Categories
Pages
-

IT Center Blog

Kategorie: ‘Support, Services & Updates’

Spoofing: An Underestimated Threat

March 18th, 2024 | by
Businessman with megaphone that says "Lie"

Source: Freepik

In the world of IT security, there are a variety of threats that can affect companies and individuals alike. One of these threats that is often underestimated is spoofing. Spoofing is a technique where the attacker attempts to disguise their true identity in order to gain access to sensitive information. In doing so, they attempt to cause damage or pretend to be a trustworthy source. In this blog post, we will take a closer look at the technique of spoofing, show the different forms it can take and explain how companies and individuals can protect themselves against spoofing attacks.

Read the rest of this entry »

RWTH Software Shop for Students

March 15th, 2024 | by
Vector standing next to phone illustration with cart icon

Source: Freepik

asknet Solutions AG, the current operator of the RWTH Software Shop, is currently undergoing self-administered insolvency proceedings. For this reason, RWTH Aachen University will terminate the current contract prematurely and offer an interim solution. This change will also affect the product range for students, which is why we have summarised the most important changes for you below.

Read the rest of this entry »

Email Security – How to Configure Forwarding Correctly

March 13th, 2024 | by
Hand-drawn text messages between two cell phones on the board

Source: Freepik

In this article in our mail security series, we will show you how to configure the forwarding of incoming mails. In our previous articles, we have informed you about the problems involved in sending mails, possible security vulnerabilities and security mechanisms that have already been implemented and explained why redirects are bad. This article is about setting up forwarding in the RWTH Mail App, also known as “OWA” (Outlook Web App).

Read the rest of this entry »

Video Tutorials on Multifactor-Authentication and the Token Manager

March 8th, 2024 | by
Illustration Laptop with Video and film roll

Source: Freepik

On February 1, 2024, the RWTH Aachen University introduced multifactor-authentication (MFA) for the VPN service. This will significantly improve the protection of the IT services you use.

You can learn how to use MFA for VPN and how to set up your second authentication factor in the Token Manager in the first videos in our video series on multifactor-authentication, which we are presenting to you today.

Read the rest of this entry »

Time to say goodbye, RWTH-Tenant!

March 6th, 2024 | by
Finger presses the power button on a laptop

Source: Pixabay

Some time ago, we already started cleaning up the Microsoft accounts in the old RWTH-Tenant. First, it was the turn of the students of RWTH Aachen University.

Now we will continue with the Microsoft accounts of the employees, so that at the end of the clean-up campaign we can duly say goodbye to the RWTH-Tenant.

In today’s article, we’ll explain what the clean-up campaign is all about, what you should look out for, and where you need to take action yourself.

 

Read the rest of this entry »

RWTHmoodle: Help, My Study Rooms Have Suddenly Disappeared!

March 4th, 2024 | by
Vector sitting next to big manual illustration

Source: Freepik

We often receive enquiries from students at the beginning of the semester because their current study rooms no longer appear in RWTHmoodle despite successful registration. There are two reasons for this, which we would now like to explain to you in more detail.

 

Read the rest of this entry »

Change at the RWTH Aachen Software Shop

February 23rd, 2024 | by
Shopping cart on screen

Source: Freepik

To simplify the procurement processes in the area of software, the IT Center has been operating the RWTH Software Shop in cooperation with asknet Solutions AG for years.

asknet Solutions AG is currently in self-administered insolvency proceedings. RWTH has therefore decided to terminate the current contract in the first quarter of 2024, on March 25, 2024.

In this context, an alternative provider for a new software store is required. This needs a thorough specification of the desired functions and requirements with a corresponding invitation to tender in order to ensure sustainable operation. Due to the short-term nature of the events, the IT Center will offer an interim solution with the most important functionalities for the transition period during the procurement of a new system.

On March 26, 2024, the interim solution AcadCloud from SoftwareOne will be launched with limited functions. Read below to find out exactly what this means.

Read the rest of this entry »

Reason to Celebrate – The DKZ.2R Has Started

February 21st, 2024 | by
Logo of the Rhine-Ruhr Center for Scientific Data Literacy (DKZ.2R)

Source: Forschungszentrum Jülich

We are celebrating the launch of the Rhine-Ruhr Center for Scientific Data Literacy (DKZ.2R)! The overarching goal of the Rhine-Ruhr Data Competence Center is to offer researchers a space to support their projects and build methodological expertise in data science, high performance computing (HPC), research data management (RDM) and machine learning.

Read the rest of this entry »

IPv6 beta operation license server for software at RWTH Aachen

February 16th, 2024 | by
IPv6

Source: Freepik

The Internet, which provides us with information, entertainment and communication options on a daily basis, is based on a complex system of protocols and addressing. IP addresses play a crucial role in the architecture of the Internet. Internet Protocol version 4 (IPv4) was originally developed for this purpose and has successfully managed data traffic on the Internet for many years. However, with the constantly growing number of IP addresses required, IPv4 reached its limits. To meet these challenges and support the future development of the Internet, Internet Protocol Version 6 (IPv6) was introduced. As a renowned university, RWTH Aachen University strives to keep pace with this development. For this reason, we are planning to commission the license servers for software via IPv6.*

 

Read the rest of this entry »

Romance Without Risk: IT Security

February 14th, 2024 | by
Two vectors hugging

Source: Freepik

Valentine’s Day, a time of love and affection, brings with it not only romantic gestures but also potential online threats. In a world where digital connections are just as important as personal relationships; it is crucial to protect your own data.

In this article, you can find out how to order flowers online, buy Valentine’s Day gifts and use online dating platforms while staying digitally safe. Take care, friends!

Read the rest of this entry »