MultiBase and Cosmos. Particularities about the database engine installation on client-server architecture. BASE 100, S.A.
|
|
- Candice Floyd
- 5 years ago
- Views:
Transcription
1 Particularities about the database engine installation on client-server architecture BASE 100, S.A.
2 Index 1. CLIENT-SERVER INSTALLATION SERVER SIDE COMPUTER Linux or Unix Windows CLIENT SIDE COMPUTER ANNEX I. THE INETD PROCESS TO INVOKE THE DATABASE ENGINE IN SOME LINUX VERSIONS VARIATIONS TO THIS CONFIGURATION ANNEX II. PROFILE OF THE STARTING SERVICE USER ANNEX III. ACTIVATION OF SECURITY POLICIES DOMAIN SERVERS Policies for domain servers SERVERS WITHOUT DOMAIN Policies for servers without domain ANNEX IV. ACTIVATION OF THE CTSQL SERVICE IN WINDOWS SERVERS CTSQLMONITOR Copyright BASE 100, S.A. All rights reserved. All products mentioned in this document are trademark or registered trademark of their respective owners. [NT_client-server_v3_en.doc] Pág. 2
3 1. Client-server installation When installing your License in client-server mode you should take into account the peculiarities discussed bellow. IMPORTANT: If you are using a firewall, you must open the port defined in the "services" file for the clientserver connection. Note that some antivirus software installs a firewall software. 1.1 Server side computer Linux or Unix The services file ( /etc/services ) must be modified. This file is placed in the "/etc" directory. In that file you must define the name of the database engine ("CTSQL", for example), with the associated port number. In this file you must add the next line: For example: ctsql <port number>/tcp ctsql ctsql 5555/tcp ctsql The <port number> must be unique in the /etc/services file. In the "/etc" directory exists a file called "inetd.conf", where we must insert the next line: ctsql stream tcp nowait root /home/ctl/lib/ctsql ctsql system NET On some Linux versions the file inetd.conf doesn t exists. The way to invoke the database engine in such cases is described in Annex I Windows The services file must be modified. This file is placed in: windows en Windows 9x. windows\system32\drivers\etc on the other Windows versions. You must add the next line: For example: ctsql <port number>/tcp ctsql ctsql 5555/tcp The port number must be unique in the services file. Pág. 3
4 The ctsql service will be activated in Windows servers when is installed following the steps detailed bellow: The user that starts the service must be an user with administrative privileges in the local domain. The user s name length must not be longer than 8 characters (see Annex II), and the security policies described in Annex III must be active. The database users must be local users of the local server domain, and must have active the security policies described in the previous case. The service must be registered with the register.exe file, placed in the bin directory of the MultiWay installation. In order to activate the service in Windows servers, you must exec the mwlisten program (see Annex IV). NOTE: The security policies activation process is different in domain servers than servers without domain (see Annex III). 1.2 Client side computer Insert the same line shown in the previous section in the services file: windows on Windows 9x. windows\system32\drivers\etc on the other Windows versions. /etc in UNIX and Linux. The <port number> must be the same tan in the server side and must be unique. If that line is in the last line, you must insert a page break. Pág. 4
5 2. Annex I. The inetd process to invoke the database engine in some Linux versions In some cases the inetd.conf file doesn t exists. Instead there is a directory called xinetd.d, where are placed all the defined services, and where you must add the new file for the ctsql service called ctsql, with the same file permissions than the other files in the directory. For that you must follow the next steps with the root user: cd /etc cd xinetd.d vi ctsql You must add the next lines: # default: on # description: The ctsql server serves ctsql sessions service ctsql { socket_type protocol wait = stream = tcp = no instances = 100 user server server_args log_on_failure = root = $TRANSDIR/lib/ctsql = system NET += USERID port = 5555 } You must replace the $TRANSDIR string with the path where is installed the Unix/Linux Multibase license. You must replace the port number with the port shown in the services file for the ctsql service. You must restart the inetd process in order to take effect these changes: Kill 1 <inetd process number> In some OS the command can be: kill 10 (check the manual man kill ). The command restart service xinetd is also valid. In other systems (Linux systems with xinetd daemon instead of inetd daemon), you must exec the /etc/init.d/xinetd restart. Pág. 5
6 2.1 Variations to this configuration The instances parameter is optional. With this parameter you set the max number of instances of the ctsql service. In the server_args section, and only if the previous configuration doesn t works, you can try to put ctsql before the system string. If you want to activate the user identification option with the -dm parameter, you must replace the system word with the -dm word. For example: -dm NET In the server_args section, the system 3.0 string shows the installed CTL version. The 0.0 string can be replaced with the absolute path of the CTSQL environment file. NOTE: In the /tmp/startsql.log file you can see the results of the ctsql start process. Pág. 6
7 3. Annex II. Profile of the starting service user The user that starts the service must have a local user with administrative privileges. Computer Management Local users and groups Users. In Windows Vista/7 select User accounts in the Control Panel. Click with the mouse s right button on the Users folder and select New User. The next window will be shown: Pág. 7
