Berkeley CSUA MOTD:Entry 33179
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

2004/8/27 [Academia/Berkeley/CSUA/Troll/Ilyas, Academia/Berkeley/CSUA/Motd] UID:33179 Activity:high 66%like:30864 66%like:32374 66%like:34937
8/27    Someone want to tell us what just happened there?
        \_ Someone's running a borked merge script.
           \_ Hey now, that sounds like repeated motd munging to me!
              OFF WITH THEIR HEADS!  SQUISH SQUISH SQUISH!. -- ilyas
           \_ If they run a Thomased merge script, do we all get pubic hairs on
              with our Cokes?
              \_ Only if you're a hot chick.
        \_ Someone fingered soda.
          \_ SQUISH!!!!!!!!! We haven't had a squish trigger happy politburo
             since the jon administration. Ah, those were the days...
             \_ I ve said it before, and I ll say it again -- thank God for
                boring government.  The last thing we need is for it to become
                exciting. -- ilyas
                \_ yeah, thank god because otherwise you would have been
                   squished by popular vote, no question asked. Ah, I miss
                   the old administration.
                   \_ Yeah, looks like you miss the days of, as pst would say,
                      the old boys' network politburo.  Good for you.  It's a
                      good thing today's politburo doesn't operate on personal
                      animosity anymore. -- ilyas
                      \_ yeah, it's much better when the csua president
                         doesn't have to worry about getting ousted for
                         violating policy.  -tom
                         \_ Speaking of policy, isn't it against EECS policy
                            for alums to be consuming network resources?
                            "POLICY, THOU ART MY MASTER!  COMMAND ME!"
                            I love a policy wanker.  It's a certain breed of
                            petty tyrant usually inhabiting a government or
                            sysadmin position somewhere, that truly makes my
                            life worth living. -- ilyas
                            \_ Your premise is false.
                               And you're also an idiot.  -tom
                               \_ The Boy Who Cried Idiot strikes again.
                                  I stand corrected though, it's not EECS
                                  policy.  It's Berkeley-wide policy instead.
                                  The network is for students, faculty and
                                  staff only.
                          http://itpolicy.berkeley.edu:7015/usepolicy.html
                                    -- ilyas
                               \_ this rules.  great entertainment.
                                  What does a libertarian think about
                                  providing FREE labor by entertaining
                                  motd readers?  Are we stealing from you
                                  guys?  Should this be taxed?
2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2013/10/24-2014/2/5 [Academia/Berkeley/CSUA/Motd, Computer/SW] UID:54746 Activity:nil
9/26    I remember there was web version of the motd with search function
        (originally due to kchang ?).  The last time I used it it was hosted
        on the csua website but I can't remember its url (onset of dementia?)
        now. Can somebody plz post it, tnx.
        \_ http://csua.com
           \_ for some reason I couldn't log in since Sept and the archiver
	...
2012/9/5-11/7 [Academia/Berkeley/CSUA, Academia/Berkeley/CSUA/Motd] UID:54472 Activity:nil
9/4     It looks like there are some issues with wallall at the moment. Any
        plans for it getting fixed? I can run wall, but wallall just gives an
        error.
        \_ Asking questions on the motd will not get any attention from
           any undergrad. You should email politburo or perhaps csua. -ausman
        \_ Asking questions on the motd will not get attention from any
	...
2012/4/23-6/4 [Academia/Berkeley/CSUA/Motd] UID:54359 Activity:nil
4/19    Motd updater thingy seems to be broken, does anyone know why?
        If not, I will take a look later in the day. -ausman
        \_ /etc/motd.public is not getting copied into /etc/motd for a while.
           \_ Now it works and no one knows why. Strange. -ausman
	...
2012/2/6-3/26 [Academia/Berkeley/CSUA, Academia/Berkeley/CSUA/Motd] UID:54301 Activity:nil
2/6     Um, what happened to http://www.csua.berkeley.edu/~myname ?
        "The requested URL /~myname/ was not found on this server."
