Berkeley CSUA MOTD:Entry 22191
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

2001/8/20 [Academia/Berkeley/Ocf, Computer/SW/Security] UID:22191 Activity:high
8/20    http://socrates.berkeley.edu:7015/email
        I've graduated many years ago. How are they going to enforce my
        soda account termination?
        \_ we can port and run re-reg (from the ocf).
           \_ the ocf hasn't run re-reg in years, and has no intention
              of running it anytime soon.
              \_ maybe.  maybe it will now.  Maybe you ought to think about
                 options.  Looks like a non-issue for now tho.
              \_ "years" meaning, what, 3?
        \_ What's the page about?  My browser can't find it with the URL above.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2011/11/16-12/28 [Academia/Berkeley/CSUA, Computer/HW] UID:54230 Activity:nil
11/16   We'll be taking all CSUA machines offline in the near future for a Soda
        Hall server room reorganization (we're being moved to a neighboring
        server cabinet).  Downtime will hopefully be minimal.  --jordan
        \_ Thanks for all your work keeping the machines running!  It's
           been awesome having soda actually working again.
        \_ Update:  this is tentatively scheduled for Saturday afternoon.
	...
2011/8/9-27 [Computer/SW/Editors/Emacs, Academia/Berkeley/CSUA] UID:54162 Activity:nil
8/9     So I just found out that an old college friend of mine lost her
        four month old daughter to SIDS. What is the correct response here?
        \_ "Did she sleep with her belly?" and "Did you breastfeed?"
        \_ try this joke:
           How do you make a dead baby float?
           ˙ʎqɐq pɐǝp ÉŸo sdooÉ”s oʍʇ puɐ ɹÇ\
	...
Cache (5043 bytes)
socrates.berkeley.edu:7015/email -> socrates.Berkeley.EDU:7015/email/
Email System Backup Procedures 10 Notification of the UC Email Policy This document does not describe all the provisions of the Policy -- please refer to the UC Email Policy itself for the complete policy information. Note: All indented text blocks in this implementation document are direct quotes from the UC Email Policy. The 11 Appendix to this document includes references to 12 Selected Regulations, 13 Resource Documents, and 14 Resource Offices to assist with the administration of UC Email Policy issues. Definitions The following words are defined to have specific meanings within this Berkeley Campus implementation document: Providers: Departments and units of the Berkeley Campus who provide email services. Employers: Departments and units of the Berkeley Campus who employee faculty and staff. Users: Those who use email services supplied by Providers. Providers should ensure that their system information directory functions, such as "finger" or other online directories, generate only "directory information" and observe any other relevant restrictions on publication or disclosure of student records. UC Email Policy 19 section IX, paragraph A, states that students may request the campus not to make their email addresses public. Providers should obtain a student's permission, or ensure that the student has not requested "directory information confidentiality" from the campus, before making a student's email address available through the system. Electronic mail services are to be provided by University organizational units in support of the teaching, research, and public service mission of the University, and the administrative functions that support this mission. Users of University electronic mail services are to be limited primarily to University students, faculty, and staff for purposes that conform to the requirements of this Section. University electronic mail services shall not be provided in competition with commercial services to individuals or organizations outside the University. As a required condition for eligibility to use campus email services, Providers must obtain agreement from any users of their email service to abide by appropriate use regulations. This must include all provisions of the 22 UC Email Policy and the Berkeley Campus 23 Computer Use Policy. For information regarding administering appropriate use issues see the 24 Guidelines for Administering Appropriate Use of Campus Computing and Network Services. Providers may choose to provide or not provide former users of their email services with "redirection only" service for their outside email. The duration of any such redirection services is determined by the Provider. Providers shall carry out email service terminations (or conversions to redirection service) with due diligence, subject to timelines determined by data availability and business needs. Email service administrators shall notify email account holders in advance, if possible, of impending account cancellation (or conversion to redirection service). IST's local procedures for 26 Disabling UCLink and HomeIP Accounts may serve as a useful resource document for other Providers in preparing their own local procedures. Individuals, departments, or groups wishing to appeal decisions regarding their continued eligibility for access to email services may do so either through the offices of the Providers or through any existing procedures applying to their affiliation with the University. Providers' requests for exceptions to campuswide termination requirements should be sent to the 27 Associate Vice Chancellor--Information Systems and Technology, who will review such requests and submit them to the 28 Campus Computing and Communications Policy Board (CCCPB). C, Service Restrictions clarifies that "access to University electronic mail services, when provided, is a privilege that may be wholly or partially restricted by the University without prior notice and without the consent of" the User: when required by and consistent with law, when there is substantiated reason (as defined in 31 Appendix A, Definitions) to believe that violations of policy or law have taken place, or, in exceptional cases, when required to meet time-dependent, critical operational needs. Providers should comply with an Employer's request to restrict email privileges of their employees, following confirmation of the identity and authority of the requestor. In such circumstances, the Employer is responsible for ensuring that the action complies with rights and regulations pertaining to the User's employment. If a Provider allows use by groups or individuals not officially affiliated with the campus, then the Provider must have terms and conditions which include provisions for processing restrictions of service. The nonaffiliated Users must be notified of such terms and conditions and be required to agree to them before they are given access to use the email service. Scope states that this Policy applies only to electronic mail in its electronic form.