Each network connection in the residence halls is designed to provide individual use allowing students to access the Internet and campus technology services.
The network is not designed to support numerous servers in the residence halls. Running servers exponentially increases the number of connections and network traffic within the halls. In addition, while today’s new desktop computers come with powerful network and server services, these features contain numerous vulnerabilities to viruses and worms. Viruses often enable hackers to connect to workstations and attack other computers, launch denial-of-service attacks, or get access to your personal data. Unmanaged software and workstations that enable outside users to connect to workstations affect everyone in the residence hall.
A block is in place preventing any computer outside the campus network from connecting to a computer in any residence hall. Computers in the residence halls can connect to on-campus services, external servers, web sites, and download files via the Internet.
This block will affect external access (off campus) to servers including FTP servers, Web and Database servers. It also may affect some features of P2P file sharing programs and Instant Messaging services on workstations in the residence halls.
This block will not affect connections between computers on-campus. It is still critical that you apply daily anti-virus software updates and perform regular Windows updates. If you are running server and network services software for an on-campus server, it is still critical that you maintain good security practices.
If you are using file sharing programs to download and share copyrighted material, this block will not protect you from identification by software publishers and subsequent legal action. Illegal sharing of copyrighted files is against University Policy.
If you have an academic or administrative need to run a server in your residence hall that can be accessed by computers outside the Georgetown University network, an exception process is in place.
Meet with the University Information Security Office to review University policies (Computer Systems Acceptable Use and Information Security Policy), security responsibilities, and required practices. Arrange for a security check up of your server to identify and resolve any security holes before proceeding.