» Read more
Tags: piracy, copyright, file sharing, freeware and open source software, network ethics, warez, piratismi
» Read more
junk mail a.k.a “spam” Junk mail can be very annoying, especially if you get tens or maybe hundreds of them in your inbox daily. We use Greylisting to get rid of most of the junk Addresses that end with *@staff.oamk.fi, *@students.oamk.fi *@oamk.fi have now used grylisting wince 2007 and it has dramatically helped to reduce […]
» Read morePublishing your own webpages at Oamk’s students (or staff) server What you have to do in your Unix home directory You can publish your own web pages at the students.oamk.fi server (or staff.oamk.fi in case you’re a member of OUAS staff). You need to make a directory called public_html which is the default directory for […]
» Read moreThe purpose of the rules of IT systems use Principles of use Access rights and user accounts Validity of access rights Maintenance of IT systems (this page) Maintenance of IT systems Each information system in the University of Applied Sciences must have a designated party responsible (an owner), who is in charge of the intended […]
» Read moreThe purpose of the rules of IT systems use Principles of use Access rights and user accounts Validity of access rights (this page) Maintenance of IT systems Validity of access rights The access rights expire automatically when the user is no longer within the University of Applied Sciences community the access rights granted for a […]
» Read moreThe purpose of the rules of IT systems use Principles of use Access rights and user accounts (this page) Validity of access rights Maintenance of information systems Access rights and user accounts The user is issued rights to access certain information systems. The access rights are based on the user’s position at the University of […]
» Read moreThe purpose of the rules of IT systems use Principles of use (this page) Access rights and user accounts Validity of access rights Maintenance of information systems Principles of use The key general principles guiding the use of the equipment and electronic services of the University of Applied Sciences, the rules of IT systems use […]
» Read moreThe purpose of the rules of IT systems use (this page) Principles of use Access rights and user accounts Validity of access rights Maintenance of information systems The purpose of the rules of IT systems use The University of Applied Sciences is both a science and research community and an educational institution. It should secure […]
» Read moreConsider the recipients of your e-mail When you reply to an e-mail check that the e-mail address in the to-field is correct. Use a descriptive heading. Don’t spread any circular e-mails. Prefer text only messages whenever possible (= No HTML-pages or word documents for message that is composed of just text) Instead of mail attachments, […]
» Read moreSorry, this entry is only available in suomi.
» Read more