Editing InstallFest

Jump to: navigation, search

Warning: You are not logged in.

Your IP address will be recorded in this page's edit history.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 29: Line 29:
 
## Download or distribute protected media (warez, downloading mp3s, etc)
 
## Download or distribute protected media (warez, downloading mp3s, etc)
 
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
 
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
## Illegal activity, such as cracking or spamming.
+
## Illegal activity, such as hacking or spamming.
 
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
 
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
 
# Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.
 
# Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.
Line 39: Line 39:
 
## Download or distribute protected media (warez, downloading mp3s, etc)
 
## Download or distribute protected media (warez, downloading mp3s, etc)
 
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
 
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
## Illegal activity, such as cracking or spamming.
+
## Illegal activity, such as hacking or spamming.
 
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
 
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
 
# For wireless access, you will need to enter the card number of your current, valid library card from an [http://www.einetwork.net/ein/libraries.html Allegheny County eiNetwork library].
 
# For wireless access, you will need to enter the card number of your current, valid library card from an [http://www.einetwork.net/ein/libraries.html Allegheny County eiNetwork library].
Line 61: Line 61:
 
## Download or distribute protected media (warez, downloading mp3s, etc)
 
## Download or distribute protected media (warez, downloading mp3s, etc)
 
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
 
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
## Illegal activity, such as cracking or spamming.
+
## Illegal activity, such as hacking or spamming.
 
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
 
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
 
# For wireless access, you will need to enter the card number of your current, valid library card from an [http://www.einetwork.net/ein/libraries.html Allegheny County eiNetwork library].
 
# For wireless access, you will need to enter the card number of your current, valid library card from an [http://www.einetwork.net/ein/libraries.html Allegheny County eiNetwork library].
Line 72: Line 72:
 
## Download or distribute protected media (warez, downloading mp3s, etc)
 
## Download or distribute protected media (warez, downloading mp3s, etc)
 
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
 
## Download, distribute or display objectionable material (use your common sense, WPLUG is a family environment.)
## Illegal activity, such as cracking or spamming.
+
## Illegal activity, such as hacking or spamming.
 
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
 
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc.
 
## Only those with Carnegie Mellon Andrew accounts may utilize the wireless network provided by the University. Creating or utilizing competing wireless networks is prohibited.
 
## Only those with Carnegie Mellon Andrew accounts may utilize the wireless network provided by the University. Creating or utilizing competing wireless networks is prohibited.
 
# Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.
 
# Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy.

Please note that all contributions to WPLUG may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see WPLUG:Copyrights for details). Do not submit copyrighted work without permission!

Cancel | Editing help (opens in new window)