15%
30.01.2024
.
The LibreNMS agent for Linux [3] collects data from remote systems and uses the Checkmk software. The matching check script is included in the agent package; a Windows version is now also available [4
15%
03.04.2024
protocol; its original form had virtually no protection against misuse.
DNSSEC corrects this problem by using DANE to ensure that a remote mail server can only be considered for delivery of mail
15%
01.06.2024
, Start-DscConfiguration might initially result in an error message. If PowerShell DSC has not been used before, you might need to finalize the Windows remote management (WinRM) tool configuration and grant
15%
25.09.2023
securely between your server and any remote client that connects to it.
Figure 2: A tunneled connection provides no public access, only a tunneled connection
15%
16.05.2013
information can be found in the log file /var/log/univention/connector-s4.log. For example, if you use the Windows remote administration tools to create a user in Active Directory (Samba 4), the user
15%
16.05.2013
interfaces, as well as Posix filesystem storage. Also, the oVirt framework can connect with Red Hat Directory Server or IBM's Tivoli Directory Server and use remote databases. All-in-one operation makes
15%
18.07.2013
server that currently has capacity to spare. To make this feature available, the built-in network adapter must support the RDMA (Remote Direct Memory Access) function and be very fast. Suitable adapter
15%
09.01.2013
for configuring the SLE host and the iSCSI clients.
SUSE also has prepared its SLE kernel for the use of Intel AMT remote maintenance technology [4] (Active Management Technology). If you want to use AMT you
15%
13.02.2017
[3].
If you install the plugin on the openITCOCKPIT system according to the installation instructions, it will be available in the /opt/openitc/nagios/libexec folder. Now you can remotely monitor
15%
13.02.2017
no software. In most cases, these "essential services" are restricted to SSH, which allows logins via the remote shell. Your first task now awaits you: SSH login with an SSH key is far safer than using