- Timestamp:
- May 20, 2009, 6:46:53 PM (16 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/samba-3.2.x/docs/htmldocs/Samba3-ByExample/RefSection.html
r149 r204 1 <html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Part III. Reference Section</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.73.1"><link rel="start" href="index.html" title="Samba-3 by Example"><link rel="up" href="index.html" title="Samba-3 by Example"><link rel="prev" href="nw4migration.html" title="Chapter 10. Migrating NetWare Server to Samba-3"><link rel="next" href="kerberos.html" title="Chapter 11. Active Directory, Kerberos, and Security"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Part III. Reference Section</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a> </td><th width="60%" align="center"> </th><td width="20%" align="right"> <a accesskey="n" href="kerberos.html">Next</a></td></tr></table><hr></div><div class="part" lang="en"><div class="titlepage"><div><div><h1 class="title"><a name="RefSection"></a>Part III. Reference Section</h1></div></div></div><div class="partintro" lang="en"><div><div><div><h1 class="title"><a name="id26036 06"></a>Reference Section</h1></div></div></div><p>1 <html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Part III. Reference Section</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.73.1"><link rel="start" href="index.html" title="Samba-3 by Example"><link rel="up" href="index.html" title="Samba-3 by Example"><link rel="prev" href="nw4migration.html" title="Chapter 10. Migrating NetWare Server to Samba-3"><link rel="next" href="kerberos.html" title="Chapter 11. Active Directory, Kerberos, and Security"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Part III. Reference Section</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a> </td><th width="60%" align="center"> </th><td width="20%" align="right"> <a accesskey="n" href="kerberos.html">Next</a></td></tr></table><hr></div><div class="part" lang="en"><div class="titlepage"><div><div><h1 class="title"><a name="RefSection"></a>Part III. Reference Section</h1></div></div></div><div class="partintro" lang="en"><div><div><div><h1 class="title"><a name="id2603620"></a>Reference Section</h1></div></div></div><p> 2 2 This section <span class="emphasis"><em>Samba-3 by Example</em></span> provides important reference material 3 3 that may help you to solve network performance issues, to answer some of the critiques 4 4 published regarding Samba, or just to gain a more broad understanding of how Samba can 5 5 play in a Windows networking world. 6 </p><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="chapter"><a href="kerberos.html">11. Active Directory, Kerberos, and Security</a></span></dt><dd><dl><dt><span class="sect1"><a href="kerberos.html#id26037 03">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2604353">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2604369">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2604766">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#ch10expl">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2606396">Share Access Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2606745">Share Definition Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2607357">Share Point Directory and File Permissions</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2607760">Managing Windows 200x ACLs</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2608487">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2608622">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="DomApps.html">12. Integrating Additional Services</a></span></dt><dd><dl><dt><span class="sect1"><a href="DomApps.html#id2609251">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2609281">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2609382">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2609415">Technical Issues</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2609571">Political Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2609589">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#ch10-one">Removal of Pre-Existing Conflicting RPMs</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2611441">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2611501">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="HA.html">13. Performance, Reliability, and Availability</a></span></dt><dd><dl><dt><span class="sect1"><a href="HA.html#id2612020">Introduction</a></span></dt><dt><span class="sect1"><a href="HA.html#id2612107">Dissection and Discussion</a></span></dt><dt><span class="sect1"><a href="HA.html#id2612579">Guidelines for Reliable Samba Operation</a></span></dt><dd><dl><dt><span class="sect2"><a href="HA.html#id2612606">Name Resolution</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613082">Samba Configuration</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613409">Use and Location of BDCs</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613485">Use One Consistent Version of MS Windows Client</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613507">For Scalability, Use SAN-Based Storage on Samba Servers</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613556">Distribute Network Load with MSDFS</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613611">Replicate Data to Conserve Peak-Demand Wide-Area Bandwidth</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613656">Hardware Problems</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613815">Large Directories</a></span></dt></dl></dd><dt><span class="sect1"><a href="HA.html#id2613918">Key Points Learned</a></span></dt></dl></dd><dt><span class="chapter"><a href="ch14.html">14. Samba Support</a></span></dt><dd><dl><dt><span class="sect1"><a href="ch14.html#id2614088">Free Support</a></span></dt><dt><span class="sect1"><a href="ch14.html#id2614306">Commercial Support</a></span></dt></dl></dd><dt><span class="chapter"><a href="appendix.html">15. A Collection of Useful Tidbits</a></span></dt><dd><dl><dt><span class="sect1"><a href="appendix.html#domjoin">Joining a Domain: Windows 200x/XP Professional</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2615014">Samba System File Location</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2615433">Starting Samba</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2615779">DNS Configuration Files</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2615791">The