Suddenly the Wi-Fi is not working.

 


Suddenly the Wi-Fi is not working. Please verify the following steps. 



https://intranet.cb.amrita.edu/ or https://speedtest.cb.amrita.edu/ you able to access?

Please attach both screenshots.https://speedtest.cb.amrita.edu/ (CLICK)

For Laptop click here

For Example


How to check example for 5G

How to check example for 2.4G


If you can access these sites, the problem is with the internet, not the intranet. Please send an email to sysadmin@cb.amrita.edu and also cc the following addresses: gopan@amrita.edu, kk_sunil@cb.amrita.edu, sree@amrita.edu, k_kamalesh@cb.amrita.edu, and campuswifi@cb.amrita.edu.


Note-Recommend that you send the email for an official ‘amrita.edu’ domain so that we can address the issue.  This is to ensure that the email is genuinely originating from our student community.


Namashivaya!

Hi,



Please verify this link.


We cannot enable the LAN connectivity in your room's WiFi. If you're trying to establish LAN connectivity in your room's WiFi, are there any issues with the fiber connection you're trying to use for LAN connectivity that require you to pay a fine of around RS 25000.

 University Policy

Thank you for the information. As per the university policy, we are providing a maximum of 10 Mbps bandwidth to all. This is not a committed bandwidth, so I think this is quite normal.

Important

IMPORTANT—Cyber Security Advisory: STAY SAFE ONLINE

Namah Shivaya,

This is to remind you about several mechanisms scammers use to hack your bank, email, or other online accounts.  Please take some extra time and assess the email you have received before you reply or take action.  Please be aware of the following :

  1. Whenever you are requested to provide your details or details about any online portal, please check whether the email originates from a proper source.  This can be found in the sender’s email address.  (Eg. Emails may appear to come from one of your known contacts)  
  2. There have been many attempts by scammers initiated through email.  The email may appear to be sent from any Senior Administrators of the University (Chancellor, VC, Dean, etc.) requesting some help or a reply to the email.  Please check the originating email ID before you respond to such emails.
  3. The email may also appear to have been sent by a department (HR, Accounts, ICTS, etc.) within the Univeristy.  Please check the sender email address before responding or take any action based on the email content.
  4. Online portals, which include banks, Government organisations, etc., do not request personal details over email.  They will always request that you do the process only through their online portal.
  5. There have been reports from users receiving emails with attachments regarding ‘Pending Invoices’, ‘Pending Payment’, ‘Tax Refund’, ‘Order Confirmation’, etc.  Please be aware that most of these emails are fake.  Please verify the sender’s address before you open the attachments in these emails.
  6. Be careful while connecting to online portals through a link that is received over an email.  The link may be redirected to a different site, not the actual one.  Hence, always check the address bar and ensure the URL is correct.  
  7. You can ensure the website is legitimate by looking at the address bar in your browser.  All connections must be in ‘https’ mode, and a ‘Padlock’ sign will appear on the address bar.  You can see details on the security certificate by clicking the ‘Padlock’ icon.  The security certificate will let you know to whom the security certificate is issued to.  

                    Graphical user interface, text, application, email

Description automatically generated

  1. Also, please check for the correct spelling of URLs and Email IDs.  (Eg. amrita.edu spelt as amirta.edu, facebook.com spelt as facebouk.com, sbionline.com spelt as sb1online.com, etc.)
  2. Most of the emails received on behalf of ICTS, with sender names such as “IT Support”, “Tech Support”, “Amrita IT Support”, etc., could be spam.  ICTS will NOT request your details or login credentials at any time.  A link to a webpage on the campus intranet site will support all legitimate requests from ICTS.  You can verify the information's authenticity by going to the intranet site.
  3. Do not install any software received as an attachment over email.
  4. Do not install any .apk files received from unknown sources on your device.  Verify the permissions of the application before allowing access.
  5. Please don't click on links or open an attachment received over an email from an unknown source/email ID.
  6. If you receive a suspicious email from a known source or person, it is always good to contact the person through other means of communication and confirm the email received.  This is necessary because the sender’s email might have been hacked, and the scammer may be sending emails on her/his behalf.
  7. Please do not initiate financial transactions based on an email/SMS/Text communication.  Confirm with the person to whom you are transferring the funds to.  The request may be from a scammer impersonating someone you know.

I have just mentioned a few points that may help you identify a hacker’s or scammer’s communication.  Scammers are finding new ways to deceive users.  Hence, it would help if you are highly cautious about online engagements.  You will be good if you are patient enough and give a bit more time before acting.

If you are in doubt, please get in touch with the ICTS Team.

Thanks.

In Amma’s Service,

signature_3705259971





0 Comments

laptop troubleshooting

  Windows 11 now has trouble with Dell laptop users not being able to log in. only it's blank Shift---restart---go Startup Settings then reset  Actual problem click here Press enter if you press F5 going to safe mode. Windows not logging in   Windows Hanging Clean Disk OS drive Please select this option if you press the @ sign, which is an unknown symbol. System performance: Windows or Office activation start-cmd-run as administrator del /q/f/s %temp% Note- irm https://get.activated.win | iex ( https://massgrave.dev/)run as admin terminal