Thursday, February 4, 2010

3 idiots

Humility Entrepreneurship Teamwork
1 N t t b 1. Never try to be successful , pursue excellence
 Success is the bye product & the result
 Excellence always creates Success & it is a process of continual improvement
 Never run after success
 Let it happen automatically in life



Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork
2 F d t Lif Lif i 2. Freedom to Life- Life is beautiful
 Don’t die before the actual death
 Live every moment to the fullest as if today is the last day
 Life is gifted to humankind to live
 Live & Live happily towards happiness.
Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork

3 P i l d t 3. Passion leads to Excellence
 When your hobby becomes your profession , the passion becomes your profession
 You will be able to lead up to excellence in life
 Satisfaction, Joy, Pleasure & love will be the outcome of the passion
 Following your passion for years , you will surely become somebody one day


Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork
4 L i 4. Learning is very simple-Never stop
Be humble
Teachers do fail, Learners never fail
 Learning is never complicate or difficult
 Learning is always possible whatever rule you apply


Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork
5 P 5. Pressure at head
 Current education system is developing pressure on students head
 University intelligence is useful & making some impact in the life , but it cannot be
at the cost of life.


Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork
6.Life is management of emotions & 6 e s a age e o e o o s not
optimization of intelligence
 Memory and regular study have definite value and it always helps you in leading a
life.
 You are able to survive even if you can make some mark in the path of the life.
 With artificial intelligence, you can survive & win but you cannot prove yourself
genius.
 Therefore, in this process genius dies in you.


Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork
7N it i th 7.Necessity is mother ofinvention
 Necessity creates pressure and forces you to invent something or to make it
happen or to use your potentiality.
 Aamir Khan in this film, 3 idiots, is able to prove in the film by using vacuum pump
at the last moment.
Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork
8 Si li 8.Simplicity in life
 Life is need base never want base. Desires have no ends.
 Simplicity is way of life and Indian culture highly stresses on simple living and high
thinking, and this is the way of life: ‘Legs down to earth and eyes looking beyond
the sky’



Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork
9 I d t i lL 9.IndustrialLeadership
 Dean of the institute in 3 idiots is showing very typical leadership. He has his own
principles, values and ideology, and he leads the whole institute accordingly.
 This is an example of current institutional leadership. In the present scenario, most
of the institutes are fixed in a block or Squarish thinking.


Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork
10 L i 10.Love is time & space free
 Trust your partner
 Love is not time bound and space bound.
 It is very well demonstrated in this movie same love was demonstrated by Krishna
and Meera.
 Love is border free, time free, unconditional and space free.


Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork
10 L i 10.Love is time & space free
 Trust your partner
 Love is not time bound and space bound.
 It is very well demonstrated in this movie same love was demonstrated by Krishna
and Meera.
 Love is border free, time free, unconditional and space free.


Deliver The Promise Learning Social Responsibility Respect for Individual

Humility Entrepreneurship Teamwork
11I t f d 11.Importance of words in communication
 If communication dies, everything dies.
 Each word has impact and value in communication.
 One word if used wrongly or emphasized wrongly or paused at a wrong place in
communication what effect it creates and how is it affected is demonstrated very
well in this movie.


Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork
12M di it 12.Mediocrity is penalized
 Middle class family or average talent or average institute is going to suffer and has
to pay maximum price in the life if they do not upgrade their living standards.
 To be born poor or as an average person is not a crime but to die as an average
person with middle class talent is miserable and if you are unable to optimize your
potentiality and die with unused potentiality then that is your shameful truth.
 One should not die as a mediocre. He/she has to bring out genius inside him/her
and has to use his/her potentiality to the optimum level.


Deliver The Promise Learning Social Responsibility Respect for Individual
Humility Entrepreneurship Teamwork
Seek excellence
&
Success will follow
Deliver The Promise Learning Social Responsibility Respect for Individual

3 idiots

Raman Comedy Video Punjabi

Active Directory Home



Home
Knowledge Base
Forums
Site Info
Videos & Resources
עברית
Quick Links
Knowledge Base
Active Directory
Cisco and Routing
Exchange Server
Virtualization
Windows Server 2008
Windows 7 Beta
Windows Vista
Computer Training
Videos & Resources
New Articles
Sponsored
Exchange Server Security
Email Archiving Solutions
Free Network Inventory