        \_ Try emailing root or politburo. I don't think that the
           undergrads use this machine anymore. -ausman
        \_ Ausman is mostly right. LDAP went down due to an expired cert and
           took down most of the rest of our stuff. It's probably a thing with
	...
2012/2/24-3/26 [Academia/Berkeley/CSUA/Motd] UID:54313 Activity:nil
2/24    What newsreader should I use on soda?
        \_ USENIX? You serious? Everyone switched to RSS.
           \_ I think you mean usenet not usenix.  usenet was generally much
              better than blogs / rss (cf. comp.lang.c, comp.lang.perl,
              the usenet oracle, alt.* with digg, slashdot, etc.)
           link:reader.google.com is the best
	...
Cache (5482 bytes)
itpolicy.berkeley.edu:7015/usepolicy.html
Reporting Misuse In support of the University's mission of teaching, research, and public service, the University of California, Berkeley provides computing, networking, and information resources to the campus community of students, faculty, and staff. Rights and Responsibilities Computers and networks can provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege, and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations. Students and employees may have rights of access to information about themselves contained in computer files, as specified in federal and state laws. In addition, system administrators may access user files as required to protect the integrity of computer systems. For example, following organizational guidelines, system administrators may access or examine files or accounts that are suspected of unauthorized use or misuse, or that have been corrupted or damaged. Existing Legal Context All existing laws (federal and state) and University regulations and policies apply, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct. Misuse of computing, networking, or information resources may result in the restriction of computing privileges. Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable University or campus policies, procedures, or collective bargaining agreements. Complaints alleging misuse of campus computing and network resources will be directed to those responsible for taking appropriate disciplinary action. Reproduction or distribution of copyrighted works, including, but not limited to, images, text, or software, without permission of the owner is an infringement of US Copyright Law and is subject to civil damages and criminal penalties including fines and imprisonment. Examples of Misuse Examples of misuse include, but are not limited to, the activities in the following list. Obtaining a password for a computer account without the consent of the account owner. This includes but is not limited to programs known as computer viruses, Trojan horses, and worms. Activities will not be considered misuse when authorized by appropriate University officials for security or performance testing. May 11, 2001 Additional Use Policies The Computer Use Policy applies to use of all Berkeley Campus computing resources. Additional computer and network use policies and terms and conditions may be in place for specific electronic services offered by the campus. In particular, the UCLink and Home IP services, as well as the Microcomputer Facilities, have additional policies that govern use of these services. The University of California Electronic Communications Policy applies to the use of UC computers and networks for electronic communications. You must familiarize yourselves with any of these when you agree to use these services. Appropriate Use UC Berkeley extends to students, faculty, and staff the privilege to use its computers and network. When you are provided access to our campus network, you are enabled to send and receive electronic mail messages around the world, share in the exchange of ideas through electronic news groups, and use Web browsers and other Internet tools to search and find needed information. The Internet is a very large set of connected computers, whose users make up a worldwide community. In addition to formal policies, regulations, and laws which govern your use of computers and networks, the Internet user community observes informal standards of conduct. These standards are based on common understandings of appropriate, considerate behavior which evolved in the early days of the Internet, when it was used mainly by an academic and highly technical community. The Internet now has a much wider variety of users, but the early codes of conduct persist, crossing boundaries of geography and government, in order to make using the Internet a positive, productive, experience. You are expected to comply with these informal standards and be a "good citizen" of the Internet. Enforcement Penalties may be imposed under one or more of the following: University of California regulations, UC Berkeley regulations, California law, or the laws of the United States. Minor infractions of this policy or those that appear accidental in nature are typically handled informally by electronic mail or in-person discussions. More serious infractions are handled via formal procedures. In some situations, it may be necessary to suspend account privileges to prevent ongoing misuse while the situation is under investigation. Infractions by students may result in the temporary or permanent restriction of access privileges, notification of a student's academic advisor and/or referral of the situation to the Student Conduct Office. Those by a faculty or staff member may result in referral to the department chairperson or administrative officer. Offenses which are in violation of local, state, or federal laws may result in the restriction of computing privileges, and will be reported to the appropriate University and law enforcement authorities.