34 - December 2002
is a Virtual Private Network (VPN)?
Virtual Private Network (VPN) has risen fast to become a major networking
technology in just a few years. With a VPN, you can send data, via
a shared or public network in a manner that emulates a point-to-point
private link, between two networks (routers), between two servers,
or between a client and a server...
is Now Connected to Internet2
now connected to Internet2 through a 45 Mbps HARNET connection
to Abilene via the STAR
TAP (Science, Technology And Research Transit Access Point) interconnection
XP Problems in Lecture Theatres and Classrooms
the 33rd issue of the Network Computing, we have reported the installation
of new Windows XP operating system on PCs of the Lecture Theatres
(LT) and classrooms...
Replacement of Staff Email Server
The Computing Services Centre (CSC) is
very proud to announce that we have successfully replaced the aged
OpenVMS Alpha Cluster staff email server with a more powerful Sun
ONE Messaging server on 8 October 2002...
of the Windows XP Upgrade
2002, in addition to the normal support work, the Computing Services
Centre (CSC) has been busy carrying out the campus-wide PC operating
system upgrade to English Windows XP...
Student Computer Literacy Programme Goes Online
Over the years, thousands of students have attended
the Student Computer Literacy Programme organised by the Computing
Services Centre. In the last academic year, the Programme accepted
more than 20,000 course enrolments in 20 types of training courses...
Training Through the CSC
Technology is moving in an ever-increasing speed.
Staff and students alike are forever faced with the challenge of adapting
quickly to the dynamic University computing environment...
Acrobat Documents on the Web
has become common practice for Web content providers to put up Acrobat
documents as reference since it allows better page layouts and formats,
especially for long documents with chapters, sections or graphics...
Security: Tips for Staff, Faculty and Students
Password is a very important piece of information
for any computing user. Together with your username, it gives you
access to all computing services on the campus network. Every time
you connect, you must provide the magic word. When the password
has been leaked to an illegal person, he/she can...