Introduction to the Unix Cluster. Node: Responsibilities
The computers discussed in this document are paid for by the
taxpayer, used by many people, and connected to the Internet. Since
these computers are used in research, relatively few restrictions are
placed on the way you use these computers. Thus, as a user of these
computers you have certain obligations:
Make sure you pick a good password (see Passwords). We assume that you are not malicious and so will
not intentionally abuse the computers. We need to be sure that only
authorized users gain access to the computers. Passwords are the main
line of defense against computer abuse. A password that is too short or
is a common word can be guessed by malicious outsiders.
Please be judicious in your use of the computers. It's easy, for
example, to overwhelm the network, fill up the disks, etc. If someone
notices you doing this, you may be asked to modify your behavior.
Don't take this personally; we'll try to find other ways for you to
accomplish your work efficiently.