Rules for Users of GMCS 425 Windows 7 account

07Sep2011 This File:

You must be a Computer Science major or in a CS course with instructor created account.
You must acknowledge reading the Policies for Lab Users and the campus Acceptable User Policy (AUP) by initialing the documents that follow.

You must provide your contact information: (print legibly please). These accounts are valid for one year.

  1. Name: ___________________________________________________________

  2. Email address: ________________________________________________________

  3. Year in school: __________________________________________________________

These accounts are valid for the semester class.

RedID: _____________________________

Policies for Lab Users: 

1.                  Lab Hours: M noon-10pm; Tu-Th 10am – 10pm; Fri noon – 4pm; Sat 10am – 4pm (when a Lab Monitor is present)

2.                  No food or liquids in GMCS 425    Please leave on table at entry.

4.                  Be neat and pick up after yourself.  There is a trash can in the room, use it.

5.                  Be sure to save your work in your class account on\cs100_XX  Do not save files on the C: drive.

6.                  Before you leave your station, you should save your work and logoff.

7.                  Printing is by the “Pay for Printing” system with output available in GMCS425, similar to the system in the SDSU Library, where you slipe your RedID / Aztec card with funds.

8.                  These systems are dual boot (Linux and Windows 7).  They start as PC Windows 7 and can change to Linux using a soft restart (press power button once) and select from menu.

9.                  The computer equipment in GMCS 425 is administrated by the Sciences Computing and Electronics Center (x-44881) These IT support professionals are aware of the evolving campus Management Vulnerability Plan (MVP) to ensure this Lab and its policies are consistent with good Network Security practice.

10.              Users should be aware of the Acceptable Use Policy (AUP) for SDSU which is repeated later.

11.              Do not touch the back of the computer systems.  There are USB connectors on the front of each computer for your use and there is no authorized reason for you to touch the back of the computers.

12.              Users should be familiar with Library & Information Access / On-Line Guides

13.              If you have your own notebook computer, use its wireless network capabilities to obtain network access to the SDSU system.  Wireless adapters can be purchased at Fry’s for $10 or so.

14.              Configuring Wireless Windows 7 for DHCP/ Wireless

15.                 SDSU Guidelines for Responsible Email Use For the current fall workshops, see

16.              Since many CS courses are using the campus machine,, you may wish to familiarize yourself with
Especially Guide to Using ROHAN

17.                 Note:  Access to must use software that establishes a Secure Shell Connection.  Software is available for download for the popular platforms (Mac and PC Windows) Software for remote connection to a server. Offers Secure Shell connections. Platform: Mac
SSH: Terminal connection client that uses encrypted communication. Also allows for secured FTP transfers. This version is for non-commercial use only. Platform: Windows
Linux connections should have Secure Shell installed.

The list of software available from


Inital, after reading the document above: _________________________________________

University Senate on April 3, 2001

Acceptable Computing Use

1.0 Computer users shall be liable for all activities on their accounts. All relevant federal and state laws and all University regulations shall apply. The University shall reserve the right to limit, restrict, or extend computing or communications privileges and access to its information resources.

2.0 Acceptable Use

2.1 University computing and communications resources shall be used for the University-related activities for which they are assigned.

2.2 Proper copyright permissions shall be obtained and sources shall be properly cited.

2.3 Users shall not engage in activities that compromise computer security, circumvent controls, disrupt services, or violate computer etiquette.

3.0 Legality and Enforcement

3.1 University policies shall not supersede federal or state laws. Illegal actions may result in prosecution.

3.2 Violations of University computing policies may result in the revocation of access or the discontinuance of an account or the loss of computing privileges.

4.0 Privacy. Computer files, electronic mail, and computing accounts are not absolutely private and may be subject to access by various authorized persons, as well as to access in compliance with the California Public Records Act.

5.0 Operational procedures shall be determined by the Instructional Technology committee of the Senate and reviewed on a periodic basis. Current operational procedures are available at


Inital, after reading the document above: _________________________________________