The UTCS Account Creation application is here - log in with your UT EID, and follow the instructions.
Please note that students enrolled in the UTCS Online Master of Computer Science program are not eligible for this type of account.
Unfortunately, no. After an account has expired the files will not be restored.
Reluctantly, UTCS has started using hard quotas on home directories. You can read more about it here.
Not being able to save things to disk, or experiencing editor save failures are signs that your home directory may have reached quota. Use chkquota to see if you have reached yours. You can use du -sk ~/* ~/.??* | sort -n to see what is taking up the most space. Try removing some files to see if that fixes your issues. If the problem is still occurring, send mail to firstname.lastname@example.org describing the problem. We are NOT ABLE to raise your quota.
The "Plan" is a printout of a file named .plan in your home directory. For people to see it, the file must be world-readable and your home directory must be world-executable.
A login name is permanent for the life of an account, as stated on the account form; once the account has been created the login name cannot be changed.
We have no way of finding out what your password is, so you'll have to change it. You should visit our password update webpage and log in using your UTEID to change your password. Please read the instructions and information provided carefully. If that fails for some reason, open a help ticket by sending an email to email@example.com. For security reasons, passwords are never sent via email. Also, any password update by any method can take a couple of hours to propagate through our network, so please be patient.
You can see the expiration date for your account by typing finger <username>@cs.utexas.edu on the command line. Under and tmpclass accounts are automatically extended each semester provided the student who holds the account is enrolled in a Computer Science course that semester. For all types of accounts, notice will go out two weeks prior to expiration. If you have received an expiration notice, do the following, according to the type of account you have:
The public labs are located in GDC 3.302 and GDC 1.310. Each station in GDC 1.310 contains a UNIX machine and a Windows machine with a KVM switch to go from one to the other. GDC 3.302 contains mostly UNIX machines and a few Windows machines. You can also access the UNIX computers remotely via ssh; view the public UNIX host status page for a list of the UNIX computers and their current status. These labs are open to all students currently enrolled in a CS course.
For more information on all of these labs, see the Public Labs page.
Facilities problems should be reported directly to Physical Plant Planning and Scheduling by calling 471-0043 (for GDC) during normal working hours, or sending email to firstname.lastname@example.org.
For urgent conditions outside normal working hours please call 471-2020.
For urgent conditions directly affecting CS department facilities, e.g. fire, flood, ceiling leaks onto machines, etc, please notify email@example.com after notifying emergency personnel.
A "public" machine is a machine that can be logged into by anyone with a CS account; the name linux.cs.utexas.edu is always aliased to a public Linux machine. You can use the command cshosts to find out more information about other machines on the CS network; type cshosts help or man cshosts for more information about how to use it. Alternatively, you can visit the public host status page for a list of public hosts and their current status.
Assuming you want more than wireless networking, you have two options. One is only intended for short-term visitors and students such as undergrads without offices. These users can use Horatio with the public DHCP network jacks located in the public UNIX lab in GDC 3.302 and they should have ethernet cables already attached.
For longer term / office usage, we are happy to offer you a static IP address or a DHCP address. For DHCP, all non-assigned walljacks in GDC are already setup for access to horatio. It is very important that you never disconnect any network or power cable, please submit a helpreq if you need a cabling change or a machine moved.
For those wanting a static IP address, we'll need the following submitted in a helpreq:
In order to have a machine on the Department network, you must be able to install, encrypt, and maintain that machine without little or no help from the department technical staff. In the case of some research groups, there may already be someone able to help you do this, please ask around and list them as the system administrator (7), and yourself as the primary user (8). Make sure you copy them on the helpreq.
New UT Austin employees starting on or after 12/11/18 will have an @austin.utexas.edu email address created for them automatically by ITS. This mailbox is discoverable via UT's Exchange directory, so you may be receiving email there and not know about it. This can be problematic for obvious reasons. Follow these steps to remove that address from the Exchange directory, and forward the email.
First you should go here: austin.utexas.edu/Office365Management/ and check the box so the austin.utexas.edu address doesn't show up in the Exchange directory.
