Essential maintenance to the University's IT network - Saturday 16 December
CIS will be undertaking urgent repairs to IT network equipment on Saturday, 16 December. This work means that between 9am-12noon on this day there will be no network access (including deskphones) at the following locations – Biology (including LSSU), Mountjoy 1-4, Psychology, Maiden Castle and Hallgarth House - with a small risk that DUBS and Palace Green Library may also be affected. If you will be on-site at one of these locations on this date, read on so you know what to do in the event of an emergency.
If you will be on-site at these locations, ensure you have access to a mobile phone - you can also contact Security who can call on your behalf in an emergency.
Emergency phones in lifts should not be impacted and will continue to ring through to Security who will contact the maintenance company in line with normal procedures.
(8 Dec 2017)
Students, avoid stress at the start of term – scan your computer during the Christmas vacation
At the start of every term we need to check that our students' computers have the latest anti-virus and anti-spyware updates and system patches. It’s an important process that keeps your devices and our networks secure. If your computer doesn’t pass through the scan – you won’t be able to connect it to the University’s student network.
Make sure you can get connected as soon as you return by using our remote scan facility – available via this page from 1 January 2018. You'll also receive an email reminder from the IT Service Desk over the Christmas break, so look out for that.
Scanning your computer early gives you the opportunity to check your devices during the break to reduce the risk of disruption to your network access at the start of term. If your device doesn’t pass the process, you’ll have time to carry out the appropriate updates and re-submit it before term starts.
The scan runs a check on your laptop or PC from home and if you have up-to-date security software your device is marked safe to use on the network (DU Student). This applies to those of you with a Windows or Apple laptop, desktop or Windows tablet device. It doesn’t apply to smartphones or other tablets.
How do I carry out the remote scan?
The Bradford Campus Manager Pro-Active Scan will be available here https://www.dur.ac.uk/cis/wireless/student/remotescan/ from 1 January. Just follow the simple instructions. If you would prefer to navigate to the page yourself, go to the CIS (Computing and Information Services) homepage on the University website and select ‘Remote Scan’ from the available options.
Our quarantine process will be run on the morning of 16 January and if your machine has passed successfully through this scan beforehand, you won’t need to go through the process.
We’ll send you a reminder about this towards the end of the Christmas vacation so please check your University email account during this period so you have time to take any action you need to.
(7 Dec 2017)
Buy printer credit online from £1
From Monday, we’re removing the £5 minimum spend for buying printer credits online so that all students can buy credits from as little as £1. This means you no longer have to visit the kiosk in Bill Bryson Library or the IT Service Desk for purchases under £5. Simply log on with your username and password here and select your amount (in multiples of £1) to make your purchase. You can also buy your print credits via the MyDurham app. Download the app for free from the App Store or Google Play.
(1 Dec 2017)
Mac OS X 10.13 (High Sierra) Vulnerability - Updated
The vulnerability effectively allows someone with access to the machine to log in and gain administration rights through the root user account, which could result in machines stopping working (by deleting certain system files), confidential data being viewed, data being deleted, or malware installed. If you have remote access to your Mac enabled then the vulnerability can be exploited remotely without physical access to the device.
Apple have released a security patch which will fully resolve the issue.
The instructions to address this vulnerability are as follows:
1. Check the Version of Mac OS X Installed
Open the Apple Menu and select About This Mac
You will be presented with a new Window which displays the current version of Mac OS X you are using.
If the version of OS X shown IS NOT High Sierra then you are not exposed to this specific vulnerability and no further action is required. NOTE: It is highly recommended you do not update your OS X to High Sierra until an official Apple statement is released that the vulnerability has been fixed.
If the version of OS X IS High Sierra then the issue is present and will need resolving using the following instructions.
2. Install the Security Patch
Open the Apple Menu and select App Store...
On the App Store Window select Updates (make sure the device has an Internet connection). A security update will appear in the Window. Select the Update option to install the patch.
The device will no longer have the security vulnerability. If the Root account was enabled as detailed in the instructions released pre-patch, the account will now be disabled as is the default standard.
(29 Nov 2017)