FAQ

+Open all -Close all

Public Server

The provided text doesn't contain enough information to answer your question. Please provide the text you want me to translate.

Connect to any CARNET individual internet access service and enter your AAI user account (e.g. mylogin@public.hrand the corresponding password.

What is my AAI username (e.g., mylogin@public.hr and mylogin@public.carnet.hr)?

Form tag: mojlogin@public.hr is used to connect to the internet via CARNET's Internet Access Services and the use of other AAI@EduHr services.

Form tag mojlogin@public.carnet.hr or Ime.Prezime@public.carnet.hr This is the name of an email that is generated when opening an account for a natural person.

The password for both tags is the same.

AAI@EduHr is the Authentication and Authorization Infrastructure of the Croatian Academic and Research Network.

AAI@EduHr is a system whereby users of CARNET's public server access services outside the server itself. List of network services  accessed through AAI@EduHr.

How to change your password?

Access your personal record via web interface and click “Change Password” and follow the instructions.

Your user account is valid for how long?

The user account is valid for one year, after which it should be extended through the  Administration portal.

How to read email on the web?

CARNET offers  webmail service for all AAI@EduHr users.

On the homepagehttps://webmail.carnet.hr/You log in with a full user ID, as well as for the internet access (e.g., Pero Perić would write pperic@public.hr). During the first use, you will get an additional page with a selection of servers. Here, under the user name, you enter the short form (e.g., pperic, without the domain), and as the server, select “CARNET – public computer.”.

Log in to WordPress administration?

Maintaining and editing WordPress pages for administrators on CARNET Public Server is performed via the interface available at:

https://pubweb.carnet.hr//wp-login.php

where “” is part of the address – name obtained when registering for a guest information service.

For example, for the imaginative CARNET association that has an open guest information service at http://pubweb.carnet.hr/carnet with domain carnet.hr

The page administration is performed via the link: https://pubweb.carnet.hr/carnet/wp-login.php

How to use the WordPress contact form (CF7)?

Contact forms are added to the WordPress administration under the “Contact” menu, by clicking the “Add New” button. You can name the form by clicking on the form title, for example “Unnamed”, and enter the desired name, for example “contact”. In addition to the usual tag name, subject, and email, You must also use Google reCAPTCHA element to prevent spam. You can find more about integration on the add-on pages.

How to enable a multilingual plugin on WordPress pages?

The multilingual plugin can be requested by sending a request to CARNET helpdesk at +385 1 6661 555 or via e-mail. helpdesk@carnet.hr.

After processing the required request, you need to choose Settings -> Languages in the WordPress administration and add a new language.

WordPress and Facebook comments

From March 15to, Starting in 2015, WordPress comments will be replaced by Facebook comments.

To enable your own Facebook comments, you need to log in to the WordPress administration, choose Settings -> Facebook Comments, and create an APP ID by clicking on “Create an App to handle your comments.” After entering the Facebook App ID, to enable comments on posts, you need to tick (turn on) the “Singular Posts” option, i.e., on the “Pages” page.

If you do not want Facebook comments on individual posts/pages, check “DISABLE Facebook Comments” at the bottom of the post/page editing.

Here's how to set up Google Maps on a WordPress page: **Method 1: Using a Plugin (Recommended for Ease of Use)** This is the simplest method and doesn't require coding. 1. **Install a Google Maps Plugin:** * Log in to your WordPress admin dashboard. * Navigate to **Plugins > Add New**. * In the search bar, type "Google Maps" and press Enter. * You'll see a list of plugins. Popular and well-regarded options include: * **WP Google Maps:** Very feature-rich and user-friendly. * **Google Maps Widget:** Great for adding a map to your sidebar or footer. * **MapPress Easy Google Maps:** Simple and effective for embedding maps with basic customization. * Click **"Install Now"** on your chosen plugin. * Once installed, click **"Activate"**. 2. **Configure the Plugin and Add Your Map:** * The exact steps will vary slightly depending on the plugin you choose, but generally, you'll find a new menu item in your WordPress dashboard for the plugin (e.g., "WP Google Maps," "MapPress"). * **Find your location:** You'll need to enter the address or coordinates of the location you want to display on the map. Many plugins allow you to search for an address directly within the plugin settings. * **Customize your map:** You can usually adjust settings like: * Map type (roadmap, satellite, terrain) * Zoom level * Map dimensions (width and height) * Marker icon and text (e.g., your business name and phone number) * Directions features * **Get the Embed Code or Shortcode:** * **Shortcode:** Most plugins will provide a shortcode like `[wp_google_maps id="1"]`. This is a special code that WordPress understands and replaces with the map when the page is viewed. * **Embed Code:** Some plugins might also generate an iframe embed code, similar to what you'd get directly from Google Maps. 3. **Add the Map to Your WordPress Page:** * Go to **Pages > Add New** (or edit an existing page). * **Using a Shortcode:** * In the WordPress editor (either the classic editor or the Block Editor/Gutenberg), add a "Shortcode" block. * Paste the shortcode provided by your Google Maps plugin into the Shortcode block. * **Using the Block Editor (Gutenberg):** Many plugins will also offer a dedicated "Google Map" block that you can add directly. Select this block and configure it within the page editor. * **Using an Iframe Embed Code:** * In the WordPress editor, add an "HTML" block (or a "Custom HTML" block). * Paste the iframe embed code into the HTML block. * **Publish or Update** your page. **Method 2: Using Google Maps Directly (Manual Embed)** This method involves getting an embed code directly from Google Maps and pasting it into your WordPress page. 1. **Get the Embed Code from Google Maps:** * Go to [Google Maps](https://www.google.com/maps). * Search for the location you want to display. * Click on the **"Share"** button. * In the pop-up window, select the **"Embed a map"** tab. * You'll see an iframe embed code. You can customize the size (Small, Medium, Large, or Custom size) before copying. * Click the **"Copy HTML"** button. 2. **Add the Embed Code to Your WordPress Page:** * Log in to your WordPress admin dashboard. * Go to **Pages > Add New** (or edit an existing page). * In the WordPress editor, add a **"Custom HTML"** block. * Paste the iframe embed code you copied from Google Maps into the Custom HTML block. * **Publish or Update** your page. **Important Considerations:** * **API Keys:** While many embed methods and free plugins don't require an API key for basic use, if you start using advanced features or exceed free usage limits, Google Maps might require an API key. This typically involves setting up a project in the Google Cloud Console. Plugins usually guide you through this if necessary. * **Responsiveness:** Ensure your map is responsive and looks good on all screen sizes (desktops, tablets, and mobile phones). Most modern plugins and Google's embed code are responsive by default. If not, you might need to adjust the CSS. * **Performance:** Embedding too many large maps or very complex maps can affect your website's loading speed. Optimize your map settings and consider how many are necessary. Choose the method that best suits your technical comfort level. Plugins are generally the easiest and most flexible option for most WordPress users.

WordPress iframe plugin.

Once you find the desired location on the Google Maps page, in the lower right corner, select the wheel icon  option “Share or embed maps” and copy the link from the “Embed map” to the quotation marks starting with “https”.

This link needs to be set up in WordPress as a post or an iframe add-on page, for example:

[iframe src=”https://www.google.com/maps/embed?pb=!1m14!1m8!1m3!1d2781.9433323652675!2

            15.969535999999996!3d45.792362999999995!3m2!1i1024!2i768!4f1

            3.1!3m3!1m2!1s0x4765d68bca3bcf01%3A0xe8225cc97fc37baa!2s

            CARNet!5e0!3m2!1en!2en!4v1425457931153]


Upload Images to WordPress

Due to limited resources, the maximum resolution of the uploaded image that can be set is 2048 x 2048 px. Images that exceed this ratio shall be automatically decreased (respecting the width-to-height ratio). Thus, for example, the image size of 3456 x 500 after upload shall be 2048 x 296.

To publish multimedia content, we recommend using external services, such as some from This list.

Membership in CARNET Network for Institutions

The CARNET network is a high-speed broadband network connecting universities, research institutes, and their affiliated institutions in the Czech Republic. It's part of the European research and education networking community, providing advanced network services for research, education, and collaboration.

CARNET (Croatian Academic Research Network) is a computer network connecting schools, institutes, faculties, and other institutions within the science and education system, promoting computer technologies and their opportunities in the world of science and education. CARNET operates under the auspices of the Ministry of Science and Education, from whose budget it is financed.

CARNET provides internet access to educational and research institutions in Croatia. This includes universities, public research institutes, and schools. Students, faculty, and researchers at these institutions can access the internet through the CARNET network.

The right to access the CARNET network can be:

at the institutional level, where an institution is a member of CARNET, meaning the institution joins the CARNET network,

b) On a personal level via wireless internet, cable internet, or ADSL for home connection if you are a pupil, student, or employee of a CARNET network member. A list of available services can be found here.

CARNET is a network that serves the Croatian academic and research community. Membership in CARNET is primarily intended for institutions involved in education and research within Croatia. This includes: * **Universities and University Colleges** * **Research Institutes** * **Secondary Schools** * **Primary Schools** * **Other Educational Institutions** **How to Become a Member of CARNET:** The process for an institution to become a member of CARNET generally involves the following steps: 1. **Express Interest and Contact CARNET:** The institution should initiate contact with CARNET. This can typically be done through their official website, by phone, or by email. They will likely have a dedicated department or contact person for membership inquiries. 2. **Meet Eligibility Criteria:** CARNET has specific criteria that institutions must meet to be eligible for membership. These criteria usually relate to the institution's status (e.g., accredited university, registered school), its mission (education and research focus), and its technical infrastructure to connect to the CARNET network. 3. **Formal Application:** The institution will need to complete a formal application. This application will likely require detailed information about the institution, its legal status, its user base (students, staff), and its current IT infrastructure. 4. **Technical Requirements and Connection:** CARNET will assess the institution's readiness for network connection. This may involve: * Ensuring the institution has appropriate network hardware (routers, switches) and cabling. * Adhering to CARNET's technical standards and protocols. * Planning and executing the physical connection to the CARNET backbone. 5. **Agreement and Contract:** Once the application is approved and technical requirements are met, the institution will enter into an agreement or contract with CARNET. This agreement will outline the terms of membership, the services provided, the responsibilities of both parties, and any associated fees. 6. **Onboarding and Service Activation:** After the agreement is signed, CARNET will proceed with onboarding the institution and activating the provided services. This may include user account creation, network configuration, and access to CARNET's support and resources. **Key Points to Consider:** * **Official CARNET Website:** The most accurate and up-to-date information regarding membership, eligibility, and the application process can be found on the official CARNET (Croatian Academic and Research Network) website. * **Specific Requirements:** The exact requirements and procedures might differ slightly based on the type of institution (e.g., a university versus a primary school). * **Support:** CARNET typically provides significant support to its members, assisting them through the entire process from initial inquiry to becoming a fully functioning member. It is highly recommended to visit the CARNET website or contact them directly for the most current and detailed information on becoming a member.

CARNET is a computer network for the academic, scientific-research, and educational community. Therefore, CARNET's members are primarily institutions within the science and education system. These include:

  • Universities and their faculties
  • other higher education institutions
  • Scientific and research institutes
  • elementary and secondary schools.

It is important to note that membership in the CARNET network is not assigned by CARNET but by the Minister of Science and Education based on the submitted files. Decision of the Ministry of Science and Education.

The application for membership in the CARNET network should therefore be sent to the following address:

Ministry of Science and Education

Donje Svetice 38

10000 Zagreb

To make it easier for users to apply for membership in the CARNET network, CARNET has developed special forms that need to be filled in and verified by the Principal/Dean of the institution and sent to the Ministry. The forms include all the information you need to fill out: Form for joining the CARNET network for primary and secondary schools and students’ dorms, Form for joining the CARNET network for institutions in the academic community.

It is necessary to emphasize why your institution needs to connect to the CARNET network and to which address you want to connect. After that, you will receive a Decision of the Ministry that will inform you if your request has been approved and what kind of membership your institution has been granted.

A copy of the Decision is also received by CARNET. Exceptionally, a decision on temporary membership may be made by the CARNET Governing Council.

CARNET network has the following types of membership: * **Research and Education Institutions:** Universities, institutes, and secondary schools. * **Network Operators:** Institutions that manage their own computer networks and want to connect to CARNET. * **Associated Members:** Other organizations that have a specific interest in CARNET's services and network.

According to the aforementioned Decision, the Minister of Science and Education can assign your institution one of three membership types in the CARNET network.

Full Membership - obtained by legal entities whose core business is financed from the budget of the Republic of Croatia, within the scope of the Ministry of Science and Education (public higher education institutions, scientific and research legal entities, and secondary schools). The decision to acquire full member status is made by the Minister of Science and Education and is granted for an indefinite period.

Associated membership – can be obtained by legal entities that contribute to the functioning of the science and higher education system through their activities and, in the opinion of the Ministry of Science and Education, are worthy of such status. The decision to grant Associate Member status is made by the Minister of Science and Education and is valid indefinitely.

Temporary membership – can be obtained by legal entities, particularly institutions within the health and culture systems, educational institutions, state bodies, and associations. This membership grants temporary admission to the CARNET network for specific jobs and activities. The decision to grant temporary membership status is made by the Minister of Science and Education or the CARNET Governing Council, based on collaboration with the institution's pilot project, and is valid for a defined period. 

What are the specific differences regarding the membership type of individual members?

CARNET secures and leases telecommunication lines to full-fledged members who need to connect to the CARNET network and provides them with the necessary communication equipment.

Temporary and Associate Members are obliged to finance and acquire the necessary communications equipment and lease the TC line required for connectivity, according to CARNET's specifications, unless otherwise decided by the Minister of Science and Education.

Pupils, students, and employees of full-fledged and affiliated member institutions have the same rights regardless of the type of membership (see 8.). Temporary members do not have the right to enter the AAI@EduHr system, except exceptionally if the AAI@EduHr Council decides so.

