Mailing lists – what are they? Mailing lists are collections of e-mail addresses that are used when sending material to multiple recipients. Some lists are public and anyone can join them and some are closed lists, meant for a certain group only. In the OUAS, each group of students has its own mailing list. Students’ […]
» Read more(suomi) Kotisivujen suojaaminen salasanan avulla
– 13.11.2008
Salasanasuojaus webissä Voit halutessasi tehdä public_html-hakemistoosi tai sen alihakemistoon salasanasuojauksen. Suojaus on yhtä turvallinen kuin Telnet-yhteys: Salasanat kulkevat verkossa koodattuna, mutta tarpeeksi halutessaan joku voisi purkaa koodauksen hyvin helposti. Eli mistään todella turvallisesta systeemistä ei ole kyse, mutta tämän asteen suojaus riittää varsin hyvin moneen tarkoitukseen. .htpasswd Hakemistossa, joka halutaan suojata luodaan salasanatiedosto seuraavalla käskyllä: htpasswd -c .htpasswd […]
» Read moreTags: staff homepages, homepages, opiskelijoiden kotisivut
SSH – Turvallinen pääteyhteys
– 31.10.2007
SSH – Secure Shell Tavallisilla pääteohjelmilla, kuten Telnetillä, siirtyy tieto selväkielisinä verkon yli, tämä koskee myös salasanoja. SSH:ta suositellaan käytettäväksi aina, kun yhteys otetaan turvattoman verkon yli. Suojaamatonta yhteyttä voidaan salakuunnella muilta verkossa olevilta tietokoneilta. Nykyään useimmissa palvelimissa on estetty Telnet-yhteyksien käyttö oman verkon ulkopuolelta tulevilta yhteyksiltä. Oamkin palvelimille (kuten students ja staff) ei voi […]
» Read moreTags: terminal connection, ssh, SSH, computer security
Piracy is a crime
– 31.3.2007
» Read more
Tags: piracy, copyright, file sharing, freeware and open source software, network ethics, warez, piratismi
Junk mail
– 20.3.2007
junk mail a.k.a “spam” Junk mail can be very annoying, especially if you get tens or maybe hundreds of them in your inbox daily. We use Greylisting to get rid of most of the junk Addresses that end with *@staff.oamk.fi, *@students.oamk.fi *@oamk.fi have now used grylisting wince 2007 and it has dramatically helped to reduce […]
» Read moreTags: greylisting, junk mail, email, whitelisting
Your own homepages at Oamk
– 10.10.2006
Publishing your own webpages at Oamk’s students (or staff) server What you have to do in your Unix home directory You can publish your own web pages at the students.oamk.fi server (or staff.oamk.fi in case you’re a member of OUAS staff). You need to make a directory called public_html which is the default directory for […]
» Read moreTags: staff homepages, homepages, students homepage addresses, opiskelijoiden kotisivut
Rules of IT systems use: maintenance of IT systems
– 19.5.2005
The purpose of the rules of IT systems use Principles of use Access rights and user accounts Validity of access rights Maintenance of IT systems (this page) Maintenance of IT systems Each information system in the University of Applied Sciences must have a designated party responsible (an owner), who is in charge of the intended […]
» Read moreTags: Rules of IT systems use
Rules of IT systems use: validity of access rights
– 19.5.2005
The purpose of the rules of IT systems use Principles of use Access rights and user accounts Validity of access rights (this page) Maintenance of IT systems Validity of access rights The access rights expire automatically when the user is no longer within the University of Applied Sciences community the access rights granted for a […]
» Read moreTags: Rules of IT systems use
Rules of IT systems use: access rights and user accounts
– 19.5.2005
The purpose of the rules of IT systems use Principles of use Access rights and user accounts (this page) Validity of access rights Maintenance of information systems Access rights and user accounts The user is issued rights to access certain information systems. The access rights are based on the user’s position at the University of […]
» Read moreTags: Rules of IT systems use
Rules of IT systems use: principles of use
– 19.5.2005
The purpose of the rules of IT systems use Principles of use (this page) Access rights and user accounts Validity of access rights Maintenance of information systems Principles of use The key general principles guiding the use of the equipment and electronic services of the University of Applied Sciences, the rules of IT systems use […]
» Read moreTags: Rules of IT systems use, byod