News

December 2005

by John Chan

You may be aware of the heightened alerts for computer security measures from recent press reports. Hackers are using all sorts of sophisticated means in order to illegally gain access to computer systems, to capture electronic ID and passwords, to steal electronic data, and/or launch denial of ...

by Clevin Wong

Microsoft Outlook is a versatile component of the Microsoft Office 2003 for users to manage personal information and to communicate with others. It helps you in managing your email messages, appointments, contacts, and tasks, as well as making reminders and tracking activities. In this article, we ...

by Raymond Poon

An Internet domain name (e.g., cityu.edu.hk) including all its sub-domain names under it (e.g., cs.cityu.edu.hk) resemble in many ways a trademark, a brand name, or a logo of a company. Thus, like the name of the University, domain names should be considered institutional assets whose use must be ...

by Raymond Poon

Currently, University email service to a student or staff will be stopped when the student/staff leaves the University. For students properly graduated from the University, they will be provided with a set of alumni services which include free email. The email address is in the format of EID@alumni ...

by Peter Mok

Background The sophistication of IT crime increases as technology advances. Widespread of scams are rampaged through the popular use of the Internet and email. Among all IT crimes, they are dominated by phishing and identity theft activities [1]. Phishing is a high-tech scam that uses spam email or ...

September 2005

by Raymond Poon

What is two-factor authentication? It means users, in addition to their password, need one of the following to log in a system or to access a network service: One form of tokens provided by the service provider (e.g., a key fob or a smart card) The output of one form of biometric scans on finger or ...

by Joe Chow

The Computing Services Centre (CSC) has been offering comprehensive IT support and services to faculty, staff and students especially in the lecture theatre (LT) and classroom environment. In particular, the CSC has worked with the Facilities Management Office (FMO) to provide a complete set of ...

by Clevin Wong

Spam, or junk mail, refers to unsolicited commercial email (UCE) and unsolicited bulk email (UBE). It is an annoying problem faced by most of the email users. In order to provide better spam filtering service, CSC has upgraded the "spam scanner" software from SpamAssassin to Sophos Pure Message ...

by Yeung Man

The Mobile Computer Service (MCS) is a service provided by the Computing Services Centre (CSC) to allow students to access the campus network and the Internet via the wireless LAN to facilitate their studies. All full-time and part-time students in the main campus are eligible to borrow notebook ...

by Joe Lee

Desktop Security Management
Connecting to today's turbulent computing environment is not risk free. How can users survive from unknown virus infection, phishing attacks, software vulnerabilities and zero-day exploit? We have used McAfee's anti-virus software for some years and the ePolicy Orchestrator (ePO) since 2002 for ...