All members of the CARNET network exercise the right to use CARNET's services.
  • the right to connect to the Internet via the CARNET network, with costs covered by CARNET
  • the right to use assistance for end-users in the form of a Support Service (Helpdesk)
  • the right to use CARNET services, depending on the type of membership and type of institution, the list of services is available Here.
What rights do full and associate members who are employees, pupils, and students have?

By creating an electronic identity in the AAI@EduHr system within a CARNET member institution, CARNET offers the following services to pupils, students, and employees of full and associate members:

  • the right to use CARNET services, depending on
After receiving the Ministry's decision on membership in the CARNET network, the next steps typically involve: 1. **Reviewing the Decision:** Carefully read the decision document. It will outline the terms of your membership, any conditions, and what is required from your institution. 2. **Contacting CARNET:** Reach out to CARNET (Croatian Academic and Research Network) for further instructions. They will guide you through the technical setup and integration process. 3. **Technical Setup:** This often includes: * **Network Connection:** Arranging for your institution's physical connection to the CARNET network. * **IP Addressing:** Obtaining and configuring IP addresses for your institution's devices. * **DNS Configuration:** Setting up your domain name system (DNS) to be part of the CARNET network. * **Authentication and Authorization:** Implementing systems for user authentication and authorization to access CARNET resources and services. 4. **Service Activation:** Once the technical infrastructure is in place, you can begin activating and utilizing CARNET's services, which might include: * Internet connectivity. * Email services. * Access to specialized academic and research resources. * Collaboration tools. * Security services. 5. **User Training and Awareness:** Inform and train your staff and users about the benefits of CARNET membership, acceptable use policies, and how to access and utilize the provided services. 6. **Compliance and Reporting:** Ensure your institution adheres to CARNET's policies and any reporting requirements. It's essential to follow the specific instructions provided by the Ministry and CARNET, as the exact steps can vary.

A copy of the Decision is also submitted by the Ministry of Science and Education to CARNET Customer Service, which then contacts the new member and arranges an introductory meeting. At that meeting, the member's representatives are informed of the rights and obligations arising from the assignment of CARNET membership status and the procedure for connecting to the CARNET network.

What are the requirements a member must meet before joining the CARNET network?

In order to initiate the connection process as soon as possible, it is necessary for the institution to fulfill some administrative and technical requirements. Therefore, the following needs to be done as soon as possible:

1. to nominate the persons who will be responsible for contacting CARNET:

Institutions from the academic community:

  • ● Contact Person – CARNET Coordinator
  • CARNET system engineer for technical support contact.

Institutions from the education system:

  • Resource administrator
  • Directory administrator.

2. To sign a CARNET agreement that regulates the mutual rights and obligations related to the use of services and resources. CARNET will send the contract after the meeting has been held.

3. To meet the minimum technical requirements necessary to connect to each location as described in CDA0018.

Upon receipt of the appointment of the designated contact person for CARNET and notification that the minimum technical conditions have been met, CARNET will initiate the institution's connection procedure.

How to appoint contact persons with CARNET?

Forms for appointing contact persons with CARNET are available to the Principal of institutions in the application potpis.carnet.hr when selecting “Forms” on the toolbar or via a direct link:

Appointment form for Directory Administrator
Appointment form for Resource Administrator
Appointment form for e-Class Register Administrator

Other forms for appointing persons for contact with CARNET must be certified and signed by the here and they need to be certified and signed by the Dean/Principal of the institution and sent to our address:

Croatian Academic and Research Network – CARNET
Josipa Marohnića 5
10000 Zagreb

Once we have received the appointments, we will contact the appointed individuals to provide them with further instructions for the work.

The CARNET coordinator is responsible for managing and overseeing the CARNET program. This includes tasks such as coordinating activities, ensuring compliance with program guidelines, facilitating communication among participants, and reporting on program progress.

The CARNET coordinator is the official contact person for CARNET and the member. It is desirable for them to have the organizational capability to plan and encourage the best application and use of CARNET resources within the member institutions, and to organize the use and application of these resources.

Each institution can have only one appointed CARNET coordinator, regardless of the number of locations where the facility is located.

Once the institution has appointed a new CARNET coordinator, CARNET automatically discharges the duties of the person who previously performed this function.

The CARNET coordinator function should be performed by a qualified and experienced individual or a team, depending on the complexity and scale of the CARNET network. This role typically requires strong organizational, technical, and communication skills. Here are some key qualifications and responsibilities of a CARNET coordinator: **Qualifications:** * **Technical Expertise:** A deep understanding of the CARNET system, its components, and the underlying network technologies. This includes knowledge of networking protocols, hardware, software, and security best practices. * **Project Management Skills:** The ability to plan, execute, and monitor CARNET-related projects, manage resources, identify risks, and ensure timely completion. * **Communication and Interpersonal Skills:** Excellent verbal and written communication skills are essential for liaising with various stakeholders, including IT teams, end-users, vendors, and management. * **Problem-Solving Abilities:** The capacity to diagnose and resolve technical issues efficiently and effectively. * **Organizational Skills:** The ability to manage multiple tasks, prioritize effectively, and maintain accurate records. * **Security Awareness:** A strong understanding of cybersecurity principles and the ability to implement and enforce security policies related to the CARNET network. * **Familiarity with CARNET Policies and Procedures:** Knowledge of the specific rules, guidelines, and operational procedures governing the CARNET network. **Potential Roles that could perform the CARNET Coordinator Function:** * **Dedicated CARNET Coordinator:** In larger organizations, a specific role might be created for this purpose. * **Network Administrator/Manager:** Individuals responsible for managing the organization's overall network infrastructure often take on CARNET coordination responsibilities. * **IT Project Manager:** If CARNET implementation or upgrades are ongoing projects. * **Senior IT Support Staff:** Experienced support personnel who have a thorough understanding of the network. * **IT Operations Manager:** Overseeing the daily operations of the IT infrastructure, which would include CARNET. **Key Responsibilities:** * **System Monitoring and Maintenance:** Ensuring the CARNET network is operating optimally, monitoring performance, and scheduling regular maintenance. * **Troubleshooting and Issue Resolution:** Identifying and resolving network connectivity issues, performance problems, and security incidents. * **Configuration and Management:** Managing the configuration of CARNET devices, access controls, and user permissions. * **Security Enforcement:** Implementing and enforcing security policies to protect the CARNET network from threats. * **User Support and Training:** Providing assistance to users encountering issues with the CARNET system and potentially conducting training. * **Documentation:** Maintaining accurate documentation of the CARNET network, including configurations, procedures, and incident reports. * **Collaboration:** Working closely with other IT teams, departments, and external vendors. * **Policy Adherence:** Ensuring compliance with all relevant CARNET policies and regulatory requirements. * **Reporting:** Providing regular reports on CARNET network performance, security status, and any significant issues to management. The specific choice of who performs this function will depend on the organization's structure, the size and complexity of its CARNET network, and its available IT resources.

The CARNET coordinator is the person who notifies CARNET of any changes and needs of the institution, including administrative changes, CARNET equipment status reports, and requests for CARNET to upgrade communication equipment or connections.

CARNET Coordinator's duties include, among other things, informing users and management about CARNET activities, preparing CARNET annual reports, raising awareness of the benefits of information technology in the institution's day-to-day operations (more actively using IT), and cooperating with the administration and a system engineer to optimize equipment use and achieve quality of service for CARNET users. Coordinators from all institutions actively participate in the work of the Users Board, an advisory body to the CARNET CEO.

The function of a CARNET system engineer is to design, implement, and maintain the CARNET network infrastructure. This includes: * **Network Design and Architecture:** Planning and designing the overall network topology, ensuring scalability, reliability, and security. * **Implementation and Deployment:** Setting up and configuring network devices such as routers, switches, firewalls, and servers. * **Network Monitoring and Performance Tuning:** Continuously monitoring network performance, identifying bottlenecks, and optimizing configurations to ensure smooth operation and high availability. * **Troubleshooting and Resolution:** Diagnosing and resolving network issues, outages, and performance problems promptly. * **Security Management:** Implementing and maintaining network security measures, including firewalls, intrusion detection/prevention systems, and access controls, to protect against cyber threats. * **Capacity Planning:** Forecasting future network needs and planning for capacity upgrades to accommodate growing traffic demands. * **Vendor Management:** Interacting with network hardware and software vendors for equipment procurement, support, and updates. * **Documentation:** Creating and maintaining detailed documentation of the network configuration, policies, and procedures. * **Collaboration:** Working with other IT teams, departments, and external partners to ensure seamless integration of the CARNET network with other systems and services. * **Stay Updated:** Keeping abreast of the latest networking technologies, trends, and best practices to continuously improve the CARNET system.

CARNET system engineers are individuals with adequate technical education and experience in working with computer technologies, through which they provide CARNET's technical support for the computer communication resources made available to members. One of their responsibilities is the maintenance of CARNET equipment located at the member's facility.

Each institution can only have one appointed CARNET system engineer, irrespective of the number of locations where the facility is situated.

Once the institution has appointed a new CARNET system engineer, the duties of the person who previously performed this function are automatically discharged.

The function of the directory administrator is to manage and maintain a directory, which is essentially a database of information, often for users, files, or other resources within a system or network. This management typically involves: * **Creating and deleting entries:** Adding new users, files, or resources, and removing those that are no longer needed. * **Modifying attributes:** Updating information associated with entries, such as user names, passwords, contact details, permissions, or locations. * **Managing access control and permissions:** Defining who can access what information or resources and what actions they are allowed to perform. * **Ensuring data integrity and security:** Implementing measures to protect the directory from unauthorized access, corruption, or loss, and ensuring the accuracy and consistency of the data. * **Performing backups and restores:** Regularly backing up the directory data to prevent loss and being able to restore it in case of failure. * **Monitoring performance and availability:** Ensuring the directory is functioning efficiently and is accessible when needed. * **Troubleshooting issues:** Diagnosing and resolving problems related to directory access, performance, or data integrity. * **Implementing policies and standards:** Enforcing rules and guidelines for how the directory is used and maintained. The specific responsibilities can vary depending on the type of directory being managed. For example, a directory administrator for an operating system (like Active Directory) will have different tasks than an administrator for a web directory or a document management system.

The directory administrator is the official school representative, who must be a staff member, appointed by the Principal. The Directory Administrator is a CARNET-related and member-related function, and is not a job. The Administrator is obligated to respect and enforce decisions and to respect recommendations made by CARNET regarding CARNET resources made available to the member.

The Directory Administrator is an administrator in the school responsible for updating the LDAP directory. Directory updating is of utmost importance since the directory is part of a unique authentication and authorization infrastructure (AAI).

It is recommended that the administrator be a school employee who is otherwise responsible for keeping a student register, meaning one of the school's administrative staff.

At the beginning of each school year, the administrator updates the directory, i.e. adds electronic identities for new AAI@EduHr students and teaching staff, and removes users who no longer have student status or school staff who are deleted from the database. In addition to the obligation to update the directory annually, the directory administrator is obliged to update the status of the directory (e.g., arrival/departure of new teaching staff or students from/to the school).

The form for appointing a directory administrator can be downloaded here.

The function of a resource administrator is to manage and control access to resources within a system. This includes tasks such as: * **Granting and revoking permissions:** Determining who can access specific resources and what actions they can perform (e.g., read, write, execute). * **Monitoring resource usage:** Tracking how resources are being utilized to identify bottlenecks, optimize performance, and ensure fair allocation. * **Enforcing security policies:** Implementing and maintaining security rules to protect resources from unauthorized access, modification, or deletion. * **Allocating resources:** Assigning resources to users, processes, or applications based on defined policies and requirements. * **Auditing access:** Maintaining logs of resource access and modifications for security and compliance purposes. * **Managing resource lifecycles:** Overseeing the creation, maintenance, and eventual retirement of resources. In essence, a resource administrator acts as a gatekeeper and manager to ensure that resources are used efficiently, securely, and according to established rules. The specific resources they manage can vary widely, from physical hardware (like servers, storage, printers) to software (like licenses, applications, databases) and even data.

The resource administrator is the official representative of the school and must be a staff member, appointed to this role by the Principal. The resource administrator is obligated to respect and enforce decisions, and to respect recommendations made by CARNET regarding CARNET resources made available to the member.

The resource administrator is an IT-educated person in charge of allocating resources to end-users. They can only allocate resources that CARNET has provided to his school to users within his school.

On behalf of the school, he may request additional resources from CARNET and establish technical contacts regarding the computer communication resources CARNET has made available to the member. If a member has a larger number of individuals, associates, or institutions responsible for the member's computer communication and information infrastructure, the officially appointed resource administrator is the sole point of contact for technical communication between the member and CARNET.

In the name of the Member, they are responsible for the accuracy and stability of the resources that CARNET has made available to the Member, as well as for the general technical and security status of the computerized communication system that is part of the CARNET network.

The resource administrator appointment form can be downloaded here.

How to revoke a CARNET system engineer and CARNET coordinator or directory administrator and resource administrator?

Each institution can only have one CARNET coordinator and one CARNET system engineer or one resource administrator and one directory administrator, and each new appointment will automatically revoke the old one. Therefore, no formal dismissal is required.

You have received the Decision on connection and met the minimum technical conditions. Why is the connection to the CARNET network taking so long?

After receiving notification of minimum technical conditions for appointing and receiving appointments for contact persons, CARNET immediately begins negotiating the method and possibilities of connection with telecommunications operators. However, the actual implementation depends on CARNET's budget and the procurement process. This can be due to a lack of adequate telecommunication infrastructure for connecting the site.

Where to send a notice that your institution has met the minimum technical conditions?

Once the institution meets the minimum technical requirements stipulated in the CDA0018 and is therefore ready to join the CARNET network. It is not necessary to send a memo to CARNET. It is sufficient to inform the Helpdesk at helpdesk@carnet.hr via e-mail.

