Editing InstallFest
Warning: You are not logged in.
Your IP address will be recorded in this page's edit history.The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 42: | Line 42: | ||
## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc. | ## Abusing the facility, such as flooding the network, sniffing packets, impersonating MAC addresses, etc. | ||
# For wireless access, you will need to enter the card number of your current, valid library card from an [http://www.einetwork.net/ein/libraries.html Allegheny County eiNetwork library]. | # For wireless access, you will need to enter the card number of your current, valid library card from an [http://www.einetwork.net/ein/libraries.html Allegheny County eiNetwork library]. | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
# Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy. | # Any inappropriate behavior will be handled by the host of the meeting. If you do not cooperate with the hosts, you may be asked to leave the meeting. The hosts may also choose to not provide network service or electricity to anyone he or she suspects of not following policy. | ||