Categories
Pages
-

IT Center Blog

Security in E-mail Traffic 3: LDAP Address Book

September 11th, 2024 | by
Isometric hacking password stealing icon with 3d computer key and warning notification vector illustration

Source: Freepik

The LDAP address book (LDAP = Lightweight Directory Access Protocol) is a type of database or directory that an email application queries via a predefined path (server name, port, branch/search base) in order to find out the user certificate of an email address, for example. If such an LDAP address book is integrated into your own email application, encrypted emails can be sent directly, for example, provided the recipients have published their user certificate in the LDAP address book. Not every e-mail has to be sent encrypted, but you can select this option if you wish and after successful setup. Read more about the encryption of emails in part 2 of the blog series.

 

Read the rest of this entry »

Digital Minimalism: Less is More

September 6th, 2024 | by
Drawing with desk and utensils

Source: Freepik

In today’s increasingly digital world, it’s easy to get lost in the endless flood of information, notifications, and digital distractions. While these technologies offer many benefits, their overuse can also lead to stress, overwhelm, and a lower quality of life. This is where digital minimalism comes into play. But what exactly is digital minimalism, how can it be practised, and what benefits does it offer? In the following blog post, we aim to explain this in more detail.

 

Read the rest of this entry »

Security in E-mail Traffic 2: Encryption

September 4th, 2024 | by
Vector graphic with computer and lock and mail icons

Source: Freepik

It regularly happens that personal data or other sensitive information such as temporary passwords, application documents etc. need to be transmitted quickly. The choice often falls on the exchange by e-mail. However, this data must be protected against unauthorized access by third parties. In order to still be able to use e-mail, the e-mails must be encrypted. We will show you how this works in the following blog post, along with other relevant information on the subject. Go back to the first blog post in our series to read more about digital signatures.

Read the rest of this entry »

Storage Space Reduction on OneDrive & SharePoint Online

September 2nd, 2024 | by
White cloud as storage icon with file icons around it

Source: Freepik

Microsoft products play a major role in everyday university life, especially for many students. Services such as Word, PowerPoint, Excel and OneNote are part of the Microsoft licences included in the Microsoft federal contract that RWTH Aachen University has concluded with Microsoft. This gives students (and employees) the necessary rights to use the software.

Due to new votes and licence changes on the part of Microsoft, the storage space for OneDrive and SharePoint Online on the tenant for students has been redefined.

You can find out what has changed for you and how to proceed in this blog post.

Read the rest of this entry »

Overleaf at RWTH Aachen University

August 30th, 2024 | by
Logo Overleaf

Source: Overleaf

On 6 February 2024, Overleaf officially went into regular operation at RWTH Aachen University. Thanks to the cooperation with the Technical University of Darmstadt (TU Darmstadt), employees with active status at RWTH Aachen now have access to a powerful, web-based LaTeX platform that is revolutionising the creation of scientific documents. This introduction marks a significant step towards more efficient and collaborative research and teaching.

Read the rest of this entry »

Security in E-mail Traffic 1: Digital Signing

August 28th, 2024 | by
Vector graphic with user, certificate, and seal symbol

Source: Freepik

Did you know that in June 2024, more than 80% of all incoming emails at RWTH Aachen University were identified as suspicious by the email security defense systems? [1] You may now be thinking of terms such as phishing emails or spam emails.

At some point, every recipient of an email asks themselves the question: How do I know whether the sender address is trustworthy and genuine? On the other hand, every sender asks themselves at some point: How do I know whether my email has demonstrably reached the recipient unchanged? One answer to this is: Always sign emails digitally! We would like to take a closer look at this process with you in the following blog post.

Read the rest of this entry »

RWTHmoodle – Usage Survey Results

August 26th, 2024 | by
RWTHmoodle

Source: Own Illustration

In the summer semester 2024, RWTHmoodle users once again had the opportunity to evaluate the system and the associated services such as training and support services.

The usage survey started on June 17, 2024. In total, around 36,300 people who actively used at least one course room in the summer semester 2024 were invited to take part in the RWTHmoodle usage survey. 1,750 users accepted this invitation.

Read the rest of this entry »

Induction: Fit for the IT-ServiceDesk

August 23rd, 2024 | by
Vector shaking hands and welcoming other vectors

Source: Freepik

Today, the induction team from the Service & Communication department (SeKo) is introducing itself to you. The team consists of 3 employees (Alice, Daniel and Jonathan) who use a constantly evolving induction concept to prepare new team members for support at our IT-ServiceDesk.

Read the rest of this entry »

The Role of Firewalls in Network Security

August 21st, 2024 | by
chart network security

Source: Freepik

In a world that is increasingly characterised by digital connectivity, network security is becoming an essential issue. A fundamental but often misunderstood component of network security is the firewall. Most of you have probably heard the term before. In this blog post, we’ll take a closer look at the role of firewalls, their importance in network security and how they help to prevent threats. Read the rest of this entry »

IT-Bites: Quick Fixes

August 19th, 2024 | by
A man sitting in front of his laptop and looking at the screen.

Source: Freepik

In the age of digitalization, IT problems are an everyday nuisance that can cause significant disruption for both individuals and businesses. However, the good news is that many of these problems can be fixed with simple and quick solutions. In this blog post, we take a look at some of the most common IT problems and offer practical tips on how to fix them quickly.

 

Read the rest of this entry »