An important part of life Dorm Internet

It is necessary for students to have access to the Internet when moving to dormitory!

You will need it for every matter on daily life, and it’s more convenient when you look up information for your reports!

However, you have to go through some setting before logging on-line. If you want to have faster access, do as what I do, please

1.  Find out the Internet card number of your own computer

*  PS:If you want to look up Internet card number, refer to bulletin

boards of each story in dorms or consult the website:

http://netsrv.nutn.edu.tw/dormnet/

2.  You can surf the campus Internet in accordance with the IP number

of each bed in chambers, and set up IP number of your PC and related Internet arguments.(You need to set up IP number ,subnet mask, gateway, and habitual DNS Server)

(1) PS:Refer to bulletin boards at each story in dorms as to personal IP set-up procedure or consult the website:http://phpsrv.nutn.edu.tw/~nutndorm/

3.  You can follow the following steps for register, open dorm Internet service system and log into the webpage when filling in user’s information, next , enter personal data and enter Internet card number and enter dorm line number for personal use. The website:http://cock.nutn.edu.tw/dormnet/help/ask4Service.htm

4. If you have any question as to using dorm Internet, apply for instruction on-line or dial dorm Internet extension 6608 for consultation at duty hour AM8:00~PM22:00

Dorm network information security

◎Take advantage of others’ weakness in curiosity, erotic mind and having a strong desire for gains

Explanation:

1. Hackers send E-mail that contains evil-minded enclosures to intended break-in users.

2. Users open evil-minded enclosures and are embedded with backdoor.

EX:

1.counterfeit board of information security of the Executive Yuan, the Government information Office, government institution’s important announcement, news, vital policies and so on, enticing you to open up enclosures.

2.When receiving a letter called 「Free doll script」,you will be lured to get the free font.

3.When receiving a letter named 「Wang Li Hong-Change yourself」With added files, you will be attracted to attain free songs.

Consequence:

1. Users open malicious enclosures and are embedded with backdoor. The hackers will manipulate your computer to produce Internet attack.

2. Users open letters which cause immediate damage.For example, deleting your partial or whole data in your hard disk.

3. Hackers use backdoor programs to steal your information and spread out.

Coping:

1. You can regularly renew Windows Update, Office Update and virus codes.

2. Don’t open or send on ambiguous E-mail.

3. Use natural person voucher mail signature to ensure the origin of the letter identification.

BT、Emule….P2P’s deadly attraction

BitTorrent (the following called BT in abbreviation) 、Emule are ,of a new age ,P2P(Point-to-point)shared transmission software. To live up to the request of digital technological development and international pacts ,law of copyright at home add the empowerment of「Public Transmission Rights」,in addition to originally-processed rights such as production property rights. If people use BT software, because of its supportive function for other synchronal act of downloading, for downloading (i.e reproduction manner),each downloading could make up transmission fact at the same time. Although such act of transmission can’t be control by people, and in fact, each one only conveys part of production. Above-mentioned public transmission behavior that is accomplished by most people attaches to acts that openly publicize others’ rights of copyright. Once the obligee files a lawsuit, people of those groups are responsible for legal charge. People use BT to download and that will become the act of transmission of others’ production, though it is not an invasive way of providing people with mass downloading by setting up websites. This kind of behavior that reproduces and transmit information on-line will still infringe on the rights of reproduction and public transmission of the one who owns copyright .In this way, we urge students avoid randomly downloading or exchanging others’ production on-line in case of breaking the laws.