Main navigation
News
- Academic Regulations and Records Office
- (-) Computing Services Centre
- Department of Computer Science
- Department of Electrical Engineering
- Department of Information Systems
- Department of Marketing
- Enterprise Solutions Office
- Facilities Management Office
- Finance Office
- Human Resources Office
- Internal Audit Office
- Office of the Chief Information Officer
- Office of the President
- Office of the Vice-President (Administration)
- Research Grants and Contracts Office
- Run Run Shaw Library
- School of Law
- Shenzhen Research Institute
- Student Development Services
- Talent and Education Development Office
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The term APT was first used by U.S. Air Force back in 2006 to facilitate discussion about a set intrusion activities with specific characteristics. These days, APT is often used ...
by by Tony Chan
As announced by Microsoft, only the newest version of Internet Explorer (IE) will be supported from 12 January 2016. The older versions of IE will no longer be supported meaning that there will be no more security update for these browser versions thereafter, and any computer running them will ...
by Wilson Wong
Phishing email spreads over the Internet from time to time. You may have received suspicious email telling you that your computer account has problems/will expire/has exceeded quota/etc. and requires you to verify your identity by clicking on a URL (Uniform Resource Locator) to a web page, and then ...
by Tony Chan
In the IT world, software applications have an associated life cycle - newer versions of applications with new or enhanced features are often released after a certain period of time to replace the older versions. As Microsoft Office 2013 had been released for more than three years, Microsoft ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ There is a massive upsurge of mobile devices in the consumer market. Corporations are also demanding their employees to have instant connectivity to their working environment ...
by Tony Chan
Windows 10 – the latest version of the Windows Operating System was launched in July 2015. It takes a huge leap forward and gives users a deep impression. It introduces plenty of new features and improves a number of existing features. Besides, the best news is the free upgrade of Windows 10 for ...
by Joe Lee
New and Relocation of Printing Facilities Two new Konica Minolta industrial grade fast printers have been installed to replace the old printers at the Run Run Shaw Creative Media Centre (CMC) to support the quota-controlled free printing service for students. A new colour printer is also made ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ To ensure that data centres meet the reliability and performance needs of universities, and achieve the comprehensive protection from various security threats, a number of aspects ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Vulnerabilities of data centres are found in their physical security, systems / devices hosted and management procedures implemented. Several common exploitation techniques are ...
by Kevin Chan
Has Facebook, Twitter or Instagram already become an integral part of your life? You may want to share whatever you find interesting with your friends or followers, as frequent as you can. Wouldn’t it be a good idea if you can communicate with your colleagues on business issues the same way? What if ...