Spoofing: An Underestimated Threat
In the world of IT security, there are a variety of threats that can affect companies and individuals alike. One of these threats that is often underestimated is spoofing. Spoofing is a technique where the attacker attempts to disguise their true identity in order to gain access to sensitive information. In doing so, they attempt to cause damage or pretend to be a trustworthy source. In this blog post, we will take a closer look at the technique of spoofing, show the different forms it can take and explain how companies and individuals can protect themselves against spoofing attacks.
RWTH Software Shop for Students
asknet Solutions AG, the current operator of the RWTH Software Shop, is currently undergoing self-administered insolvency proceedings. For this reason, RWTH Aachen University will terminate the current contract prematurely and offer an interim solution. This change will also affect the product range for students, which is why we have summarised the most important changes for you below.
Mail Security – How to Configure Forwarding Correctly
In this article in our mail security series, we will show you how to configure the forwarding of incoming mails. In our previous articles, we have informed you about the problems involved in sending mails, possible security vulnerabilities and security mechanisms that have already been implemented and explained why redirects are bad. This article is about setting up forwarding in the RWTH Mail App, also known as “OWA” (Outlook Web App).
Review: VI-HPS Porting & Tuning Workshop 2024
What happened to the well-known aiXcelerate event this year? Well, who noticed?
The VI-HPS Porting & Tuning Workshop 2024 took place at the end of February! This workshop compensated for the aiXcelerate 2023, which did not take place.
That’s why we’re reporting on this year’s VI-HPS Porting & Tuning Workshop in the following blog post.
Video Tutorials on Multifactor-Authentication and the Token Manager
On February 1, 2024, the RWTH Aachen University introduced multifactor-authentication (MFA) for the VPN service. This will significantly improve the protection of the IT services you use.
You can learn how to use MFA for VPN and how to set up your second authentication factor in the Token Manager in the first videos in our video series on multifactor-authentication, which we are presenting to you today.
Time to say goodbye, RWTH-Tenant!
Some time ago, we already started cleaning up the Microsoft accounts in the old RWTH-Tenant. First, it was the turn of the students of RWTH Aachen University.
Now we will continue with the Microsoft accounts of the employees, so that at the end of the clean-up campaign we can duly say goodbye to the RWTH-Tenant.
In today’s article, we’ll explain what the clean-up campaign is all about, what you should look out for, and where you need to take action yourself.
RWTHmoodle: Help, My Study Rooms Have Suddenly Disappeared!
We often receive enquiries from students at the beginning of the semester because their current study rooms no longer appear in RWTHmoodle despite successful registration. There are two reasons for this, which we would now like to explain to you in more detail.
Review of the SWT Fair 2024
On February 16, 2024, the IT Center opened its doors again for the Software Technology Fair, which is the highlight of the Software Technology module for the dual students of the Applied Mathematics and Computer Science degree program. The prospective mathematical-technical software developers (MATSE) had the opportunity to proudly present their practical projects.
My Apprenticeship at the IT Center
My name is Daniel Malenkovic and I completed my training as a dialog marketing specialist at the IT Center at RWTH Aachen University. In this blog post, I talk about the training, my tasks and the highlights I was able to experience here – and hopefully I can motivate some of you to also consider such training.
Tell-a-Fairy-Tale Day 2024
Welcome to the fascinating world of IT fairy tales! Today, on the occasion of “Tell a Fairy Tale Day”, we dive into the rich tradition of storytelling and discover how fairy tales not only inspire our imagination, but also play a role in the IT world. The “Tell a Fairy Tale Day” was created to celebrate the art of storytelling and promote the joy of storytelling and listening.
But why is this day also important for IT?