Forward Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2615839">The Reverse Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2615980">DNS Root Server Hint File</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#altldapcfg">Alternative LDAP Database Initialization</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2616039">Initialization of the LDAP Database</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#id2616618">The LDAP Account Manager</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2617615">IDEALX Management Console</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12-SUIDSGID">Effect of Setting File and Directory SUID/SGID Permissions Explained</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12dblck">Shared Data Integrity</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2618095">Microsoft Access</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2618242">Act! Database Sharing</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2618326">Opportunistic Locking Controls</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="primer.html">16. Networking Primer</a></span></dt><dd><dl><dt><span class="sect1"><a href="primer.html#id2618493">Requirements and Notes</a></span></dt><dt><span class="sect1"><a href="primer.html#id2618654">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2618715">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#id2618832">Exercises</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2618958">Single-Machine Broadcast Activity</a></span></dt><dt><span class="sect2"><a href="primer.html#secondmachine">Second Machine Startup Broadcast Interaction</a></span></dt><dt><span class="sect2"><a href="primer.html#id2620104">Simple Windows Client Connection Characteristics</a></span></dt><dt><span class="sect2"><a href="primer.html#id2620606">Windows 200x/XP Client Interaction with Samba-3</a></span></dt><dt><span class="sect2"><a href="primer.html#id2621173">Conclusions to Exercises</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01conc">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2621288">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01qa">Questions and Answers</a></span></dt></dl></dd><dt><span class="appendix"><a href="apa.html">A.6 </p><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="chapter"><a href="kerberos.html">11. Active Directory, Kerberos, and Security</a></span></dt><dd><dl><dt><span class="sect1"><a href="kerberos.html#id2603717">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2604367">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2604384">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2604780">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#ch10expl">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2606410">Share Access Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2606759">Share Definition Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2607372">Share Point Directory and File Permissions</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2607775">Managing Windows 200x ACLs</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2608502">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2608636">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="DomApps.html">12. Integrating Additional Services</a></span></dt><dd><dl><dt><span class="sect1"><a href="DomApps.html#id2609265">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2609296">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2609396">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2609429">Technical Issues</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2609585">Political Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2609603">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#ch10-one">Removal of Pre-Existing Conflicting RPMs</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2611455">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2611515">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="HA.html">13. Performance, Reliability, and Availability</a></span></dt><dd><dl><dt><span class="sect1"><a href="HA.html#id2612034">Introduction</a></span></dt><dt><span class="sect1"><a href="HA.html#id2612122">Dissection and Discussion</a></span></dt><dt><span class="sect1"><a href="HA.html#id2612593">Guidelines for Reliable Samba Operation</a></span></dt><dd><dl><dt><span class="sect2"><a href="HA.html#id2612620">Name Resolution</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613096">Samba Configuration</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613424">Use and Location of BDCs</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613499">Use One Consistent Version of MS Windows Client</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613521">For Scalability, Use SAN-Based Storage on Samba Servers</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613570">Distribute Network Load with MSDFS</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613625">Replicate Data to Conserve Peak-Demand Wide-Area Bandwidth</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613671">Hardware Problems</a></span></dt><dt><span class="sect2"><a href="HA.html#id2613829">Large Directories</a></span></dt></dl></dd><dt><span class="sect1"><a href="HA.html#id2613932">Key Points Learned</a></span></dt></dl></dd><dt><span class="chapter"><a href="ch14.html">14. Samba Support</a></span></dt><dd><dl><dt><span class="sect1"><a href="ch14.html#id2614102">Free Support</a></span></dt><dt><span class="sect1"><a href="ch14.html#id2614320">Commercial Support</a></span></dt></dl></dd><dt><span class="chapter"><a href="appendix.html">15. A Collection of Useful Tidbits</a></span></dt><dd><dl><dt><span class="sect1"><a href="appendix.html#domjoin">Joining a Domain: Windows 200x/XP Professional</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2615028">Samba System File Location</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2615448">Starting Samba</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2615793">DNS Configuration Files</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2615805">The Forward Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2615854">The Reverse Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2615994">DNS Root Server Hint File</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#altldapcfg">Alternative LDAP Database