account
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
account [2012/05/03 18:13] – damir | account [2012/05/03 18:14] – damir | ||
---|---|---|---|
Line 32: | Line 32: | ||
After the creation of the account, the user will receive his/hers **login** and **password** couple. The login remain fix until the deletion, but the **password must changed at the first login** and changed again at intervals.\\ | After the creation of the account, the user will receive his/hers **login** and **password** couple. The login remain fix until the deletion, but the **password must changed at the first login** and changed again at intervals.\\ | ||
Avoid weak password as | Avoid weak password as | ||
- | * Name of cats, dogs, fishes, turtles, iguanas, parrots, sex toys (of whatsoever nature) | + | * Name of cats, dogs, fishes, turtles, iguanas, parrots and so on |
* Name of parents, siblings or other relatives, even in combined forms | * Name of parents, siblings or other relatives, even in combined forms | ||
- | * Name of Gods or other Divinities | + | * Name of Divinities |
* **names with a number after or before it** | * **names with a number after or before it** | ||
* Dates of birth, death, anniversary of anyone or anything | * Dates of birth, death, anniversary of anyone or anything | ||
Line 48: | Line 48: | ||
<note warning> | <note warning> | ||
**Why it's so important ?**\\ | **Why it's so important ?**\\ | ||
- | Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to our servers. One single weak password means that all users using the local services are susceptible to attack | + | Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to our servers. One single weak password means that all users using the local services are susceptible to attack.\\ |
Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account. | Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account. | ||
The passwords are periodically verified and the user that has a weak password is requested to change it. | The passwords are periodically verified and the user that has a weak password is requested to change it. |