Does the member have the right to connect multiple additional locations to the CARNET network?

Regardless of membership type, CARNET members have the right to connect an unlimited number of additional locations to the CARNET network. The decision to include an additional location in the plans for joining the CARNET network is made by the Minister of Science and Education individually for each additional location.

How to request the connection of an additional location to the CARNET network?

The decision to include an additional site in the plans for joining the CARNET network is made by the Minister of Science and Education.

To request additional locations from the Ministry for a connection, please fill out the form and send it to the address indicated on the form. In the case of relocation from one site to another, you must specify the original location from which the institution is moving in order to transfer the operator's leased lines, and state the address/location for which the new connection is required.

Form for connecting/disconnecting additional locations for academic institutions.

Form for connecting/disconnecting additional locations for institutions from the education system.

What to do after you receive a decision on connecting an additional location?

A copy of the Decision shall also be obtained by CARNET Customer Service, which shall inform member representatives of the conditions to be met to begin the joining process as soon as possible (CDA0018). The procedure is the same as for connecting the base location – when the CARNET coordinator informs CARNET via email at helpdesk@carnet.hr that the conditions are met and the connection process shall begin.

What to do if the institution moves to another location?

If a member of the CARNET network moves to another location, it must apply for a change of location to the Ministry of Science and Education at the following address:

Ministry of Science and Education

Donje Svetice 38

10000 Zagreb

The application is submitted by filling in:

Relocation Form for the Academic Community

or

Form for Relocation of a School or a Student Dormitory

Once both the institution and CARNET receive the Ministry’s decision, the procedure is the same as for connecting the base location.

Does CARNET assign computer equipment to its member institutions?

CARNET does not assign its computer equipment to its members.

The co-operation of member institutions and CARNET looks like a collaborative partnership focused on supporting and advancing the use of information and communication technologies (ICT) within the Croatian academic and research community. This co-operation typically involves: * **Service Provision and Utilization:** CARNET provides a range of essential ICT services to its member institutions (universities, colleges, research institutes). These services include high-speed internet connectivity, secure network infrastructure, cloud services, identity and access management, e-learning platforms, digital content repositories, and specialized research networks. Member institutions utilize these services to enhance their teaching, research, and administrative operations. * **Development and Implementation of New Services:** CARNET works in close consultation with its members to identify emerging needs and to develop and implement new ICT solutions. This often involves pilot projects, feedback mechanisms, and joint development efforts to ensure that the services are relevant, effective, and meet the specific requirements of the academic community. * **User Support and Training:** CARNET offers technical support and training programs to the staff and students of its member institutions. This ensures that users can effectively leverage the available ICT resources and services. Training might cover new technologies, cybersecurity best practices, or the use of specific CARNET applications. * **Consulting and Advisory Services:** CARNET provides expert advice and consultation to member institutions on ICT strategy, infrastructure development, cybersecurity, and digital transformation initiatives. This helps institutions make informed decisions about their technology investments and implementations. * **Community Building and Knowledge Sharing:** CARNET acts as a hub for the Croatian academic and research ICT community, fostering collaboration and the sharing of best practices among institutions. This includes organizing conferences, workshops, and other events where members can connect, exchange ideas, and learn from each other. * **Policy and Standards Development:** CARNET plays a role in developing and promoting ICT policies and standards within the academic and research sector, contributing to interoperability, security, and efficiency across the community. * **Research and Development (R&D) Support:** CARNET supports research activities by providing access to advanced computing resources, specialized networks for scientific collaboration, and tools for data management and analysis, often in collaboration with research groups within member institutions. In essence, the co-operation is a symbiotic relationship where CARNET provides the infrastructure, services, and expertise, and member institutions actively engage with these offerings, provide feedback, and contribute to the collective advancement of ICT within the Croatian academic and research landscape.

Both the institution and CARNET are obliged to fulfill the provisions of the signed contract, which ensures the highest quality of cooperation. This implies, among other things, that each CARNET member institution should:

  • Grant the right to use CARNET resources and enable the continuous opening of the electronic identity in AAI@EduHr
  • regularly inform all its users (employees, pupils, students) about CARNET's services and policies
  • enable the promotion and presentation of CARNET activities and activities at the institution
  • Prevent the use of CARNET services from endangering other Internet systems.
  • Establish and maintain WWW and directory services
  • Publish and update information on the institution's activities and prevent the use of information services by third-party institutions.
  • notify CARNET of any technical upgrades to existing local computer infrastructure that provide additional access to resources CARNET offers members
  • The academic community institution needs to have an updated DNS server for the institution, the LDAP server, and the RADIUS server.
  • have antivirus protection for outgoing email
  • The institution must not charge for access to or use of CARNET resources, either directly or indirectly, and may not permit the use of the institution's information services for commercial purposes.
Annual reports are comprehensive summaries of a company's activities throughout the preceding year. They are a key method of communication between a company and its stakeholders, including shareholders, employees, customers, and the general public. These reports typically include financial statements, a management discussion and analysis of the company's performance, and information about the company's vision and strategic direction. **Who needs to fill them up?** In most cases, **publicly traded companies** are legally required to prepare and file annual reports with regulatory bodies like the Securities and Exchange Commission (SEC) in the United States. This is to ensure transparency and provide investors with the information they need to make informed decisions. While not always a legal requirement, **privately held companies** may also choose to create annual reports for their stakeholders. This can be beneficial for: * **Attracting Investors:** A well-prepared annual report can showcase the company's performance and potential to potential investors. * **Reporting to Lenders:** Banks and other financial institutions may require annual reports to assess the company's creditworthiness. * **Internal Communication:** It can be a valuable tool for communicating company progress and achievements to employees and management. * **Building Trust and Transparency:** Even without a legal mandate, providing an annual report can foster trust with customers and the broader community. Therefore, while public companies are mandated to produce them, private companies can also benefit significantly from creating and distributing annual reports. The specific content and format of an annual report can vary depending on the company's size, industry, and reporting obligations.

The annual reports are a survey conducted by Customer Service to track customer satisfaction and the ability to introduce new technologies and services to the CARNET network. According to the agreement between CARNET and member institutions, the Annual Reports are

prepared by CARNET coordinators and resource administrators. Based on the report, CARNET and the Ministry are trying to improve their services, monitor the need for the use of certain technologies and the utilization of the allocated resources.

Membership in the CARNET network is terminated in the following cases:

CARNET membership status ends in one of the following ways:

  • by the decision of the Minister of Science and Education if a member fails to comply with some of the terms based on which it was granted the status of a CARNET member
  • by the expiration of the period for which the member was granted status (for temporary members)
  • if the institution does not meet the requirement or violates the terms of the mutual agreement between the member and CARNET
  • by decision of the CARNET Governing Council (for temporary members who have acquired status by decision of the Governing Council).
Whom should I contact if I have problems with the CARNET connection?

In the event of a problem with the connection to the CARNET network, you should contact the Helpdesk by e-mail at helpdesk@carnet.hr or by phone +385 1 6661 555.

Who to contact with any additional questions?

In case of additional questions, please contact the Helpdesk at e-mail helpdesk@carnet.hr or by phone +385 1 6661 555.

Domains

The most common questions and answers can be found on the web page Domene.hr.

 

CARNET Web for Schools

How to activate CMS?

In order for the school to use the CARNET CMS system, it is necessary to activate it through the administration application at http://admin.skole.hr.

In the menu on the left, you need to select “Web” and then “Web on Content Management System“.

Once activation is complete, please wait a few minutes for the website to appear at the school's address.

After activation, other individuals authorized by the resource administrator can participate in the administration of the school's website. See also: “Who can administer the school page?”

Who can administer the school page?

The CMS activation process for schools at admin.skole.hr can only be initiated by the resource administrator (AR). It is recommended to use this role when contacting CARNET Support Services for CMS for Schools.

A registry administrator (AI) in a newly created school web in CMS may or may not have the same authority as the resource administrator.

If more people need to edit the school website in the CMS, it is recommended to use the Group module to create a new group of authorized users in the CMS. See also the question: “Can students edit part of the school page?"

What information do I need to log in to the administration?

To administer, you must log in with the username and password assigned to the resource administrator.

If the resource administrator has no user data, the directory administrator can assign it to them.

Can static web and CMS be used together?

Due to the way the HUSO system works, it is not possible to use both a static and a dynamic website simultaneously at the same address: www.nameoftheschools.skole.hr.

How to add a module?

The module can be added after you log on to the school’s website as a resource administrator.

In the “Portal Management” menu, select “Edit Page,” then click the down arrow in the column where you want to add the module. Choose a module that will be visible on that page only or on all pages.

Can students edit parts of the school page?

All students added to the HUSO system and synchronized within the school system's CMS can edit the personalized section of the website.

Exceptionally, if the resource administrator permits a student to administer the entire page by granting them administrative privileges, the student can edit the entire school page.

How do I delete a link from navigation?

To delete the link from the navigation, you must select “Administration” in the “Portal Management” menu after logging in.

Inside the administration on the left, select the link you want to delete and delete it by clicking “Delete”. Once you have set the navigation correctly, choose “Save All Changes” from the right.

Yes, you can set up your own CSS file.

It is possible to set up your own CSS file and change the appearance/color of the website. Detailed instructions can be found on this link. 

We must note that the ‘CMS for schools’ is constantly being upgraded and optimized, so it is sometimes possible to apply the names of ID elements and their classes in the templates. In this case, if you are using your own CSS file, it is possible that something will not look as originally intended until your own CSS has been updated.

Can I change colors as desired?

The layout and colors of school web pages created within the CMS are determined by the selected template, so it is not possible to change colors except by choosing another template.

How to upload files via FTP when using a CMS for schools?

When “Web” is selected as the web type in the content management system (CMS), additional files cannot be uploaded to the FTP server; instead, the "Document Archive" module is used for this purpose.

How to sync with the HUSO directory?

At the initial CMS-based web, all users who have been added to the HUSO school system directory shall automatically be synced with the CMS.

When you add a user to the HUSO directory later, synchronization can be done by selecting “Contacts from directory” under “Portal Management” and then clicking “Add new users.” Adding new users depends on the School Year Settings. 

How to set up a new school year?
  • The first requirement is that there are students enrolled in the HUSO directory for the new school year.
  • It is necessary to start the synchronization of the users with the directory (then the new information about the students is retrieved from the HUSO system).
  • only then will the new school year appear in the drop-down menu

If the current year is not explicitly defined as ‘current’, the system shall automatically determine the year to be used from the date, so that the “transition” to the next year shall occur on October 1st.

The school may, if necessary, advance the school year and schedule the following one to change timetables and grade lists earlier than planned (1.10).

Can I install my own modules/modules from other CMS systems?

Currently, it is not possible to create your own modules. Modules from different CMS systems are not compatible and cannot be installed on CARNET CMS.

Yes, CMS can be used outside of school.

Since CARNET CMS installation runs automatically on the space provided for schools, its installation is not possible on other servers.

How to properly add a Flash video/object?

Below is a typical “troublesome” Flash video that interferes with website administration and how this behavior of different Flash objects can be regulated.

As you can see, the video covers the surface for editing the Static HTML module. To avoid such a situation, click on the Flash icon (choose “f”) when adding the flash object, select “Properties,” and choose “Transparent” from the “Window Type” menu.

What will happen to the content of the page if I change my chosen layout?

You can change the page layout independently of the content. Regardless of template changes, all content posted on the school's website will remain in place but will be presented through the newly selected visual.

We deleted the home page, what now?

One of the most common mistakes when administering CARNET CMS is seemingly deleting a homepage.

The same thing happens if you set a “Clean” layout that will then display a clean white page on the Homepage.

Since it is a CMS, the homepage has not been destroyed and can still be managed if an administration link is accessed, which is in the form of: www.imeskole.skole.hr/admin/sites?asid=1

You need to set a previously selected layout, and the Homepage will be redisplayed in the desired format. 

Is it possible to restore the lost data back to the page?

CARNET CMS users are solely responsible for the content posted on their school website, its installation, and maintenance.

In the event of data loss, backup of the content is possible only in cases when data is lost:

  • due to errors in the operation of the CMS system that were not caused by the user,
  • As a result of malicious security attacks on CMS.

In all other cases, restoring data backups is not possible.

CARNET Webmail

Webmail isn't accepting my password. What should I do?

Your system administrator at the institution is responsible for managing your passwords, meaning the administrator of the user directory for the education system. You cannot find or change either of the two required passwords through a webpage, nor can we do it for you.


After contacting a system engineer or a directory administrator, I was told that everything was fine in my institution. Who should I contact now?

From any other e-mail account, send a description of the problem to helpdesk@carnet.hr and make sure you include all the relevant information (first name, last name, user account, and the name of the server or institution where your e-mail account is located). Problems with webmail are possible, but they are far fewer than password problems or issues with mailboxes at the parent institution.


How do webmail interfaces change (dynamic, traditional, minimalist)?

After logging into Webmail, follow the series of links: “Options” -> “Edit options for” -> “Global Options” -> “Select your view mode”. Select the desired display mode here.

If you use the Croatian translation interface, the sequence shall be: “Options” -> “Edit options for” -> “Global options” -> “Display options” -> “Select display mode”.


I cannot find my e-mail server in the mail server list, what do I do?

Report a problem to Helpdesk (helpdesk@carnet.hr), which will forward your inquiry to the webmail team. After verification, the server will be added to the server list.

If the server is unofficial or does not belong to the category of servers that we add to the predefined list, you can add multiple e-mail servers within the same AAI@EduHr identity. Instructions can be found on the “User Instructions” link.

CARNET Services School Hosting

How to get user data in the AAI@EduHr electronic identity system?

A school administrator is responsible for opening AAI@EduHr accounts for all students and teachers.

The school has appointed a new administrator, what is the procedure?

