|
Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] Accelerated-X access control by IP address access.db ACLs (access control lists) 2nd ACLs (Access Control Lists) Kerberos, usage in AD (Active Directory) 2nd Kerberos and addprinc administration CUPS, web-based tool for desktop systems Kerberos realms remote text-mode tools, used for 2nd [See also text-mode logins] remote via text-mode logins aliases.db AMANDA (Advanced Maryland Automatic Network Disk Archiver) 2nd data backup and restoration dump type and backup set definition Linux client configuration network protocols used by options server configuration server programs tape preparation Windows client configuration anti-aliasing antispam and antivirus tools Bogofilter [See Bogofilter] Postfix Procmail [See Procmail] SpamAssassin [See SpamAssassin] AppleShare AppleTalk ATA (Advanced Technology Attachment) authentication domain configuration, advantages Kerberos [See Kerberos] LDAP [See LDAP] Linux authentication of NT domains [See Winbind] NetLogon authentication pass-through authentication NetLogon authentication and Samba [See domain controllers] authentication servers Automachron |
|