Increased Cyber Security at RWTH Through MFA Introduction

Source: Freepik
Universities are increasingly becoming the target of cyber attacks. According to the Federal Office for Information Security (BSI), the current threat level is higher than ever before [1]. In view of this growing threat and the increasing number of corresponding attacks, the Ministry of Culture and Science (MKW) of the state of North Rhine-Westphalia (NRW) published an Agreement on Cyber Security at Universities (VzC) at the end of 2023. With a total of 12 measures, this serves as a basis for securing university networks. At the same time, the BSI regularly recommends targeted measures to defend against threats.
Against this backdrop, the specific protection of RWTH Aachen University’s IT infrastructure is increasingly indispensable.
SysAdmin Day 2024: A Big Thank You!

Source: Freepik
Today we are honouring the invisible heroes who work behind the scenes to ensure that our IT infrastructure runs smoothly. Whether it’s computers, networks, data backups, printers or internet connections – the people we’re talking about are of course our system administrators – SysAdmins for short.
In fact, today we are celebrating System Administrator Appreciation Day!
A Look Behind the Scenes of Apprenticeship – Part I

Source: Pixabay
After Daniel Malenkovic successfully completed his apprenticeship as a dialog marketing specialist at the IT Center in February 2024, we were delighted to welcome another graduate in June: Yasin Kalem.
After three years of hard work, he too has finally achieved his goal. But what was it like for him? What did he do with us, how did he feel and what’s next for him?
That’s exactly what we asked him and we take a look at his journey with us in a one-to-one interview.
Rwthapp Relaunch: Your Feedback is Needed
More than a year has already passed since the relaunch of RWTHapp on 3 April 2023. In this blog post, we want to give you an insight into what has happened since then and what the future holds for RWTHapp. Your opinion is particularly important to us. Which is why at the end of the post you will also find out how you can directly influence the further course of development and maybe even win a little something by doing so
Ethical Hacking: Hacking for More Security

Source: Freepik
Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.
Help, My Email Password Was Compromised!

Source: Freepik
In the digital world, email accounts are a central part of our lives. If your email password has been compromised, it can have serious consequences: A hacked email account gives cybercriminals the opportunity to send phishing emails with fraudulent links to your family members, friends and addressees in your name.
In this article, you will learn how you can better protect your accounts and devices to prevent them from being compromised.
The Evolution of Emojis Part 2

Source: Unsplash
In the last part on the evolution of emojis, you were able to delve deeper into the development process and historical background. Today it’s all about the evolution in terms of influencing our digital communication.
Archer: Error Detection for HPC

Source: Pruners Github
The world of high-performance computing is developing rapidly and computing capacities are reaching new heights. In this context, tools for error detection and correction are essential to ensure the reliability of applications. One such tool is Archer, which was specially developed to detect data races in OpenMP programmes.
The Evolution of Emojis Part 1

Source: Freepik
Everyone knows them and almost everyone has used them at some point – welcome to the world of emojis!
But when did emojis come into existence and what exactly is the difference between emojis and emoticons and what does emoji mean?
We answer these and many other questions in the following blog post.
Exam Scan – Digital Inspection

Source: Own Illustration
Digital inspections offer a number of advantages: They save resources by reducing the use of staff, students can participate remotely and receive a copy of the exam without additional effort, which they are allowed to request in accordance with the Higher Education Act in NRW.
In order to be able to use these advantages for paper pencil exams, the IT Center, CLS and the Chair of Controlling at RWTH Aachen University have developed Exam Scan, a Moodle plugin that prepares such exams for digital viewing.