In the CARNET (Croatian Academic and Research Network) Registration form for primary and secondary schools and student dormitories It is necessary to state the name of the new administrator and send the completed form to the CARNET address.

The user's electronic identity has expired (the expiration date of basic connectivity has passed). How can the user regularize their status?

If a user is a primary or secondary school student, the registry administrator has the authority to extend their electronic identity for the remainder of their school days. It is also possible to extend the status of employees with fixed-term contracts until their expiry or enter NONE for permanent contracts. These actions are performed in the CADMIN application.

What are students and teachers allowed to use within HUSO?

At the School Portal, in the Schools section on the right, there is a module “Important documents” containing a list of important documents for school staff and students. These include CARNET services for school staff, CARNET services for elementary school students and CARNET services for secondary school students.


The Registry Administrator (RA) does not have user data to access HUSO. What is the proper procedure?

Please contact the CARNET User Support Service via email at helpdesk@carnet.hr or by fax at +385 1 6661 630 and submit a request for user data. After verification, user data will be sent to the registry administrator.

How to set up and use webmail for reading and sending emails?

At the School Portal In the Schools section on the right, there is a module titled “Important Documents” containing a list of important documents for school staff and students. One of them is a CARNET webmail interface manual Here are detailed instructions on how to create a new email account: **1. Choose an Email Provider:** There are many free email providers available. Some of the most popular and reputable ones include: * **Gmail (Google):** Offers a large storage capacity, excellent spam filtering, and integration with other Google services. * **Outlook (Microsoft):** Provides a clean interface, good integration with Microsoft products, and generous storage. * **Yahoo Mail:** A long-standing provider with a feature-rich interface and good spam protection. * **ProtonMail:** Focuses on privacy and security with end-to-end encryption. * **Zoho Mail:** Offers a professional-looking interface and good for business use. You can find others by searching for "free email providers" online. For this guide, we'll use **Gmail** as an example, but the steps are generally similar for most providers. **2. Go to the Email Provider's Website:** Open your web browser and go to the website of your chosen email provider. * For Gmail: `www.gmail.com` * For Outlook: `www.outlook.com` * For Yahoo Mail: `www.mail.yahoo.com` **3. Look for the "Sign Up" or "Create Account" Option:** On the homepage of the email provider, you'll typically see options to "Sign In" or "Sign Up/Create Account." Click on the **"Sign Up"** or **"Create Account"** button. **4. Fill Out the Registration Form:** You will be presented with a form asking for your personal information. The exact fields may vary, but generally include: * **First Name and Last Name:** Enter your legal name. Some providers may allow you to use a nickname later if desired. * **Desired Username (Email Address):** This is crucial. Your username will be the unique part of your email address (e.g., `yourname`@gmail.com). * **Tips for choosing a username:** * Make it professional if you plan to use it for work or important communications (e.g., `firstname.lastname` or `initiallastname`). * If it's for personal use, you can be more creative. * Keep it relatively short and easy to remember. * Avoid using numbers excessively or characters that might be confusing (like "l" and "1"). * The provider will usually tell you if your desired username is already taken, and offer suggestions. * **Password:** Create a strong, memorable password. * **Tips for creating a strong password:** * Use a combination of uppercase and lowercase letters, numbers, and symbols. * Make it at least 8-12 characters long. * Avoid using easily guessable information like your name, birthday, or common words. * Consider using a password manager to generate and store strong passwords. * **Crucially, do NOT reuse passwords from other accounts.** * **Confirm Password:** Re-enter your chosen password to ensure you've typed it correctly. * **Date of Birth:** This is usually required for age verification. * **Gender (Optional):** Some providers ask for this, but it's often optional. **5. Security Information (Account Recovery):** Most email providers will ask for additional information to help you recover your account if you forget your password or if it's compromised. This often includes: * **Recovery Phone Number:** Entering a phone number allows the provider to send you a verification code via SMS if you need to reset your password. * **Recovery Email Address:** Providing an alternative email address (if you have one) can also be used for recovery. **6. Verify Your Identity:** To prevent bot registrations, you'll likely need to verify that you're a human. This usually involves: * **Google's reCAPTCHA:** You might need to click "I'm not a robot" and possibly complete a quick challenge (e.g., selecting images). * **SMS Verification:** If you provided a phone number, you might receive a text message with a code that you need to enter on the website. **7. Review and Agree to Terms of Service and Privacy Policy:** You'll be presented with the provider's Terms of Service and Privacy Policy. It's important to at least skim these to understand how your data will be used. You'll need to check a box to indicate that you agree to these before proceeding. **8. Click "Create Account" or "Next":** Once you've filled out all the required fields and agreed to the terms, click the final button to create your account. **9. Welcome and Setup (Optional):** After creation, you might be greeted with a welcome screen. Some providers offer a quick tour or prompts to personalize your account by: * **Choosing a theme or layout.** * **Setting up your profile picture.** * **Importing contacts from other services.** **10. Start Using Your New Email Account!** You're now ready to send and receive emails! Navigate to your inbox and explore the features of your new email account. **Tips for Maintaining Your New Email Account:** * **Keep your password secure.** Don't share it with anyone. * **Enable two-factor authentication (2FA)** if available. This adds an extra layer of security by requiring a second verification step (like a code from your phone) when signing in. * **Be cautious of phishing emails.** Don't click on suspicious links or download attachments from unknown senders. * **Organize your inbox** using folders or labels. * **Regularly check your spam folder** for legitimate emails that might have been incorrectly flagged.

In HUSO, to read and send mail, you need the following data: **For Reading Mail:** * **Account Credentials:** * Email Address (username) * Password (for the email account) * **Server Settings:** * Incoming Mail Server (IMAP or POP3) address * Incoming Mail Server Port * Encryption Method (SSL/TLS, STARTTLS, or None) * **Optional:** * Server Authentication details (if different from the email password, though usually not required) **For Sending Mail:** * **Account Credentials:** * Email Address (sender's address) * Password (for the email account) * **Server Settings:** * Outgoing Mail Server (SMTP) address * Outgoing Mail Server Port * Encryption Method (SSL/TLS, STARTTLS, or None) * **Optional:** * Server Authentication details (if different from the email password, though usually not required) * Sender's Display Name (the name that appears in the "From" field) Essentially, you'll need all the information you'd typically use to configure an email client like Outlook, Thunderbird, or Apple Mail.

To use the email service, you need a HUSO identity to log into the CARNET webmail interface, as explained in the previous answer. It is possible to set up your own client account (MS Outlook, Thunderbird, etc.) as instructed on a link.

When logging into HUSO, it indicates that the user is not in the system (electronic identity not created). How to proceed?

To avoid this situation, it is important to select “Create” at the end of creating an account. In cases of prior employment, it is possible that the user has not been signed out by the previous organization. Oftentimes users have been employed in organizations other than schools, so a new account needs to be opened.


How to increase web space?

To request an increase in web space from the CARNET User Support Service, please provide the exact amount of space you require and the reason for the increase.

There is a problem with the personal identification number (OIB) when entering a new user into HUSO.

One of the most common mistakes is incorrectly entered personal identification number (OIB) or the control digit itself is invalid.

How can users change the password for their electronic identity in HUSO?

The password can be changed at https://webmail.skole.hr (My account -> password) or at http://lozinka.skole.hr


How to embed school web pages on HUSO servers?

The instructions for setting up the webpages with different FTP clients are available at http://www.skole.hr/dokumenti?dm_show_folder=534

You enter the date the staff member's employment is set to expire in YYYY-MM-DD format.

For employees with fixed-term contracts, enter the end date of the contract, and for permanent employees, enter NONE.

CARNET Video Conferences

How much time does it take to activate the service?

After receiving your request, the Multimedia Service will send you information on how to start using the service within one business day at the latest. Of course, we will always try to respond in a short period.

The recommended configuration for using the RealPresence Desktop application includes: **Hardware:** * **Processor:** Intel Core 2 Duo 2.0 GHz or higher; Intel Core i3/i5/i7 recommended for HD quality. * **RAM:** 2 GB minimum, 4 GB or more recommended for HD quality. * **Hard Drive Space:** 250 MB for application installation, plus space for recordings if applicable. * **Network Card:** Gigabit Ethernet recommended for optimal performance. Wi-Fi can be used but may be less stable. * **Webcam:** High-definition webcam (720p or 1080p) for clear video input. * **Microphone:** Integrated microphone or an external headset with a microphone for clear audio input. * **Speakers/Headset:** For clear audio output. **Software:** * **Operating System:** * Windows 10 (64-bit) * Windows 11 (64-bit) * macOS 11 (Big Sur) or later * **Web Browser:** While the application is desktop-based, it may require a compatible web browser for certain features or initial setup. * **Other Software:** Ensure your operating system is up-to-date with the latest service packs and security updates. * **Drivers:** Latest audio and video drivers for your hardware. **Network:** * **Bandwidth:** * **SD (Standard Definition):** 512 kbps upload and download * **HD (High Definition) 720p:** 1.5 Mbps upload and download * **HD (High Definition) 1080p:** 3.0 Mbps upload and download * **Content Sharing:** Higher bandwidth may be required for smooth sharing of high-resolution content. * **Internet Connection:** Stable broadband internet connection. * **Firewall/NAT Traversal:** Ensure that firewalls and NAT devices on your network are configured to allow RealPresence Desktop traffic. This may involve opening specific ports. * **Quality of Service (QoS):** If available, configure QoS on your network to prioritize RealPresence Desktop traffic to ensure call quality. **Specific Considerations:** * **Screen Resolution:** A minimum screen resolution of 1024x768 is recommended. Higher resolutions (e.g., 1920x1080) are ideal for HD experiences. * **Dual Monitors:** Support for dual monitors can enhance the user experience, allowing for separate viewing of video and shared content. * **Peripheral Compatibility:** Ensure that any external webcams, microphones, or speakers you intend to use are compatible with your operating system and the RealPresence Desktop application. **Note:** These are general recommendations. For the most up-to-date and specific requirements, always refer to the official Poly (formerly Polycom) documentation for the particular version of RealPresence Desktop you are using.

The recommended computer configuration to meet the HD ready standard/720p is an Intel Core i3 Dual Core 2.5 GHz processor or better (up to 30 frames per second), or an Intel Core i5 Quad Core 2.0 GHz processor or better (up to 30 frames per second). Supported operating systems include Windows 10, Windows 7 (32-bit or 64-bit), and Windows 8 and 8.1 Standard, Pro, and Enterprise (32-bit and 64-bit). You will need 200 MB of disk space, 4 GB of RAM, and 256 MB of video memory or more. For an improved experience, we recommend using a USB camera or built-in webcam with a minimum resolution of 720p, and a 3.5 mm headset (with microphone) or a USB headset (with microphone) for standalone system use.

When you open an app download link, the page reports an error that the resource is unavailable.

Please try again to open the link on our site, or manually find the application on Polycom pages.

Where are the TCR classrooms?

TCR classrooms can be viewed on the map, and their functionality, availability, and reservation must be made on the website: http://tcr-rezervacije.carnet.hr Some rooms are currently unavailable due to technical malfunctions or are permanently out of order.

Why do I have problems following webinars or video conferencing?

We recommend using a wired internet connection instead of wireless, and we recommend using the listed applications. If you continue to experience issues, there may be a problem with your bandwidth connection, your local devices, or your computer.

Office 365 for Schools

Content Filtering

Will websites I access from home also be filtered?

No, the ban on displaying unsuitable websites only applies to internet access from computers in primary and secondary schools and to those higher education institutions that requested inclusion in the system.

.

Which categories will be filtered by this service?

By decision of the Ministry of Science and Education, web pages are filtered through the following 18 mandatory categories:

  • Adult
  • Alcohol
  • Cheating and Plagiarism
  • Child Abuse Content
  • Dating
  • Extreme
  • Filter Avoidance
  • Gambling
  • Hacking
  • Hate speech
  • Illegal Activities
  • Illegal Downloads
  • Illegal Drugs
  • Lotteries
  • Non-sexual Nudity
  • Pornography
  • Tobacco
  • Weapons

 

By completing the Request for inclusion in the incidental content filtering system, additional categories can also be filtered. When completing a request, the responsible person decides which of the 78 offered categories shall be banned for display within their institution.

Which type of traffic should be filtered?

Only unencrypted network traffic over HTTP protocols and encrypted network traffic over HTTPS protocols shall be filtered. In the filtering of encrypted network traffic, the system does not have the ability to read the content itself, so that its processing does not undermine user privacy.

Which types of traffic shall not be filtered?

Any other traffic that does not pass through the HTTP and HTTPS protocols shall not be filtered: e-mails, P2P protocols, instant messengers, FTP, news messages, and more.

I have noticed that a site that does not contain any inappropriate content is filtered. Is there someone I can report this to?

If you believe that the site is categorized incorrectly, please send it to the e-mail address filtriranje@skole.hr and our administrators will check the query and notify you of the action taken.

Abuse Service

The CARNET Abuse service is a platform used to report and manage misuse of telecommunications services. It likely helps to identify and prevent fraudulent activities, spam, or other violations of service terms.

The CARNET Abuse service collects and processes requests related to computer security incidents and the misuse of CARNET resources.

The users of the CARNET Abuse Service are the members of the CARNET network, which includes: * Universities and research institutions in Croatia * Educational institutions (schools) * Institutions and organizations involved in science and education * Students, researchers, and staff at these institutions

The CARNET Abuse service users are all persons reporting an incident or a violation of acceptable online behavior committed by a CARNET user. The applicant itself does not have to be a CARNET user.

