68%
11.06.2014
-enabled clients, such as the Lightning Thunderbird extension, Evolution, OS X applications like Apple's iCal (Calendar since Mountain Lion), as well as iOS and Android systems.
For this to work, the Kolab team ... data available on iOS and Mac OS X and in Thunderbird and Evolution.
68%
18.07.2013
. TLS is a later version of Secure Sockets Layer (SSL), and this kind of connection is often still called an SSL connection. The box titled "Tap-Proof" shows how to set up an encrypted connection ... 15
68%
18.07.2013
requested. The important word is: you
. It sets it up as you
requested.
Many admins have learned how to configure a server by installing things manually, so automating the configuration steps can lead ... 15
68%
11.06.2014
with creating a requirements profile that maps all the relevant processes. The intent is to examine how to retrofit missing functionality or possibly add that functionality by integrating software packages
68%
10.06.2015
-encrypting devices (SEDs). However, not everyone is using encryption.
Recent revelations about accessing the data of individuals include the story about how the NSA and Britain's Government Communications
68%
05.12.2016
"
12 tapetype "EXAMPLE-TAPE"
13 define tapetype EXAMPLE-TAPE {
14 length 100 mbytes
15 filemark 4 kbytes
16 }
17 define dumptype simple-gnutar-tcp {
18 auth "bsdtcp"
19 program "GNUTAR
68%
19.02.2013
on the administrator’s own machine, which even can be a Windows or Mac OS X machine; the only important thing is that you have a Perl environment in place. To install Rex, first pick up the git
versioning tool (using
68%
30.11.2020
. Subscription customers pay EUR15 per user per year, with a sliding scale in increments of five users.
Data Control
Kopano extends the core features of the groupware platform to include modern technologies ... Kopano Groupware seeks to be more than a slot-in replacement for Microsoft Exchange. We reveal how you can commission the platform and the highlights it offers.
68%
02.04.2013
, therefore, decide in advance whether they want to work with certificates, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509
68%
18.07.2013
or administrator password unnecessary.
The problem of how to define emergency passwords still persists; every organization wants to continue managing its servers even if the usual administrator is not available ... 15