!  :@,u1hln Yƺp}rЀPS HY,# d}~.z)ͶUp0_YyEz Pv;"5@@\ v=76<(KK i-ϣDQxHQȰ@㑔8ODŋgccw,vuN'4E& VkmY-z<ݙx7m}I3l\) :gW'xVY(rR.S1_u~M^(Jn[W).ӈ&?@眫^@HVq P]sicH4 1uB"DYbK+SQ,}r-(WW3yqA}J.\ȇD(պpPE[)b>u|eMf.׵yBi[N;\0d[cBy15. 4t3S\8 XgB3g X 9&&_M9@.\dHRљ,^pt<~zIypжxɬ;~U]'uHEP[[ӻvZ .b]vv5K}Ėl[#C'8NŮ.J-M!1՚DM 孭MZJtĹ.d%i.OkߐZ=[o{E'rbXmwB&U:z&|K7cE)>hL6sz۲ضW':B L[o>h?4/V?%$ٷ'5DR6g9ls?\>LY"+{gz.} c-Ւ VS\RC(k}D}:wи iv85Bq_U!4,y?]pp%Q|XG (EK!NjxL,SA<d~D@ CK&NQeҴQ*i8xaYRc1.O/] QCjeLEEy֚Jvir{Mٖ-gOEyyJbѐJ\ѹv4[SВ⹳\(l_;m pX깠g3|e"@sG{u-o=yZd,M#QܮFbsKT-"nJ"``ijRZ"ak_*kDѺgtqBᡟX?we E3?.tA,Wf-݈j\wwCc/$.i/=+^omK .8~jinr2ӿ45W_BI}nTDZ歈e&y[K& Bx<p1l])b>ǚ5Ȱ::fJY XI蹜Q(pMa$XKŌg0J纥Ǫ|l !RsGep<22l_x N^y|ADB0y5)mr?.h tjbƛł%iƒ (R_O˖o‡e!*Ѩ"3'1LhE3{Ķ8WW[.ٝxs}2£(VNΜ-eOЈEF`+^y5Z2!:7\#6;?ub낶̾^a}>6{EXq y9zs0 4)f!,5mг=\nٷ2.WGFKcO^OJz;#7=\6Hr)]QQWzT Wږ.㫪h!C[Q6+UU%69v%+h-3|qDU2{bF{nŹ~iߧe:׮/v3׆@??C5kt-]Ƈ+}}Y/1aq3 ) D&3 Cfh D*uwYZZy 7aC zA4h22x:>el Ů.5Fl]ÈX־4w} ki[hsedxW8yB-\SBmQ6F @ >?y()/\:ĸ\|u-8jcR<эq ȳ 0~!ɨ1 _C,kX\xKfָą+1_gVJt+ ŲXL)UxKK<1u$6rFhz`)x&ABpyF,O1mD ø\q>nm[ٿ/ֶB隿\(|yhrijj!=U|Oe!АWW_:5!?X !*q qi  IxϜ0\F&g&(,46UGkw{!wo7 (%d>y}R<{VFWN(䋝[.ljbJSBm]rcGېRp^*+`PϤ!M+CF.Gt]!S^LYL ݛEy*wpdXTRɲ7yhPv-2z:=t(W^G})BhJŢpz.¤!VU#òL۝ߏhs˭|0<iBsV_p:6j*_sͺbOZg)\< R0^gB-[.޽(hI ݵzBaOU>^ub{9- M6^ (*k'm+hWߞ病/J !8֮|..ܴպpQy-Yi} $B]= A)[OiwbXv(fc:vn sf\0&̫MͬW1!EsQ*-p0lA|U <(eɃbqn WY i{f-eyn}G[5P4P(: /& &W%AT` )jbXQ E]Η%QTx /vb&LHQ& 6L}V&.[^.3Eb3 ռ|G0# PW,G_Zhw>:޾_.>E S47/itvSUmhhDkZKR$)L2tf|J%):}Ξ;Dq^oo: G\WTjj*OjWq\YBH*I$S QVWYG⪢z<9ӽ}nXo[T&٬^_CӚ'L&+D:y5MD!O-T*L0&_fs޲ee~``v ZtT*c^\5 Jɴ(Z J4d|eMSu``0 nA bt4f.7l>O D^AJ%i,TcX,< YxWZk8l8NjD:4]dU;lD*6CQjX"_(lրߋ1%(f٬bF+KLvNU2B0ͻ+<Ǎ( |>6/.¥iz6(*XEiZXIX,^*.O!1Ǔ;v  MT&HZEccq@0h{>afz(!ehfY9]UM<ӝH$*C>pשS]{ 75}@UUɵ׬mkkٳgR8r'Nзw!eO>(⡃>z8ΛꪷoߕNgec?0[ʲslkyPxs{ & qSΟݻcBأi:dK:| NXppɒ;E"Q@@2xӖ͙ln۶t]iܹy3Xu&)zT煞}Z,ϱv(7A+Wϛ8Ƹ{TU[_'6oڰhQjǎ"3Ys[1o~""p\n׶mf29alq8DZ˖.fXzt4GS錦jskKsôBa8fb{k;i[ljj߿4M|oS'N(J6lXG{Eex8R[WT4cY*K/`q,[]DGMV\z}C_z*Lҝw<E /i7pX,~' $IV.s8xPȿrҎ{ljFco}֭Fmܾ}W6]׏?)Z-[nIJ qv~/P}@Twgfef*+7 ۶mq^}O8?ݯV+Gf}WƁ>?s[߶mcw /o=żwz[ɤ_?pl666 ]kmj5@xKZnܸU\fs^'do` \ _0̙K.57׎Nҳ6Y75^y9Nx2*XLG*-t$- 9zvVV::/]jrm7;^R!