
CJ
- Total activity 766
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 392
Articles
Recent activity by CJ Sort by recent activity-
How to Install Grammarly (add-in) for Microsoft Word Online
The guide will show you how to access Grammarly when using Microsoft Word online (web version). Grammarly is not available for Microsoft Outlook Online (web version), you can alternatively install ...
-
How to Install Grammarly (add-in) for Microsoft Word - mac OS Devices
Note: This guide applies to staff who have an personal or managed MacBook Air, MacBook Pro or iMac device. Grammarly for macOS is not available for Microsoft Outlook. Grammarly will work on mac...
-
Installing LAMMPS under Windows Subsystem for Linux
Purpose: This guide covers the full process of installing LAMMPS on a university managed machine using Windows Subsystem for Linux (WSL) running Ubuntu-20.04. If you are unfamilliar with Linux comm...
-
Basic Linux operation and commands
Purpose The guide for installing LAMMPS relies on a basic knowledge of Linux and it's command line interface. You won't need any advanced knowledge to complete an install, but it is nice to know a ...
-
ITS Software Summer Refresh 2021
Over this summer period, IT Services will be looking to update the same software applications that were delivered to students during the past academic year. We will not be asking academics to re-re...
-
How to report a phishing email
What is phishing? Phishing is a cybercrime in which attackers disguise fraudulent emails and websites as legitimate ones to trick you into entering sensitive information (e.g. personally identifiab...
-
What is phishing and what can I do about it?
What is phishing? Phishing is a cybercrime in which attackers disguise fraudulent emails and websites as legitimate ones to trick you into entering sensitive information (e.g. personally identifiab...
-
How to spot a phishing email
This guide provides examples of ways to recognise a possible phishing email. The list is not exhaustive and any or all of the steps may apply. This is an example of a phishing email sent to a Unive...
-
How to keep your online accounts secure
We all use a wide range of online services to help manage our work and our day-to-day life outside the office. Protecting your online accounts is critical to protecting your and the University's se...
-
How to keep your confidential data secure
The impact of either our or the University of ZenUni’s sensitive information being compromised can be serious and we all have a role to play in helping secure it. There are a wealth of ways in whic...