How do I get a new UTCS account so I can log into the Linux and Windows machines?

The UTCS Account Creation application is here - log in with your UT EID, and follow the instructions.

Please note that students enrolled in the UTCS Online Master of Computer Science program are not eligible for this type of account.


My CS account has expired. I have a CS account again now, and I was wondering whether my old account was archived and whether it would be possible for me to get my old files back?

Unfortunately, no. After an account has expired the files will not be restored.


What are the CS Department policies on using an account?

Read the CS Department policies here. Other online docs and sources of help are located here.


Is software available for download as a CS student?

Mathematica is available through a campus-wide license held by the Physics department. Follow the link and log in with your UT EID to gain access.


What's this about home directory quotas? What's my current quota? Why do I get a message, "Disk quota exceeded"? Why can't I save anything to disk? Why won't my editor save or do anything?

Reluctantly, UTCS has started using hard quotas on home directories. You can read more about it here.

Not being able to save things to disk, or experiencing editor save failures are signs that your home directory may have reached quota. Use chkquota to see if you have reached yours. You can use du -sk ~/* ~/.??* | sort -n to see what is taking up the most space. Try removing some files to see if that fixes your issues. If the problem is still occurring, send mail to describing the problem. We are NOT ABLE to raise your quota.


How do I edit the "Plan" that people see when they finger me? I have a .plan file; why can't people see it?

The "Plan" is a printout of a file named .plan in your home directory. For people to see it, the file must be world-readable and your home directory must be world-executable.


How do I change the information people see when they finger my CS account (my real name, my phone number and address, etc)?

To change any of this information, send email to from your CS email address with the changes and a staff member will take care of it.


How do I change the shell my CS account uses?

The online application to change your shell and mail forwarding address is currently offline. Please email and we will make these changes for you.


How do I change the login name for my account?

A login name is permanent for the life of an account, as stated on the account form; once the account has been created the login name cannot be changed.


I forgot/lost the password to my CS account. How do I find out what it is or get it changed?

We have no way of finding out what your password is, so you'll have to change it. You should visit our password update webpage and log in using your UTEID to change your password. Please read the instructions and information provided carefully. If that fails for some reason, open a help ticket by sending an email to For security reasons, passwords are never sent via email. Also, any password update by any method can take a couple of hours to propagate through our network, so please be patient. Note: This information pertains to Computer Science department accounts. For UTmail accounts, refer to


I have a non-CS major account (tmpclass) right now, and I'll be eligible for a CS undergrad account (under) soon. Can I just get my current account changed to an under account?

Yes, you can have your current account upgraded. Contact after the beginning of the semester in which you become a CS major -- we don't get registration information until then -- and request your account be changed to an under account.


When do user accounts expire? I just got a notice that my account is expiring -- what do I do?

You can see the expiration date for your account by typing finger <username> on the command line. Under and tmpclass accounts are automatically extended each semester provided the student who holds the account is enrolled in a Computer Science course that semester. For all types of accounts, notice will go out two weeks prior to expiration. If you have received an expiration notice, do the following, according to the type of account you have:

  • under - contact the undergrad advising office in person or by email to They must verify that you have not yet graduated and are still a CS major. They will then contact us to extend your account.
  • tmpclass - email If you are not enrolled in a qualifying CS class, however, your account will not be extended.
  • grad - grad accounts are changed to guest accounts upon graduation and extended for one year. To keep your account beyond that, you will have to have a faculty sponsor. They must request that the account be extended.
  • guest - an extension must be requested by the sponsor of the account. They will also receive the expiration notice.
Labs & Facilities

Where are there computer labs I can use? When are the labs open? What kinds of computers are available for me to use?

The public labs are located in GDC 3.302 and GDC 1.310.  Each station in GDC 1.310 contains a UNIX machine and a Windows machine with a KVM switch to go from one to the other. GDC 3.302 contains mostly UNIX machines and a few Windows machines. You can also access the UNIX computers remotely via ssh; view the public UNIX host status page for a list of the UNIX computers and their current status. These labs are open to all students currently enrolled in a CS course.

