[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] UAWG (Universal ADSL Working Group ) UDP ports 2nd 3rd 4th UDP ( User Datagram Protocol) 2nd headers ICMP interaction TCP/IP 2nd UIDs (Unique Identifiers) unacknowledged protocols IP (Internet Protocol) UNI (User-Network Interface) 2nd unicast addresses UNICODE Uniform Resource Identifier (URI) Uniform Resource Locator (URL) Uninterruptable Power Supply. [See UPS]2nd [See UPS] uninterruptible power supply. [See UPS] Unique Identifiers (UIDs) universal ADSL Universal ADSL Working Group (UAWG) universal commands universal groups Universal Network Boot universal serial bus (USB) Unix auditing 2nd 3rd 4th syslog 2nd 3rd 4th 5th 6th 7th system log files 2nd 3rd commands DNS servers configuration 2nd eDirectory ifconfig command 2nd 3rd 4th 5th login troubleshooting 2nd 3rd monitoring 2nd 3rd 4th syslog 2nd 3rd 4th 5th 6th 7th system log files 2nd 3rd netstat command 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th NFS 2nd NFS (Network File System) 2nd configuring daemons 2nd 3rd 4th 5th 6th 7th 8th 9th 10th procedures 2nd 3rd 4th RPC 2nd 3rd server-side daemons 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th troubleshooting 2nd 3rd 4th XDR 2nd NIS (Network Information Service) 2nd NIS (Network Information System) 2nd permissions viewing 2nd printers configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th SVR4 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th UNIX protocols 2nd 3rd 4th 5th BOOTP 2nd 3rd 4th 5th 6th DHCP 2nd 3rd 4th 5th 6th TCP/IP 2nd 3rd telnet 2nd 3rd 4th 5th 6th Telnetxxx 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th Unix r-commands SAMBA 2nd SFU (Services for Unix 3.0) 2nd 3rd ActiveState ActivePerl 5.6 installing 2nd 3rd 4th 5th Korn Shell commands 2nd 3rd 4th 5th password synchronization 2nd 3rd 4th Telnet 2nd 3rd 4th user name mapping 2nd SFU (Services for Unix) Korn Shell commands 2nd telnet SOHO 2nd 3rd TCP/IP 2nd users 2nd 3rd 4th 5th 6th 7th 8th 9th /etc/groups file 2nd /etc/passwd file 2nd 3rd 4th 5th administration 2nd modifying accounts 2nd 3rd 4th shadow password file 2nd UNIX utilities 2nd 3rd 4th 5th BOOTP 2nd 3rd 4th 5th 6th DHCP 2nd 3rd 4th 5th 6th FTP 2nd 3rd 4th TCP/IP 2nd 3rd telnet 2nd TelnetXXX 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th unreliable protocols IP (Internet Protocol) update sequence numbers (USNs) UPDATE state updates routers 2nd 3rd 4th updating DHCP configuring dynamic updates 2nd 3rd 4th security 2nd upgrading 10Base-2 networks 10Base-T networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th applications 2nd 3rd 4th 5th ARCnet Eternet 2nd Ethernet 2nd 3rd 4th Token-Ring 2nd 3rd 4th BDCs (Backup Domain Controllers) 2nd bridges to routers and switches 2nd 3rd 4th 5th 6th 7th 8th addressing issues 2nd management issues network protocol issues 2nd Ethernets 2nd 3rd 4th phasing into Token-Ring networks 2nd 3rd 4th 5th 6th 7th replacing Token-Ring equipment routing 2nd fiber- optic cables networks avoiding sidetracks 2nd closing deploying 2nd 3rd determining needs for 2nd 3rd 4th 5th 6th 7th documenting planning 2nd executing pilot programs 2nd maintaining support 2nd mapping 2nd 3rd measuring success 2nd notifying users 2nd optimizing 2nd 3rd planning 2nd 3rd 4th 5th restoring 2nd scheduling downtime surveying users 2nd 3rd testing 2nd 3rd 4th tracking training 2nd verifying corporate standards 2nd verifying;setting goals operating