These guidelines govern the use of the public UNIX machines belonging to the Department of Computer Sciences of The University of Texas at Austin. Users of CS machines should conduct themselves in a manner that promotes a productive working environment. Conduct that creates a disturbance to other users, or that intentionally or negligently interferes with the proper operation of the system or its use by others is prohibited. Any activity that uses disproportionate amounts of system resources falls under this category.
Unsuitable lab behavior includes, but is not limited to:
- Bringing food into any public computer lab at any time.
- Printing or diplaying material unsuitable for public display.
- Leaving the lab and leaving yourself logged into a terminal.
- Locking a terminal for more than 30 minutes.
Unsuitable system use includes, but is not limited to:
- Rebooting machines (this should only be done by staff).
- Sharing an account or password with another person.
- Using an account for commercial or profit-making purposes.
- Using an account for non-academic purposes when a cost to the department is incurred (laser-printing, etc).
- Engaging in any activity that compromises the security of the system.
- Any illegal activity, including software piracy or other copyright violations.
- Any long-running CPU-intensive process should be submitted to condor to run. It will automatically pick a lightly loaded machine, suspend the process when someone begins using the console, and ensure that no one hogs an excessive number of machines.
- Any other long-running CPU-intensive jobs are subject to being killed at any time on any public machine.
- Running a personal HTTP server and running bots (including IRC bots) are strictly forbidden. The only exception is an academic requirement (such as running an HTTP server for a class, in which case that process must be running only for such time as required by that class).
If processes appear to be in violation of these guidelines or are very idle and appear to have been abandoned, they will be killed by the staff. If users appear to be in violation of lab behavior guidelines, possible actions can range from a reprimand, to the loss of an account, to referral to school or state authorities for disciplinary action.
If you believe you have a compelling reason to violate any of these guidelines, please send mail to email@example.com before you take action.
- Awards & Honors
- About Us
- Student Engagement and Support
- Masters Program
- Ph.D. Program
- Financial Information
- Prospective Students
- Incoming Students
- Current Students
- Portfolio Program in Robotics
- Curricular Practical Training
- Grad Student Talks
- UTCS Direct
- Change SMTP/Outgoing Mail Password
- Cluster Node Status
- Equipment Checkout
- Grad Office Assignments
- Laptop Encryption
- List of Public UNIX Hosts
- Meeting Rooms
- Public Labs
- Scheduled Maintenance
- Shop Req (Hardware Issues/Requests)
- Software Downloads
- Software Request Form
- SSN Detection
- System & Facilities Blog
- Tech Staff Updates Blog
- UTCS IT Policies