CEU Computer Communications Lecture
How CEU computer system works, how much storage and e-mail space is available, how to send and receive messages through the CEU MS Office 365 Outlook and online cooperation tools.
This is a compilation of tutorials on the topics we offer courses about.
The following is a list of links on broader topics useful for CEU students.
Frequently asked questions (FAQ)
To print in color, choose the printer named
"Multicolor" among the avaiable printers in the printing window.
Then go to any of the color printers, use your ID card, and push the green
Don't forget to set the "color" the property before printing,
otherwise you'll get black and white pages, even if the original contained
Color pages will always come out grayscale on the default "Multigray" printers.
You can purchase transparent sheets from the Computer Center. On the printers you can use the "Manual feed" function to print on transparent sheets. Please use only sheets purchased from us. Inappropriate material might be harmful and you'll be charged for the repair cost.
You have to maintain at least three passwords during your studies. They identify you and authorize your access to different servises.
We strongly recommend that you change your passwords from the default immediately, and keep them confidental. Knowledge (or even guess) of your password allows others to misrepresent you: read, change, steal your personal material, use your quota, or send e-mail in your name.
Security experts advise that all passwords you are using be different. In this case if any of them is compromised (been stolen, guessed, lost) then the others are still secure. This advise is against the convenience of password usage, and makes easier to confuse what password is required. We at the Computer and Statistics Center think that setting all three passwords to the same one is secure enough, and not confused about the passwords is more important than the increased security.
A good password is a mixture of letters and digits only, consisting of at least 5 characters but not more than 10. No password should containt the space character. If you forget your password there is no way to recover it, but see here what can be done.
Changing the password requires different procedure depending on what password you want to change.
Passwords are not stored, rather there is an elaborate method to check passwords for validity. If you forget your password, no one can recover it, no one can tell you what it was. The only remedy is that system administrators can change the password to something else.
Novell passwords are managed by the IT Department. If you forget the password, you should go to the Student Helpdesk at B105, the door next to Computer Lab 2 during office hours (usually between 9 a.m. and 4 p.m.) After identifying yourself, the assistant can set a new password for you. Please note that not every person working there is authorized to set new password.
Office 365 passwords: Click on the Can’t access your account? link on the bottom of your Excange page.
UIS passwords are handled by the UIS staff. If you need their service, please go to the Student Helpdesk at B105 or send an e-mail to Infosys Support.
To access your CEU mailbox using an e-mail client application (such as MS Outlook, Mozilla Thunderbird, Mac Mail, etc.) you will need the following parameters desribed on the link below:
With Office 365, we are replacing primarily two services: Novell Groupwise for emailing, and the so called P: drive for storing personal documents.
This year CEU is introducing Microsoft Office365 for students which contains powerful online email, calendar, document storage and collaboration services, including online versions of the newest Word, Excel and PowerPoint.
A mean enemy of computer users is the computer virus. The name refers to the similarities of its biological name-alike: it is small in size, usually a few hundred bytes only, and spreads fast by attaching to executable applications. They are *NOT* real viruses, and no one can get any disease from an infected computer.
In order to prevent infection, or if it would be too late, to minimize the harm possibly caused by those small unwanted programs, you must know certain facts about these viruses.
As viruses are small programs, they can cause any harm only if they got the possibility to be excecuted. This means that neither text nor data files can get infected, and if you only write and read text files, process data, and never launch new programs, then your machine cannot catch flue.
Unfortunately there are exceptions to the above general rule. When Microsoft decided to include invisible executable program pieces in their DOC document files, they opened wide the door before virus infection. An infected document contains a small and invisible runnable code which becomes active as soon as you load the document into your machine. Since the RTF (Rich Text Format) version does not contain any executable code and preserves all typesetting information, using RTF format you are always on the safe side. Similarly, certain PDF files can also contain harmful executable pieces which are actived as soon as you open the PDF file.
Viruses usually consist of two parts. One part is responsible for the "infection", i.e. to spread the virus as widely and as soon as possible, and the other part is the "funny" side which takes different actions from time to time, as e.g. cleaning up your hard drive, sending messages or messing up the screen. It can throw dirt randomly to your hard disk, changing a bit here and there which you will notice after your hard drive is mixed beyond any hope to repair it. The "Friday 13th" virus does naughty acts only if the date is Friday the 13th.
The real threat from viruses is not that they can (or will) destroy your data, or mess up your computer totally. They open a backdoor to your computer, listen to traffic, analyze the browsing habit of the user, check keyboard hits (the so-called keyboard sniffers) to steal pin codes and passwords. Or simply hide at a hidden corner of the machine waiting for a wakeup message. Machines with such dormant malware are called zombi machines. Zombies are woken up to send hundreds of million spam mails, or to take part in a Denial of Service (DOS) attack where millions of machines request simultaneously the same web page or web service. It is almost impossible to tell whether a pc or laptop is hosting a zombie or not: there are no telltale signs, it is sitting in a far away dusty corner usually under a well chosen disguised name.
Please bear in mind that new viruses born every day, and no antivirus software is able to found all of them. Therefore you also have to follow certain practice to stop acquiring and spreading new viruses.
With your kind help and support, careful usage of the available resources, we hope to maintain the high quality of security within our University.
PDF files are necessary for your work at CEU, e.g. you need to upload your thesis as a PDF file.
and on Yammer CEU.