The Chinese University of Hong Kong

Faculty of Engineering

Computing User Guide for Engineering Students

Computing Facilities

Common Computing Laboratories


WiFi Access

Engineering Computing Account (ERG) Username

Your ERG Username will be "s" + 10-digit CUHK student ID (e.g s1155012345)

Change your ERG password:

After logged on Windows PC in Faculty Common Computing Laboratory, press "CTRL-ALT-DEL"  , and then select

"Change a Password".

Forgot Password:

Please come to Faculty Office at RM606, Ho Sin-Hang Engineering Building for password reset.

Faculty Common Computing Laboratories


No. of PCs

Opening Hours

Ho Sin Hang
Engineering Building


Room 123


9am - 5pm
(Mondays to Fridays)

Ho Sin Hang
Engineering Building


Room 904


9am - 5pm
(Mondays to Fridays)

William M.W. Mong
Engineering Building


Room 909


9am - 5pm
(Mondays to Fridays)

*All the Faculty Common Computing Laboratories can be accessed using your CU-Link card.

  1. OS installed: Windows 10
  2. Login using your ERG username and password
    • If you fail to input correct password 3 times consecutively, the account will be locked. After 30 minutes your account will be unlocked, and you can try login again.
  3. To connect network drives:
    • Start -> Computer -> S:\userapps
  4. L Drive: Your own file store to save data files (1GB disk quota)
    • L Drive is connected automatically when you login the Windows.
    • DO NOT save important files on the Windows Desktop or local hard drive.
    • You are recommended to store files on your o365 OneDrive
  5. S Drive (\\ergntsvr1\userapps): you can access useful application software here.
  6. Firefox - under S:\Mozilla\
  7. Google Chrome - Start -> All Program -> Google Chrome



  1. "The Faculty" means Faculty of Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong.

  2. "Computing facilities" means all facilities in the Faculty.


Use of your computing facilities is a privilege to be exercised responsibly. Ignorance is not an excuse. Therefore, study the regulations carefully.

  1. A user must not allow any other to access the resources granted to him/her. Therefore a user must not disclose his/her computer account password to any other person, or allow account accessed by unauthorized persons using any method under any circumstances.

  2. A user must not use computing resources or access information to which he/she has not been granted access by the Faculty. A user shall not access other sites' computing resources without approval from the sites' authority. The computing staff may report to the site's authority, and the site's authority can request Faculty to take disciplinary actions against the user.

  3. A user must never attempt to intrude the computer systems of local or external sites, or obtain illegal access to another account of local or external sites.

  4. The computer facilities must only be used in connection with University/Faculty courses and valid University/Faculty related projects, in an efficient and non-wasteful manner. A user must not use the computing facilities to engage in activities leading to commercial gain, monetary or otherwise.

  5. A user must never attempt to cause any damage to the computing facilities and is responsible for the cost of repair or replacement.

  6. A user must never attempt to change the configuration of the PCs without consent of the computing staff.

  7. A user shall not copy proprietary/licensed software owned by the Faculty.

  8. A user shall not store any materials with offensive content in his/her computer account, or any materials that infringe the laws regarding Copyright, Patent and Trademark.

  9. Users who borrow equipment (hardware, software or documentation) from the Faculty are responsible for its proper care and for returning it in a timely fashion. Equipment will be examined by technical staffs prior to being loaned and upon its return to ensure that it is in good working condition. Equipment can be checked in and checked out only by technical staffs. Please notify the Faculty immediately if any problems, damage, theft or loss occurs. Failure to do so may result in the loss of borrowing privileges. The borrower is fully financially responsible for any loss or damage that occurs while equipment is in his/her possession. The Faculty reserves the right to charge administration, repair or replacement costs.

  10. A user shall not use false or anonymous identity to carry out any computing activities including, but not limited to, sending email or posting news.

  11. A user shall not send unsolicited bulk email (i.e. spam or junk email).

  12. A user shall not play any computer games in the laboratories. The computer games include, but not limited to, PC games, and Internet games. This regulation is not applicable to approved projects.

  13. A user shall not bring unauthorized persons to the laboratories without prior approval from computing staff.

  14. A user shall not interfere with other users.

  15. A user shall bring his/her CULink card in the laboratories. This is to let staff to identify any unauthorized persons in the laboratories.

  16. A user shall not abuse the computing resources.

  17. No food or beverage are allowed in the laboratories.

  18. A user shall not leave the doors of any laboratories unlocked after office hours.

  19. A user has the responsibility to report violation of regulations (such as abuse of the computing facilities or breaking of computer security by other users) to technical staff. Everything will be kept anonymous.

  20. A user has the responsibility to report system or hardware failure to technical staff.

  21. When a user leaves the Faculty, his/her computer account(s) will be deleted in two weeks.

A user shall report cases concerning violation of laboratory regulation to the computing staff. It may be necessary for the computing staff in the Faculty to access your account without your knowledge to investigate suspected abuse. Since it can be impossible to distinguish a legitimate project from potential abuse, you may be asked to come forward to explain your actions.

User who violates any of the regulations shall be disciplined in accordance with the nature and gravity of the offence. According to University Regulations, such disciplinary action may take the form of any of the following penalties:

  1. reprimand;

  2. suspension from part or all of the privileges of using the computing resources for a specified period of time;

  3. demerit;

  4. suspension from the University for a specified period of time; or

  5. termination of studies at the University

Users guilty of serious or repeated violation of the regulations will be referred to the Faculty's Discipline Committee, College Discipline Committee, or University Senate's Discipline Committee.

Related Information

Email Services

We will use your o365 E-mail account as the main email address. (CWEM)

Important announcements and news from Engineering Faculty and Departments will be sent to your @link email address.