8 From Computer Management Local Users and groups Groups : If the new user is not an Administrators group member, push the Add button. Select the computer name where we have created the new user. You must push the Location button. In the edit field you must insert the user name. Pág. 8
9 4. Annex III. Activation of security policies 4.1 Domain Servers Control Panel Administrative Tools Domain Controller Security Policy : Policies for domain servers You must add the next policies: Act as part of the operating system. Log on as batch job. Log on as service. Allow log on locally. Pág. 9
10 4.2 Servers without domain Control Panel Administrative Tools Local security policies : Pág. 10
11 4.2.1 Policies for servers without domain You must add the next policies: Act as part of the operating system. Log on as batch job. Log on as service. Pág. 11
12 5. Annex IV. Activation of the CTSQL service in Windows servers Follow the next steps to activate the ctsql service: 1. Select the option menu Run in the Windows Start menú and write: c:\multiway\mwlisten.exe install ctsql Click Ok. 2. Repeat the process with: c:\multiway\mwlisten.exe d ctsql When you click Ok the next window will be shown: Click Activar Cambiar Salir. On Windows Vista/7/Server 2003/2008, instead of execute the mwlisten command from the start-run menu, you must execute the cmd command with Run As Administrator in order to have the correct permissions to execute successfully the command. Pág. 12
13 5.1 CTSQLMonitor If the CTSQL engine version is 3.4 o higher, you must start the CTSQLMonitor program. Exec the command monitor.exe : c:\multiway\bin\monitor.exe This window will be shown: To start the CTSQLMonitor you must execute the option Start in the Options menu or click the icon. To stop the CTSQLMonitor select Stop option in the Options menú or click the icon. If the installation is in a Unix or Linux server, to start the CTSQLMonitor you must execute the next statement:./monitor start To stop the CTSQLMonitor you must execute:./monitor stop Pág. 13
TELE 301 Lecture 8: Post
Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the
More informationTCP Wrapper. Provides host-based access control to network services
1 TCP Wrapper Provides host-based access control to network services It has the following features: Logging Access Control Host Name Verification User Name Verification Spoofing Protection 2 TCP Wrapper
More informationRTC 502 and its Git adapter, Git and its prerequisite
RTC 502 and its Git adapter, Git and its prerequisite software installation and setup guide In this doc, OS is RedHat Enterprise Server 6.4. Note: Why? Because open source software installation sometimes
More informationLPR for Windows 95/98/Me/2000 TCP/IP Printing User s Guide
LPR for Windows 95/98/Me/2000 TCP/IP Printing User s Guide Rev. 02 (August, 2001) Copyright Statement Trademarks Copyright 1997 No part of this publication may be reproduced in any form or by any means
More informationMultiservice servers. Stefan D. Bruda. Winter 2018
Multiservice servers Stefan D. Bruda Winter 2018 MULTISERVICE SERVERS Why? Because it sounds like fun Because we may need it E.g., a database server might receive requests from clients, but also from other
More informationGlobus Installation Procedure
Globus Installation Procedure M. H. Eres, G. E. Pound, and S. J. Cox {eres, gep, sjc}@soton.ac.uk Southampton Regional e-science Centre School of Engineering Sciences University of Southampton Highfield,
More informationLinux Networking: network services
Linux Networking: network services David Morgan Client and server: matched pairs Client process inter-process communication Server process 1 OK as long as there s a way to talk Client process Server process
More informationChap2: Operating-System Structures
Chap2: Operating-System Structures Objectives: services OS provides to users, processes, and other systems structuring an operating system how operating systems are designed and customized and how they
More informationXinted. 1.1 Brief introduction. 1.2 Configuration of Xinetd
Xinted 1.1 Brief introduction Xinetd provides visiting control, improved log function and resource management. It is standard super guardian process of Internet in Asianux 2.0 system. Inetd is called super
More informationcron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004
cron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004 615-0006-01 2004 Net Integration Technologies Inc. All company and product names are registered trademarks off their respective
More informationRed Hat Ceph Storage 3
Red Hat Ceph Storage 3 Monitoring Ceph for Red Hat Enterprise Linux with Nagios Monitoring Ceph for Red Hat Enterprise Linux with Nagios Core. Last Updated: 2018-06-21 Red Hat Ceph Storage 3 Monitoring
More informationGlobal Array Manager
NEC Express Server Express5800 series NEC Express5800/100,ft Series Global Array Manager Ver. 5.00 Installation Manual [Linux Server Edition] Trademarks Microsoft, Windows and Windows NT are registered
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2016 Lecture 5 Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 User Operating System Interface - CLI CLI
More information14. Configuring Telnet in Knoppix
14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix
More informationStormTracker EMS 2.3 Installation Instructions. Contents. Document Number EMS-A2-GN10-00 July 2002
StormTracker EMS 2.3 Installation Instructions Document Number EMS-A2-GN10-00 July 2002 Contents Overview... 2 Basic StormTracker EMS Functionality... 2 Oware and StormTracker EMS... 2 Supported Systems...
