System configuration

Results: 1845



#Item
311System software / GNOME / Avahi / Freedesktop.org / KDE / Zero configuration networking / GNU Guile / Multicast DNS / Scheme / Software / Computing / Domain name system

Using Avahi in Guile Scheme Programs For Guile-Avahi 0.3 Ludovic Court` es

Add to Reading List

Source URL: www.nongnu.org

Language: English - Date: 2008-03-10 16:57:41
312Software / Windows Server System / Windows Server / Microsoft SQL Server / SQL Server Express / SQL / Windows Internal Database / SQL injection / Relational database management systems / Computing / Microsoft

SQL Server 2008 Express Service Configuration Table of Contents SQL Server 2008 Express Service Configuration.........................................................2 The SQL Server Service.............................

Add to Reading List

Source URL: www.pulsestar.co.uk

Language: English - Date: 2012-08-15 09:36:12
313Manned spacecraft / Space Shuttle / Orbiter / Spaceflight / Space technology / Space Shuttle program

MS3 Overall Architecture – Nominal Mission Configuration HARDWARE • IBM PC/Intel CPU compatible • Generally one computer per monitor/display/scene • One computer for system/simulation control and status • Off-t

Add to Reading List

Source URL: www.binarystarltd.com

Language: English - Date: 2014-03-08 11:47:59
314Linux / Kernel / Linux kernel / Operating system / Ring / Dynamic Host Configuration Protocol / Ioctl / Loadable kernel module / Computer architecture / Software / System software

Introduction The Kernel is a vendor-independent applications development environment, as well as a run-time environment providing standard vendor-independent services to applications software. It is not an operating syst

Add to Reading List

Source URL: www.hardhats.org

Language: English - Date: 2000-02-03 10:01:31
315VMware ESX / Hyper-V / Virtual machine / VMware vSphere / VMware Infrastructure / System software / Software / VMware

vSphere Configuration & Management v5.5 Days: 5 Description: The vSphere Configuration and Management class will provide the administrators who are

Add to Reading List

Source URL: www.lantecctc.com

Language: English - Date: 2014-05-28 14:20:33
316Password

MENU: PURPOSE: Configuration: Database and Maintenance They group all the programs that were designed to maintain the background databases, settings and parameters that are required to run the system.

Add to Reading List

Source URL: www.ascar.com

Language: English - Date: 2014-06-16 16:44:18
    317Iridium Communications / SMS / Business telephone system / Plain old telephone service / Telephone / Telephone plug / Thuraya / Technology / Telephony / Electronic engineering

    RemoteSAT RST100 RJ11/POTS Connectivity Voice/Data/FAX/SMS Local & Remote Configuration

    Add to Reading List

    Source URL: www.trtelecom.com.au

    Language: English - Date: 2014-12-09 17:15:10
    318Computer configuration / Environment variable / Installation software / Path / Installation / Windows XP / Windows Vista / Microsoft Windows / Features new to Windows XP / System software / Software / Computing

    ALS Workstation Setup Instructions (Note: Replace X: with your mapped network drive letter) 1. Prior to installation it is critical that the workstation being setup has all the latest Windows Updates installed. Workstati

    Add to Reading List

    Source URL: www.advancedlease.com

    Language: English - Date: 2014-06-12 15:19:07
    319Firewall / System software / DMZ / Check Point VPN-1 / Internet security / Nokia IPSO / Security appliance / Application firewall / Comparison of firewalls / Computer network security / Cyberwarfare / Computing

    COVER FEATURE A Quantitative Study of Firewall Configuration Errors The protection that firewalls provide is only as good as the policy they are

    Add to Reading List

    Source URL: www.eng.tau.ac.il

    Language: English - Date: 2004-06-21 07:38:15
    320Unix / Computer network security / Malware / File system / Computer file / Operating system / Device file / Privilege / Configuration file / Computing / Computer security / System software

    Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY June 2001 Detecting Insider Threats by Monitoring System Call Activity Nam Nguyen and Peter Reiher

    Add to Reading List

    Source URL: lasr.cs.ucla.edu

    Language: English - Date: 2003-10-29 13:27:33
    UPDATE