The primary function of the computer facilities is for general usage and for conducting lab course. Students/staff may use the facilities for general use when no course labs are taking place. However when course labs are in progress all general users are expected to vacate the lab. If users are found to be abusing the computers or printers, their access to the computer facilities will be denied and further action will be taken by CSEA.
Entry to s/w lab
There are 4 labs: Software Labs SL1,i SL2 and SL3, cs101 Lab(basemenet) . All registered CSE users can enter the lab. Only Sysad RAs and staff have access to the system area. Do not bring unauthorized people (Non CSE students) to the lab without permission. Muddy footwear, Umbrellas, raincoats are to be left at the entrance.
Key transfer policy
SL1 and SL2 are open only for conducting lab courses. The SL3 Lab is potentially open 24 hours.
Staff will be available only during office hours.
So in order to keep the lab open when there are users, a key-transfer policy is in place.
There is a key transfer Register kept in SL2 which gives details of who has opened the lab and who has currently taken over the key etc.
(External users and Btech First Year students are not allowed to take over the keys.
External users are students who come to use the lab from other departments/institutions.)
It is very important that this register is to be properly maintained in order to keep the lab open round the clock.
The Key transfer policy currently followed is as follows:
- Anyone who has taken Key Permission can open the lab by getting keys from the watchman against their valid identity card. (Key permission is obtained by submitting a form to security through s/w lab in-charge and Head of the dept. A few students recommended by CSEA are allowed to submit the Key permission form.)
- The person who opens the lab should enter his name, roll number, time of opening the lab, etc. in the register kept for this purpose. The Key is to be kept on the wall near the entrance on a nail.
- When he/she wants to leave the lab, he/she can transfer the key to any other user (except external user) who is willing to take over the key and make sure that the person makes an entry in the register. If there are no users or if no one is willing to take over the key; he/she should lock the lab after putting off the lights and fans and hand over the key to the watchman. Making an entry in key tranfer register at s/w lab indicating the closure of the lab is very important.
- If the lab is not open during office hours, users can request the office staff for getting the keys issued and open the lab. An appropriate entry in the key transfer register is to be made.
System usage
Use the resources only for academic purposes. Do not let anyone else access your account. The user will be held fully responsible for any files in their account, and any abuse/misuse of their account.
- Do not lend password to anyone.
- Do not attempt to get other's password by fraud methods (by writing password hacking programs)
- HOSTING OF ILLEGAL COPIES OF COPYRIGHTED MATERIAL ON HOMEPAGES IS NOT ALLOWED. SUCH CASES WILL BE REPORTED TO SYSCOMM AND HEAD OF CSE TO TAKE FURTHER ACTION. THEIR lOGINS WILL BE BLOCKED UNTIL SYSCOMM RECOMMENDS. Syscomm can refer such cases to Commitee of Student Affairs which can lead to debarring from course for a semester.
- Check the permissions (must be 701 i.e. read/write/execute by owner and execute option for others to make homepages visible) and contents of your
.ssh/authorized_keys
. - Playing games is strictly prohibited.
- Playing songs is not allowed during office hours. Outside office timings, use ear phones or keep low volume, so that others will not get disturbed.
- DO NOT lock the terminals when going out of the lab for lunch/dinner/classes etc.
- Do not write programs which triggers infinite number of processes.
- Whenever you are not sure if anything is allowed please file a bug.
Monitors and PCs
- DO not REMOVE POWER CABLES OR NETWORK CABLES. THERE IS WIFI FOR CONNECTING LAPTOPS TO NETWORK. THERE ARE EXTRA POWER POINTS ON EACH TABLE TO CONNECT LAPTOPS.
- Put off monitors when not in use.
- Never restart the machine without consulting sysads. There will be users remotely logged in. A strict action will be taken if anybody is found doing so.
- Send mail only when necessary.
- Delete unwanted mails.
- Do not allow mail files to grow.
- Do not mail objectionable/non-academic material.
- Do not masquerade as some other user or send fake mails.
- Do not try sending mails using shell script with infinite loops. A strict action will be taken if anybody is found doing such acts.
INTERNET resources
Internet resources are meant for limited academic use only. Before you use any of these resources for any special purpose, you must check with sysads, or file a bug. Indiscriminate use of this will put heavy load on the network causing problems not only to other users in our department, but also in rest of the campus.
Unauthorized usage
- Using somebody else's account or lending your login/password to others will draw stringent penalties.
- HOSTING OF ILLEGAL COPIES OF COPYRIGHTED MATERIAL ON HOMEPAGES IS NOT ALLOWED.
- Report all malfunction (software/hardware) to S/W staff and make it a point to note it down in the complaints register.
- Noticing misuse of the lab facilities and not reporting the same will make you accessory to the offense.
- Downloading/distributing objectionable non-academic material will draw heavy penalties.
- Trying to obtain unauthorized access to any part of the computer system is liable to punishment.
- Cracking tools found to be owned by any user is enough to impress cracking charges.
- Entry to server room is strictly prohibited.
USERS ARE REQUESTED TO FOLLOW THE GUIDELINES STRICTLY. VIOLATION OF THESE WILL CAUSE LOT OF DIFFICULTY TO MANY PEOPLE AND THIS WILL FORCE THE AUTHORITIES TO TAKE STRINGENT ACTION.