New machines are installed by us and then handed to the groups. For machines that we cannot install, e.g. because they have been delivered by the maker of an instrument, you need to tell us their MAC address and hostname.
Machines can be hooked into any network port, but will usually only work, after we switch the port to the correct network, because Linux, Windows and Laboratory machines are on different networks. To do this we need the network socket's identifier, which you can read off of the socket. The identifiers have the form 1.2.34/1-1, where everything before the slash is the room number, the number directly after the slash is the number of the network socket and the last number is the number of the port. The port number will be 1 or 2 and, if it is not labeled, 1 is left. If the socket number is missing, which can be the case for older sockets, it will be 1 as well.
First of all, you should never reply to suspicious emails, click on links contained in such mails or open its attachments. Be careful with mails that you do not expect, that comes from people you have never had contact with or that are unusual for the sender. If in doubt, just ask us.
Emails can be very falsified very easily, since they are little more than text files in a certain format, that are exchanged between mail servers. A lot of servers are therefore extremely liberal in what they accept in their
Current malware can produce extraordinarily genuine looking phishing mails, but recently we had cases of easily-noticeable forgeries, notable for inconsistent names and addresses (John Doe <firstname.lastname@example.org>), usage of non-departmental mail addresses, linguistic mistakes and their content.
If you suspect to have received such mail, please send it to email@example.com by first saving the mail (usually right click on the mail and
Save as) and attaching it to your mail.