AppGrad is not approved for use with University of Reading IT Systems and should not be used. It is not associated with the University of Reading. Continue reading
Version 10.3 of Sophos Endpoint Security client for Windows is coming early in October. This version adds support for the Sophos Client Firewall on Windows 8 workstations as well as an updated threat engine. Continue reading
Following Microsoft’s currently aggressive pricing on the Surface Tablet, particularly the Windows 8RT version, here are some pros and cons for this Operating system Continue reading
We have started to force the Office 2010 Service Pack 2 installation to all our managed PCs since 29 August.
Once the install has finished, the next time that Outlook is opened, you may experience sluggish opening of your InBox, if a re-index for Search occurs.
Also, PCs may run more slowly whilst the install is running.
Office 2010 SP2 has been available since end of July and contains significant bug and performance fixes. We normally push current Office SP to desktops around this time every year.
The only known issues with SP2 are not relevant, as they apply only to Server 2003.
A few days ago somebody “responsibly” published proof-of-concept code for vulnerabilities in Java and as a result there are now exploits starting to appear in drive-by-download exploit kits. Continue reading
As we frequently mention on this newsfeed and on Twitter, it’s time to update Java again. Oracle has released a Critical Patch Update on 18 June 2013 that affects multiple versions of Java and addresses 40 different vulnerabilities. Continue reading
We have had a series of issues over the last 24 hours and this is to explain some of the problems. Continue reading
IT Services will not support Windows XP beyond Microsoft’s withdrawal of security update support after 8 April 2014. This also applies to Office 2003. Continue reading
You may be aware that IT Services has been involved in an identity management project, known as ‘ID Manage’, ‘ILM’ or ‘IDM’, to increase automation and make efficiency, accuracy consistency and speed improvements in the following: Continue reading
We have had another phishing attack, which purports to come from IT Services. The email contains text as follows: Continue reading