Then go here: office365.austin.utexas.edu. Select Outlook Web App (OWA) and login.
In the OWA click on the gear icon at the top right; click "View all Outlook settings", then find the forwarding option and configure your forwarding for the @austin.utexas.edu address.
All POP/IMAP users should use "mailbox2.cs.utexas.edu" as their "incoming" server. Note that, in general, CS recommends the use of IMAP instead of POP, especially if you check mail from multiple computers and/or mobile devices.
The SMTP server is "mail2.cs.utexas.edu".
For complete details see our Email Configuration page.
This means you are trying to send mail via the UTCS SMTP server, but the user name and password is either missing or misconfigured. See our Email Configuration page for details on how to set this up.
Note that the new SMTP server (mail2.cs.utexas.edu) no longer requires you to use a different password from the one you use to retrieve email.
The CS department install of procmail which filters your mail upon delivery is specially configured for our environment. It is set up as usual via your ~/.procmailrc file, but with two caveats:
With these restrictions in mind, the main use of procmail during message delivery at CS is to filter your mail in real-time into different folders based on headers (such as the score it received from our spam-analysis system, the sender, a mailing-list-specific header, or the subject).
Since we have disabled execute and forward functionality in procmail during delivery, we suggest using the example in the procmail(1) man page for a template in creating your own post-processing scripts. The version of procmail in /lusr/bin which you can run manually does not suffer these limitations.
(Search for the third occurrence of the string 'cron' in this man page to find the example script.)
Two changes you will need to make to that script are to change the $ORGMAIL variable to point to the actual location of the folder, and to provide a separate procmail recipe file to the executed version of procmail in the script (the line formail -s procmail < .newmail && will need to be changed to formail -s procmail /path/to/your/recipefile < .newmail && ).
These scripts can be run periodically via the cron(1) command to do the actions automatically, or you can run them before you read mail to do something like filter out the messages or text you don't like.
PLEASE NOTE: To avoid clobbering mail folders make sure all recipes start with :0:, not just :0. The procmailrc(1) and procmail(1) manpages have more details."
While there may be any number of reasons for the failure, many ISPs and organizations block outbound network traffic on port 25 (the SMTP port) that mail servers use to communicate with each other as one method of stopping spam. If you are using CS's server for your outgoing mail server, we recommend you use port 587 (the Submission port) with STARTTLS turned on. For more information see our Email Configuration page. if you still encounter problems sending mail please do not hesitate to email firstname.lastname@example.org and we will try to help you resolve the problem.
The POP/IMAP servers and some mail reader software (anything that uses the c-client library) use this "dummy" message to maintain state over time. Because our POP/IMAP server recognizes this message as containing metadata, it doesn't send it to POP/IMAP clients, such as Apple Mail or Thunderbird, so you'll normally never see it. But if you use an email client that doesn't recognize this as a "special" message, it will show it to you as a regular message. It's true that if you delete the message, you may lose important information, such as whether messages are read/unread, whether they've been seen at all by the client (which could lead a POP client to "duplicate" some messages), etc.
You have several options:
Use the 'vacation' program. You can read the vacation(1) man pages for usage info, but the quick-start method is to create a message you'd like to send in response to emails you receive and save it as ~/.vacation.msg, and then run vacation -i. To turn this off, simply remove ~/.vacation.msg.
All mail forwarding on the CS system is handled by a central user account database; .forward files won't work. To get mail forwarded, email email@example.com from your UTCS email account and make the request. UTCS email is never forwarded past the lifetime of an account. UT offers alumni email here. If you want to learn more about how to use procmail on our systems, check out the FAQ on procmail.
Mailing lists, for the most part, are only created for "official" department purposes (lists of students in a class created for TAs, etc). These are the steps to take to create one:
The alias, if approved, will become effective within one or two business days.
There's not really a way to opt out of using the spam filter, but users do have the ability to tune how aggressively the filter behaves on mail sent to you. In your user directory, there is a hidden directory named .spamassassin, and Inside of that is a text file called user_prefs (there are other files too, but you should leave those alone). Using a text editor, you can add one of the following lines to the end of the file:
These choice are list in order of how much spam will be allowed through the filter, where the first will be a fair amount, the second will allow most spam through, and the third will let in all but the most egregious spam.
