Main navigation
News
- Academic Regulations and Records Office
- Computing Services Centre
- Department of Computer Science
- Department of Electrical Engineering
- Department of Information Systems
- Department of Marketing
- Enterprise Solutions Office
- Facilities Management Office
- Finance Office
- Human Resources Office
- Internal Audit Office
- Office of the President
- Office of the Vice-President (Administration)
- Research Grants and Contracts Office
- Run Run Shaw Library
- School of Law
- Shenzhen Research Institute
- Student Development Services
- Talent and Education Development Office
by Yeung Man

Since our last article ( Ref: Network Computing Issue 43 – March 2005) on the Computer Account Management (CAM) System, the system has evolved to serve more than just simple maintenance tasks. Now it manages not only the accounts for students and alumni, but also those for staff, applicants, ex ...
by Tony Chan

The Computing Services Centre (CSC) has successfully completed the first phase of the client virtualization project and, after the past Easter break, released around 130 virtualized workstations in one Teaching Studio (AC2-4200) and two Open Access Areas (AC2-G601 and AC2-5802) in the CSC Teaching ...
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Firewalls are one of the most critical devices or applications that protect universities' information systems and resources from unauthorised access or malicious attacks. To ...
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Any device that controls network traffic for security reasons can be called a firewall. It puts up a barrier that controls the flow of traffic between networks and is able to ...
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Although patches aim to mitigate the risks caused by information system's vulnerabilities, they may expose these systems to additional channels of attack and even be manipulated ...
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ To build an effective patch management process that manages the risks from both external (i.e. vulnerabilities of the information systems) and internal factors (i.e ...
by Simpson Wong, Yeung Man

To better serve our users, the Computing Services Centre (CSC) has installed three sets of 42-inch LED TV panel beside the entrances of the CSC Teaching Studio Areas on G/F, 4/F and 5/F of Academic 2. AC2 G/F AC2 4/F AC2 5/F These panels display the availability of computers for student use. First ...
by Sunny Wong
Message from Microsoft "After 12 years, support for Windows XP will end on April 8, 2014. There will be no more security updates or technical support for the Windows XP operating system. It is very important that customers and partners migrate to a modern operating system…” (Microsoft, 2014) After ...
by Eric Shai

Nowadays, people use PCs, mobile devices to perform many activities on the internet, such as webmail, online shopping, e-banking, etc. Private information is frequently being transmitted across the internet. If the se sensitive data are not transferred securely, they can easily be captured or stolen ...
by Tony Chan

Virtualization is an irreversible trend in the IT industry. It brings great benefits to enterprises by allowing better utilization of IT resources, simplifying IT administration, facilitating faster disaster recovery. For more discussion on its benefits, please refer to an earlier article “Moving ...