For more information on all of these labs, see the Public Labs page.


How do I use the department's cluster? What is HTCondor?

See the cluster documentation page.


There's something wrong in one of the labs or one of the buildings (the A/C isn't working, it's flooding, it's on fire, one of the light bulbs is burned out, ...). Who do I report it to? How do I get it fixed?

Facilities problems should be reported directly to Physical Plant Planning and Scheduling by calling 471-0043 (for GDC) during normal working hours, or sending email to

For urgent conditions outside normal working hours please call 471-2020.

For urgent conditions directly affecting CS department facilities, e.g. fire, flood, ceiling leaks onto machines, etc, please notify after notifying emergency personnel.


How can I find out the names of some computers I can use? What machines are publically available on the CS network? What's a "public" machine?

A "public" machine is a machine that can be logged into by anyone with a CS account; the name is always aliased to a public Linux machine. You can use the command cshosts to find out more information about other machines on the CS network; type cshosts help or man cshosts for more information about how to use it. Alternatively, you can visit the public host status page for a list of public hosts and their current status.


How do I connect my own computer to the network ?

Assuming you want more than wireless networking, you have two options. One is only intended for short-term visitors and students such as undergrads without offices. These users can use Horatio with the public DHCP network jacks located in the public UNIX lab in GDC 3.302 and they should have ethernet cables already attached.

For longer term / office usage, we are happy to offer you a static IP address or a DHCP address.  For DHCP, all non-assigned walljacks in GDC are already setup for access to horatio.  It is very important that you never disconnect any network or power cable, please submit a helpreq if you need a cabling change or a machine moved.

For those wanting a static IP address, we'll need the following submitted in a helpreq:

  1. A requested hostname (the domain will be
  2. Computer vendor make/model (e.g. Dell/Precision-007n).
  3. The location of the computer (e.g. GDC 3.302j).  Please don't say something like Prof Smith's Laboratory.
  4. The walljack number. Walljacks are generally arranged in 2x3 blocks, numbered left to right, top to bottom. To determine which is the lowest numbered jack, you may need to tilt your head.
  5. Operating system(s).
  6. Name of computer's owner (i.e. who paid for it).
  7. Name of the system administrator for this machine. This will be the technical contact and will be expected to respond quickly and knowledgeably to reports of security violations and other types of abuse. They are expected to install, encrypt, and maintain the computer in a responsible manner without requiring staff assistance.
  8. The name of the Primary User of the machine if different from the system administrator.
  9. The UTID, if owned by the university. This will be a six digit identifier. It will appear on a tag attached to the computer.
  10. If there is no UTID, then we will tag the machine with a CSID tag as part of the helpreq.
  11. Please provide the vendor's serial number. This is typically on the back of a computer, sometimes identified by "SN".

In order to have a machine on the Department network, you must be able to install, encrypt, and maintain that machine with little or no help from the department technical staff.  In the case of some research groups, there may already be someone able to help you do this, please ask around and list them as the system administrator (7), and yourself as the primary user (8).  Make sure you copy them on the helpreq.


Forwarding your O365 ( email.

New UT Austin employees starting on or after 12/11/18 will have an email address created for them automatically by ITS. This mailbox is discoverable via UT's Exchange directory, so you may be receiving email there and not know about it. This can be problematic for obvious reasons. Follow these steps to remove that address from the Exchange directory, and forward the email.

First you should go here: and check the box so the address doesn't show up in the Exchange directory.

Then go here: Select Outlook Web App (OWA) and login.

In the OWA click on the gear icon at the top right; click "View all Outlook settings", then find the forwarding option and configure your forwarding for the address.


What is the name of the CS POP (Post Office Protocol) and IMAP (Internal Mail Access Protocol) server? The SMTP (Simple Mail Transfer Protocol) server?