^ܳO;ECc?rc8c~so~k;o>Ƒё N EvزiSÏ:A/xz{wπd̥69EMMo,//;wlٻg{'_ٷoW|f\.vZ;wn4NE+*J׭vO=e||I3UEE7ޭnX\쮭Ͼ[67nۺ!˽AE96ݦP(Hm6NM&CCoRB!dDL6˪T h(f9" /++p {l788/ L(^~]Q%\n SS`0X,0r9-Qj>EoS %gHi5l6'Je㽽J3 ɅElW+*TJ~%?tw=wes76dFbhp{ ia`x_P_P{{W6UlVTUF>2:hZf9^ύOLT:6aMu޹}Z V1iYzv-FRzѠz] `ЉE֩鹁X4x"Xb1UVt:mQu> P]Ui|ŭ|s0 zREӔJPڊ,%%Fr9C#Wsss LVe2Fw(KE!@P A!$A fqUe'&{䡃{kk*}l>OI[**|g\}X6_a|.KFEQd]]塃Ok*A*<(Z,7|bzjՕeL^Kcy6q6l0]ow%|>)8=F|:дlu4388RWW؃5 [6/[:55ZblܺuCYY1 0Qd2%(dlEZFEcq#L$S4-3 DB@"XGQX(B˃ϧ| $A@Q Mvmz@&C8e2t!IIg8iZI! (m(c(E B?otZ\N/CaxAg2Yrr,S;{.\l:|ijpgl[j(Qr7ۻZZn{橺P(,64}TV%B K KGB j?R*Q鴹9M$B'Lƍ[uuU&?ofj 0PTuAeEVD2Ĕfx7nv {|>/R( PFp?q|UEQ_Y1aC;000l0A{s.gX,166YQ m Fch4*uw;E2g7nv֯.YrbjJViABDS!L3LSsNೳd2k4ꓧΫ)va2#E*Ek*ϞD(AiyK!㝫xׯ+ZRNt `JJ<7ov?qčhpy9<2FQ㜘Z*4(/AKGw"dho着*p:?#AN/w c\./j4P(RlCО `y~\˱TRGoi0x~r!'8~I=@ XpayRB TH7|!{R,T'-Sl+$)m6]$ɜ4øB#Fe'dY"!u%B '"X JH"PBbyEH$G&Y]<)6ֹ LMCO'MMd%L3LwM-. dzfԩd I"J$&B2J&S vR` 0_dW/5 S. gp8N3 N\Ԕy\ }5Lvzh)T2,~L%'c2{Gɽu"rW寸I\vY)D裏}k#Gp<˱d;+Z/,cEYq V\Ok 8jjd^}A.Ud23P^^h+b?;0 p0F!fF.э(;b8òl_M֯S*}}CccA7ج@ 8NOK}ŴM (25=jk*Cc*rqq꿩:"vmu##F~}ch ! 7k4ƏOL_ڪoXըs\ީIa,8&Ɂ3L&LvttPk͛ppPݴqf?08Bt}}^eYvaaQ…&\nͩTv>Uה>J;8jٹl.: uu1Ltd&&FæM ۽ӳZz}cV"da`04<<:*FS*ƺ厚 =&SQ3/\vA7Y,i{n]-|Vϕ@Pt`sl*#I2fslUU,X޾!Z%eNMOKJp` M]Ǖ篷ڽ{^EW} nig=ժ7ǧ z.!duTA&ąVhuucS2tbmDgޙH2A6oYesbjn~` =;dM&#'?}}hx,O㉺d-aI*"@<8Nh,q}q1|<`,%:H{Ѩ(UJAFb /1;VeJ)z-9yj6g^Z 0MzۊS33e>b0 w+rGiF0E y2ZXb8,E+xg'LO{D"9=3D9AL6t:f.-ؾ Bh*mW00099EEP_[WW p\RCDQb1:EzFyN$S闿l[ۭ6_ÑXK ;/]jY0 Ģd2e1m6ˁ{45sE  TfliLClUSA"GF'ZM%VQ1fdxXXyy|6+[& | . "Fd2ByР׹EѨs9w>ܿoW}}͹sW(Jn]- v:ΟcBA.W5CC#y]QPȟ{n"Qׯ{~Mi4Gl慅E͢RP=uB)g KǵZM[[| :3g/ @hlO3 DP ʱ>ը-V֭.\h*)qc&ێ yĉk"+a4T*,c;;`2N+**NZ˲sxT*Lf#ŰBNx-,#-nkHē A 9^ ¡PDC4"L`AD a% Rt(mA0hd2 ˲z XLu:f1eZ=7 !ID{[_W5Z ï~|uE~Y,^{63fܹhlㆆu,BDV}ʭ_89PU ->'!y$ >y.ѴZa2h$n6:]A/ kGD'Xc$B %$Ik$B 5F#PBbD(!H"Xc$JH1%$Ik$B 5F#PBbyU14xOX rޘWE6P(_V8|>S!% A0 3LēF6 ]~RZ-ⲓ_%$3o-RjHDZ%!"uGIdMEzJH1%$;HGJH|mD(!HчQAO!jRQT*M8[H|Ez>: s;S3LfphzL>ϭ2eϝ:66T+C? pM6L&h2oy/;Ti-gj{CC(KNΜ;T*B{6_m]HJd WRh+NqR%JіU;FˀMD|14 m6DH$^~"gN8 ]xpLww?c`E={V'N zrrZ8hsMZ955xCCԌ\A~7tX,NӲwz!?CȕhZx~M֯~wEd88P*<'I |ejw3G7oj(yM&ի48EPd۶nD?T 󅞪 4-i8Ah-FiQrujʟg9V]U3 EJs_ATTT\|ɓ4M?S$((]XAx5ռ.Z&̥L&+FrSl6P*1 MM$>CK(K:ɱ,PGA2iP0LV4  ,Q@.:-(8巔<,L&Kilm 0!" q4MpԊ=E$!DDFQ8Pj j@V*C*Nb,!xȾýC< &V>wjYYqssUUK;/wf I @P)p6:u2nnn3.53L@j:;{nu]򒖖(*L6[[S100LQT.yA藊5mVbK i2'&fJK*RAl!q$I'HCa\edFMN;ٽg +f?