Our spam filtering relies partly on a bayesian filter, which requires constant training to keep up with the ever changing tactics of spammers. You can help us by sending a complete copy of your spam emails to firstname.lastname@example.org. Please note, this must be a *complete* copy of the email, including all headers. The easiest and best way to send the mail is to use your mail client's ability to "Forward as an Attachment".
You can type "man printers" for information on how to use the printers, what the printer names are and how to refer to them, etc. The commands to use the printer are: lpr -Plw[printernumber] [yourfile] - prints "yourfile" to the named printer. lpq -Plw[printernumber] - displays the current print queue for the named printer. lprm -Plw[printernumber] [job ID] - removes the job with ID job-ID from the print queue for the named printer. Job ID's are found with 'lpq'.
To find out which printers can be printed to ("public" printers), use the command ypmatch lw.pub machines. For more information about the printers (location, usage, etc.) please run man printers.
A lot of information about printers, including location, is stored in the file /lusr/share/etc/printcap -- you can look there for the location of a specific printer. You can also run man printers for usage and location information about the public printers.
Press the down arrow button, and it will ask you if you would like to print to normal paper that is available. Press OK and it should begin to print using the paper from one of the trays.
Type 'lpq -Plw[printernumber]'. This will often display an error message such as "Out of paper" or "Paper jam". If one of these errors has occurred, correct it (put more paper in the printer or open it and clear the jam if the printer is not physically locked). If that doesn't fix the problem, or if no such problem is displayed, restart the printer daemon with the command /lusr/etc/restart_lw -Plw[printernumber] and see if that fixes it. If the printer seems to be hanging on a specific large job, try cancelling that job and restarting the printer daemon. If none of these steps clears the problem, contact email@example.com and describe the problems and the steps you've taken.
You don't. The software is specifically setup to prevent you from doing this. Printers are not copiers and should not be used as such.
An Oracle database server and a MySQL server are installed for use by some classes; please check with the class instructor about how to get access to them and how to use them. The MySQL database server program (mysqld) is installed only on the Linux machines and client programs and libraries on all of the architectures when requested by an instructor.
We have installed Java in /usr/bin/java. We generally have the latest version on the default system path so you will get that version by default. All version of java are installed in /usr/lib/jvm, if you need a different version.
GNU gcc is available in /usr/bin/gcc. g++ is the C++ compiler based on gcc and is located in /usr/bin/g++. There are several additional versions of each of these (4.4, 4.6 and 4.8 found by adding -4.4, etc to the path). GNU gcc 5.2 is installed in /lusr/opt/gcc-5.2.0. If you need that version, you'll need to add /lusr/opt/gcc-5.2.0/bin to your path.
gfortran is available as /usr/bin/gfortran.
Yes, the directory location is: /usr/bin/perl. Perl (Practical Extraction and Report Language) is a scripting language often used under UNIX. Perl provides access to all operating system calls but is interpreted (not compiled), so it is faster to code and easier to debug than writing, say, C; but it typically runs more slowly.
Yes, Python is located in the directory: /usr/bin/python. Python is an interpreted, interactive, object-oriented programming language that combines power with clear syntax. See "man python" for more information.
gcl is available as /usr/bin/gcl, Steel Bank Common Lisp as /usr/bin/sbcl, and clisp as /usr/bin/clisp.
GNU gdb (/usr/bin/gdb) is available on all of the supported machines. ddd (/usr/bin/ddd) is a graphical interface to gdb. All debuggers should work for either C or C++, and possibly FORTRAN and Pascal as well.
Tcl is located in the directory /usr/bin/tclsh, and wish is located in the directory /usr/bin/wish. Also, Tcl extensions expect, itcl, and tix are installed.
LibreOffice is installed on the linux machines and it capable of viewing Microsoft documents. Just run /usr/bin/libreoffice or select it from the applications menu in your windows manager.
