Search

You can find the results of your search below.

mail @computers:truenas
5 Hits, Last modified:
ause the mail system would have to run as root to access the files containing the mail. If there's any bug... ll mail for root into another mailbox that we can access as an unprivileged user. The domain name (the b... AP provides, so I'll just use the POP protocol to access the mailbox. I will be using the //qpopper// service to provide simple POP mailbox access. 1. Install the software <code> jexec "ioc-${JAI
policy @cookie
2 Hits, Last modified:
ew friends. We need to use cookies and sign in to access these pages. ===== What Are Cookies ===== As is... ared when you log out to ensure that you can only access restricted features and areas when logged in.
skills @skills
2 Hits, Last modified:
eplace a retired Cobol application without losing access to the valuable data. In 2007 and after 23 years... embled and maintain a Linux server, providing VPN access for remote workers, and centralised secure storag
famp @computers:truenas
2 Hits, Last modified:
in remotely? **Yes** * Remove test database and access to it? **Yes** * Reload privilege tables now? *... ioc-${JAIL_NAME:?}" mysql </code> 4. Allow full access to the database for the user. <code> echo "GRANT
gateway @computers:truenas
2 Hits, Last modified:
low other members of my family to have restricted access some of the information stored on my home network... d to communicate with each other, and maybe allow access to the Internet via my home router. The goal loo
dokuwiki @wiki
1 Hits, Last modified:
an administrator's favorite. Built in [[doku>acl|access controls]] and [[doku>auth|authentication connect
arduino @computers:arduino
1 Hits, Last modified:
y of accessing data is called "indexed sequential access method" or [[https://en.wikipedia.org/wiki/ISAM|I
heimdall @computers:truenas
1 Hits, Last modified:
ilt-in, but if you often use different devices to access the Internet, you might want to see the same "sta
truenas @computers:truenas
1 Hits, Last modified:
n detection * Reverse Proxy - to provide public access to hosted web sites * VPN * Security cameras