next up previous


SYSTEM ADMINISTRATION
CIS 5406
Summer 1996
Security and Courtesy for Root Users

  1. Use only the IP number and name that has been assigned to you.
  2. Do not boot Linux from any other CS dept machine than the one that has been assigned to you.
  3. Do not take on the user ID of any regular user other than yourself (even on your own machine).
  4. You may, of course, take on system user IDs such as root, daemon, bin, etc. on your Linux machine. Do not attempt to login with system user IDs on any CS dept machine other than your assigned machine.
  5. Report any security holes (or potential security holes) to me or the Systems group.
  6. Any unsanctioned security probes will be interpreted as hostile actions.
  7. For your convenience, you may boot your machine into Linux mode at lab closing time. The lab assistants will be instructed to leave the PCs running overnight so that you may work on your machine remotely after hours. Please remove the Linux boot disk and replace the DOS boot disk before leaving. The machine will be rebooted as a DOS machine the next morning so you may want to do a clean halt before the next morning.
  8. You are responsible for the integrity of the DOS partitions on your machine. Don't mess them up! One of the lessons of being a systems administrator is to not create unnecessary work for other systems adminstrators.