{UVUv77]o޻EQB;TJDF jWe2_Wג$+*U A:n=7:gj*,M[[MFpPYU 0DQduuU@D!d$ar9o_͛̽wf ڂ`8FI0 A$0 Q$ըyRbeh,(&@!@ON8ϗ+?384\׽u1" $E DQ\:#$IHx4YM v9.ǽHw_v+gc:/xP/ kzA<ޱ}ӎV?񳇞~Ӆ$?<ϯfEcS. V1q2l.^HVm+8Ѩ/*(XQE*rNej5(@kviW*dj5oPv5u0@Q;6Q jE6+(ڬv;rY"(+jՅ71vLѨE6 UJF:YbJRZmMbpNU*սB-L & ,ˊfdm% aA>%)wr>ԟwYDp @qeEN'&&lLxaYvqqnc_#z6}聙v1?ZjӒz`Aό!yQ<H*($J|H"Xc$JH1;C -$z$$6HO‡@zJշIeL&#YHH"\(4J:#_'(Z,m"E%ϰ\fkO,V GBbD(!H"Xc$JH1%$Ik$B 5F#PBbD(!H"Xc$JH1%$ɋ Cl6d:#k"aY6N?^`84@I_< MMMƏw A8+//x<+ ! #9LʵcEX,{uim۞A@jvDE!T*&i3Xy^P,iH4O^:lv'$!D#PBbD(!H"Xc$JH1#B<yC T:fKf(_ip烩4 \4 *_ V9 C|`S)B*NZ$G*#"p8_R)'jk+{XSSanKC ~\((/%5A~B"7i_tF'aZ=}EQ!7?+$J ݎB%Zn(s$E swx 嶭:Ξgbwau2kӎIkLe2 O_:v||(mY6?22CQqA7\.J1 uڲ1,E^bfs*baa10nq"GGSlE=)<v ·F՗_HS#pTUh64n7޵m Uex6M>_1aҩta ?9EmQUt #,61? vuaVUUfl6b<%p4]U]Vd ?565Iyrqlǎ-JH+:.\l*++Y\ ~絧̥?@s!GAـB78:08h.{CɨT|,56Ŧ@0K[pO;o>xp1Zi_zХ(]W[/_fSԟ~7o F\.C8yNJ)jv⟙;yܫ GBWwWxE w?JWob? _l<,Ik0Ó7o[l.ѱKKkSS3?--ml.k/|^^ L\._^qV*ͼ z'?}.㣏NۋmƆD2UU]W166}C55_gv۹sϜicCQ14z]iihmk8q\IgphzѨ߾}6onid2R_꭛׭NH8W'bFۭݻj>yjAPYz8[Yy!h$w4-;|ȱcۯP.xp199; B`n_ ~"{u*N;;7ޑ[zJd2R)7 $I:muu\.:p8r%%Ag1&&gk z]xv讝[k4C֛4gH$v *s8lX[[8ᱺ*F !dԌa+)PUTdZ--T zڪ?ot'{wtIrB~j333Gqy$7oDR)u%~a3CCCssskNJ DS(BSN}]L&aj&0AD wBhrJd2px5 Q!dZ^DEʯgitTBbD(!H"Xc$JH1wDWxY5L Arr%!wgE'm7c >O !!x`8 endstream endobj 17 0 obj << /Type /Annot /Subtype /Link /A 18 0 R /Border [0 0 0] /H /I /Rect [ 76.0277 526.1326 148.5497 535.2901 ] >> endobj 18 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za/jira/plugins/servlet/theme/portal/6) >> endobj xref 0 19 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000361 00000 n 0000000398 00000 n 0000000536 00000 n 0000000599 00000 n 0000003957 00000 n 0000004069 00000 n 0000004184 00000 n 0000004304 00000 n 0000004412 00000 n 0000009839 00000 n 0000009923 00000 n 0000011389 00000 n 0000012149 00000 n 0000044248 00000 n 0000044375 00000 n trailer << /Size 19 /Root 1 0 R /Info 5 0 R >> startxref 44492 %%EOF Training « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Training