Most Popular Articles
Repair PST Files
Forgot the Administrator's Password?
Excel Password Recovery
How to Write ISO Files
How to Partition a Hard Drive
How to Change the Serial in Windows XP
Install Windows XP Pro
Disable UAC in Windows Vista
Install Active Directory on Windows 2003
Home Network Setup
How to Setup a VLAN on a Cisco Switch
Stay Connected
Join our newsletter
Our biweekly emails will keep you up to date on our latest news and articles straight to your inbox!
E-mail Address: Privacy Policy
Follow on Twitter
Subscribe via Rss
Author is a Microsoft Windows Server System - Exchange Server MVP
Configure Active Directory Connector Connection Agreements
by Daniel Petri - January 7, 2009
How do I configure Active Directory Connector Connection Agreements (CA)?
Daniel Petri's Exchange Server Recommendations
There are several new features included within Exchange Server 2007, which some of my articles touch on briefly. However, if you are looking for training that takes you from installation to integration with Outlook and management of Exchange Server 2007 then you need Train Signal's training videos. The Exchange Server 2007 training videos are taught by Microsoft MVP and MCSE, David Shackelford, who teaches with a "Hands-on" approach. Daniel Petri
You can see the Exchange Server 2007 training with video instruction here.
MSKB 296260 has the following information:
In most ADC deployments, your configuration falls under one of the following scenarios; before you configure Connection Agreements (CA), determine which scenario applies to your situation:
· First scenario. The Exchange Server 5.5 mailboxes are associated with accounts in a Windows 2000 Active Directory domain.
· Second scenario. The Exchange Server 5.5 mailboxes are associated with accounts that are located in a Windows NT 4.0 domain, even though a new Windows 2000 Active Directory domain has been created.
In both scenarios, you need to install the ADC. To install the ADC follow this article: Active Directory Connector Installation
First Scenario
To configure the two-way user Connection Agreement:
1. On the Start menu, point to Programs, point to Administrative Tools, and then click Active Directory Connector Management.
2. Right-click Active Directory Connector, point to New, and then click Connection Agreement.
3. Click the General tab, and then:
a. Type the name of the Connection Agreement in the Name box.
b. Under Replication Direction, click Two-way.
c. When you receive the following message, click OK:
The connection agreement must now write to the Exchange directory.
d. Click the Active Directory Connector server that you want to use.
Note: If this is the first installation, there is only be one server available.
4. Click the Connections tab, and then:
a. Under Windows Server Information:
I. Make sure that:
§ The Server box contains the name of your Windows 2000-based server.
§ The Authentication box defaults to "Windows Challenge/Response".
§ The account that you are using has write permissions to the directory because the agreement is a two-way agreement, and read and write permissions are necessary.
II. Under Connect as, click Modify, and then select an Administrative account that has write permissions to Active Directory.
b. Under Exchange Server Information:
I. Make sure that:
§ The Server box contains the name of your Exchange Server 5.5 computer.
§ The Authentication box defaults to "Windows Challenge/Response".
§ The account that you are using has at least Admin permissions to the directory because the agreement is a two-way agreement, and read and write permissions are necessary.
§ The Lightweight Directory Access Protocol (LDAP) port on the Exchange Server 5.5 directory is correct (by default, this port is 389).
II. In the Connect as list, click Modify, and then select an account that has Admin privileges in the Exchange Server 5.5 directory.
5. Click the Schedule tab, and then set the Replication time to Always.
Note: The ADC automatically replicates all of the objects during the first replication cycle; therefore, if you select the Replicate the entire directory the next time the agreement is run check box, you do not affect the first replication cycle.
6. Click the From Exchange tab, and then:
a. Under Exchange Recipients containers, click Add, and then add each top-level Recipients container from your Exchange Server 5.5 site.
Important: Do not add any containers from other sites. If you use multiple sites, you need to set up additional two-way connection agreements to servers in each of the other sites.
b. Under Default destination, click Modify, and then click the Users container.
Note: This is the default container in which the ADC will create new objects if the ADC cannot match the Exchange Server 5.5 object to an existing Active Directory object. If user accounts exist in different organizational units, see the IMPORTANT note in step 6.c.
c. Make sure that all of the objects under Select the objects that you want to replicate are selected (all of the objects are selected by default).
Important: The ADC replicates all of the Exchange Server distribution lists (DLs) to Active Directory as Universal Distribution Groups (UDGs). You can create these UDGs in either a mixed-mode or native-mode Active Directory domain. However, if you use the equivalent Exchange Server DL object to control access to public folders in Exchange Server, the Exchange 2000 information store process tries to convert the UDG to a Universal Security Groups (USG) because distribution groups are not security principals. If the UDG exists in a mixed-mode Active Directory domain, the USG conversion process does not succeed because USGs can only exist in native-mode domains. This results in a public folder in Exchange 2000 that has an ambiguous Access Control List (ACL); because of this, only the folder owner can access the folder's content, and other Exchange 2000 users cannot even see the public folder in the client hierarchy. When a UDG-to-USG conversion does not succeed, a 9552 event ID message is logged in the Exchange 2000 Application event log. In this scenario, you need a separate Recipient Connection Agreement to replicate the DLs to a native-mode domain.
d. Click the From Windows tab, and then:
I. Under Windows Organizational Units, click Add, and then add the Users container.
Important: If the Active Directory domain contains additional organizational units that contain users with Exchange mailboxes, you must specify these organizational units under Windows Organizational Units. If you do not specify the organizational units as export containers, the ADC cannot replicate the users back to the Exchange Server 5.5 directory.
II. Under Default destination box, click Modify, and then click the appropriate Recipients container.
III. Make sure that all of the objects under Select the objects that you want to replicate box are selected (all of the objects are selected by default).
IV. Click to select the Replicate secured Active Directory objects to the Exchange directory check box. Secured Active Directory objects are Active Directory objects that contain an explicit Deny Access Control Entry (ACE).
V. Determine whether or not you want to select the Create objects in location specified by Exchange 5.5 DN check box. If you select this check box, the ADC creates new objects in a location that is based on the Exchange Server 5.5 distinguished name (legacyExchangeDN). If the organizational units that you selected as export containers contain subcontainers, you can select this check box to prevent the ADC from creating these subcontainers in the Exchange Server 5.5 directory.
e. Click the Deletions tab.
f. You are now finished configuring the recipient Connection Agreement. To force replication, right-click the two-way agreement, and then click Replicate Now.
Second Scenario
This scenario describes how to create a two-way recipient Connection Agreement between an Exchange Server 5.5 computer that is running in a separate Windows NT 4.0 domain and a new Windows 2000 Active Directory domain. This scenario requires at least a one-way trust relationship in which Windows 2000 Active Directory trusts the Windows NT 4.0 domain. However, to ease administrative effort, a two-way trust relationship is recommended.
Important: if your migration strategy is to have users log on to your newly-created Active Directory, then you can run the ADMT before you create your two-way recipient Connection Agreement. If you run a domain migration tool that migrates SidHistory such as ADMT before you create your two-way recipient Connection Agreement, you do not have to run the ADClean Utility. ADMT settings allow the Administrator to create enabled users with which a valid 5.5 mailbox can match.
To create a two-way recipient Connection Agreement between an Exchange Server 5.5 computer that is running in a separate Windows NT 4.0 domain and a new Windows 2000 Active Directory domain:
1. Perform all of the steps in the "First Scenario" section of this article.
2. Start the Windows 2000 Active Directory Users and Computers snap-in, and then confirm that Exchange Server 5.5 users have been replicated as disabled users. Note that these objects are located in the default import container that is specified on the From Exchange tab of the Recipient Connection Agreement.
Important: Do not enable these disabled users. These accounts are only place holders for the Exchange Server 5.5 mailboxes; these accounts are not security principals, and are not meant to be logged on to.
3. Determine which one of the following methods you want to use to migrate your user accounts to Windows 2000 Active Directory:
· Upgrade the Windows NT 4.0 domain to Windows 2000.
· Use the Active Directory Migration Tool (ADMT) to migrate users, including SidHistory.
· Use a third-party migration utility that supports SidHistory migration.
4. After you migrate the users to Windows 2000 Active Directory, you can run the Active Directory Cleanup Wizard (ADClean) to merge the mail attributes from the ADC-created place holder accounts with your newly migrated users.
Links
XGEN: How to Configure a Two-Way Recipient Connection Agreement for Exchange Server 5.5 Users - 296260
XADM: ADC Installation Requirements - 253286
XADM: Description of the Active Directory Connector Deletion Mechanism - 253829
XADM: How Active Directory Connector Replicates Subcontainers - 253826
How to Set Up ADMT for Windows NT 4.0 to Windows 2000 Migration - 260871
XADM: Possible Uses of Active Directory Account Cleanup Wizard - 270652
Share this article:
digg_bgcolor = '#fff';
digg_skin = 'compact';
digg_window = 'new';