All POP/IMAP users should use "" as their "incoming" server.  Note that, in general, CS recommends the use of IMAP instead of POP, especially if you check mail from multiple computers and/or mobile devices.

The SMTP server is "".

For complete details see our Email Configuration page.


What causes "Relaying denied. Proper Authentication required."?

This means you are trying to send mail via the UTCS SMTP server, but the user name and password is either missing or misconfigured.  See our Email Configuration page for details on how to set this up.

Note that the new SMTP server ( no longer requires you to use a different password from the one you use to retrieve email.


How does the procmail setup in the CS department work? Why can I not forward email or execute programs during delivery via my .procmailrc?

The CS department install of procmail which filters your mail upon delivery is specially configured for our environment. It is set up as usual via your ~/.procmailrc file, but with two caveats:

  1. You may not run a program from your .procmailrc. This is to protect our mailserver (and thus your mailbox), not only from deliberately malicious actions but also from accidental misconfigurations which would swamp the server. Since our mail server does not allow user logins for the same reasons, this is an extension of existing policy.
  2. You may not forward mail to another user via the '!' mechanism in a procmail recipe. This is to protect the mail server from the high load and eventual meltdown that can be caused by a mail loop.

With these restrictions in mind, the main use of procmail during message delivery at CS is to filter your mail in real-time into different folders based on headers (such as the score it received from our spam-analysis system, the sender, a mailing-list-specific header, or the subject).

Since we have disabled execute and forward functionality in procmail during delivery, we suggest using the example in the procmail(1) man page for a template in creating your own post-processing scripts. The version of procmail in /lusr/bin which you can run manually does not suffer these limitations.

(Search for the third occurrence of the string 'cron' in this man page to find the example script.)

Two changes you will need to make to that script are to change the $ORGMAIL variable to point to the actual location of the folder, and to provide a separate procmail recipe file to the executed version of procmail in the script (the line formail -s procmail < .newmail && will need to be changed to formail -s procmail /path/to/your/recipefile < .newmail && ).

These scripts can be run periodically via the cron(1) command to do the actions automatically, or you can run them before you read mail to do something like filter out the messages or text you don't like.

PLEASE NOTE: To avoid clobbering mail folders make sure all recipes start with :0:, not just :0. The procmailrc(1) and procmail(1) manpages have more details."


Why has sending mail from my home computer suddenly stopped working?

While there may be any number of reasons for the failure, many ISPs and organizations block outbound network traffic on port 25 (the SMTP port) that mail servers use to communicate with each other as one method of stopping spam.  If you are using CS's server for your outgoing mail server, we recommend you use port 587 (the Submission port) with STARTTLS turned on.  For more information see our Email Configuration page. if you still encounter problems sending mail please do not hesitate to email and we will try to help you resolve the problem.


I've got a mail message with the subject "DON'T DELETE THIS MESSAGE -- FOLDER INTERNAL DATA," and the body says not to delete the message or important data will be lost. What's going on?

The POP/IMAP servers and some mail reader software (anything that uses the c-client library) use this "dummy" message to maintain state over time. Because our POP/IMAP server recognizes this message as containing metadata, it doesn't send it to POP/IMAP clients, such as Apple Mail or Thunderbird, so you'll normally never see it.  But if you use an email client that doesn't recognize this as a "special" message, it will show it to you as a regular message. It's true that if you delete the message, you may lose important information, such as whether messages are read/unread, whether they've been seen at all by the client (which could lead a POP client to "duplicate" some messages), etc.


How do I authenticate with the CS SMTP mail server?

The newer SMTP server ( no longer requires a separate SMTP email password, so you will simply use your standard CS account password.  See our Email Configuration page for more details


How can I use webmail with my CS mailbox?

