Red Hat NETWORK - USER REFERENCE GUIDE 1.3 User Reference Manual page 66

Table of Contents

Advertisement

66
Chapter 8:Frequently Asked Questions
for someone to steal your identity. If you should forget your Red Hat login, you can call Customer
Service to access your account. This information will help protect your account from unauthorized
access.
Your system hardware and package profiles are required to give you the most relevant information
about what affects your systems. Without these profiles, you'll have to sift through tons of information
to find what you need.
Q: Who will be using my information?
A: Your personal information is yours, not ours. Tell us how you would like us to use it, and we will
listen.
We never sell our customers' personal information or provide it to others without making it clear that
we intend to do so at the time the information is collected. If you receive any sort of communication
from Red Hat that you find intrusive, whether via phone, email, or regular mail, let us know so we can
make sure it doesn't happen again.
Q: What happens if I do not give my personal information?
A: You can still use the RHN service. RHN only needs to know which version of Red Hat Linux you
are running, the architecture of your system, and which packages you want to receive notifications
about. RHN does not require any personal information. Even your email address is optional.
However, you can not receive email notifications if you do not supply an email address. And you'll
need to provide additional information to access the Red Hat Network web site. We ask for this infor-
mation to help us better support you and protect your security.
Q: What will the Network be in 6 months? What are your plans for the Network?
A: The Red Hat Network available now is just the beginning of our plans for it. Beginning in Decem-
ber 2000, some of the new RHN features include unlimited system registration and system groups,
multiple administration levels, quality of service monitoring for Internet applications, security evalu-
ation and analysis, product discounts, and kickstart replication technology.
In Early 2001, expect to see application configuration and management, system health monitoring,
high performance file and messaging proxies, certified ISV applications, and network-enabled system
replication.
Q: I forgot my username and password. How do I access my account?
A: Go to the Red Hat Network web site. In the Member Login section is a "Forgot Your Password"
link. Click the link and complete the form. Your password will be sent to your email address.
If you didn't provide and email address during registration or have forgotten your username and email
address, call our customer service desk. Be prepared to provide lots of details on your self and your
systems. We don't want your identity falling into the wrong hands.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network 1.3

Table of Contents