Main navigation
News
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ In universities, some data have to be shared with students, staff, guests whereas others have to remain protected. At the same time, the number of data leak and unauthorized ...
by Eric Shai

The CityUWiki, a collaborative platform based on Microsoft SharePoint 2010 has been launched for almost 10 years. Today, there are over 100 sites hosting on this platform. Users have enjoyed the advantage of using it for document management, shared calendar of resource bookings, etc. In order to ...
by Adams Chan (OCIO)

There could be many reasons to start a web project: a new initiative, a new campaign, a new policy, headship turnover in the department where the websites are designated to; the web masters left the University and therefore lack of support; or when the company supporting the website does not deliver ...
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Every two years the number of data in the world is multiplied by two 1. Data do not remain in the corporate network; they are shared with outside collaborators. Thus, firewall ...
by Joe Chow

What is Advanced Threat Protection? Advanced threat protection (ATP) is a proactive security solution that defends against attacks by malware. One of its important goals is to prevent any malware from reaching and running in the protected devices. Usually, ATP deploys on cloud where files from the ...
by Joe Chow

In the previous two articles ( Ref: September 2015 and March 2016), we have introduced Windows 10 and its deployment plan on both Student LAN and Staff LAN. Subsequently, the Computing Services Centre (CSC) deployed Windows 10 for teaching and learning in the CSC teaching studios, lecture theatres ...
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Network forensics is the technique in capturing, storing, and analysing network logs in incident events. It also comes in other names, such as specific packet mining, packet ...
by Joe Lee

CityU values the diversity of its students and is committed to providing a learning environment that is conducive to the success of all its students, including those with Special Educational Needs (SEN), in their academic pursues and personal developments. In supporting the IT needs for SEN, the ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Distributed Denial of Service attack is one of the most menacing security threats on the Internet. In order to put down these attacks, the real source of the attack should be ...
by Simpson Wong

PC Hardware Further to the PC upgrade last year, the remaining half of the CSC Teaching Studio Areas, around 500 PCs, have been upgraded to newer hardware this summer. These PCs are also configured as diskless start-ups with Citrix Provisioning Services (PVS). The computers boot up from the network ...