User Tools

Site Tools


account

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
account [2012/05/03 18:13] damiraccount [2012/05/03 18:15] damir
Line 32: Line 32:
 After the creation of the account, the user will receive his/hers **login** and **password** couple. The login remain fix until the deletion, but the **password must changed at the first login** and changed again at intervals.\\ After the creation of the account, the user will receive his/hers **login** and **password** couple. The login remain fix until the deletion, but the **password must changed at the first login** and changed again at intervals.\\
 Avoid weak password as Avoid weak password as
-  * Name of cats, dogs, fishes, turtles, iguanas, parrots, sex toys (of whatsoever nature) and so on+  * Name of cats, dogs, fishes, turtles, iguanas, parrots and so on
   * Name of parents, siblings or other relatives, even in combined forms   * Name of parents, siblings or other relatives, even in combined forms
-  * Name of Gods or other Divinities+  * Name of Divinities
   * **names with a number after or before it**   * **names with a number after or before it**
   * Dates of birth, death, anniversary of anyone or anything   * Dates of birth, death, anniversary of anyone or anything
Line 48: Line 48:
 <note warning> <note warning>
 **Why it's so important ?**\\ **Why it's so important ?**\\
-Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to our servers. One single weak password means that all users using the local services are susceptible to attack from hackers.\\+Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to our servers. One single weak password means that all users using the local services are susceptible to attack.\\
 Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account. Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account.
 The passwords are periodically verified and the user that has a weak password is requested to change it. The passwords are periodically verified and the user that has a weak password is requested to change it.
Line 54: Line 54:
 </note>  </note> 
  
-===== Wireless Network "epfl" =====+===== EPFL Wireless Network =====
  
 The account for this network are managed directly by the EPFL, and not by us. The **epfl** wireless network is a facility available to all personnel of the EPFL ([[ http://network.epfl.ch/fr/Access%20at%20campus/WiFi/Zones/| EPFL WiFi ]]) and, after request, even to visitors or invited Professors. The request for this kind of account take some time to be accomplished, so It's useless if the user is visiting for a less than a month. The account for this network are managed directly by the EPFL, and not by us. The **epfl** wireless network is a facility available to all personnel of the EPFL ([[ http://network.epfl.ch/fr/Access%20at%20campus/WiFi/Zones/| EPFL WiFi ]]) and, after request, even to visitors or invited Professors. The request for this kind of account take some time to be accomplished, so It's useless if the user is visiting for a less than a month.