You have several options:

  • You can use the CS webmail to connect to your CS mail account. Simply log in using your CS account and password.
  • You can use a third party webmail system, such as, GMail or Yahoo.  Specific instructions for setting this up will vary by webmail provider so it's beyond our ability to support, but googling for "other" "email" "account" and the name of the provider should get you pointed in the right direction.  Note that many of these only allow POP access to your CS email account, so if you plan to still use other email software to access your CS email, choose the settings in your webmail provider's configuration carefully (leave email on server, in particular).
  • Forward your mail to a separate offsite address which already provides webmail, such as those mentioned above as well as others.

How do I set up my account so that it automatically sends out a message stating that I am on vacation when I receive an incoming message? How do I turn it off?

Use the 'vacation' program. You can read the vacation(1) man pages for usage info, but the quick-start method is to create a message you'd like to send in response to emails you receive and save it as ~/.vacation.msg, and then run vacation -i. To turn this off, simply remove ~/.vacation.msg.


How do I forward my mail from my CS account to a different account? Why isn't my .forward file working? How can I get my mail forwarded someplace else after my account expires?

All mail forwarding on the CS system is handled by a central user account database; .forward files won't work. To get mail forwarded, email from your UTCS email account and make the request. UTCS email is never forwarded past the lifetime of an account. UT offers alumni email here. If you want to learn more about how to use procmail on our systems, check out the FAQ on procmail.


How can I create a mailing list?

Mailing lists, for the most part, are only created for "official" department purposes (lists of students in a class created for TAs, etc). These are the steps to take to create one:

  • Create a file of the people who should be on the list, one email address per line.
  • Make the file world readable.
  • Make all directories in the path to the file world executable.
  • Email, giving the name of the alias you want, the name and path of the file, and the purpose of the alias.

The alias, if approved, will become effective within one or two business days.


How can I disable the departmental spam filtering for my UTCS email address?

There's not really a way to opt out of using the spam filter, but users do have the ability to tune how aggressively the filter behaves on mail sent to you.  In your user directory, there is a hidden directory named .spamassassin, and Inside of that is a text file called user_prefs (there are other files too, but you should leave those alone).  Using a text editor, you can add one of the following lines to the end of the file:

  • whitelist_to {your email address}
  • more_spam_to {your email address}
  • all_spam_to {your email address}

These choice are list in order of how much spam will be allowed through the filter, where the first will be a fair amount, the second will allow most spam through, and the third will let in all but the most egregious spam.

​If you are turning off the spam filter because you have found it to be making mistakes (either false positive or false negative), please email --we want to know!


A piece of spam got through your filter. What should I do with it?

Our spam filtering relies partly on a bayesian filter, which requires constant training to keep up with the ever changing tactics of spammers. You can help us by sending a complete copy of your spam emails to Please note, this must be a *complete* copy of the email, including all headers.  The easiest and best way to send the mail is to use your mail client's ability to "Forward as an Attachment".


Where can I watch talks, lectures, and other UTCS related videos?

For lectures and talks filmed in POB visit the POB media site.

For lectures and talks filmed in GDC visit the UTCS video site.


How do I print something to one of the printers? How do I see whether my job has printed? How can I remove something from the print queue if I decide to cancel it or I have to leave?

You can type "man printers" for information on how to use the printers, what the printer names are and how to refer to them, etc. The commands to use the printer are: lpr -Plw[printernumber] [yourfile] - prints "yourfile" to the named printer. lpq -Plw[printernumber] - displays the current print queue for the named printer. lprm -Plw[printernumber] [job ID] - removes the job with ID job-ID from the print queue for the named printer. Job ID's are found with 'lpq'.


What printers can I print to? Which printers are "public" (publically available)?

To find out which printers can be printed to ("public" printers), use the command ypmatch machines. For more information about the printers (location, usage, etc.) please run man printers.


Where are the printers located? How can I find out where a given printer (say, lw7) is located? How can I find out what a printer is called, that I know the location of?

A lot of information about printers, including location, is stored in the file /lusr/share/etc/printcap -- you can look there for the location of a specific printer. You can also run man printers for usage and location information about the public printers.


The printer says 'Load MP Tray' or 'Load A4 Paper' and won't print. How do I fix this?

Press the down arrow button, and it will ask you if you would like to print to normal paper that is available. Press OK and it should begin to print using the paper from one of the trays.


I am using a computer running Windows or MacOS that is connected to the csres network or to Horatio. How do I print to the CS printers?

This is outlined here.


I am using a computer not currently connected to the CS or CSRES network. How do I print to the CS printers?

This is outlined here.


What command line options can be used to customize printing?

Please see our documentation page on CUPS printing options.


The printer isn't working (my job isn't printing out). What's wrong with it? What do I do?

Type 'lpq -Plw[printernumber]'. This will often display an error message such as "Out of paper" or "Paper jam". If one of these errors has occurred, correct it (put more paper in the printer or open it and clear the jam if the printer is not physically locked). If that doesn't fix the problem, or if no such problem is displayed, restart the printer daemon with the command /lusr/etc/restart_lw -Plw[printernumber] and see if that fixes it. If the printer seems to be hanging on a specific large job, try cancelling that job and restarting the printer daemon. If none of these steps clears the problem, contact and describe the problems and the steps you've taken.


How do I print more than one copy of something?

You don't. The software is specifically setup to prevent you from doing this. Printers are not copiers and should not be used as such.


Is there a database system like Oracle or MySQL installed?

An Oracle database server and a MySQL server are installed for use by some classes; please check with the class instructor about how to get access to them and how to use them. The MySQL database server program (mysqld) is installed only on the Linux machines and client programs and libraries on all of the architectures when requested by an instructor.


I want to develop an application using Java. Where is it installed?

We have installed Java in /usr/bin/java. We generally have the latest version on the default system path so you will get that version by default.  All version of java are installed in /usr/lib/jvm, if you need a different version.


What C/C++ compilers are available on the CS machines?

GNU gcc is available in /usr/bin/gcc. g++ is the C++ compiler based on gcc and is located in /usr/bin/g++. There are several additional versions of each of these (4.4, 4.6 and 4.8 found by adding -4.4, etc to the path).  GNU gcc 5.2 is installed in /lusr/opt/gcc-5.2.0.  If you need that version, you'll need to add /lusr/opt/gcc-5.2.0/bin to your path.


Is there a FORTRAN compiler?

gfortran is available as /usr/bin/gfortran.


What is Perl? Is Perl available on the CS systems?

Yes, the directory location is: /usr/bin/perl. Perl (Practical Extraction and Report Language) is a scripting language often used under UNIX. Perl provides access to all operating system calls but is interpreted (not compiled), so it is faster to code and easier to debug than writing, say, C; but it typically runs more slowly.


Is Python available?

Yes, Python is located in the directory: /usr/bin/python. Python is an interpreted, interactive, object-oriented programming language that combines power with clear syntax. See "man python" for more information.


Is LISP available on CS machines?

gcl is available as /usr/bin/gcl, Steel Bank Common Lisp as /usr/bin/sbcl, and clisp as /usr/bin/clisp.


What debuggers are available? For what languages?

GNU gdb (/usr/bin/gdb) is available on all of the supported machines. ddd (/usr/bin/ddd) is a graphical interface to gdb. All debuggers should work for either C or C++, and possibly FORTRAN and Pascal as well.


Is Tcl/Tk available?

Tcl is located in the directory /usr/bin/tclsh, and wish is located in the directory /usr/bin/wish. Also, Tcl extensions expect, itcl, and tix are installed.

Text Editing

How can I view Microsoft Excel or Word documents on a UNIX machine?

LibreOffice is installed on the linux machines and it capable of viewing Microsoft documents. Just run /usr/bin/libreoffice or select it from the applications menu in your windows manager.


How can I view or create a file with the .pdf extension (Adobe Doc format)?

You can view the file using evince, libreoffice,  gv or xpdf. LibreOffice supports printing to PDF files.


What text editors are available?

The two major UNIX editors are emacs and vi. Other editors installed are xedit, xemacs, pico, ed,  sublime_text,  and nano.


I've started Emacs. How do I quit?

Hold down the ctrl key and press x; then c. Please make sure you exit before you log out. See the man pages on Emacs for more information.


I've started vi. How do I quit?

Press the escape key (esc on some machines) to make sure you are in command mode (also called edit mode). In command mode type "ZZ" or ":wq". If you want to exit without saving changes, use ":q!".


How can I create a new group?

New UNIX groups, for the most part, are only created for "official" department purposes (students working together in a class created at the request of the professor, for example). If you have a reason to need a group, Email, giving the name of the group you want, the login names of the people who need to be in it, and the purpose of the group. The group, if approved, will be created within one or two business days.


I have a directory with a permission "s" (or "S"). What does that mean?

It means that all new files will be created with the same group id as that of the parent directory. The lowercase s shows that the directory is also executable, meaning you can cd into it.


I am getting a weird capital A with a circumflex over it in so me of the text displayed in my terminal. How do I get rid of this?

This is typically caused by older programs that can't handle unicode properly. You will need to add export LANG=C to your .profile file (or whichever shell config file you use, such as .bashrc).


I like being able to use emacs or vi style key bindings (keyboard shortcuts) to navigate while typing in applications other than those editors. How can I do this?

That functionality is typically provided by the GNU Readline Library, which is used by many applications such as shells (bash, tcsh, zsh), mailreaders (mutt) and many others. However, some applications are not readline-aware but fear not, there is a way to make them behave like they are! We have installed the program rlwrap which provides readline functionality to any text input program. It is in the standard path and can be run with any client application, though there are many applications (anything graphical for instance) with which it would not make sense. An example execution would be:rlwrap acl which starts the allegro common lisp interpreter with readline functionality.There is a man page (rlwrap(1)) for your edification.


How can I convert a postscript file into a graphics file such as a GIF? How can I convert between graphical file formats?

The ImageMagick suite is capable of all types of conversion. Using it is simple: convert originalfile.format newfile.newformat convert automatically determines the original filetype from the file itself and chooses the output format based on the file extension you provide for the newfile. For example, convert file.gif will convert the file from postscript to GIF. see the convert(1) man page for more information on the formats it supports.

While ImageMagick supports multi-page GIF files, many utilities and viewers do not, so you may wish to either convert single pages of the PS file to GIF format, or first use the psnup command to reduce (the relevant pages of) your document to a single page


How can I connect to the Department of Computer Sciences from home?

As of April 12, 2019, SSH keys are required when SSHing to CS/CSRES networks when outside of our networks, campus wireless, or the VPN. The University ISO will quarantine any host allowing SSH access that has not disabled password authentication.

For instructions on creating SSH keys, visit this page.


Where can I find system news? What is the sysnews alias?

System news can be found on the System Status blog. A RSS feed of this blog is available for news tracking. If you prefer to receive these updates through email as they are posted, you can send mail to requesting to be added to the mailing list for system news.


How do I find a process I know I must have running that I can't see? How do I get rid of a process I don't want?

To find a runaway process, use the ps command. On linux machines type ps -augx. The man pages (man ps) show all possible flags.

To kill a process once you've found its process ID (PID), type "kill PID". If that doesn't work, you can use "kill -9 PID".  If you need to kill all your processes, you can use "killall -u 'login name'"


When I try to run Firefox it complains "Firefox is already running" and tells me to kill the existing process. How can I fix this?

To find out which machine Firefox is running on, type:
ls -l ~/.mozilla/firefox/*/lock

If there is a lock, it will be a symbolic link pointing to a file with the IP address of the computer where it is running followed by the process ID it is using. To translate IP-ADDRESS to a host name, type:

The process id should also be present, so type:
rsh <HOSTNAME> kill PID


For example: 

~>ls -l ~/.mozilla/firefox/*/lock

lrwxrwxrwx 1 rivin dept 20 Jan 18 14:04 /u/rivin/.mozilla/firefox/uiil642a.default/lock -> 

~>host domain name pointer 

~>rsh eagle kill 24876

Be sure to remove the lockfile if killing the process didn't!

