This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
institute_lorentz [2018/11/09 10:53] – [Lorentz Institute] lenocil | institute_lorentz [2020/01/03 15:20] – [Servers, clusters, storage] lenocil | ||
---|---|---|---|
Line 5: | Line 5: | ||
A phishing email is an email that looks like originating from a reputable institution and that usually contains a request to click on a link to confirm/ | A phishing email is an email that looks like originating from a reputable institution and that usually contains a request to click on a link to confirm/ | ||
- | credentials. In fact this link will bring you to a malicious website that will stole your credentials while you naively insert them. | + | credentials. In fact this link will bring you to a malicious website that will steal your credentials while you naively insert them. |
Here is a short guide on how to avoid being fooled by this type of scams. | Here is a short guide on how to avoid being fooled by this type of scams. | ||
Line 58: | Line 58: | ||
===== Servers, clusters, storage ===== | ===== Servers, clusters, storage ===== | ||
- | * [[institute_lorentz: | + | * [[institute_lorentz: |
* [[https:// | * [[https:// | ||
- | | + | * [[https:// |
- | * [[institute_lorentz: | + | |
- | * [[institute_lorentz: | + | |
- | | + | |
- | * [[institute_lorentz: | + | |
* [[institute_lorentz: | * [[institute_lorentz: | ||