User Tools

Site Tools


account

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Last revisionBoth sides next revision
account [2012/05/03 18:17] damiraccount [2015/07/01 15:45] – external edit 127.0.0.1
Line 18: Line 18:
   * Email address (messages from the Sys Admins will be sent to this address)   * Email address (messages from the Sys Admins will be sent to this address)
   * Office where the User is located (or Institute from wich the user is connecting)   * Office where the User is located (or Institute from wich the user is connecting)
-  * Lab Affiliation (**ALGO, ARNI, LCM, LICOS, LTHC, LTHI**)+  * Lab Affiliation (**ALGO, ARNI, LCM, LINX, LTHC, LTHI**)
   * Type of Account requested   * Type of Account requested
     * Workstation (the user needs to use a Linux Workstation)     * Workstation (the user needs to use a Linux Workstation)
Line 43: Line 43:
  
 <note tip> <note tip>
-A good password contain at least chars and has a "melange" of letters, Capital Letters, number and other chars as in this example: qy7hM462, or 24xi31iQ.+A good password contain at least 12 chars and has a "melange" of letters, Capital Letters, number and other chars as in this example: qy7hM462, or 24xi31iQ.
 </note> </note>
  
 <note warning> <note warning>
 **Why it's so important ?**\\ **Why it's so important ?**\\
-Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to our servers. One single weak password means that all users using the local services are susceptible to attack.\\+Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to your identity and our servers. One single weak password means that all users using the local services are susceptible to attack.\\
 Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account. Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account.
 The passwords are periodically verified and the user that has a weak password is requested to change it. The passwords are periodically verified and the user that has a weak password is requested to change it.
-If you're requested to change your password, please do this A.S.A.P.**you can change your network password from anywhere in the world**, just connect to the access server using a ssh protocol and use the passwd command. +If you're requested to change your password, please do this A.S.A.P.**you can change your network password from anywhere in the world**, just connect to the access server using a ssh protocol and use the passwd command. 
 </note>  </note>