Computer configuration

Results: 1629



#Item
681Computer architecture / Internet standards / SYSLINUX / BIOS / GPXE / Booting / Dynamic Host Configuration Protocol / Trivial File Transfer Protocol / Knoppix / System software / Network booting / Computing

Booting PC-Diag from a PXE server running Linux. Note- it is out of scope to describe how to install DHCP server and TFTP server, but for completeness we’ll give examples when necessary. Make PC-Diag boot image Put a

Add to Reading List

Source URL: www.pc-diagnostics.com

Language: English - Date: 2011-11-09 11:14:06
682Computer networking / Internet / Proxy auto-config / Computer network security / IP address / Hostname / Web Proxy Autodiscovery Protocol / Firewall / Name server / Computing / Network architecture / Domain name system

NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment ......................................................................................................... 3 Configuring

Add to Reading List

Source URL: www.telemate.net

Language: English - Date: 2013-11-20 13:05:34
683Installation software / Computer configuration / Environment variable / Installation / Configuration file / Path / Windows Installer / System software / Software / Computing

Resource Standard Metrics Installation Details Workstations and Servers RSM and RSM Wizard Version 7.50+

Add to Reading List

Source URL: msquaredtechnologies.com

Language: English - Date: 2009-03-08 14:09:18
684Computer configuration / Environment variable / Reatogo-X-PE / BartPE / Start menu / Dynamic-link library / Windows NT architecture / Windows File Protection / Microsoft Windows / System software / Software

Download Reatogo from : _http://www.reatogo.de/Reatogo_Download_MAIN.htm_ 2. Run the installation 3. Click on START THE CONFIGURATION

Add to Reading List

Source URL: www.pc-diagnostics.com

Language: English - Date: 2007-02-05 10:01:17
685Internet standards / Computing / Dynamic Host Configuration Protocol / Bring your own device / Operating system / Captive portal / Technology / Computer network security / Mobile technology

How to address Today’s BYOD Challenges www.h3c.com.cn 1

Add to Reading List

Source URL: www.hkngis.hk

Language: English - Date: 2013-10-21 21:38:28
686Computing / Software project management / Method engineering / Evaluation / Baseline / Configuration management / Vulnerability / Common Criteria / CimTrak / Computer security / Computer network security / Information technology management

Software Supplier Words Software Supplier Words REQUIREMENTS. The following are broad categories of short and long term goals and expectations for this SOO. The descriptions are in general terms at the objectives level

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2007-09-17 15:17:08
687Nessus / Tenable Network Security / Hacking / Software testing / Vulnerability / Payment Card Industry Data Security Standard / Computer security / System software / Cyberwarfare

Tenable Announces Nessus Enterprise to Empower Team Collaboration for Vulnerability, Configuration and Compliance Assessment Nessus Enterprise Expands Use of Market-leading Scanning Tool for Administrators, Auditors and

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2015-02-04 04:23:45
688Computing / Computer cluster / VMware Infrastructure / VMware vSphere / Software / System software / VMware

vRealize Operations Manager vApp Deployment and Configuration Guide vRealize Operations Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is

Add to Reading List

Source URL: pubs.vmware.com

Language: English
689Computer network security / Electronic commerce / Hacking / Software testing / Vulnerability / Open Vulnerability and Assessment Language / Nessus / Security Technical Implementation Guide / Critical infrastructure protection / Computer security / Cyberwarfare / Security

Secure Configuration Remediation Tool Task Order Title Department of Defense (DoD)-wide Enterprise License for an automated Secure Configuration Remediation (SCR) tool.

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2007-09-17 15:17:21
690Software / Method engineering / Management / Requirements management / Systems Modeling Language / Configuration management / Workflow / Internet-Speed Development / Computer-aided software engineering / Information technology management / Software development / Systems engineering

Evaluating and Selecting CM Tools A Perspective Steve Easterbrook President, CMPIC

Add to Reading List

Source URL: www.cmpic.com

Language: English - Date: 2012-07-18 08:00:31
UPDATE