Because MoobilenetX will be depreciated in the near future, the Computer Science department now advises eduroam* for wireless needs. Choose your OS from the Campus Wireless Access
page, and then use the eduroam instructions.
eduroam (education roaming) is the secure, world-wide roaming access service developed for the international research and education community.
Having started in Europe, eduroam has gained momentum throughout the research and education community and is now available in 74 territories.
eduroam allows students, researchers and staff from participating institutions to obtain Internet connectivity across campus and when visiting other participating institutions by simply opening their laptop.
Thanks to everyone who listened!
The UC Davis wireless networks, MoobileNetX and ResNetX, have updated security certificates. Because of this change, UC Davis wireless network users may be prompted to accept a new certificate. If you are currently not using MoobileNetX, and are instead using MoobileNet, now's a good time to try it. MoobileNetX employs an encryption for authentication (802.1x). It also means you won't have to login every time you need to use wireless on campus.
Microsoft’s Office Home Use Program (HUP) is now available for departments that participate in the Microsoft UC-MCCA software leasing program (which includes all primary Engineering departments, including Computer Science). You are now eligible to participate in Microsoft's Software Assurance Home Use Program (HUP). This program enables you to get a licensed copy of Microsoft Office for desktop PC to install and use on your personally-owned home computer.
Under the Home Use Program, you and our other employees who are users of qualifying applications at work (e.g. Office Enterprise) may acquire a licensed copy of the corresponding Home Use Program software (e.g. Office Enterprise) to install and use on a home computer. You may continue using HUP software while you are under our employment and as long as the corresponding software you use at work has active Software Assurance coverage.
Microsoft stopped maintaining the 13-year-old operating system software on April 8, 2014.
That means XP is no longer secure enough to use on the UC Davis network—or to use online, period. If you still use XP, you need to move to a newer operating system.
UC Davis policy prohibits use of unsupported OS or application software on machines that connect to the campus network. Unmaintained software is a common entry point for viruses and malware, which can then spread to other UC Davis computers.
Campus is now advising everyone to change our Kerberos passphrases
. Go to computingaccounts.ucdavis.edu, select "Change your passphrase," and follow the instructions.
You should not use your Kerberos passphrase for any non-UC services. Re-using passwords increases the risk of a breach.
Seriously consider changing your passphrases for other services, such as banks and retailers, once they have fixed their own vulnerabilities.
Do not respond to suspicious email messages, especially when they ask you for your passphrase or other personal information. More information is available at security.ucdavis.edu
Other websites are suggesting passphrase changes, see below.
In response to this issue, the CS Systems Support Group (SSG) has performed network scans on all CS and IDAV networks and have contacted those people with systems that are vulnerable to this risk.
What Should I do?
Experts are advising to change any passphrase on a site that was vulnerable, after they patch for the issue. If you used a passphrase on multiple sites, and one was vulnerable, change all of those website passphrases as well. While you are doing that, remember, it's best to make a unique passphrase for every site. More information on passphrases.
Places that have reported patching and are advising passphrase changes
These websites are reporting they had the Heartbleed vulnerability, and it is now patched. It is suggested you change your passphrase on these sites now. For other websites, check the Websites Reporting on Heartbleed Patching, below.
Amazon Web Services (for website operators only, Amazon.com was not affected)
Websites Reporting on Heartbleed patching