You can view the file using evince, libreoffice, gv or xpdf. LibreOffice supports printing to PDF files.
The two major UNIX editors are emacs and vi. Other editors installed are xedit, xemacs, pico, ed, sublime_text, and nano.
Hold down the ctrl key and press x; then c. Please make sure you exit before you log out. See the man pages on Emacs for more information.
Press the escape key (esc on some machines) to make sure you are in command mode (also called edit mode). In command mode type "ZZ" or ":wq". If you want to exit without saving changes, use ":q!".
New UNIX groups, for the most part, are only created for "official" department purposes (students working together in a class created at the request of the professor, for example). If you have a reason to need a group, Email firstname.lastname@example.org, giving the name of the group you want, the login names of the people who need to be in it, and the purpose of the group. The group, if approved, will be created within one or two business days.
It means that all new files will be created with the same group id as that of the parent directory. The lowercase s shows that the directory is also executable, meaning you can cd into it.
That functionality is typically provided by the GNU Readline Library, which is used by many applications such as shells (bash, tcsh, zsh), mailreaders (mutt) and many others. However, some applications are not readline-aware but fear not, there is a way to make them behave like they are! We have installed the program rlwrap which provides readline functionality to any text input program. It is in the standard path and can be run with any client application, though there are many applications (anything graphical for instance) with which it would not make sense. An example execution would be:rlwrap acl which starts the allegro common lisp interpreter with readline functionality.There is a man page (rlwrap(1)) for your edification.
This is typically caused by older programs that can't handle unicode properly. You will need to add export LANG=C to your .profile file (or whichever shell config file you use, such as .bashrc).
The ImageMagick suite is capable of all types of conversion. Using it is simple: convert originalfile.format newfile.newformat convert automatically determines the original filetype from the file itself and chooses the output format based on the file extension you provide for the newfile. For example, convert file.ps file.gif will convert the file from postscript to GIF. see the convert(1) man page for more information on the formats it supports.
While ImageMagick supports multi-page GIF files, many utilities and viewers do not, so you may wish to either convert single pages of the PS file to GIF format, or first use the psnup command to reduce (the relevant pages of) your document to a single page
As of April 12, 2019, SSH keys are required when SSHing to CS/CSRES networks when outside of our networks, campus wireless, or the VPN. The University ISO will quarantine any host allowing SSH access that has not disabled password authentication.
For instructions on creating SSH keys, visit this page.
To find a runaway process, use the ps command. On linux machines type ps -augx. The man pages (man ps) show all possible flags.
To kill a process once you've found its process ID (PID), type "kill PID". If that doesn't work, you can use "kill -9 PID". If you need to kill all your processes, you can use "killall -u 'login name'"
To find out which machine Firefox is running on, type:
ls -l ~/.mozilla/firefox/*/lock
If there is a lock, it will be a symbolic link pointing to a file with the IP address of the computer where it is running followed by the process ID it is using. To translate IP-ADDRESS to a host name, type:
The process id should also be present, so type:
rsh <HOSTNAME> kill PID
~>ls -l ~/.mozilla/firefox/*/lock
lrwxrwxrwx 1 rivin dept 20 Jan 18 14:04 /u/rivin/.mozilla/firefox/uiil642a.default/lock -> 126.96.36.199:+24876
188.8.131.52.in-addr.arpa domain name pointer eagle.cs.utexas.edu.
~>rsh eagle kill 24876
Be sure to remove the lockfile if killing the process didn't!
If this doesn't work, you will need to delete the .parentlock file:
If your file starts with a minus, use the -- flag to rm; if your file is named -g, then your rm command would look like rm -- -g. As well, and especially if you have an unprintable character (output from ls looks like ?ile) you might try something like rm -i ./*ile which will also work for commands other than rm (grep for instance).
The "public" software is anything installed in the /p or /public directory (typically, actual programs are in /p/bin). This software is installed by non-staff (students, researchers, or professors) and is not monitored, installed or maintained by the staff; if you're having trouble with a particular program, contact the person who installed that package (as shown by ls -l) directly, or email email@example.com, which is a mailing list of all people who maintain programs in /public. If you want to enable your account to install software in /public, email firstname.lastname@example.org and they'll add you to the group and mailing list.