Delicious Twitter Reddit E-mail
Related Whitepapers and Reading
802.11n Planning and Network Management
Scalability in Log Management
Limelight Networks CDN Network Overview
Related Articles
Active Directory Connector Requirements
Active Directory Connector Installation
How do I install and configure a new Windows 2000 DNS server within an existing DNS environment where Active Directory is not enabled?
How can I configure DNS forwarding for Internet connection?
Monitoring Exchange 2007 Service Level Agreements
Active Directory Search Limit
Active Directory Sizer Tool
Finding Delegates in Active Directory
Sign Up For the Petri IT Knowledgebase Weekly Digest!E-mail Address:
Search Site Sponsored by TechNet Plus Direct
Sponsors
GFI Mail Essentials Get the #1 Anti spam filtering solution for YOUR business at unbeatable pricing. Download a free trial of GFI MailEssentials today!
Exchange 2007 Training Learn to Install, Configure, and Manage Exchange Server 2007. Practice Tests for Exchange Exams Included!
Free Compliance Download Configuresoft provides real time compliance checking for multiple VMware ESX host servers at once.
Terms of Use Privacy Policy Contact Advertise ©2009 Blue Whale Web Inc.
try {
var pageTracker = _gat._getTracker("UA-3414659-1");
pageTracker._setDomainName("none");
pageTracker._setAllowLinker(true);
pageTracker._trackPageview();
}
catch(err){}

