Request for Windows XP account in GMCS 425

Update: 02 October 2007

You must be a Computer Science major, which will be checked by Stewart
You must acknowledge reading the Policies for Lab Users and the campus Acceptable User Policy (AUP) by initialing the documents that follow.

You must provide your contact information: (print legibly please). These accounts are valid for one year.

  1. Name: ___________________________________________________________

  2. Email address: ________________________________________________________

  3. Year in school: __________________________________________________________

These accounts are valid for one year.

Your account will be assigned within 2 days and will be available from the lab monitor in GMCS 425.

The Lab Monitor will check your RedID when you turn the application in (Lab Monitor, please write the RedID number below, after checking that the RedID photo matches the person handing in the request. Also the name on the request must match the name on the RedID.)

RedID: _____________________________ (Lab Monitor fill in after checking name & photo)




Policies for Lab Users: 

1.                  Lab Hours: M-Th 9:30am – 10pm; Fri 10am – 4pm; Sat 10am – 4pm (when a Lab Monitor is present)

2.                  No food or liquids in GMCS 425    Please leave on table at entry.

4.                  Be neat and pick up after yourself.  There is a trash can in the room, use it.

5.                  Be sure to save your work on the H: drive since it is the only drive with backed-up information.  Do not save files on the C: drive.

6.                  Before you leave your station, you should save your work and logoff.

7.                  Printing is by the “Pay for Printing” system with output available in GMCS422

8.                  These systems are dual boot (Linux and Windows XP pro).  They start as PC Windows XP and can change to Linux using a soft restart (press power button once) and select from menu.

9.                  The computer equipment in GMCS 425 is administrated by the Sciences Computing and Electronics Center (x-44881) These IT support professionals are aware of the evolving campus Management Vulnerability Plan (MVP) to ensure this Lab and its policies are consistent with good Network Security practice.
http://www.sci.sdsu.edu/cos/cosscec.shtml

10.              Users should be aware of the Acceptable Use Policy (AUP) for SDSU
http://security.sdsu.edu/policy/aup.html which is repeated later.

11.              Do not touch the back of the computer systems.  There are USB connectors on the front of each computer for your use and there is no authorized reason for you to touch the back of the computers.

12.              Users should be familiar with Library & Information Access / On-Line Guides http://scc.sdsu.edu//guides/guidesindex.html

13.              If you have your own notebook computer, use its wireless network capabilities to obtain network access to the SDSU system.  Wireless adapters can be purchased at Fry’s for $10 or so.

14.              Configuring Wireless Windows XP/XP Professional for DHCP/ Wireless
http://scc.sdsu.edu/wireless/wireless.html#configuringXP

15.                 SDSU Baseline Access Training & Support (BATS) offers free courses from Instructional Technology Services (ITS) each year on a wide variety of software and tools.  For the current fall workshops, see
http://www-rohan.sdsu.edu/~bats/register/PDFschedule/BATS_studentFa07flyer.pdf

16.              Since many CS courses using the campus machine, rohan.sdsu.edu, you may wish to familiarize yourself with
http://www-rohan.sdsu.edu/refdoc.shtml
Especially Guide to Using ROHAN
http://www-rohan.sdsu.edu/0200rohan1.html

17.                 Note:  Access to rohan.sdsu.edu must use software that establishes a Secure Shell Connection.  Software is available for download for the popular platforms (Mac and PC Windows) http://scc.sdsu.edu/software/software.html
Nifty Telnet: Software for remote connection to a server. Offers Secure Shell connections. Platform: Mac
SSH: Terminal connection client that uses encrypted communication. Also allows for secured FTP transfers. This version is for non-commercial use only. Platform: Windows
Linux connections should have Secure Shell installed.

 

Inital, after reading the document above: _________________________________________


University Senate on April 3, 2001

http://security.sdsu.edu/policy/aup.html

Acceptable Computing Use

1.0 Computer users shall be liable for all activities on their accounts. All relevant federal and state laws and all University regulations shall apply. The University shall reserve the right to limit, restrict, or extend computing or communications privileges and access to its information resources.

2.0 Acceptable Use

2.1 University computing and communications resources shall be used for the University-related activities for which they are assigned.

2.2 Proper copyright permissions shall be obtained and sources shall be properly cited.

2.3 Users shall not engage in activities that compromise computer security, circumvent controls, disrupt services, or violate computer etiquette.

3.0 Legality and Enforcement

3.1 University policies shall not supersede federal or state laws. Illegal actions may result in prosecution.

3.2 Violations of University computing policies may result in the revocation of access or the discontinuance of an account or the loss of computing privileges.

4.0 Privacy. Computer files, electronic mail, and computing accounts are not absolutely private and may be subject to access by various authorized persons, as well as to access in compliance with the California Public Records Act.

5.0 Operational procedures shall be determined by the Instructional Technology committee of the Senate and reviewed on a periodic basis. Current operational procedures are available at http://security.sdsu.edu/policy/aup-operational.html.

 

Inital, after reading the document above: _________________________________________