News - Update IT Services

Here you will find information on innovations concerning our IT services. In addition, you will find current information in our IT messages with special relevance or on the SCC message board.

Virtual Servers and Hosting – The Bauhaus-Universität Weimar offers its members the option of having the SCC provide servers as virtual machines (VM) in order to be able to operate them similarly to conventional servers.

more

With the »DFNconf« service, the DFN association offers users in the science sector the opportunity to hold video, audio and web conferences. The platform allows you to hold conferences with excellent video and audio features. You do not need to install an extra client. All you need is a web browser. The service currently supports 23 active participants.

more
Sicheres Arbeiten im Homeoffice

Problems with Outlook

Procedure for centrally administered Windows computers (managed by the SCC)


Instructions for setting up Outlook on iOS devices

Users with other devices please contact the administrating IT contact persons of your faculty.

 

 

Re-setting up »eduroam« after password change

If »eduroam« does not work after changing the password, please follow the steps below:

  1. Remove »eduroam« network,
  2. Set the device to flight mode
    (possibly: restart the device),
  3. Turn on WiFi,
  4. Connect to »eduroam« network
  5. Enter login data again.

When the connection is established, the flight mode can be switched off again.

Instructions for Windows 10

  1. Open the network settings via the icon of the wireless network management.
  2. Click on Network Settings  »Network and Internet« window opens.
    On »Available Networks«:
    Item: manage »WiFi Settings«.
    Click on this item again  »Manage WiFi Settings« window opens.
    At the end of the window under »Manage known networks«, all networks for which a profile exists on the client are now displayed.
    {PRIVATE "TYPE=PICT;ALT=manage WiFi"}
  3. To delete a profile, the profile must be selected.
    Click on »Do not save« to delete the profile.
  4. Then restart the computer and select EDUROAM.
  5. Enter login data again.

Instructions for MAC

  1. Remove Eduroam from the list of networks:
    System settings Network Further Options
  2. Add Eduroam again manually:
    WiFi →  add networkügen Eduroam Security »Company-wide WPA2«
  3. Enter login data again.

Phishing e-mails

Time and again, our users receive so-called phishing e-mails. These fake e-mails suggest, for example, that something is wrong with one's e-mail account and demand the disclosure of sensitive information.

In principle:

The SCC will NEVER ask you for sensitive information - such as your password - by e-mail or require you to follow an ominous link in order to make corresponding entries there!

A phishing attempt can be unmasked by the following characteristics:

  • We usually use a personal salutation.
  • We do not use meaningless subjects.
  • Linguistic errors are a sure indication of a forgery. We do not mix German and English in an email and we do not use colloquial phrases.
  • We use the official terms.
  • We only send e-mails via Bauhaus-Universität mail accounts and never ask you to enter sensitive data on websites outside our domain uni-weimar.de.
  • There are no storage space limits, upgrade options or subscriptions in the e-mail sector. E-mails that contain this are in any case a fake.
  • Attachments of suspicious e-mails or the links they contain can be checked for malware at the following website: https://www.virustotal.com/

If in doubt about the authenticity of an e-mail, please contact the SCC user service via ticket or mail.

Note: E-mail is an insecure communication medium via which sensitive information should never be transmitted unencrypted. The authenticity of the sender and the integrity of the content (integrity after sending) can only be guaranteed by using electronic signatures.

Latest news on phishing attempts can be found on the SCC message board as well as in our current news with special relevance. General and further information on the topic can be found on our pages on IT Security and in the Golden Rules of IT Security.