News

by John Chan

Password is a very important piece of information for any computing user. Together with your username, it gives you access to all computing services on the campus network. Every time you connect, you must provide the magic word. When the password has been leaked to an illegal person, he/she can ...

by Grace Ho

City University of Hong Kong, together with 25 other organizations and companies, was presented the Web Care Award by the Internet Professionals Association (iProA)in recognition of their meeting the primary "no barrier websites" requirements.

by Regina Lau

The University has stepped up measures to promote staff awareness of copyright liability concerning computer software. From September 2002 to March 2003, all academic and administrative units are required to conduct a software asset self-assessment exercise to identify actual software that is used on each personal computer and its licensing status. Moreover, as a University policy, individual units are required to purchase any new software through the centralized i-Procurement system.

by Raymond Poon

Microsoft will soon cease its support on Windows 98 (Win98) and a lot of hardware and software, especially the new ones, will be better supported under Windows XP (WinXP). More importantly, the Banner 5, which is scheduled to go live in September 2002, will not run under Win98. As a result, the ...

by Raymond Poon

Starting from 1 July 2002, the support services for both IP phones and conventional PABX phones have been transferred to the Computing Services Centre (CSC). As a result, the following arrangements have been made. Requests for Telephone Support Services To request for CSC's phone services such as ...

by Peter Mok

The anti-virus software (Mcafee) has been made available centrally for every PC on staff LAN. Users are regularly informed to update their anti-virus signature file (a file used by anti-virus software to detect the presence of any known viruses). However, for some reasons, almost everyday some staff ...

by Raymond Poon

As Internet is becoming the essential path for communications, both the number of applications and the data volume they generate deplete Internet bandwidth rapidly. These include normal network application programs such as FTP, Web, video services as well as other personal applications such as KaZaA ...

by Raymond Poon

Over the past few years, a number of "peer-to-peer (P2P)" file-sharing applications have emerged to enable sharing or swapping of files among participants of a community (or members of a network). A computer can become a participant of a community by running any one of the applications specially ...

by Raymond Poon

In the past few months, thanks to departments' cooperation, the Computing Services Centre (CSC) has successfully completed the registration of IP addresses and network cards used on the campus network. This information can help the CSC rectify problems and notify the victim users more quickly. In ...

by Peter Mok

Like most of the other organisations, our University is experiencing rapid growth in the use of IT at the time when reduction of supporting manpower continues. Seeking ways to optimise the effectiveness and efficiency of the available support work force is inevitably the only solution to the problem ...