More informationUsing Symantec NetBackup 6.5 with Symantec Security Information Manager 4.7
Using Symantec NetBackup 6.5 with Symantec Security Information Manager 4.7 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2010 Symantec Corporation. All rights
More informationUNIX Spawner Program. Starting the UNIX Spawner Program CHAPTER 36
479 CHAPTER 36 UNIX Spawner Program Starting the UNIX Spawner Program 479 Examples of Starting and Connecting to the UNIX Spawner Program 482 Ending the UNIX Spawner Program 483 Starting the UNIX Spawner
More informationBatch Watermark Creator Software
PhotoX Batch Watermark Creator Software PhotoX helps you to add watermark stamp to your photos in a batch. The watermark can be generated from text or from an image. PhotoX also provides other tools likes
More informationCS420: Operating Systems. OS Services & System Calls
OS Services & System Calls James Moscola Department of Engineering & Computer Science York College of Pennsylvania Based on Operating System Concepts, 9th Edition by Silberschatz, Galvin, Gagne Operating
More informationChapter 2: Operating-System Structures. Operating System Concepts 9 th Edit9on
Chapter 2: Operating-System Structures Operating System Concepts 9 th Edit9on Silberschatz, Galvin and Gagne 2013 Objectives To describe the services an operating system provides to users, processes, and
More informationTEMPO INSTALLATION I O A. Platform Independent Notes 1. Installing Tempo 3. Installing Tools for the Plugins 5. v0.2.
TEMPO INSTALLATION v0.2.2 (BETA) 2/7/2008 Platform Independent Notes 1 On Windows: 2 On Linux: 2 On OS X (Tiger 10.4.7 and later) 2 I O A Installing Tempo 3 Installing on Windows (Vista/XP/W2K) 3 Installing
More informationSTA 303 / 1002 Using SAS on CQUEST
STA 303 / 1002 Using SAS on CQUEST A review of the nuts and bolts A.L. Gibbs January 2012 Some Basics of CQUEST If you don t already have a CQUEST account, go to www.cquest.utoronto.ca and request one.
More informationRFC RFC. Configuring FTP Server. FTP Clients
RFC slide 1 RFC slide 2 as a network manager it is important to understand some of the subtle issues within networking within the TCP/IP suite of protocols including: TCP, UDP, IP, SNMP, ICMP, SMTP, FTP,
More informationUsers Manual SX. 5. Using PRICOM in UNIX/Linux Environment
5. This chapter explains how to configure PRICOM in UNIX/Linux environment and how to print using LPD and FTP. For further information not covered in this manual, refer to the manual of workstation you
More information5. UNIX/Linux Environment
5. This chapter will explain how to print using LPD and FTP in a UNIX/Linux environment. This chapter contains examples; please refer to the manual of the workstation for specific details. Before proceeding,
More informationTcpdump. For this exercise you must again be root. Login and obtain root privileges: Note that we use three computers for this exercise.
