Next 5: Files and Directories  Up 4: Courtesy, Ethics and Security Prev 4.B: Ethics Contents

Basic

§ 4.C: Security


A lot of caring people have invested tremendous amounts of time and money on providing you with such a nice computing environment. We would like to keep it nice for some time. Accordingly, security of the machines and of the data on them is a major issue. Here are some policies (self-enforced) that will help prevent break-ins and destruction of data by a third party.

Passwords:

We will occasionally try to crack passwords. If anyone's password is found to be crackable, it will be changed. That person should then see one of the systems administrators.

Report Suspicious Activities if:

Remember, you are working on a relatively open system. Although the system administrators work to make the system secure, your file security is primarily your responsibility. Set your file permissions for privacy. Make regular backups of your files to floppy disks or to your ucs account. (This tutorial will teach you how to do that.)

These room rules will protect the computers and avoid inconveniencing other users: