forked from thunix/documentation
Fleshing out THunix man page
This commit is contained in:
parent
c190c28c92
commit
ba42479d5b
37
thunix.8
37
thunix.8
|
@ -27,7 +27,44 @@ To enter chat, just type 'chat' and hit enter. You'll be dropped into the #thun
|
|||
You should create an account at tildegit.org, where Thunix's git repos are hosted, to include the system configuration definition files.
|
||||
|
||||
Ansible is the tool we use to configure the systems that comprise Thunix. Git and ansible are two tools your should familiarize yourself with.
|
||||
.SH Purpose
|
||||
The goal of Thunix is to be an open and collaborative environment, conducive to learning the principles of *Nix operating systems, regarding how they work, how to administer them, how to use them, and how to collaborate using them.
|
||||
|
||||
Thunix tries to adhere to the values and philosophy of the Hacker Ethic whenever possible. The hacker ethics and beliefs as described by Levy are:
|
||||
|
||||
* Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On Imperative!
|
||||
|
||||
* All information should be free
|
||||
|
||||
* Mistrust authority - promote decentralization
|
||||
* Hackers should be judged by their hacking, not criteria such as degrees, age, race, sex, or position
|
||||
|
||||
* You can create art and beauty on a computer
|
||||
|
||||
* Computers can change your life for the better
|
||||
|
||||
Thunix will never use proprietary software but users can do that if they wish. This is something they should avoid however.
|
||||
.SH Rules
|
||||
Thunix relies on the common courtesy and consideration of users to make its services fair for everyone. The following offences will result in a service ban:
|
||||
|
||||
Deliberately defacing the accounts of other users
|
||||
Deliberately trying to disrupt thunix's server
|
||||
Using thunix as a launch pad for disrupting other servers
|
||||
Using thunix to impersonate other websites and businesses for criminal purposes
|
||||
Storing/distributing pornography of any genre and medium (especially child pornography)
|
||||
Storing/distributing content that defames any individual
|
||||
Promoting racial, ethnic, religious, political & other forms of bigotry
|
||||
Mining cryptocurrencies
|
||||
|
||||
Items 4, 5, 6 & 7 may also result in legal action against any offending users, depending on the severity of each case and any other individuals who may have been affected.
|
||||
|
||||
Copyright infringement is not allowed on thunix, and we will not allow any illegal content to be distributed.
|
||||
|
||||
It's also expected that all users respect the copyrights of those who produce original content of any kind (only share if the author or license grants you permission). However, using accounts for external file storage is permissible, under fair use & other laws promoting consumer rights. Note that original content from other users must also be respected, though creating/sharing public domain content is highly encouraged.
|
||||
|
||||
If you want to requestt for content you own the copyright for to be removed from thunix, please email <amcclure@ttm.sh>. In the email, please identify who you are, if you are the copyright holder or legally representing them, the exact files you want removed with links to the files and infringed content, and contact information such as phone numbers or a reply-to email address.
|
||||
|
||||
Users that repeatedly infringe copyrights will have their account removed. Depending on the degree of the offense, their account may be removed immediately.
|
||||
.SH Architecture
|
||||
The Thunix system consists of two servers, currently: phoenix and summit.
|
||||
|
||||
|
|
Loading…
Reference in New Issue