The CARNET Abuse Service is based on the following core principles: * **Fairness and Objectivity:** Investigations are conducted impartially, based on evidence and established policies. * **Proportionality:** Actions taken in response to abuse are proportionate to the severity and impact of the violation. * **Confidentiality:** Information gathered during investigations is handled with strict confidentiality, respecting the privacy of all parties involved. * **Transparency (within limits):** While investigations require discretion, the service aims to be as transparent as possible regarding its processes and general outcomes, without compromising ongoing investigations or privacy. * **Education and Prevention:** Beyond addressing incidents, the service actively works to educate users about acceptable use policies and best practices to prevent future abuse. * **Collaboration:** The service works with other organizations, law enforcement, and relevant bodies when necessary to address complex or serious issues. * **Timeliness:** Investigations are handled as promptly as possible to minimize disruption and ensure timely resolution.

The starting point for each action is the fact stated in the received incident report. The Abuse Service accurately and precisely examines the available data for taking further steps. Each submission is classified according to the specified incident categories. If the Service receives a report indicating multiple potential offenses, the one assessed as most serious is processed first. The Service respects user privacy, and data is processed in the manner described in the Service's rules. The Service sends data to third parties solely based on a court order or at the request of the police during an investigation. All correspondence is archived.

To contact

You can contact the CARNET Abuse Service by email at abuse@carnet.hr or by phone at +385 1 6661 655.

Computer incidents are sent via e-mail only to abuse@carnet.hr. 

The working hours of the CARNET Abuse Service are from 9 AM to 4 PM.

CARNET collects traffic data from its users through various methods, primarily by analyzing the data transmitted by connected vehicles equipped with CARNET technology. This includes information such as: * **Vehicle positioning data:** GPS and other location data allow CARNET to track vehicle movement and speed. * **Speed and acceleration data:** This helps in understanding traffic flow and identifying congestion. * **Braking patterns:** This can indicate sudden stops due to traffic, accidents, or other events. * **Road conditions (in some cases):** Depending on the vehicle's sensors and CARNET's capabilities, information about road surface conditions might be gathered. * **On-board diagnostics (OBD) data (potentially):** Some vehicle performance data could be accessed if explicitly permitted and configured for CARNET. CARNET typically uses a combination of on-board units (OBUs) in vehicles and mobile applications to gather this information. The data is then aggregated and anonymized to create real-time traffic maps and analytics, which can be used to: * Provide drivers with up-to-date traffic information and route guidance. * Help traffic management authorities optimize traffic flow. * Inform urban planning and infrastructure development. * Potentially used for research and development of automotive technologies. It's important to note that CARNET, like many data collection services, emphasizes user privacy and anonymization of the collected data.

By the Electronic Communications Act, CARNET, as an Internet Service Provider, is obligated to retain data related to customer connections to the Internet. Accordingly, CARNET maintains a database of all its users' connections. Furthermore, by the same Act, the operator of public communication networks and publicly available electronic communication services is obliged to retain electronic communication data needed to determine the source, destination, time, duration, and type of communication. It is forbidden to retain data revealing the contents of communication. The CARNET Abuse Service responds exclusively to user emails. Retained data are disclosed only to employees of the Ministry of the Interior and the Ministry of Justice upon presentation of a warrant.

CARNET Abuse Service applies to the following types of incidents: * **Spam:** Unsolicited bulk email. * **Phishing:** Attempts to obtain sensitive information through deceptive emails or websites. * **Malware:** Distribution of malicious software (viruses, trojans, ransomware, etc.). * **Scams:** Fraudulent schemes designed to trick individuals into giving money or personal information. * **Hacking/Unauthorized Access:** Attempts to compromise computer systems or accounts. * **Harassment/Cyberbullying:** Abusive or threatening behavior online. * **Child Exploitation Material:** Illegal content related to child abuse. * **Intellectual Property Infringement:** Unauthorized use of copyrighted or patented material. * **Denial of Service (DoS/DDoS) Attacks:** Attempts to disrupt the availability of online services. * **Fraudulent Websites:** Websites designed for illegal or deceptive purposes. * **Doxing:** Publishing private or identifying information about an individual without their consent. * **Misinformation/Disinformation:** Spreading false or misleading information with malicious intent. * **Illegal Content:** Any content that violates applicable laws or regulations.
  • The CARNET Abuse Service warns and sanctions CARNET network users who have violated any provision of the “Decision on the Acceptable Use of CARNET Network” and the generally accepted user behavior norms in individual communication or communication within a group. In summary, these are:
    • spam – unwanted, usually commercial messages distributed to disproportionately large numbers of users
    • Copyright infringement – distribution of content such as pirated software, music, or movies, which is protected by the Copyright Act.
    • unauthorized access – (successful or unsuccessful) attempt to access another computer without permission
    • violation of Netiquette – rules and standards of desirable behavior in communication of individuals or groups on the internet
    • Rules for opening, administering, and using user accounts on a CARNET public server
    • pests: (viruses, worms, Trojans).

    More

    • Viruses are malicious code with the ability to self-replicate; their code is added to an existing executable file, waiting for the “infected” file to be run to become active again.
    • Worms – malicious codes with the ability of self-multiplication that are widespread by copying their entire content through some media of communication, such as e-mail
    • Trojans – malicious codes that are considered as harmless applications and require some user action to be installed
    • Denial of ServiceDenial of ServiceDenial-of-service attacks usually work by overwhelming a specific service or network, thereby preventing legitimate users from accessing it.
    • DDoS (Distributed Denial of ServiceDistributed Denial of Service (DDoS) attacks, which flood a network with traffic from multiple online sources to overwhelm it and deny legitimate users access to services.
    • Phishing A set of activities by which unauthorized users attempt to trick users into disclosing confidential personal information by using fraudulent emails and fraudulent websites, such as those mimicking financial organizations.
Which abuse service should an incident be reported to?
  • Incidents are generally reported to abuse services competent for the networks from which the attack originates. Therefore, in the event of an attack on your computer, it is necessary to identify the attacking network and report the incident to the Abuse Service competent for the relevant network. Computers on the Internet are identified by IP addresses, so it is necessary to determine the IP address of the attacker or the source of the e-mail and determine which Internet service provider it belongs to. Jurisdiction over IP space is divided among regional internet registers. Competence over an individual IP address can be checked on the following pages:

     

    As it is not always easy to determine the source of an attack, in the event of an inability to easily identify the network, send the notification to your ISP's Abuse Service. If the incident occurred within your organization, contact your system administrator. Incidents are reported to the National CERT (e-mail: incident@cert.hr) if your notification to the Abuse Service has not stopped illegal online activities and there is a need for mediation in handling the incident.

    E-mails of the Croatian Abuse Services:

     

 

What should be included in the submission?

In order for the submission to be correct, it must contain the following information:

  • A brief and clear description of the incident (what the user is complaining about)
  • extract from the log file or message header where it is clearly visible
    • IP address of the attacker
    • date, time and time zone of the attack.

If you're reporting spam or non-thematic Usenet messages, you need to include the content of the message.Subject: Possible Phishing Alert - Action Required Dear [Username], We've detected unusual activity on your account that may indicate a phishing attempt. To protect your information, we've temporarily limited access to certain features. **What you should do:** 1. **Do NOT click on any links or download any attachments** from suspicious emails or messages. 2. **Verify this message:** Please log in to your account directly through our official website at [Your Website Address] to check your account status and review recent activity. 3. **Change your password:** For added security, we recommend changing your password immediately after logging in. **What we're doing:** * We are actively investigating this potential threat. * We will notify you again once the situation is resolved or if further action is needed. If you have any questions or believe this is a mistake, please contact our support team immediately at [Support Phone Number] or reply to this email *from your registered email address*. Thank you for your cooperation in keeping your account secure. Sincerely, The [Your Company Name] Security Team, testuser 12345).

You can see Here how to get to the e-mail header and Here How to get to the Usenet message header.

It is important to note that the IP addresses for broadband access services change every time you connect, so IP addresses alone are not sufficient for uniquely identifying users. It is therefore important to specify the exact time of the incident, including the time zone, for each IP address, down to the second.

What are the time zones and how are they defined?

All time zones are defined in relation to Coordinated Universal Time (UTC). The time zone reference point is the zero meridian that passes through the Royal Observatory at Greenwich, London. That is why today, the term Greenwich Mean Time (GMT) is often used. For example, Croatia uses the CET time zone, which corresponds to UTC + 1; that is, if it is 2:00 PM in Croatia, it is 1:00 PM in UTC. During daylight saving time, instead of CET, CEST is used, corresponding to the UTC + 2 time zone.

How to recognize a computer security issue?
  • Unacceptable behavior in the CARNET network is defined by the document  – “Decision on the Acceptable Use of the CARNET Network” and generally accepted user behavior norms in communication between individuals or  Users communicating within the group. Any unauthorized activity described in the policy or norms of conduct is subject to the sanctions of the CARNET Abuse Service in the form of warnings and, in the case of repetitive behavior or more serious incidents, as temporary or permanent denial of Internet access. The unacceptable behavior is:
    • distribution of copyrighted material
    • selling or lending your account and using another user's electronic identity
    • disseminating offensive, humiliating, or discriminatory material
    • sending unsolicited emails
    • disabling or hindering the operation of an individual service
    • spreading malware
    • Unauthorized security vulnerability testing
    • data destruction
    • Breach of privacy.

     

    Also, the CARNET Abuse Service shall report acts to the competent state bodies that are prohibited by the laws of the Republic of Croatia in case of more serious offenses. For example, the Criminal Code prohibits:

    • racial and other discrimination
    • distribution, acquisition, and possession of child pornography on a computer system; violation of confidentiality, integrity, and availability of computer data, programs, or systems
    • Computer counterfeiting
    • computer fraud.

     

How to recognize a virus-infected computer?

It can be assumed that a computer is infected with a virus if there are issues such as:

  • significantly slow computer operation
  • Unknown programs are starting by themselves, usually in multiple instances.
  • Inexplicable shutdown or restart of the computer
  • Loss of functionality of computer protection programs (antivirus, antispyware)
  • some other expressly non-standard behaviors
  • Some network pages cannot be opened (typically the antivirus software manufacturer's site).
  • The requested network page does not open, but some others do.
  • There are also some symptoms that are a bit more difficult to check out, like unknown processes that are launched in the background.
Subject: Your Order [Order Number] Has Shipped! Dear [Customer Name], Great news! Your recent order, [Order Number], has been shipped and is on its way. You can track your order's progress here: [Tracking Link] Your estimated delivery date is [Estimated Delivery Date]. You can review your order details here: [Order Details Link] If you have any questions about your order, please don't hesitate to contact us by replying to this email or calling us at [Phone Number]. Thank you for shopping with [Your Company Name]! Sincerely, The [Your Company Name] Team

I received the following unwanted message:

From xxx@yahoo.com Sun Nov 6 21:40:21 2005

Received: from localhost (xxx.xxx.carnet.hr [999.999.999.999]) by mars.aros.net (8.13.3/8.13.1) with SMTP id jA74eJUr088160 for ; Sun, 1 Nov 2005 21:40:21 -0700 (MST) (envelope-from geoffrey@yahoo.com)

Date: Mon, 1 Nov 2005 05:40:16 +0100

From: “Fried”

To:

Subject: Best quality drags

Message-ID: <000601c5e0b8$c128d490$f95bcf52@pc>

MIME-Version: 1.0

Content-Type: multipart/alternative; boundary=”----=_NextPart_000_0003_01C5E0C9.82D73F40"

X-Priority: 3 X-MSMail-Priority: Normal

X-Mailer: Microsoft Outlook Express 6.00.2900.2180

X-MimeOLE: Produced by Microsoft MimeOLE V6.00.2900.2180

X-Virus-Scanned: ClamAV version 0.86.2, clamav-milter version 0.86 on mars.aros.net

X-Virus-Status: Clean

To get a detailed email header, you typically need to access the original message formatting within your email client. The exact steps vary depending on the email service you're using. Here's a general guide for common email providers: **General Steps:** 1. **Open the email:** Locate and open the specific email for which you want to retrieve the header. 2. **Find the "View Source" or "Show Original" option:** This is usually found in a menu associated with the email itself, often accessed by clicking a "more options" icon (like three dots or a vertical ellipsis), a right-click menu, or a specific menu item labeled "View," "More," or "Original." **Specific Instructions for Common Email Clients:** * **Gmail:** 1. Open the email. 2. Click the three vertical dots (More) next to the reply button. 3. Select "Show original." * **Outlook.com (web version):** 1. Open the email. 2. Click the three horizontal dots (...) in the upper right corner of the message pane. 3. Hover over "View" and then click "View message source." * **Microsoft Outlook (desktop client):** 1. Open the email in its own window (double-click to open it). 2. Go to the "File" tab. 3. Click "Properties." 4. In the "Internet headers" section of the Properties dialog box, you can see the headers. You can copy and paste the text from there. * **Apple Mail (macOS):** 1. Open the email. 2. Go to the "View" menu. 3. Select "Message" > "Raw Source." * **Thunderbird:** 1. Open the email. 2. Go to the "View" menu. 3. Select "Headers" > "All." **What You'll See in an Email Header:** Once you've accessed the detailed header, you'll see a block of text containing various fields. Some of the most important ones include: * **Received:** These lines show the path the email took from sender to recipient, with each server adding its own entry. They are usually read from bottom to top. * **From:** The sender's email address. * **To:** The recipient's email address. * **Subject:** The subject line of the email. * **Date:** The date and time the email was sent. * **Message-ID:** A unique identifier for the email. * **Authentication-Results:** Information about whether the email passed SPF, DKIM, and DMARC checks, which help verify the sender's identity. * **X-Headers:** Custom headers added by specific mail servers or clients, often used for tracking or additional information. Email headers are useful for troubleshooting delivery issues, identifying spam, or verifying the origin of an email.
  • When reporting an email incident, such as receiving a virus message or spam, you need the full message header for proper incident reporting. The content from the “From:” field is not sufficient for correctly identifying the sender of the disputed message, as it is most often forged. Below are some brief instructions that can assist you in retrieving the message header for some of the more popular email clients.
    • Outlook Express – In the list of received messages, right-click on the message, activate the drop-down menu, and select “Properties” from it. A tab will appear where you select “Details.” The text box contains the e-mail header. Right-click anywhere in the box. In the drop-down menu, select “Select All.” The header text will be darkened. Right-click anywhere in the text again and select “Copy” from the drop-down menu.
    • Mozilla Thunderbird – In the list of received messages, click to mark the spam message. On the keyboard, press “Ctrl” and “U” simultaneously. A new window opens that contains the entire header besides the message.
    • Eudora – Double-clicking a spam email opens a separate window displaying the list of received messages. The displayed message does not contain the full header. To view it, click the “Blah” icon, which appends the full header to the beginning of the message.
    • Gmail webmail service – Once you open the spam message, click the arrow next to the sender's name. After opening the menu, select “Show original” to open a new window with the email headers.
    • Netscape Mail 6 – Select a message, from the View menu, select the Headers -> All option. The message header appears in the message window, and then click the Forward icon or from the Message menu, select the Forward option.

