Search results

From Free Knowledge Base- The DUCK Project: information for everyone
Jump to: navigation, search
  • ... network in a secure way. SSH provides a secure channel over an unsecured network by using a client–server architecture, connecting an SSH client applicati ...ntended to provide confidentiality and integrity of data over an unsecured network such as the Internet. While Telnet was once widely used by administrators
    3 KB (513 words) - 20:38, 29 April 2022
  • HFNETCHK Network Security Hotfix Checker NET Manage network resources
    9 KB (1,313 words) - 13:58, 12 February 2015
  • :/etc/sysconfig/network-scripts/ifcfg-eth0 | /etc/sysconfig/network-scripts/dwifup ||     || route add 192.168.12.0 gw 192.168.12.25
    19 KB (2,591 words) - 11:56, 27 February 2014
  • <big>Automatic local network configuration and discovery</big> ...f microsofts plan to get people that have know idea what they are doing to network their pc's.
    2 KB (350 words) - 12:45, 24 November 2010
  • # Under Protocols, check HTTP ===Allowing Network Access with Blank Passwords with Vista===
    18 KB (2,886 words) - 10:24, 9 August 2007
  • ...fe]." Some erroneously label it a hacker's tool, while many consider it a network engineer's right hand. ...ads and writes data across network connections, using TCP or UDP transport protocols."
    5 KB (841 words) - 12:50, 24 November 2010
  • ...g the state of the device. SNMP can be used to both read and write to the network device, such as reading the configuration and then modifying the configurat ... (see the six listed below) based on the version of SNMP being used. Many network elements support only SNMPv1 and SNMPv2c. Support for SNMPv3 is minimal.
    13 KB (2,030 words) - 12:50, 24 November 2010
  • ...int always seeks to connect at 11Mbps and then switches to 5.5, 2 or 1, as network traffic demands, for increased signal range - up to 500 meters, for broad r ...tween 2.4 to 2.5 GHz (gigahertz). This technology provides a high capacity network using multiple points within large or small environments.
    122 KB (19,583 words) - 10:30, 3 October 2014
  • ... (private conversations) on a server (or series of servers in a hub & leaf network configuration for latency). ...connect to and chat on IRC. The IRC client connects to a server on an IRC network. The client provides an interface for you to identify other IRC users and
    5 KB (786 words) - 11:50, 27 November 2023
  • ...]] to initiate a DCC session. The CTCP is sent from one user, over the IRC network, to another user. ...he IRC network (the parties involved do not need to be connected to an IRC network in order to DCC).
    17 KB (2,748 words) - 11:39, 27 November 2023
  • Blob URLs are pseudo protocols that assign temporary URLs to media files. This process is crucial because Open the Network tab in the dev tools.
    4 KB (821 words) - 09:26, 21 October 2021
  • == View Network Adapter Data including IP/MAC Address/Etc == ...address for all network cards in each computer, either locally or across a network.
    9 KB (1,487 words) - 15:07, 17 January 2019
  • ...677 and Cisco 678 allow you to choose transmission protocols to match your network configuration by changing the router's configuration file. Use TFTP to tran
    1,011 B (156 words) - 13:18, 25 March 2020
  • ...peting technology with [[CDMA Phones]]. GSM is one of many [[Mobile Phone Network Tech]]nologies.
    532 B (80 words) - 19:50, 28 January 2014
  • ...ity Layer) is a framework for authentication and data security in Internet protocols. To use the SASL specification, a protocol includes a command for identify ... your subnet and SASL is not necessary. If you have users outside of your network that connect from a variety of networks, some users having dynamic IP addre
    3 KB (519 words) - 12:16, 7 February 2014
  • Network Engineer Preliminary Question Assistant 1. Experience with routing protocols (IGRP, EIGRP, BGP) and routed protocols (TCP/IP)
    2 KB (281 words) - 22:26, 10 February 2014
  • ...nd CIFS "common internet file system" are protocols. Samba implements CIFS network protocol. This is what allows Samba to communicate with (newer) MS Windows
    2 KB (395 words) - 09:59, 27 February 2014
  • Samba was developed by a team by using "network analysis" or "protocol analysis" to create file and print services to Micro Today Samba implements the CIFS network protocol to work with changes Microsoft has made in their Windows networkin
    21 KB (3,390 words) - 01:27, 14 June 2021
  • ...nt article explaining Microsoft Windows networking and Samba going back to protocols and terminology I worked with in the 1990s. Again, absolutely brilliant. ... called protocols. TCP/IP, NetBEUI, IPX, SNA and Appletalk are examples of protocols.
    16 KB (2,685 words) - 14:56, 10 April 2020
  • ...in 1973 sported a GUI, a mouse, graphic WYSIWYG technology and an Ethernet network interface. The demo was attended by Steve Jobs (Apple) and Bill Gates, amon ...tion in an insecure central registry that was also system-based. Therefore network-based user accounts could only be implemented with complex and cumbersome w
    44 KB (7,450 words) - 19:18, 5 July 2014

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)