News

December 2005

by John Chan

You may be aware of the heightened alerts for computer security measures from recent press reports. Hackers are using all sorts of sophisticated means in order to illegally gain access to computer systems, to capture electronic ID and passwords, to steal electronic data, and/or launch denial of ...

by Clevin Wong

Microsoft Outlook is a versatile component of the Microsoft Office 2003 for users to manage personal information and to communicate with others. It helps you in managing your email messages, appointments, contacts, and tasks, as well as making reminders and tracking activities. In this article, we ...

by Raymond Poon

An Internet domain name (e.g., cityu.edu.hk) including all its sub-domain names under it (e.g., cs.cityu.edu.hk) resemble in many ways a trademark, a brand name, or a logo of a company. Thus, like the name of the University, domain names should be considered institutional assets whose use must be ...

by Raymond Poon

Currently, University email service to a student or staff will be stopped when the student/staff leaves the University. For students properly graduated from the University, they will be provided with a set of alumni services which include free email. The email address is in the format of EID@alumni ...

by Peter Mok

Background The sophistication of IT crime increases as technology advances. Widespread of scams are rampaged through the popular use of the Internet and email. Among all IT crimes, they are dominated by phishing and identity theft activities[1]. Phishing is a high-tech scam that uses spam email or ...

September 2005

by Raymond Poon

What is two-factor authentication? It means users, in addition to their password, need one of the following to log in a system or to access a network service: One form of tokens provided by the service provider (e.g., a key fob or a smart card) The output of one form of biometric scans on finger or ...

by Joe Chow

The Computing Services Centre (CSC) has been offering comprehensive IT support and services to faculty, staff and students especially in the lecture theatre (LT) and classroom environment. In particular, the CSC has worked with the Facilities Management Office (FMO) to provide a complete set of ...

by Clevin Wong

Spam, or junk mail, refers to unsolicited commercial email (UCE) and unsolicited bulk email (UBE). It is an annoying problem faced by most of the email users. In order to provide better spam filtering service, CSC has upgraded the "spam scanner" software from SpamAssassin to Sophos Pure Message ...

by Yeung Man

The Mobile Computer Service (MCS) is a service provided by the Computing Services Centre (CSC) to allow students to access the campus network and the Internet via the wireless LAN to facilitate their studies. All full-time and part-time students in the main campus are eligible to borrow notebook ...

by Joe Lee

Desktop Security Management
Connecting to today's turbulent computing environment is not risk free. How can users survive from unknown virus infection, phishing attacks, software vulnerabilities and zero-day exploit? We have used McAfee's anti-virus software for some years and the ePolicy Orchestrator (ePO) since 2002 for ...

by K Y Lam

In response to the rapid changing computing environment and increasing demand for services, the Computing Services Centre (CSC) set up the Help Desk in September 1997 with dedicated human, hardware and software resources to help users resolve their day-to-day usage problems. (see Network Computing ...

June 2005

by S.K. Tsui

CityU has been offering the Wireless LAN (WLAN) service since 1997. The population of registered WLAN clients has increased more than ten folds from less than 200 at the beginning to more than 3000 clients now. WLAN technology is changing rapidly and new standards are emerging in the market ...

Whether you are a mobile phone user or an owner of a handheld device or smart phone, you may encounter technical and industry-specific terms like GSM, CDMA, WAP, MMS, SMS, GPRS (2.5G), 3G, Wi-Fi and bluetooth. To have a better understanding of the wireless world we're in, let us take a look at these ...

by Noel Laam

The entire CityU community is reminded once again of the University's commitment to the protection of intellectual property and copyrighted material. The Computing Services Centre (CSC), as the administrator of the campus network, will take all necessary actions (e.g., blocking the network ...

by Joe Lee

The Challenges In recent years, the substantial increase in student number has led to the significant shortage of computer teaching studio not only in its number but also with the right seating capacity. Unless immediate measures are to be taken, the situation will undoubtedly be worsened for the ...

March 2005

by Angela Tang

The community of City University is expanding not just in the increasing number of student, alumni and staff, but also diverse relationships with the University such as prospective students/staff, visiting scholars, exchange students, retired staff, etc. Moreover it is common to have multiple roles ...

by Yeung Man, Peter Mok

The Computing Services Centre (CSC) offers a variety of IT services to the students and helps manage a lot other services jointly supported by the cooperative efforts of administrative and/or academic departments. Some of these services include the e-Learning service, the e-Portal service, the Email ...

by Joe Lee

As publicized in the article "Delayed Deployment of Windows XP Service Pack 2 (WinXP SP2)" (Network Computing, Issue 41 - September 2004), WinXP SP2 is more than just a series of bug fixes but significant changes to the security protection mechanism. These changes can affect both existing ...

by Joe Lee

Due to continuous increase in student numbers and demand for Teaching Studios with larger capacity, the CSC has doubled the number of PC workstations in Room L making it possible to support 60 students doing computer practical exercises simultaneously. After this renovation, the room has the ...

by Joe Lee

X-Win32 (X-Server for PC) is a Microsoft Windows program that will turn a PC into an X Window System server. It will allow X client programs located on other computers (usually UNIX) to display the output at your PC using the MIT X11 protocol. The software offers a broad range of features and ...

by Noel Laam

In the light of the surging hacking attacks, security protection has become the top priority in all data centres worldwide. With our repeated plea for help and cooperation, some of our users apparently still cannot understand the importance of a good password practice. It is believed that the ...