Please don't use "find /", as it's very slow and a real drain on the network. Use locate by typing locate [string], where [string] is the name of the file you want to find, or part of the name. It's more appropriate to use find to find something in a fairly small area, such as your home directory or a /projects directory, neither of which are searched by locate. The basic find syntax is 'find [path to search] [expression to search for]'; please read the man page for find, for more detailed information.
First, you should try recovering the file from snapshots yourself; to learn how view the documentation on recovering files from snapshots. If that fails, email email@example.com and ask them to restore your files. Include the following information:
You can check your quota usage with the "chkquota" command. You can find out how much disk space is in a particular directory (such as someone's home directory) with the command du -sk, if you have permissions on that directory -- if it's yours or if it's world-readable.
By default, CGI scripts running on our server execute as the web user www; this user has no special permissions. Thus, the directory in which the script resides must be world-searchable, the script must be world-executable, and files read or written by the script must be world-readable or world-writable.
In certain applications, you may prefer that a script execute with your Unix account permissions so as to access protected data. We provide a "Secure CGI" mechanism for doing this.
Warning: Please carefully weigh your need for this feature against the security risks of a script running with the full permissions of your user account. You are responsible for the use of that account, whether by your own hand, by someone using a workstation where you left yourself logged in, or by someone exploiting a poorly written script which you have made available on the Web. You may wish to review our policies.
The basic guidelines for setting up a secure CGI script are:
This is a tough question; there is definitely some content such as sounds and images which will never be universally available to blind or deaf users. However for the most part, staying standards compliant and making sure that your pages have no syntax errors or dependency on a specific browser is the best way to be sure of reaching the widest possible audience.
The canonical reference for the most popular and most widely supported markup languages, HTML and XHTML, is published by the World Wide Web Consortium. This documentation is the agreed-upon standard for web markup across the entire internet. It is likely to be supported by all browsers, from cell phones and text-only browsers for the blind to the latest version of Internet Explorer.
To be sure you've created pages that not only meet the standards but fail to have any content-impairing typos, you should probably run them through the XHTML and HTML validator and potentially through the CSS validator as well, if you have used cascading style sheets for further page layout. Be warned that older or less capable browsers may not support CSS so do try reading your page without the CSS in the source to see if all text displays fully and legibly in its absence.
Although it is popular to write browser-specific code targetting IE or mozilla/netscape, and although such code may work on the majority of the browsers available today, you do limit your site's usefulness by doing so. Consider whether you think the cute tricks with the cursor or ActiveX controls are worth someone not being able to find the link to your resume or research. Old, small, and handicapped accessible browsers may be unable to use your site and often will just ignore it instead of informing you. The "Viewable With Any Browser" campaign may serve to further enlighten you as to the rationale behind creating more compatible web pages. Do consider making your page fully handicapped accessible.
If your computer is connected to the internet, you can run ssh -X hostname where hostname is the name of the computer that you want to log into. The -X flag enables X forwarding. You can then run X applications within that ssh window and they will display on your local desktop. For further information, such as getting this to work on the Windows operating system, see the SSH X Forwarding documentation page.
VNC is also available, although we generally discourage its use when X forwarding is an option.
There are a number of options available for your use. Some of the choices are: Fvwm, GNOME, KDE, LXDE, Openbox, Window Maker, and Xfce. You can set your window manager by clicking on the foot drop box on the login screen.
If you have logged into our UNIX machines before they were all updated to Trusty, you may need to remove your old config files for the windows manager you are using. You can use Ctrl+Alt+F1 (Ctrl+Alt+F7 or F8) will get you back to the graphical login screen) to get to a virtual console and the dotfiles/directories in question are:
If you are using gnome as your windows manager and you try to use MATLAB, you may run into this issue. To fix the problem, go to System Menu -> Preferences -> Appearance, then select the 'Visual Effects' tab. Set the effects to 'None' and close the window. MATLAB should behave normally once this is done.