Home 
Help 
Tickets (0) 
Log In 
Register 
 
 
         | 
        
             
         | 
        
            
            
Terms of Use (Revision 1)
Category: Usenet | Author: fogwraith | Modified: 08:59 on Feb 26, 2025 
  Users of the news server mcp.mac.gdn are obliged to abide by the following rules. Failure to do so will cause immediate termination of access rights without prior notice. 
- 
Sender Address
 
The e-mail addresses given in "From:", "Reply-To:", and "Sender:" SHOULD be yours (i.e. you should be entitled to use it) and SHOULD be valid (= should not bounce because of invalidity). 
Using addresses and name space of other people without their consent is prohibited.
For the From: address, however, the Top Level Domain (TLD) invalidmay be used, as in  netizen@example.invalid.
See also RFC5537 and Usenet Best Practice.
  
  
- 
no spam
 
It is not allowed to post so-called spam via mcp.mac.gdn (To spam means to send many identical or nearly-identical messages separately to a large number of Usenet newsgroups.)
       
  
 
- 
no binaries in text-only groups
 
It is not allowed to post binary files such as images, animations, videos, sound files, executables, etc. to newsgroups other than those, that explicitly allow binaries (alt.binaries.*, comp.binaries.*).
  
 
- 
No articles larger than 1000 KB
 
Articles posted through mcp.mac.gdn may not be larger than 1000KB.
  
 
- 
No control messages
 
No control messages may be posted through mcp.mac.gdn with the following exceptions: 
 
- 
Cancel and supersede messages for your own articles that have been posted through MacDomain
 - 
newgroup and rmgroup control messages
 
 
  - 
No Third Party Cancels
 
No user may cancel or supersede any articles other than his own.
       
  
 
- 
No Redistribution of Account Information
 
 Account information (user name, password) must not be disclosed to third parties ("Account Sharing"). Every user is obliged to keep his account information secret, to protect it against unauthorized access, and to report any loss or potential leakage.
  
 
- 
System Integrity and Resource Consumption
 
Any disturbance of the system's integrity and any interference with the system's operation is prohibited. The system's resources (e.g. bandwidth or CPU time) must be used with sense of responsibility and consideration.
  
 
 
 
Back to current version 
         |