1 For this exercise you must again be root. Login and obtain root privileges: sudo su Note that we use three computers for this exercise. C S H 2 Create an account on the server that can be used from the
More informationEnabling ARM Instrumentation for Platform LSF and Platform Process Manager for SAS. November 2006
Enabling ARM Instrumentation for Platform LSF and Platform Process Manager for SAS November 2006 Copyright Document redistribution and translation Internal redistribution Trademarks Third-party license
More informationBasic UNIX commands. HORT Lab 2 Instructor: Kranthi Varala
Basic UNIX commands HORT 59000 Lab 2 Instructor: Kranthi Varala Client/Server architecture User1 User2 User3 Server (UNIX/ Web/ Database etc..) User4 High Performance Compute (HPC) cluster User1 Compute
More informationImmotec Systems, Inc. SQL Server 2008 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationRELEASE NOTES LABEL ARCHIVE May, Table of Contents. System Requirements
RELEASE NOTES LABEL ARCHIVE 2015.01 10 May, 2016 Table of Contents System Requirements New Features & Enhancements New Device Support Fixed Defects Known Limitations Compatibility with other TEKLYNX Software
More informationLinux & Shell Programming 2014
Unit -1: Introduction to UNIX/LINUX Operating System Practical Practice Questions: Find errors (if any) otherwise write output or interpretation of following commands. (Consider default shell is bash shell.)
More informationIntegrated Mirroring SAS User s Guide for Windows Server 2008
CA97232-0006-01EN Integrated Mirroring SAS User s Guide for Windows Server 2008 1 / 8 Contents Before reading this manual...3 Product Names (page 3)...3 3.1 Updating Device Driver (page 50)...4 Updating
More informationHELIX to CCD Translator Setup Check List
1 Translator setup requirements: HELIX to CCD Translator Setup Check List 1.1 CCD must be installed and operational. If you plan to open a Helix model from CCD interactively, a CCD license is required.
More informationSystems Programming/ C and UNIX
Systems Programming/ C and UNIX Alice E. Fischer Lecture 6: Processes October 9, 2017 Alice E. FischerLecture 6: Processes Lecture 5: Processes... 1/26 October 9, 2017 1 / 26 Outline 1 Processes 2 Process
More informationOperating Systems. Copyleft 2005, Binnur Kurt
3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.
More informationOperating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing
Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out
More informationCan Delete Sharing Folder Windows 7 Access Denied
Can Delete Sharing Folder Windows 7 Access Denied File and folder permissions on Windows are pretty great when they're working for you but when the OS suddenly decides to deny access to a folder on your
More informationHow to Demonstrate Junos Pulse L3 VPN - Android
How to Demonstrate Junos Pulse L3 VPN - Android 1 Setup and Demonstration 1.1 Demonstrating Junos Pulse L3 VPN on Android 4 Setup and Demonstration How to Demonstrate Junos Pulse L3 VPN - Android - 3 Juniper
More informationChapter 2: System Structures. Operating System Concepts 9 th Edition
Chapter 2: System Structures Silberschatz, Galvin and Gagne 2013 Chapter 2: System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs
More informationImmotec Systems, Inc. SQL Server 2008 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationDiagnosing SAS Enterprise Guide 4.1 Connectivity Problems Using the SAS Integration Technologies Configuration Utility TS-790
Diagnosing SAS Enterprise Guide 4.1 Connectivity Problems Using the SAS Integration Technologies Configuration Utility TS-790 Diagnosing SAS Enterprise Guide Connectivity Problems Using the SAS Integration
More informationEventSentry Quickstart Guide
Contents I Part I About This Guide 2 Part II Overview 3 Part III Installing EventSentry 6 1 Installation with... Setup 7 2 Management Application... 8 3 Configuration... 9 4 Remote Update... 12 5 Heartbeat
More information(MCQZ-CS604 Operating Systems)
command to resume the execution of a suspended job in the foreground fg (Page 68) bg jobs kill commands in Linux is used to copy file is cp (Page 30) mv mkdir The process id returned to the child process
More informationOPERATING SYSTEMS. Božo Krstajić, PhD, University of Montenegro Podgorica.
OPERATING SYSTEMS Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu 1 The /etc/rc.d directory The system initialization files are stored in the /etc/rc.d directory. Each task or runlevel
More informationVMware Infrastructure 3 Primer Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5
Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5 VMware Infrastructure 3 Primer Revision: 20090313 Item: EN-000021-02 You can find the most up-to-date technical documentation
More informationUsers Manual SX2. 2. Register this product host name and IP address to /etc/hosts file.