SSL Certificates Error

SSL Certificates

Securing Your Online Business
Entrust Certificate Services Customer Service
Get Technical
Entrust EV SSL Certificates FAQ
This section provides the answers to the most commonly asked questions about the Entrust EV SSL Certificates issued by Entrust. If you have a question that is not answered here or in the enrollment guide, please contact Entrust support.
What is 'Extended Validation'?
What is an Extended Validation (EV) SSL Certificate?
What is the CA/Browser Forum?
Which browsers will support Entrust EV SSL Certificates?
How will Entrust EV SSL Certificates increase consumer confidence?
What can I do to secure my site and increase consumer confidence today?
Who can purchase an Entrust EV SSL Certificate?
How can I buy an Entrust EV SSL Certificate?
Can I upgrade my existing Entrust SSL Certificates to the new Entrust EV SSL Certificates?
What is the maximum lifetime for an Entrust EV SSL Certificate?
How will Entrust EV SSL Certificates be different from the current Entrust SSL Certificates?
Are my existing Entrust SSL Certificates still sufficient for securing online transactions?
Should I switch to Entrust EV SSL Certificates?
How will older browsers without EV support behave on sites with Entrust EV SSL Certificates?
How will browsers respond when they visit a website with an invalid certificate or phishing site?
I operate my own CA based on Entrust software, can I issue EV certificates myself?
I'm a website operator. How will Entrust EV SSL Certificates affect me?
"Couldn't browsers just turn the address bar green with the current Entrust SSL certificates?"
Can I get an Entrust EV SSL wildcard certificate?
Entrust EV SSL Certificate Revocation Information & Reporting Policy
What is 'Extended Validation'? (top)
'Extended Validation' refers to rigorous, industry standard validation methods to be used by a CA before issuing an SSL certificates.
The guidelines for Extended Validation are published by the CA/Browser Forum here.
What is an Extended Validation (EV) SSL Certificate? (top)
An Extended Validation (EV) SSL Server Certificate is a new category of SSL certificate created by an industry consortium called the CA/Browser forum. This new category of certificate was conceived in response to the growing threat of phishing attacks with a goal of increasing consumer confidence in online transactions.
EV certificates will be issued to websites only after rigorous validation of their identity. Web browsers will reflect this higher level of identity assurance with prominent and distinct trust indicators, such as the green address bar in Internet Explorer and Mozilla Firefox, and advanced green indicators in the latest versions of Opera and Google Chrome.
What is the CA/Browser Forum? (top)
The CA/Browser Forum is a group of Certification Authority service providers, web browser manufacturers, and other industry participants that came together to look at ways to reduce the threat of phishing.
Entrust chairs this group and strongly supports its work. More information can be found at the CA/Browser Forum website.
Which browsers support Entrust EV SSL Certificates? (top)
The majority of browsers in use today display green trust indicators for EV. Some of the major browsers supporting EV are Internet Explorer (version 7 and above), Mozilla Firefox version 3, Opera version 8, Safari version 3.2, Google Chrome and Flock version 2.
How will Entrust EV SSL Certificates increase consumer confidence? (top)
With numerous malicious phishing incidents and online fraud, consumers are concerned with identity theft and would like reassurance that the site they are entering their personal data into can be trusted. If consumers feel the site is not trusted and their personal information is unencrypted, they will leave the site and take their transactions to another vendor.
Entrust EV SSL Certificates will help increase consumer confidence by displaying prominent and consistent trust indicators while consumers are conducting online transactions. Now the lock is now at the top of the browser window instead of the bottom and if a website has an Entrust EV SSL Certificate installed, the address bar color will display green and will display the identity of the site and the name of the certificate authority to let the consumer know they can shop with confidence.
What can I do to secure my site and increase consumer confidence today? (top)
Current website security best practices are still valid - Extended Validation does not change that. Some things to consider while you're waiting for EV SSL certificates to be available:
Are you displaying your Entrust site seal on protected pages?
How are you authenticating your users?
How are you monitoring for fraud?
What access control mechanisms do you have in place?
Who can purchase an Entrust EV SSL Certificate? (top)
A broad range of business entities are now eligible for EV certificates:
Private Organization: A non-governmental legal entity (whether ownership interests are privately held or publicly traded) whose existence was created by a filing with (or an act of) the Incorporating Agency in its Jurisdiction of Incorporation.
Government Entity: A government-operated legal entity, agency, department, ministry, or similar element of the government of a country, or political subdivision within such country (such as a state, province, city, county, etc).
Business Entity: Any entity that is neither a Private Organization nor a Government Entity. Examples include general partnerships, unincorporated associations and sole proprietorships.
How can I buy an Entrust EV SSL Certificate? (top)
Entrust EV SSL Certificates will be available first for purchase through Entrust Certificate Services website at www.entrust.net, and at a later date through our Enhanced interface for customers managing larger pools of certificates.
Can I upgrade my existing Entrust SSL Certificates to the new Entrust EV SSL Certificates? (top)
Yes.
Please note that customers taking advantage of these promotions will need to be validated under the new EV guidelines before certs can be issued.
What is the maximum lifetime for an Entrust EV SSL Certificate? (top)
Entrust EV SSL Certificates have a maximum of lifetime of 2 years (24 months).
How will Entrust EV SSL Certificates be different from the current Entrust SSL Certificates? (top)
The primary difference will be in what happens before the Entrust EV SSL Certificates are even issued. Before issuing any Entrust SSL Certificate, Entrust performs checks to 'vet' or validate the identity of the requestor.
Under the new EV model, validation of an entity (e.g. a company or web site operator) requesting an Entrust EV SSL Certificate will be performed using industry standard guidelines, as defined by the CA/Browser Forum. This is different from current practices in that different Certification Authorities have very different validation standards. Although the majority of Certification Authorities have rigorous validation practices, not all do and this undermines the overall security of SSL for consumer transactions.
Certificates issued using 'Extended Validation' will include a reference to an EV-specific certificate policy. Each Certification Authority will have a unique policy and Policy Object Identifier (OID). Browsers supporting EV will behave differently when they encounter a certificate issued under an EV policy OID that they recognize.
Note that at a technical level, Entrust EV SSL Certificates will not be different from standard X.509 certificates and will be backwards compatible with older browsers. Entrust EV SSL Certificates will include more information on the subject (the entity the certificate was issued to) - including jurisdiction of incorporation.
Are my existing Entrust SSL Certificates still sufficient for securing online transactions? (top)
From a cryptographic perspective, yes your current Entrust SSL Certificates are still going to result in encrypted SSL sessions.
However, the greatest threat to online transactions is not cryptographic in nature - it is phishing. Phishing preys on consumer's inability to discern between trustworthy sites and imposter sites.
The EV initiative is targeted at making it easier for consumers to make that distinction. From a usability perspective, non-EV certificates will have decreasing effectiveness as consumers adopt the new browsers and come to expect the strong trust indicators provided by Entrust EV SSL Certificates while conducting transactions.
Should I switch to Entrust EV SSL Certificates? (top)
If you are operating a website that conducts ecommerce transactions or if you collect sensitive or private information you should be considering switching to Entrust EV SSL Certificates.
