Happiness Happens Day: Are You Happy?

Source: Freepik
A simple question – but always a simple answer?
Happiness is achievable and tomorrow, August 8, is a curious holiday that you can celebrate! We have 10 types of happiness for you today and will make your day a little happier today.
IT Center – We Are in Girona for You!

Source: Own Illustration
Dell’s Customer Advisory Council (CAC) was once again held this year for Dell customers from all over Europe. This time, our colleague Peter Watzlawik, who is responsible for client tenders, travelled to Girona, Spain, from June 5 to June 7. On behalf of the IT Center and the “Service and Communication” department, he provided support with questions, new incentives and ideas for constantly improving collaboration.
He has summarised the exciting impressions he gathered at the event for us below.
TreMoGe – Your Central Anchor
Dear students of RWTH Aachen University,
Do you need help setting up eduoram on your mobile device, for example? Are you still struggling to set up Multi-Factor Authentication (MFA) for RWTH Single Sign-On or are you looking for help installing certain software? Simply make an appointment for the “Treffpunkt mobile Geräte” (TreMoGe) – we will help you configure our IT services in peace and time and are available to answer your questions.
Basics at RWTH: IdM Selfservice
Source: Freepik
The IdM Selfservice is the first port of call when it comes to accounts and passwords. The token manager, which you need to set up multi-factor authentication, is also integrated there. This makes Selfservice the heart of your data management. And because it is so important, we would like to introduce you to Selfservice and its navigation points.
Increased Cyber Security at RWTH Through MFA Introduction

Source: Freepik
Universities are increasingly becoming the target of cyber attacks. According to the Federal Office for Information Security (BSI), the current threat level is higher than ever before [1]. In view of this growing threat and the increasing number of corresponding attacks, the Ministry of Culture and Science (MKW) of the state of North Rhine-Westphalia (NRW) published an Agreement on Cyber Security at Universities (VzC) at the end of 2023. With a total of 12 measures, this serves as a basis for securing university networks. At the same time, the BSI regularly recommends targeted measures to defend against threats.
Against this backdrop, the specific protection of RWTH Aachen University’s IT infrastructure is increasingly indispensable.
SysAdmin Day 2024: A Big Thank You!

Source: Freepik
Today we are honouring the invisible heroes who work behind the scenes to ensure that our IT infrastructure runs smoothly. Whether it’s computers, networks, data backups, printers or internet connections – the people we’re talking about are of course our system administrators – SysAdmins for short.
In fact, today we are celebrating System Administrator Appreciation Day!
A Look Behind the Scenes of Apprenticeship – Part I

Source: Pixabay
After Daniel Malenkovic successfully completed his apprenticeship as a dialog marketing specialist at the IT Center in February 2024, we were delighted to welcome another graduate in June: Yasin Kalem.
After three years of hard work, he too has finally achieved his goal. But what was it like for him? What did he do with us, how did he feel and what’s next for him?
That’s exactly what we asked him and we take a look at his journey with us in a one-to-one interview.
Rwthapp Relaunch: Your Feedback is Needed
More than a year has already passed since the relaunch of RWTHapp on 3 April 2023. In this blog post, we want to give you an insight into what has happened since then and what the future holds for RWTHapp. Your opinion is particularly important to us. Which is why at the end of the post you will also find out how you can directly influence the further course of development and maybe even win a little something by doing so
Ethical Hacking: Hacking for More Security

Source: Freepik
Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.
Help, My Email Password Was Compromised!

Source: Freepik
In the digital world, email accounts are a central part of our lives. If your email password has been compromised, it can have serious consequences: A hacked email account gives cybercriminals the opportunity to send phishing emails with fraudulent links to your family members, friends and addressees in your name.
In this article, you will learn how you can better protect your accounts and devices to prevent them from being compromised.




