Kategorie: ‘Students’
Rwthapp Relaunch: Your Feedback is Needed
More than a year has already passed since the relaunch of RWTHapp on 3 April 2023. In this blog post, we want to give you an insight into what has happened since then and what the future holds for RWTHapp. Your opinion is particularly important to us. Which is why at the end of the post you will also find out how you can directly influence the further course of development and maybe even win a little something by doing so
Ethical Hacking: Hacking for More Security
![A woman focused on computer code, engaged in hacking activities.](https://blog.rwth-aachen.de/itc/files/2024/07/Ethical-Hacking-1-300x200.png)
Source: Freepik
Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.
Help, My Email Password Was Compromised!
![Laptop with spam pop-ups](https://blog.rwth-aachen.de/itc/files/2024/07/18841272_5987262-1-e1721290547893-300x200.jpg)
Source: Freepik
In the digital world, email accounts are a central part of our lives. If your email password has been compromised, it can have serious consequences: A hacked email account gives cybercriminals the opportunity to send phishing emails with fraudulent links to your family members, friends and addressees in your name.
In this article, you will learn how you can better protect your accounts and devices to prevent them from being compromised.
The Evolution of Emojis Part 2
![An assortment of colorful emojis on the keyboard](https://blog.rwth-aachen.de/itc/files/2024/06/Emojis-2-3000-x-2000-px-min-1-300x200.png)
Source: Unsplash
In the last part on the evolution of emojis, you were able to delve deeper into the development process and historical background. Today it’s all about the evolution in terms of influencing our digital communication.
Archer: Error Detection for HPC
![Archer Logo](https://blog.rwth-aachen.de/itc/files/2024/07/Blog-Layout-1-300x200.png)
Source: Pruners Github
The world of high-performance computing is developing rapidly and computing capacities are reaching new heights. In this context, tools for error detection and correction are essential to ensure the reliability of applications. One such tool is Archer, which was specially developed to detect data races in OpenMP programmes.
The Evolution of Emojis Part 1
![An assortment of colorful emojis](https://blog.rwth-aachen.de/itc/files/2024/06/Emojis-3D-3000-x-2000-px-1-300x200.png)
Source: Freepik
Everyone knows them and almost everyone has used them at some point – welcome to the world of emojis!
But when did emojis come into existence and what exactly is the difference between emojis and emoticons and what does emoji mean?
We answer these and many other questions in the following blog post.
Exam Scan – Digital Inspection
![Moodle Monday](https://blog.rwth-aachen.de/itc/files/2024/07/MoodleMonday_mit_Muster.file_-300x200.png)
Source: Own Illustration
Digital inspections offer a number of advantages: They save resources by reducing the use of staff, students can participate remotely and receive a copy of the exam without additional effort, which they are allowed to request in accordance with the Higher Education Act in NRW.
In order to be able to use these advantages for paper pencil exams, the IT Center, CLS and the Chair of Controlling at RWTH Aachen University have developed Exam Scan, a Moodle plugin that prepares such exams for digital viewing.
ZKI – From Project to Working Group
![Surreal photo: Finger click on cloud in the sky](https://blog.rwth-aachen.de/itc/files/2024/07/Blog-Layout-300x200.png)
Source: Pixabay
As a partner, the IT Center actively supports the design of digitalisation processes at RWTH Aachen University. This also includes the use of cloud services and the correspondingly increasing needs of teaching staff, researchers and students at RWTH Aachen University. The flexibility and scalability of cloud services can be a means of meeting the ever more rapidly changing IT requirements of users.
“Help, I’ve deleted the internet!”
![Internet Icon](https://blog.rwth-aachen.de/itc/files/2024/06/Bild1-300x200.jpg)
Source: Freepik
Do you know any such experts who have deleted the Internet from their PC? How did they come to think that in the first place? It often happened by mistake that you deleted the icon of the browser you were using (often Internet Explorer in the past) – and thus the usual way of opening “the Internet”. But is it even possible to delete the internet? In this blog post, we want to get to the bottom of this myth.
Women in IT: Challenges and Successes
![Women vectors](https://blog.rwth-aachen.de/itc/files/2024/06/Bild1-1-300x200.png)
Source: Freepik
Welcome to the first edition of our new blog series “Women in the IT industry”!
In this series, we will be looking at the many challenges, successes and experiences of women in the IT industry. We will highlight the key issues affecting women in IT, from overcoming prejudice and promoting equality and diversity to the biggest successes and stand-out achievements. These topics are particularly relevant for women in this dynamic and forward-thinking field.