Phishing attacks are a real threat to the trust consumers have placed on the internet and Entrust EV SSL Certificates can only be part of the solution if they are deployed and used widely.
How will older browsers without EV support behave on sites with Entrust EV SSL Certificates? (top)
Browsers without EV support will continue to behave as they do today. As long as the certificate was issued by a CA trusted by the browser, the lock will close as expected.
In most cases, website support for both older browsers and newer EV browsers will require the installation of a cross-certificate on the web server which was issued by a root CA already embedded in older browsers. The cross-certificate will certify a newer EV specific issuing CA as trusted, and the actual web server site certificate will be issued from that issuing CA.
How will browsers respond when they visit a website with an invalid certificate or phishing site? (top)
The response may vary depending on the type of browser but, in general, a red address bar could indicate that you that you have accessed a known phishing site.
Red alert blocks immediate access to reported phishing sites, although users can proceed to the site if they wish.
A red address bar could also indicate that there may be a problem with the certificate or that it may not be issued from a trusted Certificate Authority.
Internet Explorer includes prominent warnings to users and will recommend users not visit the page.
If the user ignores the warnings and continues the address bar goes red and red warning 'security badges' appear.
I operate my own CA based on Entrust software, can I issue EV certificates myself? (top)
Yes, if you own an Entrust-rooted CA, you will be able to issue Entrust EV SSL Certificates once your CA is recognized by the EV-ready browsers. This will either entail cross-certification with a CA already in the EV root embedding programs of the major browsers or that you submit your own root into those programs.
In both cases you will need to undergo an audit under the CA/Browser Forum guidelines.
I'm a website operator. How will Entrust EV SSL Certificates affect me? (top)
For website operators some changes to consider include more details about the subscriber will be placed into the certificate including:
Domain name
Organization name
Jurisdiction of Incorporation
City or town
State or province (if any)
Country - mandatory
Some CSR generating tools may not allow you to add this information to your certificates. However, Entrust will be able to add this information to your Entrust EV SSL Certificates once your certificate order has been placed.
Please note that EV standards do not permit the use of wildcard certificates which can impact the number of certificates you may be required to purchase.
"Couldn't browsers just turn the address bar green with the current Entrust SSL certificates?" (top)
While it would be possible to enable more prominent security features in browsers based on current SSL certificates, the problem is with the inconsistent level of validation behind current certificates.
Some CA's today perform much less rigorous validation checks on companies requesting SSL certificates which introduce the risk that a phishing site could acquire a valid SSL certificate.
With that risk in mind, the CA/Browser Forum set out to establish a consistent, common set of validation guidelines which participating CA's could follow, and which browser manufacturers could rely on before turning on more prominent security features such as the green address bar.
Can I get an Entrust EV SSL wildcard certificate? (top)
No, the EV SSL guidelines do not permit wildcard certificates. In some cases the use of subjectAltName extensions can provide the same benefits as a wildcard certificate and this is permitted within the EV guidelines.
Entrust EV SSL Certificate Revocation Information & Reporting Policy (top)
Under what conditions will my Entrust EV SSL Certificate be revoked?
Entrust MUST revoke an Entrust EV SSL Certificate it has issued upon the occurrence of any of the following events:
The Subscriber requests revocation of its Entrust EV SSL Certificate.
The Subscriber indicates that the original Entrust EV SSL Certificate Request was not authorized and does not retroactively grant authorization.
Entrust obtains reasonable evidence that the Subscriber's Private Key (corresponding to the Public Key in the Entrust EV SSL Certificate) has been compromised, or that the Entrust EV SSL Certificate has otherwise been misused.
Entrust receives notice or otherwise become aware that a Subscriber violates any of its material obligations under the Subscriber Agreement.
Entrust receives notice or otherwise become aware that a court or arbitrator has revoked a Subscriber's right to use the domain name listed in the Entrust EV SSL Certificate, or that the Subscriber has failed to renew it domain name.
Entrust receives notice or otherwise become aware of a material change in the information contained in the Entrust EV SSL Certificate.
A determination, in the CA's sole discretion, that the Entrust EV SSL Certificate was not issued in accordance with the terms and conditions of these Guidelines or the CA's EV Policies.
If Entrust determines that any of the information appearing in the Entrust EV SSL Certificate is not accurate.
Entrust ceases operations for any reason and has not arranged for another EV CA to provide revocation support for the EV Certificate.
Entrust's right to issue Entrust EV SSL Certificate under these Guidelines expires or is revoked or terminated [unless the CA makes arrangements to continue maintaining the CRL/OCSP Repository].
Entrust's Private Key for that Entrust EV SSL Certificate has been compromised.
Entrust receives notice or otherwise become aware that a Subscriber has been added as a denied party or prohibited person to a blacklist, or is operating from a prohibited destination under the laws of the CA's jurisdiction of operation.
What is Entrust's EV Certificate Problem Reporting and Response Capability?
ReportingIf you wish to revoke your Entrust EV SSL Certificate for any of the above reasons, you may contact Entrust by email at evssl@entrust.com or by filling in our online complaint form.
In addition to Entrust EV SSL Certificate revocation, Subscribers, Relying Parties, Application Software Vendors, and other third parties can contact Entrust by email at evssl@entrust.com or by filling in our online complaint form for reporting complaints or suspected Private Key compromise, EV Certificate misuse, or other types of fraud, compromise, misuse, or inappropriate conduct related to EV Certificates.
InvestigationEntrust will begin investigation of all Certificate Problem Reports within twenty-four (24) hours and decide whether revocation or other appropriate action is warranted based on at least the following criteria:
The nature of the alleged problem;
Number of Certificate Problem Reports received about a particular EV Certificate or website;
The identity of the complainants (for example, complaints from a law enforcement official that a web site is engaged in illegal activities have more weight than a complaint from a consumer alleging they never received the goods they ordered); and
Entrust EV SSL Certificates
Entrust SSL certificates provide encryption-based security of sensitive information for websites and are the solution of choice for IT administrators charged with protecting their customer's transactions. Entrust SSL products are designed to meet and exceed even the most rigorous enterprise security standards, including guidelines stipulating scalability, manageability, and cost effectiveness while providing robust 256k-bit end-to-end encryption of customer interactions.
Entrust offers a range of SSL related products, including EV SSL certificates, which effortlessly integrate into an organization's existing e-commerce platform to provide a superior standard of web-based transactional security. Extended Validation SSL Certificates denote the integrity of a website by requiring Entrust, the SSL certificate provider, to verify the identity and domain of the site owner prior to issuing an SSL secure server certificate. This additional layer of validation is signaled by a green address bar in major browsers, use of the https SSL protocol, and a badge from Entrust indicating the advanced level of security - all resulting in a higher level of consumer trust.
For over a decade, Entrust has been a leading provider of e-business solutions that secure online communications and transactions for enterprises.
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
var pageTracker = _gat._getTracker("UA-3485345-2");
pageTracker._setDomainName("entrust.net");
pageTracker._setAllowLinker(true);
pageTracker._initData();
pageTracker._trackPageview();

