Computer configuration

Results: 1629



#Item
481Netsh / Firewall / Stateful firewall / Comparison of firewalls / Microsoft Windows / Computer network security / Computing

Software Firewalls with SchoolLeader If you need to program a software based firewall that runs on your computers, other than the Windows Firewall, these commands shown below illustrate the configuration necessary to pro

Add to Reading List

Source URL: www.schoolleader.com

Language: English - Date: 2012-05-30 18:03:51
482Information Technology Infrastructure Library / IT service management / Computer security / Screenshot / Configuration management database / Information technology management / Computing / Security

PinkVERIFY™ 2011 ITSM Tool Assessment Criteria Capacity Management Purpose: “… [E]nsure that the capacity of IT services and the IT infrastructure meets the agreed capacityand performance-related requirements in a

Add to Reading List

Source URL: www.pinkelephant.com

Language: English - Date: 2014-10-08 21:00:17
483Internet standards / Computer network security / Network access / Wireless access point / Internet Connection Sharing / Dynamic Host Configuration Protocol / Proxy server / Port forwarding / Wireless bridge / Computing / Network architecture / Internet

Vacation Scholarship Report - AIGO Network Jenni Gorham - [removed[removed]Introduction The Australian International Gravitational Observatory (AIGO) is an interferometric gravitational wave detecto

Add to Reading List

Source URL: www.gravity.uwa.edu.au

Language: English - Date: 2007-03-12 03:44:57
484Computer network security / Routing / Internet protocols / Internet standards / Networking hardware / Port forwarding / Network address translation / IP address / Dynamic Host Configuration Protocol / Network architecture / Computing / Internet

Port Forwarding Tutorial This port forwarding tutorial is provided to help you understand what port forwarding is, why it is required, and the basics on setting up port forwarding in your router to allow remote access to

Add to Reading List

Source URL: hdontap.com

Language: English - Date: 2014-11-30 11:57:47
485Constrained writing / Word square / Transdeletion pyramid / Computer programming / Computing / Software engineering

CRM-183-1 * * * A l t IP related requests must contain the date, time, and time z o n e reference configuration of the event log in the search criteria of the subpoena. Please see the last page of this document for expl

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:32
486Computing / Computer virus / Configuration file / Macro virus / Unix / Computer file / Avast! / System software / Antivirus software / Software

Cybersoft.com CyberSoft White Papers Secrets of the VFind Security Tool Kit Professional Plus Version 1.00 February 2000

Add to Reading List

Source URL: www.cybersoft.com

Language: English - Date: 2013-08-13 11:07:11
487Computer networking / Windows Server / Spamming / Application-level gateway / Computer network security / Dynamic Host Configuration Protocol / Anti-spam techniques / Proxy server / Windows / Computing / Network architecture / Internet

Release Notes Amaranten CorePlus Version 8.90 Amaranten Corporation Ltd 9M Oriental Kenzo Mansion, 48 Dongzhimenwai Avenue, Dongcheng District, [removed]Beijing, China http://www.amaranten.com

Add to Reading List

Source URL: www.amaranten.com

Language: English - Date: 2012-03-31 11:11:39
488Computing / IPv6 / Internet Protocol / Internet standards / Uniform resource identifier / Computer configuration / Link-local address / Percent-encoding / Resource / Network architecture / Internet / URI schemes

Internet Engineering Task Force (IETF) Request for Comments: 6874 Updates: 3986 Category: Standards Track ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2013-02-22 15:26:04
489Computer file formats / Open formats / XML / HTML / Portable Document Format / JavaScript / Computing / Markup languages / Technical communication

Caplin Trader Client 1.4 Composite Component Configuration XML Reference July[removed]CONFIDENTIAL

Add to Reading List

Source URL: www.caplin.com

Language: English - Date: 2014-02-13 06:37:51
490Computing / Conventional PCI / VMEbus / PCI configuration space / MIPS architecture / Interrupt / PCI-X / PCI Express / Computer buses / Computer architecture / Computer hardware

90DQG90+6    5HIHUHQFH

Add to Reading List

Source URL: www.cacdsp.com

Language: English - Date: 2000-10-26 11:41:36
UPDATE