|
|
|
|
A New Collection of services under ITS' Client Support Services (CSS) is now available. Clients can view the operational status of these services on the ITS System Status page. What's new? UTORcsi AD, DHCP, SCCM, AlertUs, SharePoint (administered by EIS), UTORcsiVPN, and TeamMate Audit Documentation. CSS also manages Simple Storage and High Availability Storage, which relies on the virtual infrastructure, and iFile at UofT's iSchool.
To learn more about these services contact the Client Support Team. |
|
|
|
|
|
Did you know there are 6 new Excel functions that simplify your formula editing experience? Based off user feedback, Microsoft implemented these improvements: TEXTJOIN and CONCAT to combine a list or range of text strings, MAXIFS and MINIFS to find the maximum or minimum in a range given one or more conditions and IFS and SWITCH to avoid messy nested IF functions.
UofT students can use Excel and Excel Online for free through UTmail+! Check out Office Blogs for details on each function: |
|
|
|
|
|
Here's a unique one. A few years back Wired released an article that suggested using glitter nail-polish across screws in your computer or laptop for better data security. The idea is to paint over the screws and then take a picture; the glitter pattern cannot be replicated if the screws are removed, and this will allow you to determine by comparing the original picture, if your computer case has been tampered with (to do things like image drives or install hardware keyloggers, malware, etc.).
Share your interesting facts or 'Techbits' with us and we will post them here. |
|
|
|
Can you Outsmart Internet Scammers? |
|
|
Ever wonder how good you are at telling the difference between a legitimate website and one that's a phishing attempt? Take this quiz by OpenDNS (now part of Cisco) to find out. |
|
|
|
|
|
|
TechKnowFile University
2 Days of IT Learning / May 4 & 5, 2016
An annual conference, which showcases many of the projects and initiatives undertaken by the IT community at UofT. It is one of the best opportunities to engage in professional development at no cost.
This year we host TechKnowFile University 2016, which offers 2 days of IT learning for you and your colleagues. Also attend two exciting Keynote Presentations by Kent Wada, UCLA and Shel Waggener, Internet2.
Registration will open early April and the community will be notified. If you would like to join the listserv, please email us. And be sure to follow TKF on Facebook & Twitter!
|
|
|
|
|
Lures belong in your table box, NOT your inbox. You may not realize it, but you are a phishing target at school, at work, and at home. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing e-mail messages, texts, or social media posts, look for the following indicators to prevent stolen passwords, personal data, or private information.
- Beware sketchy messages. Phishy messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks.
- Avoid opening links and attachments. Even if you know the sender, don't click on links that could direct you to a bad website. And do not open attachments unless you are expecting a file from someone.
- Verify the source. Check the sender's e-mail address to make sure it's legitimate. If in doubt, just delete the message.
Remember, in a phishing scam a criminal sends you an email message that appears to come from a legitimate source, like your bank or some other reputable company. The message, which may look authentic, instructs you to follow an enclosed web link–usually to "confirm your account" or "verify your information immediately." But the link actually sends you on to a counterfeit website that looks like the real one.
Delete suspicious messages, and NEVER respond to email requests for personal information. |
|
|
|
|
|
|
|