account
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
account [2012/05/03 18:13] – damir | account [2012/05/03 18:17] – damir | ||
---|---|---|---|
Line 32: | Line 32: | ||
After the creation of the account, the user will receive his/hers **login** and **password** couple. The login remain fix until the deletion, but the **password must changed at the first login** and changed again at intervals.\\ | After the creation of the account, the user will receive his/hers **login** and **password** couple. The login remain fix until the deletion, but the **password must changed at the first login** and changed again at intervals.\\ | ||
Avoid weak password as | Avoid weak password as | ||
- | * Name of cats, dogs, fishes, turtles, iguanas, parrots, sex toys (of whatsoever nature) | + | * Name of cats, dogs, fishes, turtles, iguanas, parrots and so on |
* Name of parents, siblings or other relatives, even in combined forms | * Name of parents, siblings or other relatives, even in combined forms | ||
- | * Name of Gods or other Divinities | + | * Name of Divinities |
* **names with a number after or before it** | * **names with a number after or before it** | ||
* Dates of birth, death, anniversary of anyone or anything | * Dates of birth, death, anniversary of anyone or anything | ||
Line 48: | Line 48: | ||
<note warning> | <note warning> | ||
**Why it's so important ?**\\ | **Why it's so important ?**\\ | ||
- | Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to our servers. One single weak password means that all users using the local services are susceptible to attack | + | Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to our servers. One single weak password means that all users using the local services are susceptible to attack.\\ |
Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account. | Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account. | ||
The passwords are periodically verified and the user that has a weak password is requested to change it. | The passwords are periodically verified and the user that has a weak password is requested to change it. | ||
Line 54: | Line 54: | ||
</ | </ | ||
- | ===== Wireless Network | + | ===== EPFL Wireless Network ===== |
The account for this network are managed directly by the EPFL, and not by us. The **epfl** wireless network is a facility available to all personnel of the EPFL ([[ http:// | The account for this network are managed directly by the EPFL, and not by us. The **epfl** wireless network is a facility available to all personnel of the EPFL ([[ http:// | ||
Line 69: | Line 69: | ||
</ | </ | ||
- | ===== Wireless Network | + | ===== Public-EPFL |
- | The wireless network **public-epfl** is an open network, accessible to everyone that has an antenna in the [[ http:// | + | The wireless network **public-epfl** is an open network, accessible to everyone that has an antenna in the [[ http:// |
- | The users of wireless network | + | The users of **public-epfl** receive a login and a password from the local Administrators |
** In order to use this kind of connection, after obtaining the account, the users have to: ** | ** In order to use this kind of connection, after obtaining the account, the users have to: ** | ||
- Connect to the network __public-epfl__ | - Connect to the network __public-epfl__ | ||
- Open the Web browser | - Open the Web browser | ||
+ | - Connect to the En-Clair link | ||
- Insert the login/ | - Insert the login/ | ||
- Click the "I Agree" button | - Click the "I Agree" button | ||
- | If everything is correct, the user can have access to internet and can use most of the protocols available. | + | If everything is correct, the user will have access to internet and will be able to use most of the protocols available. |
<note tip> | <note tip> | ||
- | Users of **public-epfl** can connect to our network and use the local account to access servers (via ssh) or to [[printing: | + | Users of **public-epfl** can connect to our network and use the local account to access servers (via ssh) or to [[printing: |
</ | </ | ||