     

     

Attackers can obtain your email address through various methods: * **Data Breaches:** If a company or service you've used experiences a data breach, your email address (along with other personal information) could be leaked and then purchased by attackers from the dark web. * **Publicly Available Information:** You might have posted your email address on social media, personal websites, forums, or other public platforms. Search engines can sometimes index this information, making it discoverable. * **Phishing and Social Engineering:** You might unknowingly provide your email address when responding to a phishing email, text message, or by falling for a social engineering scam that tricks you into revealing it. * **Malware:** Some types of malware, like spyware or keyloggers, can be installed on your device and may steal your personal information, including your email address. * **Brute-Force or Dictionary Attacks:** Attackers can use automated tools to try common email addresses associated with known domains or guess passwords in combination with likely usernames. * **Credential Stuffing:** If you reuse passwords across multiple websites, and one of those websites is breached, attackers can use those leaked credentials to try logging into other services, thereby discovering your email and password. * **Spam Traps:** Sometimes, intentionally created email addresses are set up to catch spammers. If you've ever interacted with a suspicious link or service, your email might have been "caught." * **Compromised Accounts:** If one of your online accounts is compromised, attackers might be able to access your contact list or other information that reveals your email address. * **"People Finder" or Data Broker Websites:** Some websites specialize in aggregating publicly available information about individuals, which can include email addresses.
  • There are several ways attackers can get your email address. The most common ways are:
    • a person whose computer is infected with a virus has your e-mail address in their address book
    • You have entered your email address on a page that cannot be safely claimed to protect your data.
    • You have written your email address in a publicly accessible location (network headquarters, newsgroup, forum).
    • You have subscribed to the mailing list (even if a subscriber list is not provided, the attacker may have been able to access it illegally).

     

How and when to report a violation of netiquette?

First, review the information on this site to see if your reporting makes sense:

It is important to note the purpose of reporting non-thematic posts to the CARNET Abuse Service. For a job to be performed with quality, it is important for users to receive quality and well-founded applications, especially since the Abuse Service cannot actively monitor all active newsgroups, primarily due to their sheer number. In general, users should report instances of targeted and repeated cross-posting, intentional disruption of participants, severe and targeted offenses, deliberate submission of non-thematic posts, and similar issues. Reporting any incorrect wording, minor instances of non-thematic posts, random non-thematic posts, and so on is counterproductive and does not contribute to establishing order on Usenet.

Once you have concluded that you can submit a report, first describe the complaint in one or two sentences, then provide a detailed header for the post and the content of the post.

A user sends an email to a large group of people and includes "Reply All" in their response, which is unnecessary and annoys recipients.

I am reporting your user for sending a non-thematic message because they sent a hardware-supply message to the hardware group newsgroup, despite the existence of the hr.potraznja.hardver group.

Path: Iskon!fu-berlin.de!news.glorb.com!nntp-server.pubsub.com!CARNet.hr!not-for-mail From: “roginator” ” ) >

Newsgroups: hr.classifieds.hardware

Subject: I am purchasing hardware

Date: Wed, 2 Nov 2005 19:56:25 +0100

Organization: CARNet, Croatia

5 lines

Message-ID:

NNTP-Posting-Host: xxx.xxx.carnet.hr

X-Trace: xxx.srce.hr 1130957786 9184 999.999.999.999 (1 Nov 2005 18:56:26 GMT)

X-Complaints-To: abuse@carnet.hr

NNTP-Posting-Date: Wed, 1 Nov 2005 18:56:26 +0000 (UTC)

X-Priority: 3

X-MSMail-Priority: Normal

X-Newsreader: Microsoft Outlook Express 6.00.2900.2180

X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 X-RFC2646: Format=Flowed; Original

X-Antivirus: avast! (VPS 0543-2, 10/27/2005), Outbound message

X-Antivirus-Status: Clean

Xref: Iskon hr.offer.hardware:33531

To get a detailed Usenet message header, you typically need to use a Usenet client or newsreader application. Here's a general breakdown of how to do it, depending on your client: **General Steps:** 1. **Open the Message:** Navigate to the specific Usenet message you're interested in within your newsreader. 2. **Locate the Header Option:** Look for an option within your newsreader's menus or context menus (right-click menu) that says something like: * "View Headers" * "Show Full Headers" * "Message Source" * "Raw Message" * "Properties" (sometimes headers are found here) 3. **Display the Headers:** Clicking this option will usually open a separate window or pane displaying the complete message source, which includes the header information. **Specific Client Examples (Common Newsreaders):** * **Thunderbird:** 1. Open the message. 2. Go to "View" > "Headers" and select "All". * **Outlook Express (Older versions):** 1. Open the message. 2. Go to "File" > "Properties". 3. Click the "Details" tab. * **Newsbin Pro:** 1. Open the message in the preview pane or by double-clicking. 2. Look for a button that looks like lines of text or a magnifying glass, often labeled "Headers" or "View Source". * **Fortitude/Unison (Modern Clients):** 1. Open the message. 2. Often, you can right-click on the message and select "View Source" or "Show Headers". Some interfaces might have a dedicated button. **What You'll See in the Headers:** The detailed header is a block of text at the very beginning of the Usenet message, before the actual body/content. It contains a lot of technical information, including: * **`From:`:** The sender's email address and name. * **`To:`:** The recipient's address (often not directly useful in Usenet as it's a broadcast medium). * **`Subject:`:** The message's subject line. * **`Date:`:** The date and time the message was posted. * **`Newsgroups:`:** The newsgroups where the message was posted. * **`Message-ID:`:** A unique identifier for the message. * **`References:`:** Links to parent messages in a thread, showing the conversation flow. * **`Path:`:** A record of the servers the message traveled through to reach you. * **`X-Headers:`:** Custom headers added by servers or clients, potentially containing information about spam filters, NNTP servers, or other metadata. **Why View Headers?** * **Troubleshooting:** To diagnose delivery issues or understand how a message was routed. * **Authentication/Spoofing:** To check if the `From:` address is legitimate or potentially spoofed. * **Thread Tracing:** To understand the lineage of a conversation by examining the `References:` header. * **Technical Analysis:** For advanced users who want to understand the underlying mechanics of Usenet. If you can tell me which Usenet client you are using, I can provide more specific instructions.
  • If you're reporting a Usenet-related incident, such as a post outside the topic, for proper incident reporting, you need a complete message header. The content from the “From:” field is not sufficient for correctly identifying the sender of the message in question. Below are brief instructions that can help you get the message header from several popular news clients.
    • Outlook Express - select a message and press CTRL and F3 simultaneously. The Message Source window will display the full header of a message. Highlight the entire contents of the window and copy it. Close the window, paste the copied message and header into a new message, and send the message to the Abuse Service.
    • Mozilla Thunderbird – In the list of received messages, click to mark the spam message. On the keyboard, press “Ctrl” and “U” simultaneously. A new window opens that contains the entire header besides the message.
    • Google Groups – select a message, click Show Options, and then click Show Original. Copy the complete header and message and send it to the Abuse Service's email address.

     

How to recognize a phishing message?
  • Fraudsters often copy the visual appearance of real emails from banks and other companies. Recently, fake messages are completely identical to the originals, but there are certain details that expose the fraud:
    • Personal information is requested in the message.
    • the urgency of the message
    • links
    • The body of an email is a picture
    • unrealistic promises.

    In any case, no one has the right, not even a system engineer maintaining the email server, to ask for your user password. Your user password is secret, known only to you, and you should use it responsibly. Phishing sites are difficult to identify because attackers are skilled at copying the visual identity of legitimate sites. Often, such fake pages have the following features:

    • The domain of the web page is similar to the legitimate site's domain, but not the same.
    • The login network where the password is entered is not HTTPS, but HTTP.
    • If there is secure HTTPS access, the site certificate is invalid.

     

Your firewall is informing you that it has blocked a scan of your computer. This typically means your firewall detected suspicious activity and prevented it from accessing your system. While this is a good indication that your firewall is working and protecting you, it doesn't necessarily mean you are a specific target of an attack requiring you to report it. Many scans are automated and probe networks for vulnerabilities indiscriminately, rather than targeting individuals. To determine if you should report this, consider the following: * **What kind of scan was it?** Some firewalls provide details about the nature of the blocked activity. Was it a port scan, a vulnerability scan, or something more specific? * **What is your role?** Are you an individual user, or do you manage a network for an organization? If you are part of an organization, you should definitely report this to your IT or security team. * **Is this a recurring issue?** If you are seeing frequent blocked scans, it might indicate your network is being heavily probed, and reporting it to your IT department is advisable. * **Did anything else unusual happen?** Were there any other signs of compromise or suspicious activity on your computer or network? **In most cases, a single blocked scan is just your firewall doing its job.** However, if you are concerned, or if you are in a position where you are responsible for network security, it's always better to err on the side of caution and report it to the appropriate personnel within your organization.

Some firewalls, especially if they are set to be more sensitive, can flag certain actions as attack attempts, even though other applications consider them normal and use them for their operations. If you notice this happening frequently and under different conditions, it is likely a large-scale scan of your computer. This phenomenon acts as a burglar alarm, but if your operating system is up-to-date, the threat is minimal. Such attacks do not need to be reported because there are services that forward all necessary information about them to abuse services.

Can you help me configure the program or remove a virus from my computer?

The CARNET Abuse Service does not support the configuration of antivirus or other programs. For assistance with software configuration, contact the appropriate service provider or the software manufacturer.

The CARNET Abuse Service does not provide support for cleaning your computer of malicious software, reinstalling the operating system, installing antivirus software or other tools, etc. The Abuse Service may offer advice on recommended computer security practices.

I received a warning that I am sending spam, what should I do?

If it is not deliberately caused by a direct user action, the computer is infected with a spam virus.

The first thing you need to do is check your computers connected to the internet with antivirus and antispyware tools. There are free scan tools as well as commercial versions. You can find some antivirus tools on the Abuse service website.

Since no security system is 100% effective, it's possible for the antivirus tool to show that the computer is clean when it actually isn't. There are situations when malicious software goes undetected and continues to cause problems. As the ultimate and safest solution to the problem, you need to reinstall the operating system, install all patches, and install antivirus software and a firewall.

It is also important to note that all that is required for malicious spammers is an Internet connection to port 25 (SMTP port). Removing mail software (such as MS Outlook, Mozilla Thunderbird, etc.) from your computer has no effect because the malicious software has an embedded mail client that sends spam. As a temporary measure, while the problem is not resolved otherwise, it is possible to set up a firewall that blocks network traffic to port 25, thereby preventing any e-mail from being sent, even via the e-mail client.

As the ultimate and safest solution to the problem, you need to reinstall the operating system, install all patches, and install the antivirus program and firewall.

Once the problem is resolved and the computer has been cleaned, it would certainly be advisable to take preventive steps so that the problem would no longer be repeated. It is good practice to disable the use of a computer with administrator privileges and to create user accounts with the minimum authorizations required to perform the tasks for which the computer is intended. Also, we recommend using one of the tools that have the ability to restore the computer to the original, previously stored status. After saving the computer status that is known to be “free of viruses” (for example, after a fresh installation of the operating system), it is possible, in the event of a problem, to relaunch the computer in a relatively uncompromised state in a relatively simple and fast way. For this purpose, there is a free Microsoft Steady State tool or commercial solutions like Deep Freeze. More information can be found on sys.portal.

Subject: E-mail Troubleshooting Incident Identification.

 I received a warning about an attempted unauthorized access to a computer or network, but I wasn't trying to break in.

As with sending unsolicited email, unless caused by direct user action, the computer is infected by a virus attempting unauthorized access to another computer system.

The first thing you need to do is check your computers connected to the internet with antivirus and antispyware tools. There are free scan tools as well as commercial variants. You can find some antivirus tools on the Abuse service website.

Since no security system is 100% effective, it's possible for the antivirus tool to show that the computer is clean when it actually isn't. There are situations when malicious software goes undetected and continues to cause problems. As the ultimate and safest solution to the problem, you need to reinstall the operating system, install all patches, and install antivirus software and a firewall.

Once the problem is resolved and the computer has been cleaned, it would certainly be advisable to take preventive steps so that the problem would no longer be repeated. It is good practice to disable the use of a computer with administrator privileges and to create user accounts with the minimum authorizations required to perform the tasks for which the computer is intended. Also, we recommend using one of the tools that have the ability to restore the computer to the original, previously stored status. After saving the computer status that is known to be “free of viruses” (for example, after a fresh installation of the operating system), it is possible, in the event of a problem, to relaunch the computer in a relatively uncompromised state in a relatively simple and fast way. For this purpose, there is a free Microsoft Steady State tool or commercial solutions like Deep Freeze. More information can be found on sys.portal.

Subject: E-mail Troubleshooting Incident Identification.

You received a notification that you sent a virus, even though your computer wasn't infected. What is this about?

