- iPhones, iPads, Smartphones and PDA use
- Cardiff Campus Manager
- The University Wireless Service
- The IT Clinic and IT Shop
- Unsolicited email and subsequent spam
- "Peer to peer" applications and copyright infringement
iPhones, iPads, Smartphone and PDA use
Wireless networking is available in University Residences (except student houses and flats).
If you register your laptop from your room, it will automatically be registered for the wireless service. Should you wish to register a mobile device (such as an iPhone, iPad etc), you will need to visit the Julian Hodge Study Centre. Alternatively drop in to the IT Clinic on the first floor of the Students Union where you can register your device between 1-3pm, Monday to Friday during term time.
Cardiff Campus Manager
Students in University Residences connect to RESLAN using a registration system called Cardiff Campus Manager. A computer running a fully licensed operating system, with approved anti-virus software installed and configured to accept all security and anti-virus updates will be able to connect to RESLAN quickly, smoothly and easily; within 1 hour of switching on the computer, it should be registered and ready to go for use on the RESLAN network.
The University Wireless Service
As part of your registration for Cardiff Campus Manager, your wireless card will also be registered for use with the University's Wireless Network.
The IT Clinic
The RESLAN Team operates a daily drop-in clinic for impartial, friendly advice for your laptop or network connection.
The team is available from 1pm-3pm, Monday-Friday during term time at the IT clinic which is located on the first floor of the Students' Union building, opposite the IT Shop.
Unsolicited email and subsequent spam
The sending or instigating of unsolicited email, unless directly related to the academic or administrative activities of the University, is strictly prohibited under regulation 5.3.2 of the Acceptable Use Policy, and breach of this regulation is subject to disciplinary action. Regulation 6.2.5 also provides the University with the authority to suspend access to the internet or the Cardiff University network, whilst complaints are investigated.
To protect the integrity of the Cardiff University network, Information Services will have no hesitation in invoking this regulation and suspending internet access for those instigating unsolicited email in this manner.
"Peer to peer" applications and copyright infringement.
All computer users connected to the University network are reminded that it is a breach of UK Copyright Law and University copyright regulations to download, share or distribute copyright material without appropriate authority from the copyright holder.
Most of the violations in question are by means of Peer to Peer (P2P) applications, examples given below, however please note that distribution of copyright materials via any another method (i.e. FTP, Web, email, etc.) is also considered a breach of copyright legislation.
If you are using any of these Peer to Peer applications you should remove them from your system. If you choose not to remove these applications, you must IMMEDIATELY ensure that your system is set to prevent the application from acting as a provider of unlicensed materials to other users.
In the event of a copyright infringement, Internet access of the system(s) involved will be denied until the material that infringes the copyright has verifiably been removed.
The following are examples of P2P applications:
UTorrent, ABC, Acquisition, Adagio, Aimini network, Aimini P2P, Altnet, Amicima, aMule,ANts P2P, Applejuice, Ares, Ares Galaxy, Asagumo Web, Audiogalaxy, Avalanche, Azureus, BCDC++, BearShare, BetBug, BitComet, BitSpirit, Bit Tornado, BitTorrent, BitTorrent.Net, Blubster Bullguard, ByteTornado,Cabos, CAKE, Caribou, Carracho, Chord, Condor, CoolStreaming, Coral CSpace, Cybersky-TV, DC++, Dijer, Direct Connect Network, EarthStation5, eDonkey, eDonkey network, eDonkey2000, eMule, Entropy, FastTrack, FileScope, FileTopia, FotoSwap, FreeCast, Freenet, FrostWire, G3 Torrent, fiFT, Globus, Gnucleus, GNUnet/gtk, Gnutella, Gnutella2,Grokster, Groove gtk-gnutella, Hamachi, IceShare, iFolder, iGlance, iMesh, iMesh Light, iSwipe, Joltid, Joltid PeerEnabler, JXTA, Kad Network, Kademlia, Kazaa, Aimster, Mamuoth MFPnet, MLDonkey, mIMac, Mnet, MojoNation, Morpheus, MUTE MANOLITO.MP2P, Napigator, Napshare, NeoModus Direct Connect, Networks Octoshape, OmilyX, OpenExt, OpenFT, OpenNap, Overnet, PeerCast, Peercasting, Peercasting, Peersites, P-Grid, Phex, Piole, PixVillage, Poisned, Qnext, QTorrent, RockItNet, Scour, Shareaza, Solipsis, soribda, Soulseek, SPIN, StrongDC++, Swapper, Swarmcast, TheCircle, Transmission, Tribler, TrustyFiles, Usenet, Warez P2P, WASTE, WinMX, Winny, WinZO, WPNP, xMule, XoloX, ZEPP, Zultrax
Note: This list is not intended to be exhaustive.