Changes between Version 12 and Version 13 of Policy


Ignore:
Timestamp:
Aug 27, 2013 3:12:49 PM (7 years ago)
Author:
jhickey
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • Policy

    v12 v13  
    44 Deter is a shared resource.  We expect users to be good citizens by not abusing or wasting the resources we make available to them for free.  We ask that you:
    55 * '''Read the tutorial''' -  [wiki:Tutorial It is right here] - and give us feedback!
     6* '''Use good passwords''' - We are a computer security testbed, so please use a strong password.  You may be reading this because you were told that your new password, 'qwerty1234', is in the dictionary.  We don't mean the Oxford English Dictionary here.  What we use is a large list of dictionary words *combined* with actual passwords that have been found in the wild.  For example, the [http://arstechnica.com/security/2010/01/32-million-passwords-show-most-users-careless-about-security/ RockYou hack] ended up revealing the unencrypted passwords of 32 million people (and about 14 million unique passwords).  Since this list is one of the go-to lists for the bad guys, we use it too.  This means that a lot of passwords that seem clever or obscure fail our test because someone else thought up the same thing.  The longer your password, the less likely it is to be in the dictionary.  Try combining multiple words mixed with numbers and symbols.  That way you get an easy to remember password that also will pass our dictionary checks.
    67 * '''Swap out your experiment it is finished''' -  People forget to do this all the time.  We do have an idle detection mechanism, but it is not perfect and may keep thinking your experiment is active long since you have collected your results, published your paper, and achieved tenure.  Please log back in and free up your nodes so that other researchers can use them.
    78 * '''Do not abuse the no idle-swap feature''' -  Only turn off idle swap if there is a true need.  Take the time to script the setup process for your experiment or create custom disk images.
     
    1213  * '''Of course you can have more space! ''' - Your quota isn't set in stone.  If you need more space, just contact us!  All these draconian sounding quota limits and housekeeping requests are so that we have extra space available to allocate to you when you need it!
    1314  * '''Let us know if you are done with your project''' - Let us know if you no longer need your project and we'll clean it up for you!
    14 
    15  * '''Use good passwords''' - We are a computer security testbed, so please use a strong password.  You may be reading this because you were told that your new password, 'qwerty1234', is in the dictionary.  We don't mean the Oxford English Dictionary here.  What we use is a large list of dictionary words *combined* with actual passwords that have been found in the wild.  For example, the [http://arstechnica.com/security/2010/01/32-million-passwords-show-most-users-careless-about-security/ RockYou hack] ended up revealing the unencrypted passwords of 32 million people (and about 14 million unique passwords).  Since this list is one of the go-to lists for the bad guys, we use it too.  This means that a lot of passwords that seem clever or obscure fail our test because someone else thought up the same thing.  The longer your password, the less likely it is to be in the dictionary.  Try combining multiple words mixed with numbers and symbols.  That way you get an easy to remember password that also will pass our dictionary checks.
    1615
    1716 * '''Do not share accounts''' - We will close accounts that we suspect to be shared.