April, 2005

Computing image

Trouble Sending Email When Offsite?

If you are offsite and unable to send email using the Lab’s offsite outgoing mail server, smtp2.lbl.gov, you may have been blocked by a local Internet Service Provider (ISP). ISPs block connections to outgoing mail servers that are not owned by the ISP. An increasing number of ISPs (like SBC, Earthlink, Comcast) are doing this to help stop viruses from sending email out once they've infected a computer on the ISP's network. Read more.

Computing image

Library Gains Access to 5,000 New Journals

The Lab’s Library has recently gained free access to over 5,000 journal titles through its affiliation with the California Digital Library (CDL) and the Directory of Open Access Journals. This is in addition to the original 1,800 journal titles to which the Library already subscribed. These additional titles are available under the provider’s terms. Some titles might have abstracts only; others might provide full text. Go here to see the full list of journals.

May Tutorials to Look at Collaborative Tools and Sociology, Managing Large Software Projects

In the networking community, some experts argue that it’s not technology that poses the hurdles, but rather sociology. The Lab’s Distributed Systems Department delves into this area in their next tutorial for LBNL staff: “Collaborative Tools and Sociology,” to be held from 1-4 p.m. Friday, May 6, in Perseverance Hall. The session will discuss a number of tools and the sociological aspects of using them to collaborate. Read more.

Access your Work Computer from Home

An increasing number of Windows users at the Lab are running the XP operating system. With XP as a target system, employees can access their work computer from home using an application called Remote Desktop. If your home machine is also XP, everything you need is built in. Read more.

Cingular Offers Free Phones for Lab Users

Computing image

Lab-approved cellular users who fit the following qualifications may receive a free phone at no additional cost. Users must be: 1) migrating their existing cellular service from another vendor to Cingular, 2) upgrading their Cingular service, or 3) activating a new plan. Two types of free phones are available to Lab users who have been approved by Division Management. Go here for product information.

Service Tip

Computing image


Mathematica 5.1.1 now available on UX8

The latest version of Mathematica is now available on our 14-processor UX8 central UNIX server. Mathematica is a leading software system for technical computing and symbolic programming. Version 5.1.1 adds new capabilities for working with large-scale, diverse types of data. To use Mathematica, log into ux8.lbl.gov and type 'module load mathematica/5.1'. Access to Mathematica on UX8 is provided to all users with central UNIX accounts and there is no additional charge for cpu usage. If you do not have a UX8 account and would like to request one, fill out this form.

 Protecting Your Computer
Computing image

Spam, Spam and More Spam

Spam is now so commonplace many users consider it a fact of life. A study conducted last summer showed that on a single day in August, nearly 90 percent of all Internet traffic consisted of spam. Anti-spam legislation in the U.S., the CAN-SPAM Act, prohibits sending bulk email and prescribes penalties for doing so. But this act does virtually nothing to deter spammers residing outside of the U.S. Read more.


UNIX Security I Course to Be Offered

UNIX system administrators need to know what’s important in securing the systems they administer. The Computer Protection Program's free course, UNIX Security I, covers what system administrators must know. This course will be held on Wednesday, May 11 from 9 a.m. to 5 p.m. in the Bldg. 50 Auditorium. Go here for a course description and here to enroll.


Beware of Messages that Look like Web Postcards

Computing image

Beware of the latest Internet security threat: email messages that appear to be Web postcards. These messages — with subject lines like "You have received a virtual postcard from a family member" — direct recipients to a Web site, which, if visited, installs a Trojan horse program designed to evade anti-virus software and personal firewalls.


Don’t Be a Phish Victim

Computing image

U.S. consumers lost $2.4 billion last year to online scammers and phishing attacks. Most fraud was carried out by people gaining access to account numbers and passwords. Phishing attacks send consumers emails which look like they’re from trusted financial institutions. Users are directed to a phony website, and are lured into entering user names and passwords. The collected identities are then defrauded. Delete any messages of this nature, and avoid forwarding on. Go here for details.


Computing image

Monthly Virus Update: More than 43,000 Worms Eradicated

The Lab's virus wall continues to guard Lab systems against worm and virus infections. Last month it detected and eradicated 43,001 worms and viruses, almost all of which target Windows systems. In contrast, the number in February was 55,224. Read more.

     
  Top  
ITSD