~>rm ~/.mozilla/firefox/*/lock

If this doesn't work, you will need to delete the .parentlock file:

~>rm ~/.mozilla/firefox/*/.parentlock


How do I remove or access a file with the name '-something' or containing another strange character ?

If your file starts with a minus, use the -- flag to rm; if your file is named -g, then your rm command would look like rm -- -g. As well, and especially if you have an unprintable character (output from ls looks like ?ile) you might try something like rm -i ./*ile which will also work for commands other than rm (grep for instance).


What is "public" software? I'm having trouble with a program installed in /p/bin (type which [programname] to find out where something is installed.) How do I install software in "public"?

The "public" software is anything installed in the /p or /public directory (typically, actual programs are in /p/bin). This software is installed by non-staff (students, researchers, or professors) and is not monitored, installed or maintained by the staff; if you're having trouble with a particular program, contact the person who installed that package (as shown by ls -l) directly, or email, which is a mailing list of all people who maintain programs in /public. If you want to enable your account to install software in /public, email and they'll add you to the group and mailing list.


Why does "find /" take so long? How do I find a file in the filesystem, knowing its name? How do I use locate? How do I use find?

Please don't use "find /", as it's very slow and a real drain on the network. Use locate by typing locate [string], where [string] is the name of the file you want to find, or part of the name. It's more appropriate to use find to find something in a fairly small area, such as your home directory or a /projects directory, neither of which are searched by locate. The basic find syntax is 'find [path to search] [expression to search for]'; please read the man page for find, for more detailed information.


I just accidentally deleted something I need (or just realized I need something I deleted a while ago). What can I do now?

First, you should try recovering the file from snapshots yourself; to learn how view the documentation on recovering files from snapshots. If that fails, email and ask them to restore your files. Include the following information:

  • When did you delete the file(s)?
  • When did you create the file(s)? ("Not recently" is enough)
  • When did you last change the file(s), before the day you deleted it/them?

How can I check how much disk space I'm using? Is there a command to check how much disk space is being used by a user?

You can check your quota usage with the "chkquota" command. You can find out how much disk space is in a particular directory (such as someone's home directory) with the command du -sk, if you have permissions on that directory -- if it's yours or if it's world-readable.

World Wide Web

How do I go about setting up a web page? How do I use CGI scripts on my web page? How do I embed Java code?

For most common questions about setting up a web page and putting scripts, images, links, etc. in it in the CS domain, see the documentation on using the web.


Can I use PHP?

Yes. We only support PHP5, not PHP4.

A mod_php script should have the suffix .php and no #! line A CGI script should invoke #!/usr/bin/php5-cgi at the top and have the .cgi suffix.

For more information, see the documentation on using the web The PHP documentation is available at


How do I make my web pages readable only by certain people? Can I protect my web page with a password?

Yes. You can use dynamic configuration files using an .htaccess file to restrict access to documents in your web directory. For more information on this, see the documentation on using the web.


Is there some way to have a cgi script run on the CS webserver as my own UID rather than the one belonging to the webserver software?

By default, CGI scripts running on our server execute as the web user www; this user has no special permissions. Thus, the directory in which the script resides must be world-searchable, the script must be world-executable, and files read or written by the script must be world-readable or world-writable.

In certain applications, you may prefer that a script execute with your Unix account permissions so as to access protected data. We provide a "Secure CGI" mechanism for doing this.

Warning: Please carefully weigh your need for this feature against the security risks of a script running with the full permissions of your user account. You are responsible for the use of that account, whether by your own hand, by someone using a workstation where you left yourself logged in, or by someone exploiting a poorly written script which you have made available on the Web. You may wish to review our policies.

