Categories
Pages
-

IT Center Blog

Schlagwort: ‘E-Mail’

Basics at RWTH: E-Mail

October 18th, 2024 | by
Vectors using email and communication icons with a large letter icon in the background.

Source: Freepik

As part of our blog series “Basics at RWTH”, today we are introducing you to the RWTH e-mail service, which is essential for your daily communication in everyday university life. We have compiled the most important information for you so that you can get started quickly and easily with your e-mail inbox – if you haven’t already done so.

 

Read the rest of this entry »

Security in E-mail Traffic 3: LDAP Address Book

September 11th, 2024 | by
Isometric hacking password stealing icon with 3d computer key and warning notification vector illustration

Source: Freepik

The LDAP address book (LDAP = Lightweight Directory Access Protocol) is a type of database or directory that an email application queries via a predefined path (server name, port, branch/search base) in order to find out the user certificate of an email address, for example. If such an LDAP address book is integrated into your own email application, encrypted emails can be sent directly, for example, provided the recipients have published their user certificate in the LDAP address book. Not every e-mail has to be sent encrypted, but you can select this option if you wish and after successful setup. Read more about the encryption of emails in part 2 of the blog series.

 

Read the rest of this entry »

Security in E-mail Traffic 2: Encryption

September 4th, 2024 | by
Vector graphic with computer and lock and mail icons

Source: Freepik

It regularly happens that personal data or other sensitive information such as temporary passwords, application documents etc. need to be transmitted quickly. The choice often falls on the exchange by e-mail. However, this data must be protected against unauthorized access by third parties. In order to still be able to use e-mail, the e-mails must be encrypted. We will show you how this works in the following blog post, along with other relevant information on the subject. Go back to the first blog post in our series to read more about digital signatures.

Read the rest of this entry »

Security in E-mail Traffic 1: Digital Signing

August 28th, 2024 | by
Vector graphic with user, certificate, and seal symbol

Source: Freepik

Did you know that in June 2024, more than 80% of all incoming emails at RWTH Aachen University were identified as suspicious by the email security defense systems? [1] You may now be thinking of terms such as phishing emails or spam emails.

At some point, every recipient of an email asks themselves the question: How do I know whether the sender address is trustworthy and genuine? On the other hand, every sender asks themselves at some point: How do I know whether my email has demonstrably reached the recipient unchanged? One answer to this is: Always sign emails digitally! We would like to take a closer look at this process with you in the following blog post.

Read the rest of this entry »

Help, My Email Password Was Compromised!

July 17th, 2024 | by
Laptop with spam pop-ups

Source: Freepik

In the digital world, email accounts are a central part of our lives. If your email password has been compromised, it can have serious consequences: A hacked email account gives cybercriminals the opportunity to send phishing emails with fraudulent links to your family members, friends and addressees in your name.

In this article, you will learn how you can better protect your accounts and devices to prevent them from being compromised.

Read the rest of this entry »

Welcome to the Summer Semester 2024!

April 10th, 2024 | by
Clock and apple on school books

Source: Freepik

The nights are getting shorter and the days are getting long again – time for a new semester to start!

With this in mind, we would like to welcome you and wish you a successful summer semester 2024!

Studying has become much more digital in recent years. This means that people are not only learning from books but also a lot on their laptops, tablets and smartphones. Are you already connected?

Read the rest of this entry »

Email Security – How to Configure Forwarding Correctly

March 13th, 2024 | by
Hand-drawn text messages between two cell phones on the board

Source: Freepik

In this article in our mail security series, we will show you how to configure the forwarding of incoming mails. In our previous articles, we have informed you about the problems involved in sending mails, possible security vulnerabilities and security mechanisms that have already been implemented and explained why redirects are bad. This article is about setting up forwarding in the RWTH Mail App, also known as “OWA” (Outlook Web App).

Read the rest of this entry »

Welcome to the Winter Semester 2023/2024!

October 9th, 2023 | by
Collage with PC screen, light bulb, chemical signs, microscope and book

Source: Freepik

The city is filling up with young people, the leaves are slowly starting to turn colorful. This can only mean one thing: A new winter semester is about to begin!

We welcome you and wish you a successful winter semester 2023/2024!

Studying has become much more digital in recent years. This means that people are not only learning from books but also a lot on their laptops, tablets and smartphones. Are you already connected?

Read the rest of this entry »

Changeover Within the GitLab Login Process

April 26th, 2023 | by
GitLab Logo

Source: GitLab

On May 3, 2023, the login process for our GitLab instances (git.rwth-aachen.de and git-ce.rwth-aachen.de) will be updated as part of a necessary maintenance.

However, in order to be able to log in to the GitLab instances of the RWTH after the maintenance, the primary e-mail address stored in GitLab must match the contact e-mail address in the Identity Management of the RWTH. Otherwise, if the e-mail addresses are different, you may get a login error after the system changeover.

Read the rest of this entry »

Email Security – Why Are Redirections Bad?

September 7th, 2022 | by
Illustration mail correspondence

Source: Freepik

The third part of our series of articles on e-mail security deals with the identification protocol DKIM and the standard method for e-mail authentication DMARC.

In our first article and second article on the topic of e-mail security, we informed you about the origins of e-mail and the current statistics in mail traffic at RWTH. In addition, we explained what the SMTP protocol is and what problems it can cause.

 

 

Read the rest of this entry »