Reporting Problems

8.1 Physical Security

Physical security is the most important part of system security. Obviously electronic security means nothing if the whole machine is stolen. Users should be aware of what networked machines are in their vicinity and keep an eye out for any suspicious activity. Doors to laboratories should be closed and locked if there are no more users in the lab.

8.1.1. Theft and vandalism

Theft and vandalism should be reported to the Auburn University Campus Police as well as Engineering Network Services.

8.2 Electronic Security

Electronic security is also the responsibility of all users. Users should periodically examine their files for unusual activities. Contrary to popular belief, systems administrators are not omniscient nor omnipresent, so suspicious activities are often reported first by wary users.

8.2.1. Notification of local system administrators

Violation of College of Engineering network policy should be brought to the attention of Engineering Network Services as soon as possible. Depending on the nature of the violation, electronic mail or telephone call is the best method of alerting the local system administrators. Send electronic mail to or call 844-2280.

8.2.2. Notification of remote system administrators

Violation of remote system policies may require notification of the remote system administrators. For internet users, the whois database and Domain Name Service databases (accessed via nslookup) should contain information on who to contact in the case of emergencies. If a remote system administrator is contacted, please notify Engineering Network Services to advise them of the situation.

8.3 Broken Machines

Broken machines or other hardware problems should be reported by e-mail to

8.4 System Software

System software problems should be reported by e-mail to

8.5 Application Software

Application software problems should be reported to the local contact person for the application. Who that is might be difficult to determine, but typically, the owner of the application's files is the local contact. If the owner is root, bin, or staff, send e-mail to

8.6 Recovery of Deleted Files

User home directories are incrementally backed up onto tape every working day. Backups during weekends and holidays are sporadic. To request restoration of deleted files, send an e-mail message to with the following information:

exactly which file(s) need to be restored; include the directory in which the files were located (i.e. my home directory, file

  • the date and time the file(s) were created
  • the date and time the file(s) were last modified
  • the date and time the file(s) were deleted

If located on tape, the files will be restored and placed in a directory named RESTORED in the user's home directory. It is the responsibility of the user to move these files to their appropriate place and delete the RESTORED directory.

Note: files which are restricted under the College of Engineering network policy will not be restored.

Any corrections, additions, or suggested changes to this document should be emailed to

Last Updated: Oct 31, 2012