Kategorie: ‘IT-Security’
Protecting the HPC account with MFA

Protection of the HPC account
Source: Freepik
At least a little less than a dozen of Europe’s supercomputers were taken offline simultaneously in May 2020. Several university centres in Europe have been attacked by hackers and had to go offline. The unknown perpetrators hacked the accounts of the users in order to gain access to the supercomputers. Fortunately, our high-performance computer was not affected, but JURECA, JUWELS and JUDAC at the Jülich Supercomputing Centre, Hawk at the Stuttgart High Performance Computing Centre and the supercomputers at the Leibzig Computing Centre (LRZ), for example, fell victim to the attack.
5 Tips on How to Keep Your Mobile Devices Safe
They keep us connected at all times and in all places. They accompany us everywhere, wake us up, remind us of important appointments and provide us with entertainment. We are, of course, referring to smartphones. What was originally intended as a means of communication is now a calendar, camera, photo album, pocket watch, navigation device, pedometer and game console all in one. Even as most-used devices for Internet access, mobile devices have long since surpassed desktop computers. Smartphones are the very top of the list.
Mobile devices are practical everyday helpers, but they also hold a large amount of personal data, such as bank and credit card information. It is not uncommon for these end devices to even be used for two-factor authentication for bank transactions and other services. This makes them a popular target for hackers. With a few tips, you can effectively protect your mobile devices and the data stored on them. Read the rest of this entry »
New Year’s IT Resolutions

Source: Freepik
We all know it: At the end of each year, many people think about things they want to change or improve in the coming year. Some people want to finally take the plunge into the gym, others are determined to learn a new language, and others are planning to eat healthier. But what about resolutions in the IT sector? You haven’t dealt with that yet? No problem! The following suggestions will help you out a little bit.
Automated SSL certificates for hosted websites

Source: Freepik
Finally, the time has come. Since December 06, 2022 hosted websites are automatically converted to “https” and provided with corresponding SSL certificates. The best thing about it? You don’t have to worry about anything anymore. Read the rest of this entry »
Computer Security Day: 5 Simple Tips to Improve IT Security
For most people, life without the Internet has long been unimaginable. Whether at home, at work or anywhere along the way – information technology is simply everywhere. However, its ubiquity also raises the question of its security. A question that experts already asked themselves back when the Internet had only just begun to develop. Since 1988, November 30 has been dedicated to IT security in many countries. The aim of this event is to raise general awareness of IT security and to educate users on the subject. To mark the occasion, we have compiled five very simple tips for more IT security in everyday life.
TSM Backup “Read Only”

Source: Own illustration
Attention!
As part of the backup transition 2022, a new platform for data backup and recovery has been built at RWTH Aachen University in the last months. Together with the manufacturers Hitachi Vantara and Commvault, the backup team of the IT Center has set up a new backup infrastructure, which in the future will not only provide the RWTH, but also other universities in NRW with the Datensicherung.nrw service.
In this context, we are gradually saying goodbye to the previous backup solution, the “TSM backup”.
The Story of the Bug

Source: Unsplash
The download does not work? Probably a bug.
The lights of the WLAN router flash wildly in all possible colors? Could be a bug.
The software only throws error messages? A bug, for sure.
The term “bug” has long since crept into everyday life. Most people know it from working with electronic devices.
RegApp – Start of the pilot phase on the cluster
Email Security – Why Are Redirections Bad?

Source: Freepik
The third part of our series of articles on e-mail security deals with the identification protocol DKIM and the standard method for e-mail authentication DMARC.
In our first article and second article on the topic of e-mail security, we informed you about the origins of e-mail and the current statistics in mail traffic at RWTH. In addition, we explained what the SMTP protocol is and what problems it can cause.
The IT Center’s IT Security Measures

Source: Freepik
With technological progress and the increasing digitization of processes, the topic of IT security is gaining more and more importance. The risks associated with digitalization affect us all. Improper behavior and naivety in dealing with information technology can have serious, costly consequences. That is why the security awareness of users in particular should be actively encouraged. IT security also plays a major role at the IT Center. In this blog, for example, we repeatedly draw your attention to security risks and explain how you can be more aware when using information technology. In this post, we would like to give you an overview of the IT security measures that have been implemented at the IT Center, for both yours and our protection. Read the rest of this entry »





