News

by Noel Laam

In the world of computers, data loss can happen in many unpredictable ways, such as sudden physical failure of the storage media, unknown virus attacks even with anti-virus software installed, application software bugs and performance problems, human errors and many more. While there might be ...

by John Chan

You may have experience in receiving email that looks like being sent from the "support", "service", "network/email/web administrator"... etc. of the University, and you were asked to provide your account password by either replying to the email, or clicking a link in the email to access a web page ...

by Joe Lee

It is true that every IT organization, including the Computing Services Centre (CSC), has already practiced a bit of so-called best practices as documented in the IT Infrastructure Library (ITIL). Our current well-received Help Desk support, total automation of work request processing, efficient ...

by Wilson Wong

Introduction In the past, security measures were often focused on the system level (which included networks, operating systems, web servers, and database servers). People may think their websites are safe from hackers if they have a "perfectly" secured system. This may be true if their websites ...

by Henry Wong

It is a known fact that Email Spam (or Junk Email) cause annoyance and pose security threats to our users. What is not trivial and yet has significant impact to users is that these spam emails use up a lot of system resources and affect the quality of the Email services. Since last fall, the amount ...

by Joe Lee

Spyware and adware consume computing resources and seriously affect the security, performance and stability of a computer. In order to protect users from the infection of these unwanted programs, the Computing Services Centre (CSC) had included the McAfee's Anti-Spyware module (MASE) in addition to ...

by Alex Lam

Overview Everyday, new viruses, worms and software security vulnerabilities of all types are discovered on the Internet. Network security is becoming an ongoing network monitoring and management activity. In response to these security hazards, the Computing Services Centre (CSC) is continuously ...

by John Chan

You may be aware of the heightened alerts for computer security measures from recent press reports. Hackers are using all sorts of sophisticated means in order to illegally gain access to computer systems, to capture electronic ID and passwords, to steal electronic data, and/or launch denial of ...

by Peter Mok

Background The sophistication of IT crime increases as technology advances. Widespread of scams are rampaged through the popular use of the Internet and email. Among all IT crimes, they are dominated by phishing and identity theft activities [1]. Phishing is a high-tech scam that uses spam email or ...

by Raymond Poon

What is two-factor authentication? It means users, in addition to their password, need one of the following to log in a system or to access a network service: One form of tokens provided by the service provider (e.g., a key fob or a smart card) The output of one form of biometric scans on finger or ...