New machines are installed by us and then handed to the groups. For machines that we cannot install, e.g. because they have been delivered by the maker of an instrument, you need to tell us their MAC address and hostname.
Machines can be hooked into any network port, but will usually only work, after we switch the port to the correct network, because Linux, Windows and Laboratory machines are on different networks. To do this we need the network socket's identifier, which you can read off of the socket. The identifiers have the form 1.2.34/1-1, where everything before the slash is the room number, the number directly after the slash is the number of the network socket and the last number is the number of the port. The port number will be 1 or 2 and, if it is not labeled, 1 is left. If the socket number is missing, which can be the case for older sockets, it will be 1 as well.
There are a lot of printers in the department and many groups have multiple printers, so it's a good idea to ask on which printers to print. The printers in the student computer pools are
physik02 (bw) und
physikcol02 (colour) and need a ZEDAT print account with credit, which can be charged via a terminal in the computer pools.
You can print on the new centrally managed printers via the
followme queue. You can than collect your printer at any centrally managed printer after logging in with your ZEDAT account. To make that easier you can activate your door token for authentication at the printers at the Feinwerktechnik.
Documentation on using our printers with your own computers can be found in our Wiki.
Posters can be printer at the ZEDAT.
First of all, you should never reply to suspicious emails, click on links contained in such mails or open its attachments. Be careful with mails that you do not expect, that comes from people you have never had contact with or that are unusual for the sender. If in doubt, just ask us.
Emails can be very falsified very easily, since they are little more than text files in a certain format, that are exchanged between mail servers. A lot of servers are therefore extremely liberal in what they accept in their
Current malware can produce extraordinarily genuine looking phishing mails, but recently we had cases of easily-noticeable forgeries, notable for inconsistent names and addresses (John Doe <firstname.lastname@example.org>), usage of non-departmental mail addresses, linguistic mistakes and their content.
If you suspect to have received such mail, please send it to email@example.com by first saving the mail (usually right click on the mail and
Save as) and attaching it to your mail.