How can I fill out the Vehicle Request Form through EBYS?
- Log in to EBYS.
- From the left menu, select the "Electronic Forms" option.
Posted on: 26/05/2025
The search found 99 results in 0.052 seconds.
Posted on: 26/05/2025
Although Linux based operating systems be affected by viruses, there is no immense virus activity. In general updating against viruses, which would try to seep in through the shell or the gaps in the software being used, is accepted as the sufficient precaution.
Posted on: 23/12/2014
You can connect to eduroam by downloading and executing the configuration file to your iOS device.
Download configuration file for iOS devices.
Posted on: 23/12/2014
The most effective way of avoiding such software is to refrain from certain user habits that cause these to spread. Authorizing all the inquiry or notice windows while surfing the internet leads to the installation of many unnecessary software.
Posted on: 23/12/2014
APPLE MAC SECURITY PRECAUTIONS
Your Apple MAC computer can get the threats from two sources:
1. The Internet
2. Direct Access / Physical Access (if you leave your computer unattended or without taking the necessary precautions)
Posted on: 27/06/2017
If your computer's IP access has been restricted, you should first remove the cause of the problem which can be found on the list at www.netregister.metu.edu.tr -> Restiriction.
Posted on: 23/12/2014
Posted on: 23/12/2014
If an IP access of a computer that is related to you as a department computer coordinator has been restricted, you should follow the steps below:
Posted on: 23/12/2014
ODTÜ Blog Service allows creating blog and/or personal pages using the accounts defined on the central servers. There is no need for additional registration to this service. You can just log in using the form on the home page and you are done.
Posted on: 15/04/2015
In accordance with Information Technology Resources Usage memorandum released on 24 March 2004, the CC restricts IP access of a computer connected to the METU campus backbone network when reasons like virus detection etc. are encountered.
Posted on: 23/12/2014