Kategorie: ‘General’
Welcome to the Summer Semester 2024!
![Clock and apple on school books](https://blog.rwth-aachen.de/itc/files/2024/04/clock-books-with-defocused-background-1-300x200.jpg)
Source: Freepik
The nights are getting shorter and the days are getting long again – time for a new semester to start!
With this in mind, we would like to welcome you and wish you a successful summer semester 2024!
Studying has become much more digital in recent years. This means that people are not only learning from books but also a lot on their laptops, tablets and smartphones. Are you already connected?
#RWTHWelcomeWeek for the Summer Semester 2024 – On Site for You!
RWTH Aachen University once again welcomed new students for the summer semester 2024 with the traditional Welcome Week! This series of events is an excellent opportunity, especially for international students, to get to know the services and processes at RWTH Aachen University.
The IT Center was also there again on April 3, 2024 and was live on site at the Freshers’ Fair as part of the Welcome Week to answer your questions. In the following blog post, we report on the successful exchanges with the students.
RWTHonline: How to register for LV and PV
![Top view of school supplies range](https://blog.rwth-aachen.de/itc/files/2024/04/draufsicht-schulbedarfssortiment-1-300x200.jpg)
Source: Freepik
Especially at the beginning of your studies, everything is new and confusing. How do I register for my courses? And what does “Requirements met ” mean? Why can’t I see my study room yet, even though I have registered for the course?
Good preparation for the coming semester includes registering promptly for the courses (LV) and, later in the semester, for the examinations (PV). You can register in RWTHonline via the “Study Overview (Curriculum Support)” application.
World Backup Day: Security Through Data Backup
![Person holding laptop with cloud icons in background](https://blog.rwth-aachen.de/itc/files/2024/02/Bild1-300x200.png)
Source: Freepik
March 31st is World Backup Day – a day to remind us how important it is to protect our digital data. In an increasingly connected world where our personal and business data is stored digitally, backing up this data is crucial to protect it from loss or cyber threats.
Five Years of RWTHmoodle
With the go live of RWTHmoodle on March 5, 2019, a milestone was reached in the digitization strategy for teaching. This strategy provides for the development and implementation of digitalization concepts for excellent teaching. Among other things, the required system should be able to adapt to constantly changing requirements.
In the following blog post, you can read how the Moodle instance came to RWTH and what we have already experienced with it.
Webhosting: Registration, Security & Administration
![Website Hosting Illustration with Computer Design](https://blog.rwth-aachen.de/itc/files/2024/03/Blog-Layout-1-300x200.png)
Source: Freepik
What does webhosting mean?
Webhosting refers to the provision of storage space (webspace) for the provision of websites. The people who create the website fill this webspace with different content, including images, videos, files, and fonts. Websites are similar to text documents that can be made available and accessed on the Internet. The content of the websites must be saved so that we can access them from anywhere at any time. However, this storage does not take place on a local computer, but on a high-performance server that is connected to the Internet around the clock. In this way, the created website remains continuously available online and the content can be accessed by users worldwide. RWTH Aachen University and FH Aachen University of Applied Sciences cooperate to provide webspace to institutes and student associations as webhosting providers.
Spoofing: An Underestimated Threat
![Businessman with megaphone that says "Lie"](https://blog.rwth-aachen.de/itc/files/2024/03/Bild1-1-300x200.png)
Source: Freepik
In the world of IT security, there are a variety of threats that can affect companies and individuals alike. One of these threats that is often underestimated is spoofing. Spoofing is a technique where the attacker attempts to disguise their true identity in order to gain access to sensitive information. In doing so, they attempt to cause damage or pretend to be a trustworthy source. In this blog post, we will take a closer look at the technique of spoofing, show the different forms it can take and explain how companies and individuals can protect themselves against spoofing attacks.
Review: VI-HPS Porting & Tuning Workshop 2024
What happened to the well-known aiXcelerate event this year? Well, who noticed?
The VI-HPS Porting & Tuning Workshop 2024 took place at the end of February! This workshop compensated for the aiXcelerate 2023, which did not take place.
That’s why we’re reporting on this year’s VI-HPS Porting & Tuning Workshop in the following blog post.
Video Tutorials on Multifactor-Authentication and the Token Manager
![Illustration Laptop with Video and film roll](https://blog.rwth-aachen.de/itc/files/2024/03/videos_play-01-300x200.jpg)
Source: Freepik
On February 1, 2024, the RWTH Aachen University introduced multifactor-authentication (MFA) for the VPN service. This will significantly improve the protection of the IT services you use.
You can learn how to use MFA for VPN and how to set up your second authentication factor in the Token Manager in the first videos in our video series on multifactor-authentication, which we are presenting to you today.