Search
You can find the results of your search below.
Fulltext results:
- mail @computers:truenas
- ause the mail system would have to run as root to access the files containing the mail. If there's any bug... ll mail for root into another mailbox that we can access as an unprivileged user. The domain name (the b... AP provides, so I'll just use the POP protocol to access the mailbox. I will be using the //qpopper// service to provide simple POP mailbox access. 1. Install the software <code> jexec "ioc-${JAI
- policy @cookie
- ew friends. We need to use cookies and sign in to access these pages. ===== What Are Cookies ===== As is... ared when you log out to ensure that you can only access restricted features and areas when logged in.
- skills @skills
- eplace a retired Cobol application without losing access to the valuable data. In 2007 and after 23 years... embled and maintain a Linux server, providing VPN access for remote workers, and centralised secure storag
- famp @computers:truenas
- in remotely? **Yes** * Remove test database and access to it? **Yes** * Reload privilege tables now? *... ioc-${JAIL_NAME:?}" mysql </code> 4. Allow full access to the database for the user. <code> echo "GRANT
- gateway @computers:truenas
- low other members of my family to have restricted access some of the information stored on my home network... d to communicate with each other, and maybe allow access to the Internet via my home router. The goal loo
- dokuwiki @wiki
- an administrator's favorite. Built in [[doku>acl|access controls]] and [[doku>auth|authentication connect
- arduino @computers:arduino
- y of accessing data is called "indexed sequential access method" or [[https://en.wikipedia.org/wiki/ISAM|I
- heimdall @computers:truenas
- ilt-in, but if you often use different devices to access the Internet, you might want to see the same "sta
- truenas @computers:truenas
- n detection * Reverse Proxy - to provide public access to hosted web sites * VPN * Security cameras