Unfortunately, the creators of malicious programs have become more creative in evading detection by antivirus tools. There is no guarantee that any of the tools will clean up all malicious software, so it is possible that your computer is still infected even though the antivirus tool reports it as clean.

The only way to ensure your computer is completely clean is to reinstall your operating system.

How to protect yourself from viruses and malicious software

Today, there is no security system in the world that will protect you 100% from viruses and other malicious software. What you can do is reduce the risk of infecting your computer with security tools (such as antivirus, antispyware, and firewall), safer operating system configuration, and more cautious use of your e-mail client and network browser.

More on the topic can be found on the CARNET Abuse Service website in the section

 “Internet Security.

You received a notice stating that you have been distributing copyrighted material. This means that you have been sharing or making available content (like music, movies, software, or books) that is protected by copyright laws, without the permission of the copyright holder.

According to the CARNET Document CDA0035 – “Decision on the Acceptable Use of the CARNET Network” Distribution and downloading of copyrighted content is prohibited. Reproduction, distribution, storage, or processing of the work is also prohibited by the Copyright Act and related rights. The works include films, computer games, and computer programs for which the author explicitly did not issue a license to download or distribute.

After you receive a notification from the CARNET Abuse Service, you need to delete the disputed material and confirm this action to the CARNET Abuse Service by replying to the email you received. It is also necessary to cease any further copyright infringement.

Are so-called peer-to-peer protocols forbidden?

No, peer-to-peer protocols are not forbidden. The laws of the Republic of Croatia and the CARNET document “Decision on the Acceptable Use of the CARNET Network” prohibit the distribution and downloading of content protected by the Copyright and Related Rights Act.

In other words, the use of peer-to-peer protocols for the exchange of computer games, movies, applications, and other copyrighted materials is not permitted.

Here's what to do when you receive a notification for a netiquette violation: 1. **Read the Notification Carefully:** Understand exactly what the violation is, which rule or guideline you broke, and the context. 2. **Don't Argue Immediately:** While it's natural to feel defensive, take a moment to assess the situation calmly. The notification is likely from a moderator or administrator who has reviewed your actions. 3. **Acknowledge and Apologize (if appropriate):** If you realize you made a mistake, a sincere apology can go a long way. This shows you're taking responsibility. 4. **Understand the Consequences:** The notification will usually outline any penalties, such as a warning, temporary ban, or permanent removal from the platform. 5. **Review the Netiquette Guidelines:** Go back and re-read the specific netiquette rules for the platform you are using. This will help you avoid future violations. 6. **Adjust Your Behavior:** The most important step is to learn from the experience and change your online behavior to comply with the rules. 7. **Contact Support (if you believe it's an error):** If you genuinely believe the notification is a mistake or based on a misunderstanding, contact the platform's support or moderation team. Provide any evidence or explanation you have. Be polite and respectful in your communication. 8. **Avoid Repeating the Offense:** The best way to deal with netiquette violations is to prevent them in the first place.

A notification for violating netiquette has been received because you have violated some of the commonly accepted behavioral norms in group communication. More about netiquette can be found Here.

Such behavior must be discontinued in future communication on the Usenet service.

Yes, you can appeal sanctions imposed by CARNET Abuse Service.

The user sanctioned by the CARNET Abuse Service has the right to appeal to the CARNET CEO. An appeal must be filed in writing, and the CARNET CEO shall make a decision on the appeal within 30 days of its filing.

 How do I forward my email from my email account to another address (for schools)?

 

You can enable forwarding as follows:

  • log in to the webmail school system at https://webmail.skole.hr/  
  • Click on “Filters” and then on “Forward”
  • Enter one or more email addresses to which you want to forward messages
  • If you want copies of messages to remain in your account, select this option by checking the box. 
  • Click the “Save” button to save the settings.

You can find more information about the CARNET webmail system at: https://helpdesk.carnet.hr/CARNET_Webmail

 

CARNET meter

What can be measured?
  • CARNET server to user's computer data transfer rate (download)
  • data transfer rate from the CARNET server to the user's computer when downloading the file
  • upload speed from the user's computer to the CARNET server
  • availability of user's computer and RTT ping tool
  • the availability of the user’s computer and the path from the CARNET server to the user’s computer using the traceroute tool.
I am unable to fulfill your request. The provided input is an HTML tag and does not contain any text to translate.

Permanent Connection

The CARNET network is a high-speed broadband network connecting universities, research institutes, and their affiliated institutions in the Czech Republic. It's part of the European research and education networking community, providing advanced network services for research, education, and collaboration.

CARNET (Croatian Academic and Research Network) is a computer network connecting schools, institutes, faculties, and other institutions within the science and education system, promoting computer technologies and their opportunities in the world of science and education. CARNET operates under the Ministry of Science and Education and is financed by its budget.

A permanent connection is a continuous and unbroken link between two or more points. This can refer to physical connections, such as welded joints or bolted assemblies, or logical connections, such as dedicated network links. The key characteristic is that the connection is intended to remain in place indefinitely without being disconnected or reconfigured, barring intentional decommissioning.

A permanent connection is a service through which CARNET enables its members to remain connected to the Internet. CARNET rents a telecommunication line and provides equipment for the establishment of an access point to the CARNET network at the member's location.

How to become a permanent connection user?

Legal entities may become users of a permanent connection if they have regulated membership in the CARNET network and meet the minimum technical requirements for connecting to the CARNET network, as described in the document CDA0018).

Contact the IT department or the technical support group if there is a problem with the CARNET connection at the institution.

It is possible to report a problem related to the connection to the CARNET network through the Customer Support Service.

Whom to contact if you have noticed that there is a problem with the operation of CARNET online equipment at the location of your institution?

If you notice that there is a problem with CARNET equipment at your institution's location, please contact the Customer Support Department.

You should contact your ISP (Internet Service Provider) for assistance.

A request to increase speed towards the CARNET network from a member is submitted by mail to the following address:

Croatian Academic and Research Network – CARNET

Josipa Marohnića 5

10000 Zagreb

A request to increase the connection speed must be justified. CARNET shall, within a reasonable timeframe, decide on the submitted application, taking into account existing technical and other possibilities.

Whom to contact if you need additional CARNET network services?

CARNET may, depending on technical and other conditions, provide its members with some additional network services such as QoS, additional public IP addresses, and the like. If there is a justified reason for using an additional online service on the member's side, the request should be sent by e-mail to helpdesk@carnet.hr Together with a detailed explanation.

CARNET shall, within a reasonable time, decide on the submitted request, depending on the existing technical and other possibilities.

You can send a notification that your institution has met the minimum technical conditions to the designated contact person or department within your organization, or to the relevant external body or authority overseeing the technical conditions.

After your institution has met the minimum technical requirements stipulated in the document CDA0018 and thus, when preparing to join the CARNET network, it is not necessary to send a memo to CARNET; it is sufficient for your CARNET coordinator or resource administrator to notify the member institution service by e-mail to helpdesk@carnet.hr.

What needs to be done if the institution moves to another location?

If a member of the CARNET network moves to another location, it must apply for a change of location to the Ministry of Science and Education at the following address:

Ministry of Science and Education

Department of Information Technology and Technology

Donje Svetice 38

10000 Zagreb

If the connection at the location from which the institution is moving is no longer necessary, this should be emphasized in the request in order to cancel the lease of the telecommunications line that is no longer in use.

It is also necessary to inform the CARNET Membership Services Department via email at helpdesk@carnet.hr to initiate the relocation procedure or transfer of equipment to the new location.

e-Class Register for Teachers

Questions and answers for schools using e-Class Register

What to do when a token doesn't work?

Tokens are not provided for more frequent number generation without the application entry. If the button has been pressed several times for a number generator and after that the token has stopped working properly, please contact helpdesk@skole.hr.

If the token has completely stopped working, the school administrator should assign a new token to the user.

Why does the system automatically log users out after 45 minutes?

This functionality is introduced for security reasons, as the classroom session lasts for 45 minutes, and you need to enter data into the application during that time. If additional time is required, the user will need to log in again.

Is it possible to enter a written check as a criterion that will prevent students from having more than one oral examination on a particular day?

On the day of an exam, a student can be orally examined in only one subject, or two subjects if there is no written exam on that day.

To delete a teacher from e-Class Register, follow these steps: 1. Log in to your e-Class Register account as an administrator. 2. Navigate to the "Teachers" or "Staff Management" section of the dashboard. 3. Locate the teacher you wish to delete from the list. 4. Click on the "Edit" or "Options" button associated with that teacher's record. 5. Look for a "Delete" or "Remove" button or link and click on it. 6. A confirmation prompt will likely appear to ensure you want to proceed with the deletion. Confirm the action. **Important Considerations:** * **Permissions:** You will need administrator privileges to delete teachers. * **Data Loss:** Deleting a teacher will typically remove all their associated data, including assigned classes, student records they may have managed, and their login credentials. Ensure you have backed up any necessary information before proceeding. * **System Specifics:** The exact wording of menu items and buttons may vary slightly depending on the specific version or configuration of e-Class Register you are using.

To remove a teacher from a school, select the employee to be removed in user administration, then select “Remove user” from the menu. This will remove the teacher from the school, and they will no longer be able to log into the e-Class Register for the school from which they were deleted.

If a teacher fails to sign up for the e-Class Register, the following actions can be taken: * **Remind the teacher:** The first step is to gently remind the teacher about the requirement to sign up and the deadline, if one was provided. * **Check for technical issues:** The teacher might be experiencing technical difficulties. Offer assistance or direct them to IT support to troubleshoot any problems. * **Investigate the reason:** Understand why the teacher hasn't signed up. It could be due to oversight, misunderstanding the instructions, being unaware of the system, or other personal reasons. * **Escalate to administration/supervision:** If the teacher continues to not sign up after reminders and support, the issue should be escalated to their direct supervisor, department head, or the school administration. * **Communicate the consequences:** The administration may need to communicate any consequences for non-compliance with the school's policies or procedures. * **Provide adequate training/support:** Ensure that all teachers have received sufficient training and ongoing support for using the e-Class Register. Sometimes, a lack of familiarity is the root cause. * **Formal notification:** Depending on the school's policies, a formal written notification might be issued to the teacher outlining the requirement and expectations. * **Alternative arrangements (if applicable):** In some rare cases, if a teacher is unable to use the digital system for a legitimate reason, temporary alternative arrangements might be made, but this would typically require administrative approval and a clear plan for ensuring accurate record-keeping.

In this case, the administrator must verify the following:

  • Is the teacher on the list of teachers?
  • Is the username (name.surname@skole.hr) entered correctly in his/her data, and has the teacher been registered in the system?
  • Check if the token has been entered and if all the numbers have been entered correctly.

If the issue persists after checking, please contact helpdesk@skole.hr.

If a student cannot log on at https://ocjene.skole.hr, here are the steps to troubleshoot the issue: 1. **Check Username and Password:** * Ensure the student is entering the correct username and password. Passwords are case-sensitive. * If they've forgotten their password, they should use the "Zaboravili ste lozinku?" (Forgot password?) link on the login page. 2. **Verify School/Institution Selection:** * Make sure the correct school or institution is selected from the dropdown menu before attempting to log in. 3. **Browser Issues:** * **Clear Cache and Cookies:** Old browser data can sometimes interfere with logins. Guide the student to clear their browser's cache and cookies. * **Try a Different Browser:** The website might not be compatible with all browsers. Suggest trying a different web browser (e.g., Chrome, Firefox, Edge, Safari). * **Disable Extensions:** Browser extensions can sometimes cause conflicts. Ask the student to try logging in with browser extensions temporarily disabled. * **Incognito/Private Mode:** Try logging in using an incognito or private browsing window. 4. **Internet Connection:** * Ensure the student has a stable internet connection. Try visiting other websites to confirm their internet is working. 5. **System Maintenance or Outage:** * It's possible that the `ocjene.skole.hr` website is down for maintenance or experiencing a temporary outage. There might not be an immediate fix the student can do. Check if there are any announcements or status pages for the service, if available. 6. **Contact School Administrator/IT Support:** * If none of the above steps resolve the issue, the student should contact their school's administrator, IT department, or the teacher responsible for managing student accounts. They will have access to account status, be able to reset passwords if needed, and can investigate deeper technical issues. 7. **Account Lockout:** * Too many failed login attempts might result in the account being temporarily locked. The school administrator can typically unlock it. When contacting the school, it's helpful for the student to provide: * Their full name and class. * The exact username they are trying to use. * A description of the error message they are seeing (if any). * The steps they have already tried.

There are two possible reasons for an unsuccessful login. The first is that the student's school is not included in e-Class Register, and therefore has no access to the page. The other is that the student received incorrect user data from the school, such as a PIN.

If a school is included in the e-Class Registry project, one should be able to sign up to the portal ocjene.skole.hr. The list of schools involved can be found at the following link: https://ocjene.skole.hr/pocetna/skole.

After confirming that the school is on the e-Class Register, it's best to eliminate any doubt that the issue lies with your current internet browser. Please try logging into the ocjene.skole.hr portal using a different web browser (like Mozilla Firefox, Google Chrome, etc.).

If login is still not possible and the information is correct, the e-Class Registry administrator must check the validity of your PIN in the e-Class Register, e-Matica, and HUSO system. It is important that the PIN is valid in all three systems for the user to successfully log into the portal.

If neither of these suggestions resolves your issue, please contact helpdesk@skole.hr.

How to record a pupil who has unenrolled from the classroom, should they be deleted?

Students are not deleted when they leave the classroom.

The records must be kept, the same as for paper journals.

It is only necessary for the grade teacher to mark “inactive” for the half-year for which it is printed in the grade administration.
If a student unenrolls from the class in the first semester, it is necessary to mark both the first and second semesters as inactive. Similarly, if they unenroll during the second semester, the first semester should be marked as active and the second as inactive.

How to activate mToken?