systems 2nd 3rd 4th 5th PDCs (Primary Domain Controllers) 2nd 3rd 4th 5th Windows 2000 Server 2nd 3rd Windows 2003 Server 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th uplink ports UPS 2nd UPS (Uninterruptable Power Supply) as physical network security measure 2nd UPS (uninterruptible power supply) 2nd 3rd 4th 5th ACPI (Advanced Configuration and Power Interface) 2nd 3rd 4th network devices URI 2nd 3rd 4th 5th URI (Uniform Resource Identifier) URL 2nd 3rd 4th 5th URL (Uniform Resource Locator) URN 2nd 3rd 4th 5th USB (universal serial bus) user accounts 2nd 3rd delegating authority for network security 2nd tracking User Datagram Protocol (UDP) 2nd 3rd headers ICMP interaction TCP/IP 2nd User Environment Profile dialog box user identification network security measures 2nd 3rd passwords 2nd 3rd 4th 5th 6th 7th User Manager 2nd 3rd User Manager utility 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th User object user-level permissions 2nd Windows NT/2000 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th User-Network Interface (UNI) 2nd useradd command Unix usernames interdomain trust relaitonships 2nd 3rd 4th creating 2nd 3rd 4th 5th tracking 2nd users accounts Account Information dialog box 2nd 3rd 4th 5th complete trusts models 2nd creating trust relationships 2nd 3rd 4th 5th interdomain trust relationships 2nd 3rd 4th managing 2nd 3rd 4th 5th moving between Linux/NetWare 2nd 3rd searching 2nd 3rd Windows NT 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th assigning authentication Linux/NetWare complaints determining needs for network upgrades Domain Admins groups domaind creating 2nd 3rd global catalog 2nd grouping modeling directories 2nd 3rd groups creating 2nd Windows 2000 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th Linux 2nd 3rd 4th 5th 6th 7th 8th 9th Linux GUI utility managing 2nd 3rd 4th 5th 6th 7th 8th 9th names mapping 2nd pass-through authentication profiles 2nd surveying 2nd 3rd time limiting 2nd training 2nd Unix 2nd 3rd 4th 5th 6th 7th 8th 9th /etc/groups file 2nd /etc/passwd/ file 2nd 3rd 4th 5th administration 2nd modifying accounts 2nd 3rd 4th shadow password file 2nd upgrades notifying 2nd Windows NT adding to groups 2nd assigning group memberships 2nd built-in user groups 2nd 3rd creating groups 2nd 3rd groups 2nd managing accounts 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th workstations limiting 2nd using vertical-market software USNs (update sequence numbers) utilites AUDITCON 2nd 3rd 4th 5th 6th syslog linux/Unix 2nd 3rd 4th 5th 6th 7th utilities Administration Tools installing 2nd ADMT Event Viewer 2nd File Migration finger 2nd 3rd 4th 5th iPrint (NetWare) 2nd Linux GUI managing users 2nd 3rd 4th 5th 6th 7th 8th 9th MMC (Microsoft Management Console) Action menu 2nd computer management 2nd 3rd 4th 5th 6th properties 2nd 3rd 4th 5th User Manager 2nd 3rd nslookup 2nd NWADMN32 2nd 3rd PCONSOLE Bindery R-utilities authorization 2nd 3rd rcp 2nd 3rd rlogin 2nd 3rd 4th 5th 6th 7th 8th rsh 2nd 3rd 4th ruptime command 2nd rwho command 2nd Secure Shell (SSH) 2nd SYSCON 2nd 3rd 4th 5th 6th syslog Tripwire 2nd 3rd UNIX 2nd 3rd 4th 5th BOOTP 2nd 3rd 4th 5th 6th DHCP 2nd 3rd 4th 5th 6th FTP 2nd 3rd 4th TCP/IP 2nd 3rd telnet 2nd Telnetxxx 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th User Manager 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th Windows 2003 Server Application Compatibility Toolkit 2nd |