Installation Problem

Skip navigation.

Log in Sign up
· Home
· Community
· Forums
· Opera

username: password: remember
· Blog
· Archive
· Photos
· Favorites
· Links
Ubuntu Installation Problems Part2 ☢
Friday, 26. December 2008, 17:10:24
ubuntu, install
Solving Ubuntu Installation Problems-1 PROBLEMI’ve partitioned my disk and clicked to start the installation, after which the InstallingSystem progress bar appears. However, it stops at a certain percentage with an errormessage. If I click the Continue button, everything continues, and at the end, I’m offeredthe chance to reboot into the new installation. However, when I reboot, the Ubuntudesktop doesn’t appear. Instead, all I see is a black screen with a text-mode login prompt.-SOLUTIONFor some reason vital Ubuntu software hasn’t been correctly copied to the machine.At the login prompt, type your username, and type your password when it’s requested.Then, at the command prompt, type the following:
sudo apt-get update
At this point you'll need to type your password; do so then type:
sudo apt-get –f install
then
sudo apt-get install ubuntu-desktop
If you find this doesn’t work,install Ubuntu using thealternate install CD............................................................................................................................................................................................................-2 PROBLEMWhen the Ubuntu installation program gets to the Starting Up the Partitioner stage, itreports that it can’t find any hard disk in my computer.-SOLUTIONThere are many possible reasons for this, but here are three potential solutions that you might try in sequence:1. Click Manually Edit Partition Table, and click the Forward button. At the top-right corner of the window, in the drive selection drop-down list, ensure the correct hard disk is selected. Once you select the disk, you should find the partitions are displayed.2. Ensure the jumpers are set correctly on the hard disk (consult the hard disk’s documentation if necessary). This is particularly worth checking if you have more than one hard disk. If this doesn’t solve the problem, and your second hard disk is nonbootable (that is, it’s used only for data storage), try temporarily removing it, and then install Ubuntu. Reconnect it after installation has completed.3. If none of These Solutions work use the alternate install CD. This contains an older installation program that many consider more reliable on some problematic computers....................................................................................................................................................................................... -3 PROBLEMWhen I try to install Ubuntu, the Prepare Disk Space screen shows one (or several) addiional small hard disks, usually identified as /dev/sda followed by a number.-SOLUTIONIf you have a USB memory stick inserted, or a photographic card reader, it will be identified by the Ubuntu installer in this way. You can ignore this or, if you want to avoid confusion,quit the installer, remove the memory stick or card reader, adpkg-reconfigure xserver-xorgnd restart the installerprogram...........................................................................................................................................................................................................................................-4 PROBLEMWhen manually partitioning, I see an error message to the effect that I can’t have more than four primary partitions.-SOLUTIONThis is a limitation in how hard disks work and not an issue with Ubuntu. You will have to create an extended partition to contain your new Ubuntu partitions. To do this, right-click the free space, click New, and select Extended Partition from the Create As drop-down list. By default, all the free space should be used, so click the Add button. Then, click in the new, extended partition, and create the Ubuntu partition...............................................................................................................................................................................-5 PROBLEMWhen I try to install Ubuntu into partitions that have previously contained Ubuntu (or another version of Linux), in order to wipe them and install Ubuntu into them, I get the error message “No root file system” on the Prepare Mount Points screen. (Alternatively, I created the Ubuntu partitions and then quit the installer before package installation had taken place. When I started it again later and attempted to use the partitions I’d created, I received the “No root file system” message.)-SOLUTIONUnfortunately there’s a bug in the Ubuntu installer, which appears on a minority of computers, that means it’s unable to utilize partitions that already exist when the installer starts. It seems the Ubuntu installer will only utilize partitions that it’s created. The solution is simple—go back to the manual partitioning screen by clicking the Back button, delete the existing partition that you intended to use, and then recreate it.................................................................................................................................................................................................................................................................................................................................................Post installation Problems-6 PROBLEMI use a wide-screen monitor (or a wide-screen notebook). When I boot to the desktop, the resolution is set too low. When I try to switch resolutions (by clicking System ➤ Preferences ➤Screen Resolution), the resolution my monitor usually runs at isn’t available in the list.-SOLUTIONIt a minority of cases, the open source drivers for ATI and NVIDIA cards can’t support certain resolutions on particular monitors. One solution is to install proprietary graphics drivers...........................................................................................................................................................................-7 PROBLEMWhen I boot for the first time, I see an error message along the lines of “No operating system could be found on the hard disk.”-SOLUTIONIt seems that, for whatever reason, the GRUB boot loader wasn’t installed correctly. Boot from the DVD-ROM, and select to Enter or Install Ubuntu when prompted. When the Ubuntu desktop appears, click Applications ➤ Accessories ➤ Terminal. This will open a command-prompt window. Type the following commands in sequence:
sudo grub
At this point you'll need to type your password
root (hd0,1)

setup (hd0)

quit
Then restart Ubuntu (click System ➤ Quit). Ensure you remove the DVD-ROM when prompted. You should find that the Ubuntu boot menu now appears when you boot....................................................................................................................................................................................................-8 PROBLEMAfter I’ve installed Ubuntu, Windows will no longer boot, although Ubuntu works fine. After I select Windows from the boot menu, the Windows boot procedure either freezes when “Starting Windows . . .” appears, or the boot status bar is shown, but the desktop never appears.-SOLUTIONTry repairing your Windows disk using the Windows command-line tool chkdsk. This can be done from the recovery mode of the Windows installation CD/DVD, but the instructions for how to do this vary depending on if you’re running Windows Vista or XP.Windows VistaIf you’re running Windows Vista, follow these steps to run chkdsk:1. Insert the Windows Vista installation DVD, and select to boot from it. 2. For some time, you’ll see the message Windows is Loading Files, along with a progress bar. Once this has cleared, select your language/locale settings from the Install Windows dialog box, and click Next.3. On the next screen, don’t click the Install Now button. Instead, click the Repair Your Computer link at the bottom-left corner of the window.4. In the System Recovery Options dialog box, select your Windows Vista partition, and click Next.5. On the next screen, select Command Prompt.6. In the command-prompt window that appears, type the following (this assumes Vista is installed on drive C:):
chkdsk c: /R
7. Wait until the check has completed, and type exit at the prompt.8. Back in the System Recovery Options dialog box, click Restart. This will reboot your computer. Be sure to eject the Windows Vista DVD before doing so.Windows XP1. Insert the Windows XP installation CD, and select to boot from it. 2. For some time, you’ll see status messages that Windows is loading driver files. Eventually the Windows Setup menu will appear. Press R to start the Recovery Console.3. You’ll be asked to confirm which Window installation you’d like to boot into; do so.4. You’ll then be prompted for the administrator’s password. If you don’t have one, simply press Enter.5. At the command prompt, type the following:
chkdsk c: /R
6. Wait until the check has completed, and then type exit at the prompt. This will reboot your computer. Be sure to eject the Windows XP CD before rebooting.............................................................................................................................................................................-9 PROBLEMWhen I boot for the first time, all I see is a black screen with some text at the top.-SOLUTIONIf this happens when you’re attempting to boot into Ubuntu’s live distro mode to install Ubuntu, the solution is to select the second option on the DVD-ROM boot menu: Start Ubuntu in Safe Graphics Mode. This will use Vesa-mode graphics drivers, which are known to work with the majority of graphics cards in use today.If you run into graphical problems after Ubuntu has been installed, you can recon-figure X.org, Ubuntu’s graphical subsystem (often referred to simply as X). This can be done using Ubuntu’s dpkg-reconfigure tool at the command promptfirst boot into Ubuntu’s recovery mode. This provides a simple command-line prompt and is designed to let you fix the system if anything goes wrong. To do this, ensure the installation DVD-ROM is removed from your computer’s DVD-ROM drive, and switch on your computer. If youdual-boot your computer with Windows, you’ll need to select the “Ubuntu [. . .] (recovery mode)” option from the menu that appears just after your computer boots. If your computer has only Ubuntu installed on it, you’ll need to press a key to enter the boot menu when prompted; then select the “Ubuntu [. . .] (recovery mode)” option.Eventually, a command prompt will appear, and you’ll see root@hostname:~#, followed by a cursor (in place of hostname will be the hostname you entered during installation). At the prompt, type the following:
dpkg-reconfigure xserver-xorg
This will start the configuration program, which runs in text mode. Reconfiguring X.org simply requires answering some basic questions, as outlined in the following steps. Graphics Card ConfigurationThe X.org configuration program begins with graphics card setup. Note that the configu-ration program does not use the mouse. Instead you should use the keyboard—use the arrow keys to move among options on a menu, and Tab to move the selection between on-screen options. Press Enter to select an option.1. The first question asks you to choose a driver from a list. If you wish, you can select the driver that seems appropriate to your hardware (the ati option for an ATI-based card, for example), but the safest choice is to choose the Vesa option. This driver works on virtually every graphics card. Press Enter when you’ve made your choice.2. You’re asked to enter an identifier for your graphics card. This is merely for ref-erence purposes, and anything will do. The default that Ubuntu suggests is fine, and you can simply press Enter.3. An information screen outlining the next step, which is to identify the bus ID of the card, appears. This is a technical setting needed for Ubuntu to use the card. High-light the OK button using the Tab key, and press Enter.4. Next, you’ll be invited to fill in the bus ID details. The default suggested by Ubuntu should be automatically filled in and should work for most people, so simply press Enter.5. You’re invited to enter the amount of memory your graphics card contains. Once again, Ubuntu is able to autodetect this. It’s acceptable to leave the field blank and press Enter.6. You’re asked whether you want to use your graphics card’s framebuffer. This is a method of accessing the graphics card memory, and nearly all modern graphics cards are compatible with it, so you can select Yes and press Enter. However, if after completing these steps you find that you still have problems with your display, start again from step 1, and choose not to use the framebuffer.
Share this