Before using the mToken application, it is necessary to activate it, which can be done by email at helpdesk@skole.hr. The request must include the person's first and last name, mobile phone number, PIN, and HUSO electronic identity of the person whose mToken needs to be activated. The request must be sent from your official email address (@skole.hr).

What should I do if a teacher wants to enter a grade that is more than a month old?

Teachers cannot enter grades older than one month. Only the class master has the ability to enter such grades.

The classmaster can do so by selecting the desired student in “Register” and the subject for which they wish to enter the grade. Then, select the menu in the upper right corner and the “Multiple Entry” option. This allows them to enter grades older than one month.

Inability to log into the e-Class Register related to date/time/time zone settings

Tablets, desktops, and laptops must have a correctly set date, time, or time zone.

If the e-Class Register application detects incorrect settings, the following message should be displayed:
“Login failed due to incorrect date and time settings on the computer or device you are trying to access.

Please use the automatic date, time, and time zone settings, or set the correct date, time, and time zone for Sarajevo, Skopje, Warsaw, or Zagreb. Refresh the page and try signing in again.

It is necessary to check the correctness of the settings on the teachers’ devices with this message, and close all tabs in the web browser, close the browser, and try to log in again.

The time limits in e-Class Register are as follows: * **Default Time Limit:** All registers have a default time limit of 12 months. * **Extended Time Limit:** This can be extended up to a maximum of 5 years. * **Specific Time for Certain Registers:** Some registers may have a shorter, legally mandated time limit. For example, registers related to financial transactions might have a shorter period for record-keeping. The exact time limits can vary depending on the specific type of register and the applicable regulations.

The teacher can delete the entered grade within 10 minutes.

Entering grades is possible from the first day of the previous month to the current date. Grades cannot be entered for Sundays. The class master can enter grades for more than a month back using the “Multiple Entry” option.

Teaching units and absences can be deleted within 48 hours.

The e-Class Register administrator can delete entered data at any time; there is no time limit for administrators to delete data.

The class input is not time-limited. Teaching hours entered 14 or more days after the class date in each report will be marked in yellow.

Deletion of extended stay activities is possible within 48 hours. Changing activities that have already been entered is not time-limited.

The teacher who entered it can delete and edit it.

The e-mail message about the student's absence will be sent the next day at 7:30 am.

Data displayed within the e-Class Register for students is displayed without any time difference.

What to do if a student disenrolls from the school?

If a student disenrolls from the school, you need to select the class the student is in, then navigate to “Directory” -> “Right Menu” -> “Student Administration”. To choose the desired student, select “Personal Data”.

If a student disenrolls during the first semester, then the status for both the first and second semesters must be set to “Inactive.” If a student disenrolls during the second semester, then only the status for the second semester should be set to “Inactive.”.

How to change a student's program?

The program in e-Matica must be changed for the student as instructed in the following link: http://www.skole.hr/skole/eMatica/pitanja_i_odgovori?faq_id=228#mod_faq2_big

After changing the program in e-Matica, you must select “Directory” -> “Right menu” -> “Student Administration” -> “Right menu” -> “Retrieve from e-Matica”. After that, you need to select “Transfer students to e-Class Register” to transfer the new student program to e-Class Register.

If a new program from the student is not assigned to any other student in the classroom, then you need to assign a new program to the “Subject Administration” menu for each subject. A new program can be assigned to an existing subject by selecting the desired subject and then “Edit”. In the newly opened window, you will be able to select a new program.

After adding a new item to the “Subject Administration” menu, you must select “Student Administration,” then choose the desired student, and click “Subjects.” In the above menu, it is necessary to change the program for students’ subjects. This is possible by clicking on a particular subject and then “Change Program.” In the newly opened window, you will be able to select a new student program.

When a new program is set up for each student's subject, “Personal Data” should be selected and the old program should be removed from the student.

Is it possible to use mToken and a physical token to log in to e-Class Register at the same time?

It is not possible to use mToken and a physical token simultaneously. Users must choose between using a physical token or the free mToken application for the e-Class Register.

Does e-Class Register have the functionality to display grades from another school or class if the student has transferred schools or changed classes during the school year?

If a student changes schools during the school year or switches classes within the same school, it's possible to review their grades from the previous school or class. Insights into grades from another school are only available if that school also uses the e-Class Register. For the class teacher to review these grades, the student must be selected in the register, and then the menu in the top right corner of the interface should be accessed. The option “Grades from the other class” should be selected from the menu.

Can a classmaster change the status of an absence item that has been updated?

Yes, you need to select the Class Register and then the working day for the absence you want to change. You then need to click on the menu in the upper right corner and select the option “Edit Day.” Then you need to choose the absence for which you want to change the status and click on “Edit.” In the window that opens, you can change the status and type and enter the reason for the absence.

Why is the new school year not visible in e-Class Register even though it has been opened?

Class books for the new school year on the classroom selection interface are not visible until you download all classrooms from e-Matica for the new school year. To create classrooms, you must select “Class Departments and Groups” in the school settings. Then you need to click on “Create classrooms” and choose a new school year. After you create classrooms, they shall be available for selection on the classroom selection interface.

Yes, teachers have access to the Log Report per subject.

Yes, teachers can view the report for the subjects they teach in the classroom. To view the report, you need to select “Reports” in the register and then “Reports for the classroom”. In the list of reports for the classroom, select “Log Report per subject” to get insight into the hours worked for the subject you teach.

e-Class Register for Schools

Questions and Answers for New Schools

How can a school that is not yet using e-Class Register be included in the system?

Requests to be included in the e-Class Register for the 2018/2019 school year are accepted throughout the school year. It is important to note that training for e-Class Register administrators for new schools will be held in May; therefore, if an administrator wishes to participate in the training, it is necessary to submit the request for attendance by mid-April.
Which school's technical prerequisites must be met for inclusion in the e-Class Register?
schools that want to use the e-Class Register must meet the following technical prerequisites:

  • Structured cabling for a school LAN network, built according to professional standards.
  • computers connected to the Internet via the Croatian address space to access the e-Class Register application
  • if the school wants to use tablets to access the e-Class Register, a wireless network is also required.
  • a token for each teacher and school employee using the app
  • Computer maintenance and local school network expert

More detailed information on the technical prerequisites for schools wishing to use the e-Class Register is available here. LINK IS MISSING

The school gets the CARNET e-Class Register service.

CARNET provides access to the e-Class Register system and customer support for schools.

The following data are used to access the e-Class Register service: * **Username:** This is your unique identifier for accessing the e-Class Register. * **Password:** This is your secret code to authenticate your access. * **Email Address:** In some cases, your email address may be used for account verification or communication. * **Student ID/Employee ID:** Depending on your role (student or staff), a specific identification number might be required. * **One-Time Password (OTP):** If two-factor authentication is enabled, you may need to enter an OTP sent to your registered phone number or email.

If you are using a physical token, you must enter a user ID from the HUSO system (name.surname@skole.hr) to access the e-Class Register, and in the password field, enter the PIN generated by the token before the password is generated.

If you are using the CARNET mToken mobile application, you must enter a HUSO system user ID (name.surname@skole.hr) to access the e-Class Register service, and then enter only the one-time password generated by the mToken.

Questions and answers for schools using e-Class Register

Yes, if schools wish to add more district schools, classrooms, or other locations for the same school, they must re-submit their activation request for the e-Class Register.

Schools already registered in the e-Class Register that now wish to add more classrooms or district schools do not need to submit an activation request. Similarly, schools participating in the e-Class Register whose classes are held at different locations do not need to send an activation request if they wish to include additional locations.

Which data are transferred from e-Matica to e-Class Register and which data are transferred at the end of the school year from e-Class Register to e-Matica?

The student's personal information is transferred from e-Matica, along with information about the program and classroom in which the student is enrolled. At the end of the school year, subjects, grades, exams, absences, pedagogical measures, and student behavior are transferred from the e-Class Register to e-Matica.

How long does the physical token activation process last?

After the company from which you purchased a token receives a token receipt statement, it shall be activated within three business days.

e-Class Register for Students and Parents

If a student cannot log on at https://ocjene.skole.hr, here are the steps to troubleshoot the issue: 1. **Check Username and Password:** * Ensure the student is entering the correct username and password. Passwords are case-sensitive. * If they've forgotten their password, they should use the "Zaboravili ste lozinku?" (Forgot password?) link on the login page. 2. **Verify School/Institution Selection:** * Make sure the correct school or institution is selected from the dropdown menu before attempting to log in. 3. **Browser Issues:** * **Clear Cache and Cookies:** Old browser data can sometimes interfere with logins. Guide the student to clear their browser's cache and cookies. * **Try a Different Browser:** The website might not be compatible with all browsers. Suggest trying a different web browser (e.g., Chrome, Firefox, Edge, Safari). * **Disable Extensions:** Browser extensions can sometimes cause conflicts. Ask the student to try logging in with browser extensions temporarily disabled. * **Incognito/Private Mode:** Try logging in using an incognito or private browsing window. 4. **Internet Connection:** * Ensure the student has a stable internet connection. Try visiting other websites to confirm their internet is working. 5. **System Maintenance or Outage:** * It's possible that the `ocjene.skole.hr` website is down for maintenance or experiencing a temporary outage. There might not be an immediate fix the student can do. Check if there are any announcements or status pages for the service, if available. 6. **Contact School Administrator/IT Support:** * If none of the above steps resolve the issue, the student should contact their school's administrator, IT department, or the teacher responsible for managing student accounts. They will have access to account status, be able to reset passwords if needed, and can investigate deeper technical issues. 7. **Account Lockout:** * Too many failed login attempts might result in the account being temporarily locked. The school administrator can typically unlock it. When contacting the school, it's helpful for the student to provide: * Their full name and class. * The exact username they are trying to use. * A description of the error message they are seeing (if any). * The steps they have already tried.

There are two possible reasons for an unsuccessful login. The first is that the student's school is not included in e-Class Register, and therefore has no access to the page. The other is that the student received incorrect user data from the school, such as a PIN.

If a school is part of the e-Class Registry project, users should be able to sign up for the portal ocjene.skole.hr. A list of participating schools can be found at the following link: https://ocjene.skole.hr/pocetna/skole

After confirming that the school is on the e-Class Register, it's best to eliminate any doubt that the issue lies with your current internet browser. Please try logging into the ocjene.skole.hr portal using a different web browser (like Mozilla Firefox, Google Chrome, etc.).

If login is still not possible and the information is correct, the e-Class Registry administrator must check the validity of your PIN in the e-Class Register, e-Matica, and HUSO system. It is important that the PIN is valid in all three systems for the user to successfully log into the portal.

If neither of these suggestions resolves your issue, please contact helpdesk@skole.hr.

Individual user access to the CARNET Network

What SMTP settings are required to connect to a service?

CARNET's IP address and DNS record are automatically assigned during the process of connecting to a service.

A list of SMTP servers:

Service: SMTP settings:
1D/2D/3D Notebook mail.xcarnet.carnet.hr
Iskon.CARNET mail.duo.carnet.hr
Mobile CARNET/A1 on CARNET vouchers mail.mobile.carnet.hr
O2CARNET/O3CARNET mail.opti.carnet.hr
Stick2CARNET mail.stick2.carnet.hr
Tele2CARNET mail.tele2.carnet.hr

*The service is discontinued for new users

How to verify user accounts (user data) or change password?
  • Use the AAI@Edu.hr interface to change the password at this address: https://login.aaiedu.hr/promjenazaporke
  • On the LDAP webpage of the member institution. The list of member institutions can be found Here.

Users from the skole.hr domain can change their password on the central password change interface at this address. https://lozinka.skole.hr/.

CARNET system engineers helpdesk (sys.help)

The `sys.help` function in Python is used to display the help documentation for various objects. It can answer questions related to: * **Functions:** What a function does, its parameters, and what it returns. * **Classes:** The purpose of a class, its methods, attributes, and how to use it. * **Modules:** What a module contains, its functions, classes, and variables. * **Keywords:** The meaning and usage of Python keywords. * **Data Types:** The behavior and available methods for built-in data types like lists, strings, dictionaries, etc. * **Built-in Functions:** How to use Python's predefined functions like `print()`, `len()`, `type()`, etc. Essentially, `sys.help` provides the "documentation string" (docstring) for any given object in Python, which is meant to explain its purpose and usage.

Sys.help answers questions related to problems with the server operating on Debian Linux operating system and basic services that come with it (e-mail, web hosting). The goal is to ensure the institution's presence on the internet.

`sys.help` is not a standard Python function or module. It's possible it's a custom function or part of a specific library you're using. Assuming you are referring to the built-in `help()` function in Python, which is used to access documentation, `help()` generally cannot answer questions that require: * **Execution of code:** `help()` displays documentation, not the output of running code. * **Interpreting the intent or purpose of code that isn't explicitly documented:** If a function's docstring doesn't explain why it exists or how it's intended to be used in a broader context, `help()` won't be able to infer that. * **Information outside the available documentation:** If the documentation for a module, class, or function is missing or incomplete, `help()` can only show what's there. * **Debugging or error analysis:** While `help()` can explain what a function *should* do, it won't tell you *why* your specific code is raising an error or not producing the expected output. That requires debugging tools and analysis of your own code. * **External knowledge not present in Python's documentation:** `help()` is limited to information within the Python environment and its installed libraries. It cannot access general web information, personal files, or external databases unless those are explicitly integrated into the documentation or the tool you're using.

We cannot answer questions related to the Windows operating system or any Linux distributions. Also, for all inquiries about the AAI@EduHr system, please write to aai@srce.hr.

We do not have system engineers; how do we get help?

If the system engineer's job is outsourced, an expert from the institution must be designated as the system engineer and they will be eligible for assistance. The server must still be on the Debian Linux distribution.

How can we get more information?

Visit sys.portal at the address http://syshelp.CARNET.hr. At the portal we publish useful articles authored by system engineers of the member institutions.

Privacy Overview
CARNET

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

Analytics

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.