Computing & Communications Center
Helpdesk

Help For Distance Learners...

UNIX and E-mail Accounts

To create your accounts, you must have your student ID number and your WPI Personal Identification Number (PIN). Please be aware that your student ID is a randomly assigned 9-digit number; it is not your Social Security number!

If you are unsure about your ID number or your PIN, please contact the Registrar's Office for help.

Once you know your ID number and PIN, you can create your WPI accounts on-line. If you do not take classes for a semester or more, you will be marked as an inactive student, and you may need to recreate your account.

If you have your PIN and ID Number, please login to the Web Information System. Click Personal Information, then select Computer Account Settings link and follow the directions to choose a username and password which will create your WPI computer (WINDOWS & UNIX) accounts.

Your WPI accounts include a UNIX account and an ADMIN domain account. A WPI UNIX account provides students with access to a wide variety of information resources including network file storage. Your ADMIN domain account provides access to campus software for use on your personal computer, access to myWPI, and e-mail. Students taking ADLN courses must maintain an active WPI username and password and be able to communicate with their professors via e-mail and the Web.

Microsoft® Campus License Agreement

WPI has an agreement with Microsoft® Corporation that entitles all students to use a subset of the Microsoft® Product suite. This software is intended for academic use only and is for installation on your personal PC. If you are currently enrolled in an ADLN course and have a valid WPI UNIX account you may obtain product license keys by sending an e-mail request to adln@wpi.edu.

VPN

If you are trying to connect to CCC resources from off-campus, you will need to use the WPI VPN client. If you are having problems with the VPN, look at the VPN Error Page.

SSH

SSH (Secure SHell) is a protocol for logging into another computer over a network, to execute commands on a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. Please see the Installing and Using the SSH Client page for more information.

Maintained by itweb.
Last modified: Jun 08, 2011, 11:39 EDT
[WPI] [Home] [Back] [Top]