Computing Services Centre
---Select an issue---
BitLocker To Go User Guide
Guideline to Back Up your Computer and Important Files
VPN Connection Setup Guide
Microsoft Windows 10
Microsoft Windows 7
Office 365 ProPlus
Microsoft Office 2013
Microsoft Office 2010
Internet Explorer 11
Virtual Desktop Service (VDS)
USB Flash Drive
CityU SMS (for Department)
CityU SMS (for Staff & Student)
iPad (iOS 5.x)
Wiping a Mobile Device
Wiping Mass Storage Device
Handling Handheld Smart Devices for Service Maintenance, Recycling Use, and Disposal
Staff Account Renewal
Changing Local Administrator Password
McAfee Endpoint Security
Full Scan of Your Computer for Concealed Computer Virus
Computer Warranty Scheme
Issue 77 - September 2013
Printing from Smart Phones and Tablets
Nowadays, mobile devices such as smart phones and tablets have become an indispensable part of our daily lives. In the academic world, most course-related materials are now being delivered in electronic form...
Client VHD Implementation of Express Terminals
The main enabling technology for cloud computing is virtualization. Virtualization abstracts the physical infrastructure, which is the most rigid component to compile, and makes it available as a soft component...
Security Tips in Managing Mobile Devices
Nowadays, smartphones and tablet computers are increasingly popular in our everyday lives. Instead of completing the tasks using traditional personal computers, we are storing much more personal and private information in these handheld devices...
IT Security Awareness - Data Leakage Prevention
III. Exploitation on Data Leakage
Data leakage can be caused by internal and external parties, either intentionally or accidentally. According to INFOWATCH's "Global Data Leakage Report 2009"...
IV. Hardening Steps for Data Leakage Prevention - Preparation
A comprehensive DLP solution that protects data in motion, data at rest and data in user require complex and significant amount of preparation activities. Among these activities, data classification...
V. Hardening Steps for Data Leakage Prevention - Implementation
A comprehensive DLP solution is usually a combination of Network DLP, Endpoint DLP, Embedded DLP components and employee training program. The following addressed several techniques / processes to mitigate the data leakage threats...
Tips and Tricks
How to create a checklist in Excel
How to fix 7 annoyances in iOS 11
How to use VLOOKUP MATCH in Excel
10 things you should never do in Word
What is Excel camera tool and how to use it?
How to work with zip files in iOS 11
11 tips for delivering a glitch-free presentation
At a Glance
Opening Hours of the CSC
Software List on CSC Student LAN
Staff Computer Courses
List of CSC Representatives
List of Departmental Network Administrators
CityVoD - CSC Forum Archive
IT Information for Students
IT Information for Staff
IT Information for Alumni
Contact the Editors
Got any questions, comments or suggestions? Send an email to the