Public folders vs resource mailboxes

Friday, October 24th, 2014

If you have been using public folders up till now to organise meetings and events in your department, there may be an easier, more practical option available to you.

By sending an email to help@sun.ac.za you can request that the public folders you are using now be converted to resource mailboxes or to request the creation of new resource mailboxes.

But why should you use resource mailboxes instead of public folders?

  • If you send a meeting request to a resource mailbox, that resource mailbox will Accept or Decline the meeting request.
  • It happens automatically without any intervention of a human being
  • You do not have to worry about double bookings for the same date and time at the same venue.
  • You’re meeting request to a resource mailbox cannot be changed or deleted.
  • Only the owner of the resource mailbox can change  or delete meeting requests.

What are public folders?

A public folder is a feature of Microsoft Exchange Server that provides an effective way to collect, organize, and share information with others in an organization. Typically, public folders are used by project teams or user groups to share information on a common area of interest. When you are connected to your Exchange server, folders labelled “Public Folders” appear in the Microsoft Outlook Folder List in the Navigation Pane. You can manage these folders from Outlook. Public folders can contain any type of Outlook folder item such as messages, appointments, contacts, tasks, journal entries, notes, forms, files, and postings. You can also add a shortcut to any public folder to the Favorites folder under Public Folders. (http://office.microsoft.com)

Up till now this is what public folders in Outlook looked like:

1
2
What is a resource mailbox?

A resource mailbox is a mailbox that represents conference rooms and company equipment. Resource mailboxes can be included as resources in meeting requests, providing a simple and efficient way to manage the scheduling of resources for your organization.

