Library items tagged:

Appeals Registrars will be advised of the reasons where domain name requests are Rejected by the Naming Committee. It is the responsibility of the Registrar to ensure that they pass this information back to their customer.
All organisations applying either for a new domain name, or a modification, in the gov.scot domain must have an Approved Registrar Membership Account, with Jisc unless they are connected to the Janet network. There is no charge for organisations having an Approved Registrar Membership Account. However, this facility is generally only available to organisations who anticipate that they will be submitting a number of domain name requests through Jisc.
Procedure Submitting requests: All requests must be submitted by an Approved Registrar unless the domain name request is being submitted by an organisation that is currently connected to the Janet network.
Download the full evaluation of the Clearone Collaborate Room Pro 600 system
The evaluation report for the Telepresence SX80 can be downloaded at this link
Advisory issued by eduroam.OT 08/04/2014 It has come to our attention that there are vulnerabilities in the relatively new 1.0.1-series of OpenSSL (as detailed by http://heartbleed.com/) affecting TLS enabled services via a heartbeat extension. While there are no indications that this affects TLS-based EAP-mechanisms or RADIUS/TLS (aka RadSec) at this time, the operational team has made the decision to upgrade OpenSSL to versions implementing a fix for CVE-2014-0160
The Vidyo HD40 and HD100 CODECs were evaluated during March 2015 Read the full evaluation report here Read the manufacturer's comments here
Organsiations can sign up to the Assent service by completing an application form, which includes nominating persons authorised to act on behalf of and manage the organsiation's Assent membership account. The Sign up form can be found here.
There are a number of different vulnerable service reports that we send out, these vary from services that can be exploited to be used within a Distributed Denial of Service (DDOS) attack to services that are exposed to leak information or allow them to be controlled. Some of these services can simply be firewalled off from the internet at your border without causing any issues, however, some require further configuration. Please see below for further information on these reports and configuration options.
If you are reading this page, it's most likely because you've received a malware report from us advising you to refer to this page should you require assistance. Why have you received this report?