5. This chapter will explain how to print using LPD and FTP in a UNIX/Linux environment. This chapter contains examples; please refer to the manual of the workstation for specific details. Before proceeding,
More informationInstallation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010
EventTracker Install Guide 8815 Centre Park Drive Publication Date: Feb 11, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install and configure
More informationProcesses are subjects.
Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path TCP wrappers Race conditions NOTE: filenames may differ between OS/distributions
More informationOPERATING SYSTEMS LINUX
OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code
More informationUser s Manual for H4S & NetPoint 2.2
User s Manual for H4S & NetPoint 2.2 2015 BIGPOND TECHNOLOGY Co., Ltd. All rights reserved. www.sunde.net.pk USER MANUAL FOR NETPOINT2.2 AND H4S 1 2015 BIGPOND TECHNOLOGY Co., Ltd. All rights reserved.
More informationInstallation and Configuration Instructions. SAS Model Manager API. Overview
Installation and Configuration Instructions SAS Model Manager 2.1 This document is intended to guide an administrator through the pre-installation steps, the installation process, and post-installation
More informationPhotoPDF User Guide. PhotoPDF. Photo to PDF Converter
PhotoPDF Photo to PDF Converter PhotoPDF is a batch-processing tool to convert photos into PDF file. PhotoPDF provides three modes of conversion: Batch Convert, Photos Merge and Thumbnail Page. PhotoPDF
More informationSUNDE. User s Manual for NetPoint2.2 & H4S USER MANUAL FOR NETPOINT2.2 AND H4S 1
SUNDE User s Manual for NetPoint2.2 & H4S USER MANUAL FOR NETPOINT2.2 AND H4S 1 2015 Huiyuan Co., Ltd. All rights reserved. www.sundenc.com THANK YOU FOR PURCHASING SUNDE NETWORK TERMINAL. PLEASE READ
More informationThis section explains the operating environment for updating the firmware.
Model No. SP 377 Series Firmware Update Guide This manual explains how to update the firmware of the following machine: Multifunctional Printer: SP 377SNwX/377SFNwX Printer: SP 377DNwX You can download
More informationFind out where you currently are in the path Change directories to be at the root of your home directory (/home/username) cd ~
CIS 105 Working with directories You have using directories in a Windows environment extensively. Often in Windows we are calling them folders. They are important in order to organize our files. It is
More informationTagprint 3.0. Single User and Network Installation Instructions
Tagprint 3.0 Single User and Network Installation Instructions System Requirements TagPrint Pro Standalone/TagPrint Pro Client PC running Microsoft Windows XP SP3, Vista SP1 or later, Windows 7 The single
More informationIntelliTrack DMS (Data Management System) v8.1 Quick Start Guide Preliminary Copy (July 2011) Copyright 2011 IntelliTrack, Inc.
Quick Start Guide Reasonable measures have been taken to ensure that the information included in this guide is complete and accurate. However, IntelliTrack reserves the right to change any specifications
More informationRemove Windows Service Manually Command Line Net Start
Remove Windows Service Manually Command Line Net Start (Redirected from How do I start/stop/create/remove/check a service) Use Speed78's NSIS Simple Service Plugin, Execute the NET command (use Exec, Execute
More informationHuman Resource Suite Instructions for Standard Installation for Citrix Users
Human Resource Suite Instructions for Standard Installation for Citrix Users COINS USA recommends that the System Administrator or staff trained in both UNIX and Citrix installation processes perform the
More informationFreeFlow Accxes version January Xerox FreeFlow Accxes Account Management Tool Customer Release Notes
FreeFlow Accxes version 14.01.12 January 2010 Xerox FreeFlow Accxes Account Management Tool Customer Release Notes 2010 Xerox Corporation. All rights reserved. Xerox and the sphere of connectivity design,
More informationeftp Application User Guide