Initialization</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2616053">Initialization of the LDAP Database</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#id2616632">The LDAP Account Manager</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2617629">IDEALX Management Console</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12-SUIDSGID">Effect of Setting File and Directory SUID/SGID Permissions Explained</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12dblck">Shared Data Integrity</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2618109">Microsoft Access</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2618256">Act! Database Sharing</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2618341">Opportunistic Locking Controls</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="primer.html">16. Networking Primer</a></span></dt><dd><dl><dt><span class="sect1"><a href="primer.html#id2618507">Requirements and Notes</a></span></dt><dt><span class="sect1"><a href="primer.html#id2618669">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2618729">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#id2618846">Exercises</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2618972">Single-Machine Broadcast Activity</a></span></dt><dt><span class="sect2"><a href="primer.html#secondmachine">Second Machine Startup Broadcast Interaction</a></span></dt><dt><span class="sect2"><a href="primer.html#id2620118">Simple Windows Client Connection Characteristics</a></span></dt><dt><span class="sect2"><a href="primer.html#id2620620">Windows 200x/XP Client Interaction with Samba-3</a></span></dt><dt><span class="sect2"><a href="primer.html#id2621188">Conclusions to Exercises</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01conc">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2621302">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01qa">Questions and Answers</a></span></dt></dl></dd><dt><span class="appendix"><a href="apa.html">A. 7 7 <acronym class="acronym">GNU</acronym> General Public License version 3 8 </a></span></dt><dd><dl><dt><span class="bridgehead"><a href="apa.html#id26219 53">A.8 </a></span></dt><dd><dl><dt><span class="bridgehead"><a href="apa.html#id2621968">A. 9 9 Preamble 10 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622 099">A.10 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622113">A. 11 11 TERMS AND CONDITIONS 12 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26221 02">A.12 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622117">A. 13 13 0. Definitions. 14 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622 195">A.14 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622209">A. 15 15 1. Source Code. 16 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622 293">A.16 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622308">A. 17 17 2. Basic Permissions. 18 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26223 33">A.18 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622347">A. 19 19 3. Protecting Users’ Legal Rights From Anti-Circumvention Law. 20 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26223 73">A.20 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622388">A. 21 21 4. Conveying Verbatim Copies. 22 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26224 00">A.22 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622415">A. 23 23 5. Conveying Modified Source Versions. 24 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622 496">A.24 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622510">A. 25 25 6. Conveying Non-Source Forms. 26 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622 686">A.26 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622700">A. 27 27 7. Additional Terms. 28 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26228 22">A.28 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622836">A. 29 29 8. Termination. 30 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26228 65">A.30 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622880">A. 31 31 9. Acceptance Not Required for Having Copies. 32 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26228 85">A.32 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622899">A. 33 33 10. Automatic Licensing of Downstream Recipients. 34 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26229 37">A.34 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2622951">A. 35 35 11. Patents. 36 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26230 72">A.36 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2623087">A. 37 37 12. No Surrender of Others’ Freedom. 38 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2623 095">A.38 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2623109">A. 39 39 13. Use with the ???TITLE??? Affero General Public License. 40 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26231 23">A.40 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2623137">A. 41 41 14. Revised Versions of this License. 42 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2623 186">A.42 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2623200">A. 43 43 15. Disclaimer of Warranty. 44 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26232 12">A.44 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2623226">A. 45 45 16. Limitation of Liability. 46 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26232 32">A.46 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2623246">A. 47 47 17. Interpretation of Sections 15 and 16. 48 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26232 48">A.48 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2623263">A. 49 49 END OF TERMS AND CONDITIONS 50 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id26232 52">A.50 </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2623267">A. 51 51 How to Apply These Terms to Your New Programs 52 52 </a></span></dt></dl></dd></dl></div></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a> </td><td width="20%" align="center"> </td><td width="40%" align="right"> <a accesskey="n" href="kerberos.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Chapter 10. Migrating NetWare Server to Samba-3 </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> Chapter 11. Active Directory, Kerberos, and Security</td></tr></table></div></body></html>
Note:
See TracChangeset
for help on using the changeset viewer.