Room mailboxes are assigned to a meeting location such as a conference room, auditorium, or training room. Equipment mailboxes are assigned to a resource that is not location specific, such as a portable computer projector, microphone, or company car. (http://blogs.technet.com)

This is what the new resource mailboxes look like: 

3
How do I add a resource mailbox in MS Outlook 2010?

Send an email to help@sun.ac.za and request that the public folders be converted to resource mailboxes. When you get confirmation that it has been done, follow the next steps:

Create a new meeting request

Select All Rooms in the Address Book

4
Scroll down to the Room you want to add as a resource mailbox
5
VERY IMPORTANT: Please Take note of the Alias (see the 7th step further down)
6
Click on File, Info, Account Settings
7
Select your email address and click on Change
8
Click on More Settings
9
Type the name of the resource mailbox that you want to add – remember that Alias of earlier – it is the name you have to type here
10
Click Apply, OK, Next Finish
11
Go back to the Home button and click on Folder List
12
The added Resource Mailbox will display
13
Click on Calendar to view the calendar of the resource mailbox.

SUNid flash sessions

Friday, October 10th, 2014

Since the implementation of SUNid (Read more on SUNid here) a few months back, it’s already being used for the registration and administration of external workers and visitors by quite a few SU staff. But, as with any new system, there’s always a learning curve to adapt to and that’s why training is of utmost importance.

Hence, IT will be presenting short flash sessions of 30 minutes each for the next few months. During this 30 minutes the basics of SUNid will be demonstrated in a practical manner, after which another 30 minutes will be made available for any questions.

These sessions are a necessity if you are a SUNid user and will, in future, be compulsory for all staff requesting to be registered on the system.

The dates for training are scheduled during October and November on the Stellenbosch campus on the following days from 10h30-11h30:

16 October
22 October
28 October
6 November
13 November
20 November
27 November

Staff can register online via the SUN-e-HR option on the my.sun.ac.za. More information on training is available on the IT wiki.

IT can also facilitate one-on-one sessions with the “approvers” at departments or present information sessions at departmental meetings. To arrange this, please send us an e-mail at help@sun.ac.za .

Using a tablet for smarter learning (part 1)

Friday, August 22nd, 2014

Since tablets became mainstream in 2010, more and more students have started relying on these nifty gadgets to take their learning experience to the next level.

However, many students still are unaware or unconvinced of the advantages of tablet-based learning. In the following section, we’ll look at why exactly a tablet is a fantastic investment.

Why a tablet?

In short, there are four reasons:

1. The most obvious advantage of a tablet is the level of mobility it offers. As a student, you’ll most probably carry around at least a notepad, your prescribed books and your class notes. And, for many, a calculator, dictionary and diary/calendar are also indispensable. Carrying these items around all day long can quickly become a back-breaking burden – which is why most students simply leave their heavy books at home.

With a tablet, though, you can have all of these resources compacted into the size of an A5 notepad. No more forgetting books or notes at home – everything you need is but a few finger taps away. This is a killer feature in itself.

2. However, the true academic value of a tablet becomes evident when one looks at its potential as an in-class companion. Not only does a tablet keep everything you need at hand, it also allows you to manipulate these resources in useful ways. For example, you can add bookmarks, highlights and notes to your prescribed books and class notes while the lecturer is discussing them. You can also efficiently create rich notes of your own.

You’ll be able to combine typing and drawing on the screen to capture, for example, key points in a class discussion or diagrams and charts drawn by the lecturer. You’ll be able to neatly organise these notes in subject folders for future reference.

The biggest killer feature of a tablet in class, however, is the fact that it allows you to record what is said in class so that you can listen to these recordings while preparing for an exam. While it’s not practical to record every second of every class (because –let’s be honest –you’ll never listen to all of that again), this feature is extremely handy to record important bits of a lecturer’s explanation or a class discussion.

Lastly, a tablet also gives you quick access to handy reference material. Need to quickly look up a word’s definition or do a calculation? A tablet lets you do both at lightning speed, which means that you won’t lose track of the train of thought in class.

3. Tablets don’t only shine inside the classroom. Any student who’s had to scour stacks and stacks of paper notes to review specific content before an exam will testify to how frustrating, tedious and time-wasting this can be.

Having all of your own notes –and the slideshows or hand-outs provided by the lecturer –neatly organised on a single device, where it’s accessible with a few taps of the finger, eliminates the hassles of paper-based exam preparation and gives you more time to actually study.

4. An often-missed advantage of tablet-based learning is the fact that e-book versions of prescribed books and textbooks are usually cheaper than their print counterparts. While many books are not yet available in digital format, the savings on those that are can quickly compound to a substantial amount.

And, of course, using an e-book offers all of the advantages of digital learning, including such timesavers as being able to search for words and phrases, jump to specific pages and chapters, add multi-coloured highlights and make digital annotations.

Next time : Buying a tablet: The choices

[ARTICLE BY JOHANNES JONKER]

E-mail etiquette: do’s and don’ts

Friday, May 9th, 2014

If there’s one area the queen of etiquette Emsie Schoeman hasn’t commented on, it’s e-mail. But don’t think that gives you any reason to escape certain guidelines just because the electronic world seems to operate on a more informal level. Even with e-mail you can land into trouble if you don’t behave properly.

You’re probably wondering why e-mail etiquette even exists, in particular within the company milieu. There are three (very important) reasons, namely professionalism, efficiency and also protection against liability.

We consulted the internet and here are a few hints for meticulous e-mail users.

1. Be concise and to the point
Long e-mails are unnecessary and difficult to read. Avoid long sentences. Sentences should contain no more than 15 to 20 words.

2. Answer all questions and anticipate further questions
This will prevent a series of follow-up e-mails to get all the information and you won’t waste your and someone else’s time.

3. Spelling and language
Bad spelling and language create a bad impression and e-mail without capital letters or punctuation marks take effort to read.

4. Layout
Reading text on a screen is harder than written text and this makes layout in e-mails even more important. Use short paragraphs and adequate space between paragraphs.

5. Use a significant subject in the Subject line
Put the appropriate subject in the Subject line in order for the receiver to immediately know what the e-mail is about. It saves time, explaining and creates context.

6. Reply promptly
Immediately replying to an e-mail is generally expected. Don’t leave correspondence unanswered in your inbox for days when you could have answered it in a minute. Standard reply time for an e-mail is 24 hours, preferably the same working day. If you don’t have an immediate answer, just confirm you received the e-mail and will reply as soon as possible.

7. No large attachments
Don’t send unnecessary large attachments with your e-mails. Some mail servers can’t handle large e-mails.

8. Capital letters
Don’t use only capital letters. This implies that you are shouting at the recipient and can be interpreted as rude.

9. Re-read before you send
Don’t send an e-mail in haste. Other than potential spelling mistakes, it’s important to make sure if you message is clear and understandable. Remember that the recipient can easily misinterpret something when you’re not speaking face-to-face.

10. Don’t answer spam
Even if a spam e-mail claims you should reply to stop from receiving them, don’t reply. By replying to a spam e-mail, you are confirming your e-mail is active and more spam will be generated. Rather just delete the mail.

11. Don’t request delivery and read receipts
You will only irritate the receiver even before he’s read your message. Rather ask the person directly if necessary.

12. Don’t request messages to be recalled
The message has probably already been read and by recalling it, you’ll appear unprofessional. Send an e-mail explaining afterwards instead of recalling it.

13. Don’t forward chain mails or virus hoaxes
Microsoft will not send you money if you send it to 20 people – and neither will any other company. Most chain mails warning against viruses are also hoaxes. Ignore and delete them.

14. Avoid the high priority option
If you use this option to often, it will lose its efficiency. Your correspondence may also come across as pushy and aggressive. The same goes for terms like “URGENT” and “IMPORTANT”.

15. Be careful with emoticons and abbreviations
Try not to use abbreviations such as LOL and BTW. Emoticons like the smiley :) are also not appropriate in business e-mails.

SOURCE: http://www.emailreplies.com en http://www.businessemailetiquette.com

 

School for Public Leadership takes a leap into the future with IT

Friday, April 11th, 2014

The School for Public Leadership’s mixed learning project made a leap into the future at the end of February and at the same time highlighted the important role Information Technology plays in modern education and learning.

During the new honours students’ first contact session of the year for their course, they were surprised with notebook laptops, arranged by Joe Smit, Helmi Dreijer (IT) and Ilse de Kock (NARGA). Since this group of students is largely dependent on interactive telematic education and therefore needs to have access to a computer and internet wherever they are, a prepaid data package was also negotiated for them with Cell C.

In collaboration with Teaching and Learning Enrichment Johann Kistner and Marinda van Rooyen (IT) saw to it that SUNLearn was made available to students to ensure they have access to the University’s e-learning platforms.

Furthermore an e-book platform, Vitalsource was utilised with which students can sync their prescribed textbooks to notebook computers and mobile devices. Students’ highlighted text and notes will also be synchronised between devices. Ralph Pina (IT) and Le Roux Franken (IT Bellvillepark campus) managed this initiative with the assistance of Van Schaik. Le Roux was also responsible for technical logistics.

Read more on the SPL-project and the School for Public Leadership.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.