Team A eftp User Guide 1/30 eftp Application User Guide Table of Contents Page 1. Acknowledgement 2 2. Introduction a. Welcome eftp Audience 3 b. What s in this manual 3 c. Manual Conventions 3 d. Getting
More informationCentrify for QRadar Integration Guide
Centrify for QRadar Integration Guide November 2017 Centrify Corporation Abstract This integration guide is to help our Centrify Infrastructure Services customers easily integrate Centrify events into
More informationMid Term from Feb-2005 to Nov 2012 CS604- Operating System
Mid Term from Feb-2005 to Nov 2012 CS604- Operating System Latest Solved from Mid term Papers Resource Person Hina 1-The problem with priority scheduling algorithm is. Deadlock Starvation (Page# 84) Aging
More informationChapter 2: System Structures
Chapter 2: System Structures Chapter 2: System Structures 2.1 Operating-System Services 2.2 User and Operating-System Interface 2.3 System Calls 2.4 Types of System Calls 2.5 System Programs 2.6 Operating-System
More informationEASYLABEL Net Print Server
EASYLABEL Net Print Server Introduction EASYLABEL Net Print Server (ELNPS) is an application that provides a web browser-based interface for label selection and printing. Users of web browsers on Windows
More informationViewtier Parabuild 4.3. Installation Guide
Viewtier Parabuild 4.3 Installation Guide Viewtier Parabuild 4.3: Installation Guide Copyright 2004-2016 Viewtier Systems Table of Contents Preface... vi About This Manual... vi Audience... vi Technical
More informationFieldView. Management Suite
FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote
More informationFreeFlow FreeFlow Accxes Client Tools Customer Release Notes. Version
FreeFlow FreeFlow Accxes Client Tools Customer Release Notes Version 12.07.26 Table of Contents 1 Introduction... 2 2 New in ACT Version 12.07.26... 3 2.1 Vista Support...3 2.2 IPv6 Support...3 3 Release
More informationChapter 2: Operating-System Structures
Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System
More informationRed Hat Ceph Storage 3
Red Hat Ceph Storage 3 Monitoring Ceph for Ubuntu with Nagios Monitoring Ceph for Ubuntu with Nagios Core. Last Updated: 2018-09-07 Red Hat Ceph Storage 3 Monitoring Ceph for Ubuntu with Nagios Monitoring
More informationThe UNIX Operating System. HORT Lecture 2 Instructor: Kranthi Varala
The UNIX Operating System HORT 59000 Lecture 2 Instructor: Kranthi Varala Operating Systems Image By Golftheman - Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=4558519 Operating
More informationObjectives. Chapter 2: Operating-System Structures. 2.1 Operating System Services
Objectives Chapter 2: Operating-System Structures To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system
More informationFUJITSU Software ServerView Mission Critical Option
FUJITSU Server PRIMEQUEST2000 Series FUJITSU Software ServerView Mission Critical Option User Manual Version 1.2 Copyright Fujitsu Limited 2014 All hardware and software names used are trademarks of their
More informationUser Account Manager
CHAPTER 4 Note User accounts can be accessed only when operating in Internal Directory mode. To access User tasks, log in to the system (see Logging In section on page 2-1). Then, from the Home page, click
More informationEECS Software Tools. Lab 2 Tutorial: Introduction to UNIX/Linux. Tilemachos Pechlivanoglou
EECS 2031 - Software Tools Lab 2 Tutorial: Introduction to UNIX/Linux Tilemachos Pechlivanoglou (tipech@eecs.yorku.ca) Sep 22 & 25, 2017 Material marked with will be in your exams Sep 22 & 25, 2017 Introduction
More informationRSA NetWitness Logs. Oracle Directory Server. Event Source Log Configuration Guide. Last Modified: Thursday, June 29, 2017
RSA NetWitness Logs Event Source Log Configuration Guide Oracle Directory Server Last Modified: Thursday, June 29, 2017 Event Source Product Information: Vendor: Oracle Event Source: Oracle Directory Server
More informationCSE Linux VM. For Microsoft Windows. Based on opensuse Leap 42.2
CSE Linux VM For Microsoft Windows Based on opensuse Leap 42.2 Dr. K. M. Flurchick February 2, 2017 Contents 1 Introduction 1 2 Requirements 1 3 Procedure 1 4 Usage 3 4.1 Start/Stop.................................................
