Terms of usage:
In order to use the cray-cyber-network you have to agree to the following terms of usage. NOTE: By logging in (even to a guest account) you are agreeing to these terms. Doing anything which is against these rules will have consequences such as the deletion of your account or even the ban of your IP (-range).
0. Persons authorized to use the systems:
Our computer systems may not be used by citizens coming from one of
the following states (or from a national resident of):
Cuba, Iraq, Libya, Sudan, North Korea, Iran, Syria or any other country
to which the U.S. has embargoed goods.
The usage of our computing systems for military purposes (especially
the research of nuclear, chemical and biological weapons or their
rocket carrier systems) is also prohibited.
Furthermore, only non-commercial use of the systems is allowed. The usage of
our systems is forbidden if you plan to make money with your work where you
used (even one) of our systems for.
You are not allowed to give away your password to any third party
- it's no problem to get an account, so better obtain an own one.
Furthermore, we advice the logon via SSH (encrypted connection) but telnet
login is still possible. There is a SSH client for almost every operating
system - see http://www.freessh.org.
For more information about logging in, see
how to access the systems.
2. Take care of other users:
You are not the only user of the systems, so please take care.
Do not cause heavy traffic such as uploading/downloading huge files etc. as
we only have a limited bandwidth of 768 kBit down and 384 kBit up.
If you have large files to transfer, don't transfer them on saturdays, but
better during the other days.
Do not run prewritten CPU-intensive procesess such as Seti@Home - other
users want some time, too.
This rule doesn't include selfwritten programs - if you have a project you want
to be computed on one of our computers, feel free to start it, but if you do
please keep in mind that these are vector-computers and so don't run a program
which doesn't make any use of the vector-features.
3. Take care about the operators:
Remember that it's our time we are
spending in order to give you the opportunety to play with this old iron.
So please always provide your real information if you're asked to do so
(especially guest logins)
Do not use these systems for commercial use, or if you plan to do so, please
contact us at email@example.com so
we can vote about your plan - you will hear from us, but without explicit
permission, commercial use is forbidden.
If you try to do something bad to a machine, or try to gain more privileges
than you were given, or try to abuse the privileges you were given, your
account will be deleted instantly and if you continue, your IP(-range)
will be banned (think about other users of the same network - they won't
like it ;))
Don't use these machines as a free storage - disk space at these times was
expansive, and we only have a limited number of HDDs available.
If you request an account, make sure you use it from time to time,
too - nothing is more annoying than creating an account which is never being used.
Generally: Think before you act!!!
The administrators preserve the right to ban a user from the network without
a certain reason (they normally won't do so, but you know youself what's
stupid and what is not).
These machines are originally intended to preserve the old culture and
machines and make them available for everyone who just wants to play
around, do software developing or whatever.
Everyone is welcome, have a great time and do not hestitate to
contact us if you have questions.
These terms are subject to change at any time without further notice.