Student's Accounts and Data Security
All students are assigned several computer accounts identified by login name and password. All accounts managed by faculty use the same login name beginning with letter 'x' followed by first 5 characters of user's surname and finished by 2 distinguishing characters, e.g. xsmith12. All accounts have the same original password which should be changed for security reasons. However passwords of these accounts are independent so you should change all of them.
Which accounts are used?
All university level applications should accept both VUT login and personal ID (printed on your student ID card). VUTlogin is completely independent on faculty login. Rights and duties for utilizing the student accounts are described in the Guidelines for the Usage of the Brno University of Technology Computer Network which are obligatory for all faculties and workplaces of the Brno University of Technology.
PhD Student AccountsPh.D. students should follow the same rules. Those working for faculty are assigned another staff account. Student account is then used for their own study affairs.
An account may be used only by the user with exclusive rights for the account. It is not allowed to grant the account (password) or computing facilities to other person. Moreover, users must avoid such situations when password can be revealed - either by using such password that can be easily derived or recording the password.
When creating a new password following rules should be followed:
The Unix password are changed by passwd command, in Windows XP press CTRL+ALT+DEL, choose Change Password. When changing the password, check whether the Czech keyboard is off - otherwise the password will consist of characters that may not be entered again.
In case you've forgotten your password, please follow these rules.
A password will be changed after the identity of the person is verified (it is verified whether the user is entitled to use the account). To verify the identity, the student card or any other identification card with photo can be used.
It must be always assumed that your files can be read from anywhere on Internet. The Administrators take a big effort to avoid it, but in the field of safety it is always necessary to expect the worst possible situations. What can you do for your data safety? The list of activities starting with the most safe methods to the least safe ones is described below: