Last modified by Kateřina Baierová on 07.06.2024 10:51

From version 8.2
edited by Kateřina Baierová
on 07.06.2024 10:43
Change comment: There is no comment for this version
To version 8.3
edited by Kateřina Baierová
on 07.06.2024 10:51
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -9,7 +9,7 @@
9 9  * Use a special network services, which are also popular for people who intentionally violate copyrights.
10 10  * Make acts in school programs in which you have access.
11 11  * Use network for political, religious or racial agitation.
12 -* A much more that you can find in the [[Rules use of computer networks VŠB-TUO>>doc:tuonet.pravidla.WebHome]]. And also in the rules of individual faculties and departments.
12 +* A much more that you can find in the [[Rules use of computer networks VSB-TUO>>doc:tuonet.pravidla.WebHome]]. And also in the rules of individual faculties and departments.
13 13  
14 14  For the security of passwords is not enough just to keep the password secret, but is also necessary to choose a sufficiently secure password. For example, it is not appropriate to have a password to choose to be your name or login. As for PIN card is not appropriate to write the password on paper with the login loginem, the address of the server and so on. Likewise, it should give attention to the visibility of passwords for the award of the keyboard from people in your surroundings. In addition, existing programs mechanically tested passwords (and combinations of words) and so is the need for a sufficiently long and complex password. Can not be excluded that someone has found your password, without needing to know and it is good preventive password from time to time to change.
15 15