Search results
Jump to navigation
Jump to search
Page title matches
- ...mply put, you connect to our servers here Remote Access. When you remotely access a computer, you are inputting data into a computer other than the one you a ...ines are often busy and callers may have to wait a long time to gain phone access to the system. To use the NC State Dialup Service, first make sure your com9 KB (1,470 words) - 12:08, 26 January 2016
- To request administrator access to a research machine, you should ask your faculty advisor to email [mailto If you require administrator access to install software, please ask us387 bytes (64 words) - 10:35, 11 September 2006
- ...ndar. Access rights for individuals must be set manually. Until a person's access rights are set, they will be under the default rights, which means, they ca There are four different levels of access to set your entries to.2 KB (406 words) - 11:41, 20 April 2006
- Setting Access Rights allows you to pick who can and cannot see or edit certain parts of y #Know what access rights you want a person to have before you begin2 KB (282 words) - 14:20, 26 April 2006
- =How do I get access?= Card access to the teaching labs is managed by WolfTech. Card access to the teaching labs is granted only to the following:886 bytes (144 words) - 14:34, 2 July 2007
Page text matches
- ==Guest Access== ==All Access==786 bytes (107 words) - 15:06, 26 January 2007
- GuardDog is a tool designed to manage the access privileges of users for multiple areas (directories on the webserver). ...llowed to access this area. That is, user deny restrictions override group access privileges.1 KB (257 words) - 07:35, 10 August 2006
- =How do I get access?= Card access to the teaching labs is managed by WolfTech. Card access to the teaching labs is granted only to the following:886 bytes (144 words) - 14:34, 2 July 2007
- Setting Access Rights allows you to pick who can and cannot see or edit certain parts of y #Know what access rights you want a person to have before you begin2 KB (282 words) - 14:20, 26 April 2006
- ==Location and Access== ...ehelp@ncsu.edu] and request that a member of their research group be given access to print to ECE-POSTERS1.916 bytes (145 words) - 10:44, 19 September 2016
- [09:20] <jacorley> if you have access to a cvs client (either via add or a local cvs install) you can do cvs+ssh [09:23] <jacorley> i.e. if I'm using ssh.ncsu.edu to access a CVS repository in AFS:3 KB (395 words) - 09:30, 30 October 2006
- '''Physical Access''' ...ready have the required access card. I have given the course instructor(s) access to the lab.3 KB (532 words) - 18:13, 9 January 2008
- *[[RPT:User_Management]] -- How to manage departmental access and permissions. ==Gaining Access==2 KB (264 words) - 10:19, 9 November 2006
- To request administrator access to a research machine, you should ask your faculty advisor to email [mailto If you require administrator access to install software, please ask us387 bytes (64 words) - 10:35, 11 September 2006
- ...ndar. Access rights for individuals must be set manually. Until a person's access rights are set, they will be under the default rights, which means, they ca There are four different levels of access to set your entries to.2 KB (406 words) - 11:41, 20 April 2006
- ...main has a number of special groups to apply security policies and provide access to resources. This document explains the function of these groups and thei ...red to this group to automatically mount the Q drive. Only staff who need access to the ACS Q Drive should be members of this group. '''NOTE''': OU Admins s5 KB (921 words) - 16:07, 28 August 2017
- static $access, $integrated; if (!isset($access)) {2 KB (274 words) - 15:09, 31 May 2011
- ...y. Although this is very handy, it's quite a security risk. Anyone who has access to your home directory could potentially read your Unity password from this ...ord is not stored, but you must answer the annoying question every time to access the repository. We recommend that you add the following text to your ~/.sub2 KB (248 words) - 15:03, 22 November 2011
- This guide will explain how to access shares located in the ECE Department's Celerra network file space (known as ...process requires that you know the specific name of the share you wish to access. Contact WolfTech if you do not know the name.4 KB (655 words) - 13:39, 6 January 2011
- ...o reconnect whenever you log in to the machine, and is a convenient way to access files on another machine that you use regularly. You can also use the Wolf ...window for you to enter in the username and password of the user that has access to the resource. See ''Figure 2'' below.3 KB (537 words) - 13:34, 8 January 2013
- ==Location and Access== <h4>Physical access to MASTIFF is restricted to the hours of 8am - 5pm, Monday through Friday.<2 KB (338 words) - 11:30, 24 August 2009
- ...Windows Settings/Security Settings/Local Policies/Security Options/Network access container. #Add the Everyone group to the built-in group Pre-Windows 2000 Compatibility Access.3 KB (534 words) - 22:46, 27 February 2006
- ===Requests for admin access=== Admin access setup on <machine>. If you're currently logged in, you'll need to log out3 KB (557 words) - 15:22, 2 December 2010
- ...Manager to make changes to users and groups. You will need administrator access to make these changes. Do NOT attempt this process if you are not comforta * You must have administrator access to the machine to install OpenAFS and make the changes in Terminal and NetI3 KB (527 words) - 08:47, 6 June 2006
- ...that we extend a NoPay account to them. Assuming I agree (some basic usage/access questions are always asked), the outsider fills out a form we have for the ...D account is provided to the individual. This allows non-NCSU personnel to access the NCSU Wireless network. As most laptops are now equipped with wireless c4 KB (750 words) - 10:07, 28 September 2007