More informationChapter 2. Operating-System Structures
Chapter 2 Operating-System Structures 2.1 Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System
More informationHP JetDirect Print Servers. HP JetAdmin. Setup Guide
R HP JetDirect Print Servers HP JetAdmin Setup Guide Setup Guide HP JetAdmin Copyright Hewlett-Packard Company 2000 All rights reserved. Reproduction, adaptation, or translation without prior written
More informationZBG 100 Gateway Recovery Guide Version 02 ZBG pikkerton GmbH ZBG Gateway Recovery Guide.docx Page 1/11
2015 pikkerton GmbH ZBG.docx Page 1/11 1 History DVers.: Date Modified by Changes State 01 04.06.2015 PI FG Born Release 02 13.10.2015 PI FG Update of file links Release 2015 pikkerton GmbH ZBG.docx Page
More informationRSA NetWitness Logs. Bind DNS. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017
RSA NetWitness Logs Event Source Log Configuration Guide Bind DNS Last Modified: Thursday, October 19, 2017 Event Source Product Information: Vendor: Bind Event Source: Bind DNS Logs Versions: Bind DNS:
More informationPerceptive Interact for Microsoft Dynamics AX
Perceptive Interact for Microsoft Dynamics AX Installation and Setup Guide Version 1.2 Compatible with ImageNow, version 6.7.x Written by: Product Documentation, R&D Date: September 2016 2013 Perceptive
More informationNetwork Connection Guide
EN MA1703-A Network Connection Guide Be sure to keep all user documentation handy for future reference. To obtain the latest version of this manual visit the website at the URL below. http://world.casio.com/manual/projector/
More informationCopyright FUJITSU LIMITED
******************************************************************************** ** ** ** Systemwalker Templates Installation (readme) ** ** - Event Monitor Templates ** ** - Process Monitor Templates
More informationInstallation Guide. Copyright 2011 Bitdefender
Installation Guide Copyright 2011 Bitdefender Bitdefender Total Security 2012 Installation Guide Publication date 2011.07.15 Copyright 2011 Bitdefender Legal Notice All rights reserved. No part of this
More informationLab Authentication, Authorization, and Accounting
Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices
More informationInfor ES Application Service Manager Administration Guide
Infor ES Application Service Manager Administration Guide Copyright 2016 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and contains
More informationETERNUS SF AdvancedCopy Manager V13.3 Message Guide
B1WW-8881-05ENZ0 (00) ETERNUS SF AdvancedCopy Manager V13.3 Message Guide ii Preface About This Manual This manual explains the messages output by ETERNUS SF AdvancedCopy Manager. Intended Reader This
More informationLab Working with Linux Command Line
Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed
More informationSophos Anti-Virus standalone startup guide. For Windows and Mac OS X
Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos
More informationLAB #7 Linux Tutorial
Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing
More informationDell EMC ME4 Series vsphere Client Plug-in
Dell EMC ME4 Series vsphere Client Plug-in User's Guide Regulatory Model: E09J, E10J, E11J Regulatory Type: E09J001, E10J001, E11J001 Notes, cautions, and warnings NOTE: A NOTE indicates important information
More informationBOOTP. 1. Verify that the bootpd and bootptab files are in the correct. 2. Edit the hosts file to add the printer internet addresses and names:
BOOTP Bootstrap protocol, BOOTP, is the recommended way to establish communications from the host to the printer in an internet protocol environment. BOOTP obtains booting data from the bootptab file.
More informationAltova CbC Reporting Solution. Installation Guide
Installation Guide Installation Guide All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping,
More informationTroubleshooting the Installation
APPENDIX A This appendix provides troubleshooting information for CD One installation. It contains: Checking Files and Directories After Installation Viewing and Changing Process Status Understanding Installation
More informationPlan 9 Authentication in Linux
Plan 9 Authentication in Linux Ashwin Ganti University of Illinois at Chicago aganti@cs.uic.edu ABSTRACT This paper talks about the implementation of the Plan 9 authentication mechanisms for Linux. As
More informationThinPoint Quick Installation Guide - 1 -
ThinPoint Quick Start Guide ThinPoint Quick Installation Guide - 1 - ThinPoint Quick Start Guide (Fourth Edition, April 2008) Published by: NetLeverage Pty. Ltd. Suite 17, 17 International Business Centre
More informationGNU/Linux: An Essential Guide for Students Undertaking BLOSSOM
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
More informationGridPro v6.0 INSTALLATION GUIDE
GridPro v6.0 INSTALLATION GUIDE TABLE OF CONTENTS 1. DOWNLOADING GridPro 1 2. CD CONTENTS 1 3. REQUIRED PACKAGES 1 4. SYSTEM REQUIREMENTS 2 5. INSTALLATION PROCEDURE 2 5.1 INSTALLATION PROCEDURE FOR WINDOWS
More informationBackup using Quantum vmpro with Symantec Backup Exec release 2012
Backup using Quantum vmpro with Symantec Backup Exec release 2012 Step 1) If the vmpro appliance name and IP address are not resolved through DNS, update the Windows hosts file to include the IP address
More information