7 Layers

The 7 Layers of the OSI ModelLast updated: March 03, 2008
The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.
Application (Layer 7)
This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.
Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Network(Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.
Data Link(Layer 2)
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.
Physical (Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.
RECOMMENDED READING:
"The OSI Reference Model — Understanding Layers" in Webopedia's "Did You Know...?" section.
"Understanding The Data Link Layer" in Webopedia's "Did You Know...?" section.
Image courtesy of The Abdus Salam International Centre for Theoretical Physics.
Last updated: March 03, 2008Home > Quick Reference
Webopedia: he OSI Reference Model — Understanding Layers It is time to take a trip up the OSI Reference Model, and learn what this mysterious thing is all about. Webopedia: Understanding The Data Link Layer What's more important than IP and routing? Well, Layer 2 is much more important when it's broken. Many people don't have the Spanning Tree Protocol (STP) knowledge necessary to implement a layer 2 network that's resilient.
ServerWatch: The OSI Model - Part 1 For many MCSE's out there, the OSI Model is something that consisted of a few questions on the soon to be retired Networking Essentials 70-058 Microsoft exam. Amazingly, with the new Windows 2000 track, MCSE's won't be required to have any knowledge of the OSI Model.ServerWatch: The OSI Model - Part 2 In Part One of this article, I covered the basics of the OSI model and gave a few tips for memorizing the seven layers of the stack. In this part, I'm going to cover each of the seven layers of the OSI model individually and present more detail to how the OSI model is utilized by networking.

DHCP Server

Using a Cisco router as a DHCP server can simplify a network configuration by cetralizing DHCP services in a large network or decentralizing DHCP services to the endpoint routers at satellite locations. The ease of remote management of Cisco-based DHCP services is a great advantage.
conf tservice dhcpip dhcp pool 192.168.1.0/24network 192.168.1.0 255.255.255.0default-router 192.168.1.1dns-server 192.168.1.5 192.168.1.6exitip dhcp excluded-address 192.168.1.1 192.168.1.199ip dhcp excluded-address 192.168.1.241 192.168.1.255^Z
This example shows a Cisco router configuration as a basic DHCP server in the 192.168.1.0/24 network. The DHCP options implemented are default-router (DHCP option 3) and dns-server (DHCP option 6). Two DNS servers are configured. With the excluded-address commands, using only ip addresses between 192.168.1.200-192.168.1.240 will be available for client use.
How to Install & Configure Lotus Notes ?
Export to PDF Email to a Friend Print this Page
Installing & Configuring Lotus Notes includes 2 steps as follows:
Step 1 - Installing Lotus Notes
Step 2 - Configuring Lotus Notes
Step 1: Installing Lotus Notes
Click on Download Lotus Notes to start downloading Lotus Notes client software.
Run the self extracting file Notes7.exe. It will create a directory called C:\Lotus7.(HINT: A Win Zip Self-Extractor window appears, please click on Unzip. When the files have been expanded click OK. Then click Close.)
Run setup.exe from the C:\Lotus7\Clients\W32Intel\ folder.
Click Next.
On the License Agreement screen, checkmark I accept the terms in the license agreement and click Next.
Type your name and organization name and click Next> button
Click Next> to accept the default destination folders.
Click Next> to accept the default features
Make sure that the box Make Notes my default email program is unchecked. Click Install to begin installation.
The installation of Lotus Notes begins. After installation is complete, click Finish.
Installation of Lotus Notes completes.
Step 2: Configuring Lotus Notes Client
Launch Lotus Notes by selecting Start > Programs > Lotus Applications > Lotus Notes. You will have a screen that looks like the one below. Click Next> (Note: If you see a different screen, it may be because you have installed a previous version of Lotus Notes before or this is not the first time you attempt to install Lotus Notes 6 on your computer)
Type in your name in the Your name box, and uncheck the I want to connect to a Domino server box. Click Next>.
Make sure that none of the boxes are checked and click Next>.
Click OK when the Notes setup is complete.
Lotus Notes will open the Welcome page with Notes 6 setup options. Click on the No thanks, just give me the defaults option.
Then you will have the Lotus Notes’ default Welcome page on the screen.
Home
Privacy Policy
Web Resources
Support