The basic guidelines for setting up a secure CGI script are:

  • Full script pathnames should contain only printing ASCII characters. They should not contain relative path components.
  • Script directories should be searchable by the owner and have the same owner/group as the script file. They should not be writable by anyone other than the owner
  • Script files should be a regular file (not a symlink), be executable by the owner and have the extension ".scgi".They should not be setuid or setgid or writable by anyone other than the owner.

Other notes:

  • Non-parsed-header scripts may be used with the usual nph- prefix.
  • Access control directives (in a .htaccess file) will not work for a .scgi script. Normally, this is not a problem, since the script is typically the action associated with a form in a .html file, which can be access controlled. Of course, the script is at liberty to implement any authentication for itself that it chooses.

I've figured out how to set up my web page, but how can I be sure that it will be programatically correct and available to the maximum number of readers?

This is a tough question; there is definitely some content such as sounds and images which will never be universally available to blind or deaf users. However for the most part, staying standards compliant and making sure that your pages have no syntax errors or dependency on a specific browser is the best way to be sure of reaching the widest possible audience.

The canonical reference for the most popular and most widely supported markup languages, HTML and XHTML, is published by the World Wide Web Consortium. This documentation is the agreed-upon standard for web markup across the entire internet. It is likely to be supported by all browsers, from cell phones and text-only browsers for the blind to the latest version of Internet Explorer.

To be sure you've created pages that not only meet the standards but fail to have any content-impairing typos, you should probably run them through the XHTML and HTML validator and potentially through the CSS validator as well, if you have used cascading style sheets for further page layout. Be warned that older or less capable browsers may not support CSS so do try reading your page without the CSS in the source to see if all text displays fully and legibly in its absence.

Although it is popular to write browser-specific code targetting IE or mozilla/netscape, and although such code may work on the majority of the browsers available today, you do limit your site's usefulness by doing so. Consider whether you think the cute tricks with the cursor or ActiveX controls are worth someone not being able to find the link to your resume or research. Old, small, and handicapped accessible browsers may be unable to use your site and often will just ignore it instead of informing you. The "Viewable With Any Browser" campaign may serve to further enlighten you as to the rationale behind creating more compatible web pages. Do consider making your page fully handicapped accessible.

X Window System

If I have a UNIX machine running X windows at home, how can I run an application on the CS machines and have it display to my home computer?

If your computer is connected to the internet, you can run ssh -X hostname where hostname is the name of the computer that you want to log into. The -X flag enables X forwarding. You can then run X applications within that ssh window and they will display on your local desktop. For further information, such as getting this to work on the Windows operating system, see the SSH X Forwarding documentation page.

VNC is also available, although we generally discourage its use when X forwarding is an option.


What window managers are available on the UNIX machines? How can I use them?

There are a number of options available for your use. Some of the choices are: Fvwm, GNOME, KDE, LXDE, Openbox, Window Maker, and Xfce. You can set your window manager by clicking on the foot drop box on the login screen.


I've logged into the UNIX machines in the lab, but when my windows manager starts I am getting a blank screen or messed up tool bars. How can I fix this?

If you have logged into our UNIX machines before they were all updated to Trusty, you may need to remove your old config files for the windows manager you are using. You can use Ctrl+Alt+F1 (Ctrl+Alt+F7 or F8) will get you back to the graphical login screen) to get to a virtual console and the dotfiles/directories in question are:

  • gnome - .gnome2, .gnome2_private, .gconf, and .gconfd
  • kde - .kde and .kderc
  • xfce - .config, .gconf, and .gconfd

I am trying to use MATLAB, but whenever I open it all I am getting is a blank screen. How do I fix this?

If you are using gnome as your windows manager and you try to use MATLAB, you may run into this issue. To fix the problem, go to System Menu -> Preferences -> Appearance, then select the 'Visual Effects' tab. Set the effects to 'None' and close the window. MATLAB should behave normally once this is done.