Ubuntu Desktop Guidedrivers Hardware problems, printers, power settings, color management, Bluetooth, disks… Universal access Seeing, hearing, mobility, braille… Tips & tricks Special characters, middle click shortcuts… Get Launcher The Launcher appears automatically when you log in to your desktop, and gives you quick access to the applications you use most often. Learn more about the Launcher. The Dash The Ubuntu desktop, it will appear along the left-hand side of the screen. The Launcher provides you with quick access to applications, workspaces, removable devices and the trash. If an application that you want0 码力 | 1709 页 | 5.81 MB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)Technology Communication 10,000 + mainstream applications on cloud native, big data CND, MEC, industrial control,etc. Integrated ecosystems and extensive compatibility through distributed kits Arm, x86, RISC-V DPUs/IPUs are also supporting the offloading of management- and control- plane components. This means that all management and control components of the data center infrastructure can be offloaded to seamless offloading in various scenarios. File system collaboration supports cross-host file system access and provides a consistent file system view for host and DPU processes. It also supports special0 码力 | 116 页 | 3.16 MB | 1 年前3
Ubuntu Server Guide 18.04............................................................................... 292 17. Version Control System ......................................................................................... ...................................................................................... 101 17.1. Access Methods ........................................................................................ support reusing existing partitions on the disks of the system you are installing. It also requires access to the Ubuntu archive, possibly via a proxy. The previous, debian-installer based, installer is still0 码力 | 413 页 | 1.40 MB | 1 年前3
ubuntu server guide3 service-ldap-introduction Introduction 3 service-ldap Installation 3 service-ldap-access-control Access control 3 service-ldap-replication Replication 3 service-ldap-usage Simple LDAP user and group samba-file-server Set up a file server 3 samba-print-server Set up a print server 3 samba-share-access-control Share access controls 3 samba-apparmor-profile Create AppArmor profile 3 Legacy pages 4 samba-domain-controller menu, or pressing Control + Z or F2. If you are accessing the installer via tty1, you can also access a shell by switching to a different virtual terminal (Control + Alt + arrow, or Control + Alt + number0 码力 | 486 页 | 3.33 MB | 1 年前3
This Debian Reference (version 2.109) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.2.4 Control of permissions for newly created files: umask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 4 Authentication and access controls 89 4.1 Normal Unix authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 4.7 Other access controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 266 页 | 1.25 MB | 1 年前3
Moxa Industrial Linux 3.0 (Debian 11)
Manual for Arm-based Computers
Version 1.0, January 2023........................................................................................ 87 Access Control ............................................................................................ Console Port Settings Baudrate 115200 bps Parity None Data bits 8 Stop bits 1 Flow Control None Terminal VT100 Below we show how to use the terminal software to connect to the Arm-based these steps to the Arm-based computer itself. Use the ssh command from a Linux computer to access the computer’s LAN2 port. user@PC1:~ ssh moxa@192.168.4.127 Type yes to complete the connection0 码力 | 111 页 | 2.94 MB | 1 年前3
Cilium v1.8 Documentation(traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog posts Books Talks Further Documents API Reference Introduction How to access the API kernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? BPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.9 Documentation(traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog posts Books Talks Further Documents API Reference Introduction How to access the API technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? eBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.6 DocumentationGuide BPF Architecture Toolchain Program Types Further Reading API Reference Introduction How to access the API Compatibility Guarantees API Reference Reference Command Cheatsheet Command utilities: kernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously growing0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.10 Documentationwith commit access Granting Commit Access Revoking Commit Access Changing the Policy Voting Company Block Vote Limit Templates Nomination to Grant Commit Access Vote to Grant Commit Access Vote Results for Grant of Commit Access Invitation to Accepted Committer Proposal to Remove Commit Access for Inactivity Notification of Commit Removal for Inactivity Proposal to Revoke Commit Access for Detrimental Behavior Behavior Vote to Revoke Commit Access Vote Results for Revocation of Commit Access Notification of Commit Revocation for Detrimental Behavior Development Guide How To Contribute Clone and Provision0 码力 | 1307 页 | 19.26 MB | 1 年前3
共 81 条
- 1
- 2
- 3
- 4
- 5
- 6
- 9













