Kategorie: ‘IT-Managers’
New Function in the Telephone-Administration
Until now, telephone numbers and telephones were managed and controlled centrally.
With a new function in the TK-Portal, administrators can now manage telephones for their facilities independently.
To be able to use this, you need the “Verwaltung Telefonie” role, which can be issued to you by the relevant role manager.
You can find out exactly what the new function means below.
Help Us to Improve Coscine!
Coscine has now been in regular operation at RWTH Aachen University for a year. On the occasion of this event, we are counting on your opinion. If you actively use Coscine, the platform for research data management, you now have the opportunity to share your experiences and give us valuable feedback from April 22 to May 6, 2024. Together, we can continue to improve Coscine and adapt the support offering accordingly.
Meet Us – The Editorial Team
Hey! 🙂
Or “Moin!” as our colleague Merrit from the north would say – we are the editorial team of the IT Center and would like to introduce ourselves to you with this article. Every day we work to provide you with information about our services, IT security updates and news from the IT Center cosmos.
World Backup Day: Security Through Data Backup
March 31st is World Backup Day – a day to remind us how important it is to protect our digital data. In an increasingly connected world where our personal and business data is stored digitally, backing up this data is crucial to protect it from loss or cyber threats.
Webhosting: Registration, Security & Administration
What does webhosting mean?
Webhosting refers to the provision of storage space (webspace) for the provision of websites. The people who create the website fill this webspace with different content, including images, videos, files, and fonts. Websites are similar to text documents that can be made available and accessed on the Internet. The content of the websites must be saved so that we can access them from anywhere at any time. However, this storage does not take place on a local computer, but on a high-performance server that is connected to the Internet around the clock. In this way, the created website remains continuously available online and the content can be accessed by users worldwide. RWTH Aachen University and FH Aachen University of Applied Sciences cooperate to provide webspace to institutes and student associations as webhosting providers.
Spoofing: An Underestimated Threat
In the world of IT security, there are a variety of threats that can affect companies and individuals alike. One of these threats that is often underestimated is spoofing. Spoofing is a technique where the attacker attempts to disguise their true identity in order to gain access to sensitive information. In doing so, they attempt to cause damage or pretend to be a trustworthy source. In this blog post, we will take a closer look at the technique of spoofing, show the different forms it can take and explain how companies and individuals can protect themselves against spoofing attacks.
Mail Security – How to Configure Forwarding Correctly
In this article in our mail security series, we will show you how to configure the forwarding of incoming mails. In our previous articles, we have informed you about the problems involved in sending mails, possible security vulnerabilities and security mechanisms that have already been implemented and explained why redirects are bad. This article is about setting up forwarding in the RWTH Mail App, also known as “OWA” (Outlook Web App).
Video Tutorials on Multifactor-Authentication and the Token Manager
On February 1, 2024, the RWTH Aachen University introduced multifactor-authentication (MFA) for the VPN service. This will significantly improve the protection of the IT services you use.
You can learn how to use MFA for VPN and how to set up your second authentication factor in the Token Manager in the first videos in our video series on multifactor-authentication, which we are presenting to you today.
Time to say goodbye, RWTH-Tenant!
Some time ago, we already started cleaning up the Microsoft accounts in the old RWTH-Tenant. First, it was the turn of the students of RWTH Aachen University.
Now we will continue with the Microsoft accounts of the employees, so that at the end of the clean-up campaign we can duly say goodbye to the RWTH-Tenant.
In today’s article, we’ll explain what the clean-up campaign is all about, what you should look out for, and where you need to take action yourself.
RWTHmoodle: Help, My Study Rooms Have Suddenly Disappeared!
We often receive enquiries from students at the beginning of the semester because their current study rooms no longer appear in RWTHmoodle despite successful registration. There are two reasons for this, which we would now like to explain to you in more detail.