Subject Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] cache cache directories caching case sensitive case-sensitive centralized storage character set check samba daemons 2nd check-point check-point controls Checkpoint Controls chgrp chkconfig 2nd 3rd 4th 5th 6th 7th chmod choice 2nd chown CIFS 2nd cifsfs clean database clients per DC Clock skew cluster clustering 2nd code maintainer codepage collision rates commercial commercial software commercial support Common Internet File System [See CIFS] comparison Active Directory & OpenLDAP compat compatible compile-time complexities compromise 2nd 3rd computer account Computer Management 2nd computer name condemns conferences configuration files configure.pl connection connectivity consequential risk consultant 2nd consumer 2nd consumer expects contiguous directory contributions control files convmv copy corrective action cost cost-benefit country of origin Courier-IMAP credential credentials 2nd crippled criticism 2nd Critics Cryptographic CUPS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th queue 2nd 3rd 4th cupsd customer expected customers |