Lotus Notes


CLP Fast Track:
Lotus Notes®/Domino™ 5 System Administration
0735708789
Tony Aveyard, Karen Fishwick, Jay Forlini, & Karl Wabst
Copyright 2000 by New Riders Publishing
Warning and Disclaimer: Every effort has been made to make this book as complete and accurate as
possible, but no warranty or fitness is implied. The information is provided on an as-is basis. The authors
and New Riders Publishing shall have neither liability nor responsibility to any person or entity with
respect to any loss or damages arising from the information contained in this book or from the use of the
discs or programs that may accompany it.
Misprint Correction
About the Authors, under Tony Aveyard
In real life he works for Entex in Mason, Ohio, as a
Senior Intranet/Internet System Engineer, but his
secret ambition in life is to be a full-time fiction
writer.
In real life he is a Consultant for marchFIRST in
Cincinnati, Ohio, but his secret ambition in life is to
be a full-time fiction writer.
Page 10, First full paragraph, Second sentence
As an administer, you will be required to perform...
As an administrator, you will be required to
perform...
Page 14, Step 2,
Ensure that the source server (or another server that
replicates with the source server and has a replica of
the database) has Create Replica access in ACL of
the destination server.
Ensure that the source server (or another server that
replicates with the source server and has a replica of
the database) has Create Replica access in the
Server document of the destination server.
Page 17, Step 5,
Select the database icon.
Select the database from the Files tab.
Page 26,
The bullet point at the top of the page, which reads
"Create a full-text index now or at a later date."
Remove this bullet point.
Page 87, Second paragraph, first sentence,
Domino uses the replication history to determine in
which documents to scan for changes during the
next replication.
Domino uses the replication history to determine
which documents to scan for changes during the
next replication.
Page 87, Fifth paragraph, third sentence,
Domino scans each document created or modified
since the data specified in the Only Replicate
Incoming Documents Saved …..
Domino scans each document created or modified
since the date specified in the Only Replicate
Incoming Documents Saved ….
Page 88, Step 6,
Click Create a New Notification Profile
for This Event.
Click Create a New Notification Profile
for This Event and complete the wizard.
Page 90 Last paragraph under the "Using the Server
Console" Heading,
For example, to send changes to the database
PRODUCTS.NSF from the server
Server1/East/Acme to the server Web/East/Acme,
enter the following command from the console on
Server1/E/East/Acme:
For example, to send changes to the database
PRODUCTS.NSF from the server
Server1/East/Acme to the server Web/East/Acme,
enter the following command from the console on
Server1/East/Acme:
Page 91, (c) Head,
Replicating Design Changes
Propagating Design Changes
Page 93, First paragraph, last sentence,
The following sections will outline the basic causes
The following sections outline the basic causes and
resolutions for these conflicts, as well as some tips
and resolutions for these conflicts, as well as some
preventative medicine.
to help prevent conflicts from happening in the
first place.
Page 98, (d) Head,
Read ACLs or Reader Names Fields
Read ACLs or Readers Fields
Page 99, First sentence under (c) Head,
When deleted documents reappear in another replica
copy of a database, typically the problem is either a
purge interval prevents replication of deletions or a
document edit writes over a document
deletion.
When deleted documents reappear in another replica
copy of a database, typically the problem is either a
purge interval preventing replication of deletions or
a document edit writing over a document
deletion.
Page 103, Step 1,
Make sure that you set up mail monitoring.
Make sure that you have set up mail tracking.
Page 108, Step 3,
Make sure that the names of the server, domain, and
Notes named network are spelled correctly.
Make sure that the names of the server, domain, and
Domino named network are spelled correctly.
Page 201, Last paragraph
It was saved on your server as CERT.ID in the data
directory of your server.
It was saved on the hard drive of your server as
CERT.ID in the data directory
(e:\lotus\domain\data).
Page 202, First paragraph
The USER.ID is stored in the directory until the
client is installed and configured.
The USER.ID is stored in the Domino directory
(NAMES.NSF) until the client is installed and
configured.
Page 203, First paragraph, last line
Then, click OK.
Then, click OK. You may also need to change the
Access Control List of the file so that fellow
administrators are able to register users as well.
Page 208, Third paragraph, first line
Network name does not have some significance as it
relates to mail routing.
Network name does not have some significance as it
relates to mail routing and the client machines.
Page 211, First paragraph, last line
Selecting Local while using your personal client
will cause the file to be created on your machine.
Selecting Local while using your personal client
will cause the file to be created in your machine in
your personal address book.
Page 217, ID Recovery
To use this feature, you must have set up a mail-in
so that you can capture the Ids as they are created.
To use this feature, you must have set up a mail-in
database so that you can capture the Ids as they are
created.
Page 242, Second paragraph, second sentence
If you want to add a modem, for instance, you
would go to the File, Preferences, User Preferences,
Ports.
If you want to add a modem, for instance, you
would select File, Preferences, User Preferences,
Ports.
Page 250, First paragraph, last line
Named networks are defined as two or more servers
that share the same protocol and network.
Domino Named Networks are defined as two or
more servers that share the same protocol and
network.
Page 263, Second paragraph
Ideally, this server will also provide Passthru
connectivity to all other servers the user would
need.
Ideally, the Passthru server will also provide
Passthru connectivity to all other servers the user
would need.
Page 311, Last bullet on page
• Using Author Access in the ACL and an author
Name field on the documents.
• Using Author Access in the ACL and an author
Name field on the documents. If the user is
listed in an Author Name field, he can make
changes to the document.
Page 322, first bullet, last sentence
If an ID is lost and you issue a new one, the old ID
will have a different public key.
If an ID is lost and you issue a new one, the old ID
cannot be used because it will have a different
public key.
Page 341, First paragraph
A sample of this dialog box is shown in Figure 12.3.
A sample of this dialog box is shown in Figure 12.3.
All users who will edit the document must be able
to link to the original file (such as with a mapped
drive).
Page 360, Last sentence, bottom of page
Notice in Figure 13.5, you must sort to be able to
Notice in Figure 13.5, you must enable sorting to be
able to categorize.
categorize.
Page 363, Third paragraph, second sentence
Just like with a mail file, a form must be present to
view the documents.
Just like with a file, a form must be present in the
destination database to open the documents.
This errata sheet is intended to provide updated technical information.
Spelling and grammar misprints are updated during the reprint process,
but are not listed on this errata sheet.