UCS 4.1-3: Third Point Release published

The third point release of Univention Corporate Server 4.1 – UCS 4.1-3 – is now available to download. It includes various usability improvements, important security updates and all errata updates that have been published in the last three months. One of the main focuses of this release is on the further extension of the App Center such as offering software vendors the possibility to provide Docker-based apps.

Shortly Explained: Virtualization

Virtualization Schriftzug

In its simplest terms, virtualization is the replication of hardware resources via software implementations. It is employed in particular to provide multiple server systems on a single hardware system. Although I want to concentrate on the virtualization of server systems in this article, it is important to mention that these principles are also being applied ever more frequently in the fields of network technology and data storage as well as on clients too.

Univention App Center presented

Univention Corporate Server Logo

In this video tutorial we give you a short introduction into the Univention App Center. The App Center is a central feature of Univention Corporate Server which allows you to easily install and manage additional UCS components and business applications of third-party vendors. You can thus adjust your IT infrastructure to your personal needs at any time. One crucial and great benefit of the App Center is the central management of all apps including their users via the UCS management system.

More on this in the following video!

Cool Solutions – Guacamole…Not Just a Dip!

What are “Cool Solutions”?

Cool Solutions is the name we use to describe Univention solutions which expand UCS with practical, advantageous functions and are also sometimes employed by our customers. These solutions are regularly presented in the Univention Wiki in the form of Cool Solutions articles.

In a new series of articles, we want to introduce you to the five most popular “Cool Solutions” over the next few weeks. Today we are starting with Guacamole – and no, we don’t mean the tasty Mexican dip this time.

New Release of UCS@school Simplifies the Central Management of User Accounts

Logo UCS@School
With the release of UCS@school 4.1 R2, we have equipped our IT solution for schools with two new additional functions for the central management of digital identities and authorizations. From now on, UCS@school allows teaching staff and pupils to use their accounts at various schools. And stored school administration data can now be automatically imported into the identity management system of UCS. These new functions significantly reduce the maintenance efforts of managing the identities and authorizations of pupils and teaching staff. With these two new features we increased UCS@school’s standing as a solution for creative, centralized, and cost effective IT management of applications and digital identities in schools.

Protection Against Ransomware – a Subjective Overview

antivirus. Binary code, technology background

The threat posed by ransomware such as Locky and other malware has been a hot topic on and off in the media for months now. In a number of cases, including some rather more prominent ones, hackers have managed and continue to manage to infect their victims’ files with malware, which encrypts them to the point where they can no longer be used – the files are only made available again once a “ransom” has been paid. The more accesses the user in question has, the higher the damage: if possible, files on servers in the network are also “captured”.

A great deal has already been written on the topic. At this point, I would like – albeit very subjectively – to introduce a couple of approaches for how to protect yourself against such attacks.

Private Internet use requires clear rules

Frau chattet im social web am Laptop

When it comes to network security, one of the greatest security gaps is still the “human factor”, especially through private Internet use at the work place. In addition to private e-mails, the ever increasing reach of social networks is currently representing a great challenge. Viruses and other malware from the web seek out exactly these weaknesses. Attacks increase on a daily base and businesses in all industries and of all sizes, must implement ever more sophisticated standards for protection.