Library items tagged:

This page is updated regularly Current browser plugin version ***New plugin to support Chrome being tested - we hope to release in February*** Supported browsers: IE11, Safari, Opera, Firefox Issues by browser: Google Chrome Currently not supported by plugin. ---------------------------------------------------------------------------------- How to find Vidyo Logs 1. MS Windows C:\Users\<USER>\AppData\Local\Vidyo\Data\User
April 2014 - 8-14/04/2014 This advisory applies to all member organisations using RADIUS systems using TLS enabled with OpenSSL. Go to:
You'll find below a list of helpful use guides. We will continue to update and more user guides and videos as we create them. If you can't find what you are looking for, or you have an idea for a new guide or video, please get in touch Help Guides: Advice for dial in participants with a hardware system here
Version: 7           Issued: 25/01/2019 Reference: MF-POL-016 Author/Owner: Claire Forkner Last Reviewed Date: 03/01/2020
Conference participants can be included as a dial-in participant if they would prefer to dial-in rather than have Vscene automatically call out to them. Dial-in participants will receive an email with dial-in detail ahead of the conference. The dial-in options provided in an email to an IP dial-in participant appear as [PIN or Room Number]@[IP address]. Some VC system manufacturers deal with PINs or Room ID Numbers in different ways. If in doubt, just dial the IP address first and then enter the Room Number when asked for a PIN.
The Vidyo HD40 and HD100 CODECs were evaluated during March 2015 Read the full evaluation report here Read the manufacturer's comments here
Organsiations can sign up to the Assent service by completing an application form, which includes nominating persons authorised to act on behalf of and manage the organsiation's Assent membership account. The Sign up form can be found here.
Service information about the Assent service launched on 25 March 2015. Jisc Assent is a ground-breaking service which will help manage access to protected digital services and e-infrastructures more efficiently and cost-effectively. Using Assent can give your staff and partners federated access to a wide range of digital services including cloud infrastructures, high performance computing, grid computing and commonly deployed services such as email, file store, remote access and instant messaging.
There are a number of different vulnerable service reports that we send out, these vary from services that can be exploited to be used within a Distributed Denial of Service (DDOS) attack to services that are exposed to leak information or allow them to be controlled. Some of these services can simply be firewalled off from the internet at your border without causing any issues, however, some require further configuration. Please see below for further information on these reports and configuration options.
If you are reading this page, it's most likely because you've received a malware report from us advising you to refer to this page should you require assistance. Why have you received this report?