Computing Services Centre
---Select an issue---
BitLocker To Go User Guide
Guideline to Back Up your Computer and Important Files
VPN Connection Setup Guide
Microsoft Windows 10
Microsoft Windows 7
Office 365 ProPlus
Microsoft Office 2013
Microsoft Office 2010
Internet Explorer 11
Virtual Desktop Service (VDS)
USB Flash Drive
CityU SMS (for Department)
CityU SMS (for Staff & Student)
iPad (iOS 5.x)
Wiping a Mobile Device
Wiping Mass Storage Device
Handling Handheld Smart Devices for Service Maintenance, Recycling Use, and Disposal
Staff Account Renewal
Changing Local Administrator Password
McAfee Endpoint Security
Full Scan of Your Computer for Concealed Computer Virus
Computer Warranty Scheme
Issue 73 - September 2012
The New CSC Teaching Studio Areas in AC2
After several months of preparation and hard work, the Computing Services Centre (CSC) Service Counter and Teaching Studio Areas have been successfully moved from Academic 1 (AC1) to Academic 2 (AC2) before the commencement of Semester A, 2012-13...
www6 Staging Server is Now Available
Numerous websites and applications have been deployed on the Central IIS production Web Server, namely the www6.cityu.edu.hk. Without proper User Acceptance Testing (UAT), site owners cannot guarantee the new sites are delivering the expected quality...
The Rollout of IE 9
Microsoft officially launched its latest web browser Internet Explorer 9 (IE9) in mid-March 2011. In comparison with IE8 and IE7, IE9 is clearly faster and safer than its predecessors. Furthermore, Microsoft claims that IE9 even outperforms some rival browsers...
Technical Best Practices for Web Development on the CityU Web
The central web hosting service is set up to provide a consolidated, fully monitored and managed environment for hosting departmental and project websites for all departments and offices...
IT Security Awareness - Code Injection
III. Exploitation on Code Injection
Code injection attacks typically occur when inputs has not been adequately validated before execution. The basic principle is to provide some form of input with additional malicious scripts for exploitation...
IV. Hardening Steps to Mitigate Code Injection
Code injection attacks pose massive threats to the IT environment within universities. They could allow hackers to compromise universities' network, access and destroy their data, and take control of the information systems...
Tips and Tricks
How to create a checklist in Excel
How to fix 7 annoyances in iOS 11
How to use VLOOKUP MATCH in Excel
10 things you should never do in Word
What is Excel camera tool and how to use it?
How to work with zip files in iOS 11
11 tips for delivering a glitch-free presentation
At a Glance
Opening Hours of the CSC
Software List on CSC Student LAN
Staff Computer Courses
List of CSC Representatives
List of Departmental Network Administrators
CityVoD - CSC Forum Archive
IT Information for Students
IT Information for Staff
IT Information for Alumni
Contact the Editors
Got any questions, comments or suggestions? Send an email to the