Difference between revisions of "Introduction Grid Computing Lab Course AUP"

From PDP/Grid Wiki
Jump to navigationJump to search
m
m
Line 2: Line 2:
  
 
[[Image:Course-network.gif|thumb|IGC2005 Network]]
 
[[Image:Course-network.gif|thumb|IGC2005 Network]]
 +
 +
To reach the machine dedicated to the IGC2005 Lab Course, you will first have to login to the head node. A username and password will be assigned to you by the tutors (in case you lost it, contact Dennis Kaarsemakers).
 +
On the course machines themselves, you will have root access. With that you can do all kind of wonderful things that you have never dreamt of on the normal UvA systems. However, that does not mean that you have to exercise all that power, or indeed that you supposed to do that. Whenever your prompt starts with a pound sign, beware of the extra havoc and dismay you can cause to yourself, your fellow students, or the system itself.
 +
 +
In particular:
 +
* don't run keyboard sniffers -- and beware that you never type a valuable password when logged in to the course systems. Use secure copy (scp) with public key authentication, and always initiate copied form the outside to the inside.
 +
* don't snoop network traffic that's not your own
 +
* don't abuse the systemks for sending spam, identity hijacking, or general obfuscation of identity
 +
* don't destroy someone else's work (remember that it's easy to do damage as root!)
 +
* in general, behave nicely -- this course type is experimental

Revision as of 11:47, 31 August 2005

IGC2005 Lab Course Systems Overview and AUP

IGC2005 Network

To reach the machine dedicated to the IGC2005 Lab Course, you will first have to login to the head node. A username and password will be assigned to you by the tutors (in case you lost it, contact Dennis Kaarsemakers). On the course machines themselves, you will have root access. With that you can do all kind of wonderful things that you have never dreamt of on the normal UvA systems. However, that does not mean that you have to exercise all that power, or indeed that you supposed to do that. Whenever your prompt starts with a pound sign, beware of the extra havoc and dismay you can cause to yourself, your fellow students, or the system itself.

In particular:

  • don't run keyboard sniffers -- and beware that you never type a valuable password when logged in to the course systems. Use secure copy (scp) with public key authentication, and always initiate copied form the outside to the inside.
  • don't snoop network traffic that's not your own
  • don't abuse the systemks for sending spam, identity hijacking, or general obfuscation of identity
  • don't destroy someone else's work (remember that it's easy to do damage as root!)
  • in general, behave nicely -- this course type is experimental