2. Rules for using the network and servers
2.1 Prohibitions and recommendations
2.2 Choosing and changing the password
2.3 Available disk space
The local computer network of the Institute of Physics and the Department of Applied Computer Science together with computers connected to it (including servers) is used by the employees and students of the Faculty to complete their didactic and scientific tasks. Currently, servers support about 1,200 people. In order to provide everyone with access to servers, good and reliable services and provide the necessary level of
system protection, the following rules for using the servers are introduced (see also the Computer Network Regulations of the Nicolaus Copernicus University).
2.1 Prohibitions and recommendations
The user is prohibited from:
- Installing, running, storing and sharing programs (files) violating the license rules, copyright, etc. In particular, this applies to peer-to-peer programs used to exchange copyright-protected audio/video files.
- Installing, running, storing and sharing programs (files) that infringe the security of computer and network systems or user safety. This applies in particular to malware, such as viruses, Trojan horses and exploits, as well as programs monitoring network traffic.
- Launch password decryption programs, conduct actions to eavesdrop or capture information flowing in the network, violating the privacy of system resources (see below).
- Launching programs that may disrupt or prevent the proper functioning of computer systems and the local / wide area network.
- Connecting network devices, including desktop and laptop computers, to the local computer network without registering them first.
- Sending mass mail, ads (spam).
- Using servers to conduct business (advertisement of goods and services), political and to disseminate content or images that harm the University’s reputation, content and images that are vulgar, obscene, offensive to third parties, violate anyone’s personal rights (in particular, the content of websites ).
- Use cookies as part of the website to track user preferences, give him personalized ads, etc. (it is only possible to remember cookies related to the user session who logged in to the site).
- Lending your own account to third parties.
- Make attempts to use a foreign account and access restricted computer resources.
- Making any changes in the configuration of personal computers serving as public terminals and being the equipment of computer labs and installing their own software on these computers.
- Servers may be used to run long-running tasks but they must be run with the lowest priority, i.e. nice +19 command. If the task was started with the default priority, it can be changed using the command nice +19.
Failure to comply with the above prohibitions and recommendations will result in immediate loss of access to the server and other appropriate sanctions. The Dean of the Faculty will be informed of any significant violation of the rules of using the local computer network.
2.2 Choosing and changing the password
In order to protect your own data and protect the entire system from intrusions, each user MUST use a password that is difficult to guess.
When creating a password, do not use:
- names frequently encountered,
- common nouns,
- digits only at the beginning or end of the password,
- names associated with the place where the account is placed
The password must be at least nine characters long, including at least one capital letter and one number or special character (@!,:; “…).
When creating a password, it is recommended to use:
- numbers inside the password,
- different size letters,
- words not often found in colloquial language.
2.3 Available disk space
Due to the limited disk resources that can be allocated to users’ home directories, as well as a large number of users, one has to use these resources prudently. If it is necessary to store larger amounts of data for a short period of time, the /tmp space should be used.
Home directories are regularly archived. In the event of data loss, it is possible to recover them. Because no system is 100% sure, it is recommended to archive the most important data on your own. The system administrator is not responsible for the loss of data collected by users.