Computer configuration

Results: 1629



#Item
361Computer networking / Windows Server / Computer network security / Internet standards / Internet privacy / Proxy server / Application-level gateway / Anti-spam techniques / Dynamic Host Configuration Protocol / Computing / Network architecture / Internet

Release Notes Amaranten CorePlus Version 8.90 Amaranten Corporation Ltd 9M Oriental Kenzo Mansion, 48 Dongzhimenwai Avenue, Dongcheng District, Beijing, China http://www.amaranten.com

Add to Reading List

Source URL: www.amarantenasia.com

Language: English - Date: 2012-03-31 11:11:38
362Computing / BIOS / Open standards / Advanced Configuration and Power Interface / Electric power / Sleep mode / Power management / Universal Serial Bus / Advanced power management / Computer hardware / Energy conservation / System software

Introduction Device Configuration Activate Functions

Add to Reading List

Source URL: openbsd.aise.re

Language: English - Date: 2011-10-10 05:29:34
363Computer network security / Honeypot / Spamming / Computer emergency response team / Dynamic Host Configuration Protocol / Request Tracker / Framework Programmes for Research and Technological Development / Private network / IP address / Network architecture / Computing / Internet

dMAPI, anonymization, ToCs

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-02-28 12:48:23
364Installation software / Computer configuration / Environment variable / Path / Installation / Microsoft Windows / TMPDIR / Windows Vista / Features new to Windows XP / System software / Software / Computing

ALS Workstation Setup Instructions (Note: Replace X: with your mapped network drive letter) 1. Prior to installation it is critical that the workstation being setup has all the latest Windows Updates installed. Workstati

Add to Reading List

Source URL: www.advancedlease.com

Language: English - Date: 2014-06-12 15:19:05
365Information technology management / Public safety / Data security / Computer law / Information security / Federal Information Security Management Act / Change management / Incident management / Configuration management / Computer security / Security / Computing

Policy Number (A145) University-wide Policy Change and Incident Management Policy Date Approved:

Add to Reading List

Source URL: umshare.miami.edu

Language: English
366Computing / Unix / 6dF Galaxy Survey / Compiling tools / 2dF Galaxy Redshift Survey / UK Schmidt Telescope / Computer configuration / Very Large Telescope / Configure script / Astronomical surveys / Telescopes / Software

ANGLO­AUSTRALIAN  OBSERVATORY P.O. BOX 296 EPPING N.S.W. 2121 AUSTRALIA Telephone:  +61 2 9372 4800    Fax:  +61 2 9372 4880 2dF / 6dF / AAOmega CONFIGURE User Manual 

Add to Reading List

Source URL: 203.15.109.22

Language: English - Date: 2011-12-28 10:08:14
367Network architecture / Internet / Computer network security / Point-to-Point Tunneling Protocol / Email / Password / OpenVPN / Profile configuration file / Computing / Tunneling protocols / Network protocols

VPN Connection Information (Please fill out one sheet per network if more than one) Contact Info: Company Name:

Add to Reading List

Source URL: www.fitrix.com

Language: English - Date: 2012-12-12 14:45:00
368Security Content Automation Protocol / Information Security Automation Program / Computer security / Automation / Federal Desktop Core Configuration

NIST Security Automation Tim Grance – Program Manager September 28, 2010 Agenda

Add to Reading List

Source URL: scap.nist.gov

Language: English
369Software / PCI Express / PCI configuration space / Conventional PCI / QEMU / Interrupt request / Advanced Configuration and Power Interface / PCI-X / Bochs / Computer hardware / Computer buses / Computing

PCI Express in QEmu Isaku Yamahata <> <> VA Linux Systems Japan K.K. KVM-forum 2010: August 10, 2010

Add to Reading List

Source URL: www.linux-kvm.org

Language: English - Date: 2010-08-13 13:33:27
370Cyberwarfare / Honeypot / Honeyd / Network telescope / Network address translation / Denial-of-service attack / Dynamic Host Configuration Protocol / Client honeypot / Computer network security / Internet / Computing

INTERNATIONAL COMPUTER SCIENCE INSTITUTE 1947 Center St. • Suite 600 • Berkeley, California • ( • FAXGQ: Realizing a System to Catch Worms in a Quarter Million Places

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2006-09-07 19:03:47
UPDATE