性奴调教

Skip to main content

Computing Resources

The 性奴调教 Department of Computer Science operates a variety of Linux computing systems to support both classes and research, including activities in computer science, bioinformatics, data science, mathematics and statistics. 

Overview of Systems

All of our systems are Linux-based and rely on the same credentials. These include:

  • Linux workstations in the Interdisciplinary Science and Engineering building, Room 230
  • Linux workstations in Ritter Hall, Room 115
  • Linux workstations the Interdisciplinary Science and Engineering building, Room 216
  • Linux workstations in the Interdisciplinary Science and Engineering building, Room 214 for bioinformatics and computational biology graduate students
  • Linux workstations in various places for M.S.-CS, M.S.-SE, M.S.-AI graduate students
  • Remote access to server hopper.slu.edu (our primary remote server for computer science students)
  • Remote access to server mendel.slu.edu (our primary remote server for bioinformatics students)
  • Git server at git.cs.slu.edu. Git is a distributed version-control system that is commonly used by technical teams for collaboration and for tracking changes is software or other projects. Many different sites provide project management with git (with github.com one of the most prominent).
  • Jupyter Notebook server at jupyter.cs.slu.edu
  • Various specialized systems for research labs
  • A distributed file system that supports all of the above systems

User Accounts/Passwords

We offer accounts on our systems for any students who are taking computer science or bioinformatics courses, or for select mathematics/statistics courses, as well as for students engaged in one of our research labs.

  • User names on our systems are the same as your 性奴调教Net ID. However, the password for our systems is not the same as your standard slu.edu password.
  • Initial one-time passwords will be sent via email when a new account is created.
  • All passwords expire every 120 days, and you will be prompted to change upon next login.

The only way to change your password is through login either to one of the physical workstations within RTH/ISE, or remote login to hopper.slu.edu or mendel.slu.edu. If not already prompted to change your password (for example, if the current one is expired), you may use the "passwd" command from a terminal console.

  • It will first prompt you for your current password (though it will not visibly echo it while you type).
  • It will then ask you for the new password (again not visually echoing), and then for you to repeat the new password.
  • New passwords must be at least 10 characters long, use at least three of the four character types (uppercase, lowercase, numbers, symbols), and cannot be the same as a previously used password.

Appropriate Use Policy

All users of our systems are expected to adhere to both the University and departmental policies on appropriate use. For clarity, several points of the policy are highlighted below.

Systems Are For Academic Use Only
The department computer systems are to be used for academic purposes and limited personal use. Any use for business purposes, illegal activity or other use violating university policy is expressly forbidden. Reasonable use for personal purposes (such as web surfing, email, etc.) is permissible as long as it does not interfere with others use or violate university policy.
Interfering With the Use of Others 

Any use of the computer system that interferes with another's use is unacceptable. This includes monopolization of network bandwidth, excessive use of disk storage space and running of programs that utilize all of the system resources without relinquishing them. Tampering with any university computers (including turning them off, unplugging them from the network or other devices) is also prohibited as this can affect others who are using the system remotely.

Unauthorized Access

Using any account other than your own for any purposes is not allowed. Accessing another user's files with the exception of public files, share directories and web files is expressly forbidden. Any attempt to break into another account, guess another user's password, or hack into any computer system will be dealt with to the full extent of university policy.

Academic Honesty

All computer use should be consistent with the university's academic honesty policies. Any use of the computer systems to violate these policies or the honesty policies in any course will be dealt with according to university policy.

Privacy Expectations

Under typical situations the privacy of user files and data will be respected. However, there are a couple exceptions to this. First, the system administrator may need to access and make changes to user account in order to ensure proper running of the department computer systems. Secondly, with approval of the department chair, department faculty may examine the contents of user files to address questions of academic honesty and other violations of university policies.

Installation and Running of Software

Installing software without permission of the system administrator is not allowed. Requests for any software installation can be made to the system administrator. Running any server software (e.g. web server, chat server or game server) is not allowed with the exception of projects for a course or with permission of the system administrator.
 

For further details, see the .