Search results
From ArticleWorld
For query "Administrators"
For more information about searching ArticleWorld, see Searching ArticleWorld.
Showing below 25 results starting with #1.
View (previous 50) (next 50) (20 | 50 | 100 | 250 | 500).
No page title matches
Page text matches
- Forum moderator (1814 bytes)
5: ...y and purpose of the board. Owners appoint forum administrators and it is to these officers that moderators are a... - Web server (2197 bytes)
7: ...nt. These are features required by webmasters and administrators in order to correctly secure and control the deli... - Proxy server (2112 bytes)
5: Proxy servers are often used by network administrators to enforce network policies or to provide various... - MySpace (2241 bytes)
11: ... new members are registering continuously, so the administrators find themselves forced to undergo several mainten... - School discipline (1889 bytes)
5: ..., school discipline was doled out physically. The administrators of the discipline would often cause the student i...
12: ...nd thus lose control. In addition, there are some administrators who use their position of power as a form of disc... - ClosedBSD (1227 bytes)
7: ... This makes it a popular choice for small network administrators and users with home networks, as they don't have ... - OpenSolaris (2587 bytes)
1: ...o build a complete community of Solaris OS users, administrators and developers. At the time of writing, the proje...
7: ...ace was (and still is) a tool used by many system administrators, allowing them to trace a broad range of vital in... - Linux Standard Base (2259 bytes)
37: administrators to maintain networks with several - Rooter (2025 bytes)
15: ...ed the password, a rooting attack is exactly what administrators would try to do in order to repair the system. - Login spoofing (1524 bytes)
5: ...eb as an environment. this happens because system administrators usually enforce certain rules and instruct their ... - Password cracking (3102 bytes)
1: ...ing is not necessarily a malicious action. System administrators often do this operation themselves, either to che... - Password psychology (1403 bytes)
1: ...rs remember and choose passwords, allowing system administrators to improve the safety of the passwords. - Web hosting (2025 bytes)
9: ...tools to simplify the tasks of website owners and administrators. Web-based interface for managing the website's d... - Dedicated hosting (2042 bytes)
8: ... it is not uncommon for a company to allow system administrators of another company highly privileged access on de... - Post office (2708 bytes)
8: ...ion through the many Post.Office features. System administrators can make changes from anywhere on the Internet us... - How to enable Apache's suexec support on Mac OS X 10.4 and newer (3543 bytes)
1: ... feature of Apache. However, although many system administrators enjoy its power and successfully use it, the Apac... - How to teach your children how to program using LOGO (2683 bytes)
1: ...net, some programmers have children. So do system administrators and engineers, and, actually, the majority of tho... - How to allow limited Windows accounts to burn CDs (1386 bytes)
12: ... Format and eject removable media. Assign this to Administrators and Interactive Users. - How to disable Windows Messenger on Windows XP (1470 bytes)
1: ... prone to security problems. In time, many system administrators and home users decided to ignore its services and... - How to learn more about an operating system (1521 bytes)
1: ...tems are a fascinating piece of software. Will-be administrators often indulge in countless hours of just explorin... - How to set up a computer for the school lab (2289 bytes)
15: 4. Cover all the "holes", or, like administrators like to say, destroy all self-destruct buttons. D... - Database system (2595 bytes)
22: * Database administrators (DBAs): The DBA is responsible for the maintenanc... - Active database (3059 bytes)
6: ...ner. The active database provides a mechanism for administrators to describe the reactive behavior (also known as ... - Database catalog (2158 bytes)
6: ...an be queried and updated by DBMS software or DBA administrators. This querying is done using the query language o... - Footprinting (3039 bytes)
9: Network administrators can block ICMP ECHO requests from external source...
28: #Administrators should use strong passwords to protect and safegu...
View (previous 50) (next 50) (20 | 50 | 100 | 250 | 500).