IT Tips & Procedures

Procedure for use of: Veracrypt Encryption Software
pdfDownload PDF
Sharing Document Securely via Google Drive

pdfDownload PDF


Configure Outlook For Google Apps Account
pdf Download PDF

Configure Outlook For Google Apps Account 1.Configuring your Google Apps Mail : Open your Google Apps mail account. Click on settings and Enable the “Forwarding and POP” Settings as shown below.

Configuring touchpad on a Dell inspiron 1525

pdf Download PDF

How to Disable the Touchpad on Dell Inspiron 1525 when external USB Mouse is connected?

  1. Click on Start > Settings > Control Panel

Rule sets for Microsoft Outlook
pdf Download PDF

Why the need for set of rules in Microsoft Outlook?


Rules are used in Microsoft Outlook to organize incoming Emails. Setting up rules in Outlook automates various actions that can be taken on incoming mails depending on the criteria set. For example, mails from a particular colleague or friend can be automatically forwarded or placed in a special folder, messages with a specific subject line or containing a certain word or phrase can be redirected. The Rules in Microsoft Outlook 2003 once set, allows the user to automate and organize his/her emails in the following way:

Data Backup Procedures
04 Dec 09
Version 1.0
pdf Download PDF





Guide on Protecting Against Hacking




pdf Download pdf

Please find below fault reporting procedure for IT and Telephone related issues

1. Computer, Printer, Network, Staff Email, Student Email and other IT issues


Creating Email Filters in UMAIL

pdf Download pdf

 Follow the steps below

1. Login your umail account at

What is a Spyware

pdf Download PDF

What is Spyware?

Spyware is a program developed by hackers so that they are used to extract personal information (for example, passwords, IP address, and credit card number), post advertisements on your PC without your approval and to do other harmful actions.


What is a Virus?

pdf Download pdf

What is a virus?

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can also be defined as a set of codes written to cause mischief or damage to a computer system. Most viruses do damage, whether to your files, your registry, or even your hardware. Viruses are hard to detect, easy to propagate, and difficult to remove. Your computer can pick up a virus when you copy a seemingly normal file from a diskette or download it from the Internet.


Browser and TLS Security Information

pdf Download pdf

1. What is and Why using TLS 1.2 ?

TLS 1.2 is an acronym for “Transport Layer Security,” version 1.2, which is the protocol that allows digital devices (such as computers and phones) to communicate over the internet securely without the transmission being vulnerable to an outside audience.

Designed & Maintained by CITS