Welcome to the ASTA 3 Help Tutorials. These are documented tutorials that included new user jump start, to file sends to server techniques with non-database Servers showing how to use Providers and ServerMethods. A Current version of these tutorials can always be found on line
Winprint HylaFAX
Makes a HylaFAX Server look like a standard Windows printer, as seamless as commercial FAX Servers. This project is written in Borland C++ Builder
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator and maintainer of User Mode Linux shows how to put it to work hands-on. Jeff Dike covers everything from getting started through running enterprise-class User Mode Linux Servers. You ll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more.
Sector is a system infrastructure software that provides functionality for distributed data storage, access, and analysis/processing. It automatically manages large volumetric data across Servers or clusters, even those over distributed wide area high speed networks. Sector provides simple tools and APIs to access and/or process the data. Data and server locations are transparent to users, as the whole Sector network is a single networked super computer to the users.
ssd8考試一 計(jì)算機(jī)網(wǎng)絡(luò)
A Web proxy server listens to requests, then retrieves the requested files from other Web Servers and serves them to the clients. These proxy Servers are useful in certain situations, such as on firewalls, where they can allow access to certain pages and deny access to others
xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661).
L2TP allows you to tunnel PPP over UDP. Some ISPs use L2TP to tunnel user
sessions from dial-in Servers (modem banks, ADSL DSLAMs) to back-end PPP
Servers. Another important application is Virtual Private Networks where
the IPsec protocol is used to secure the L2TP connection (L2TP/IPsec,
RFC 3193). The L2TP/IPsec protocol is mainly used by Windows and
Mac OS X clients. On Linux, xl2tpd can be used in combination with IPsec
implementations such as Openswan.
開源備份軟件源碼
AMANDA, the Advanced Maryland Automatic Network Disk Archiver, is a backup system that allows the administrator to set up a single master backup server to back up multiple hosts over network to tape drives/changers or disks or optical media. Amanda uses native dump and/or GNU tar facilities and can back up a large number of workstations running multiple versions of Unix. Amanda uses Samba, Cygwin or a native Windows client to back up Microsoft Windows desktops and Servers
Description: Microsoft?Windows?HTTP Services (WinHTTP) provides developers with a server-supported, high-level interface to the HTTP/1.1 Internet protocol. WinHTTP is designed to be used primarily in server-based scenarios by server applications that communicate with HTTP Servers. WinHTTP
is also designed for use in system services and HTTP-based client applications. WinHTTP is more secure and robust than WinInet. However, single-user applications that need FTP or gopher functionality, cookie persistence, caching, automatic credential dialog handling, Internet Explorer compatibility, or downlevel platform support should still consider
using WinInet.
simple ATM [Automatic Teller Machine] system the basic functions Login including write-offs, inquiries, deposits, withdrawals and alter the code. Simulation of ATM terminal users logged in, their account numbers and passwords through the ATM network to transmit to the server, ATM database server based on the information to confirm the account number and password is correct, the results back to the ATM terminal. If the correct account number and password, the ATM into the next terminal interface Otherwise prompt mistakes. Cancellation notice for the operation of the server ATM transactions concluded inquiries, deposits, withdrawals and alter the code operations are first sent an order to ATM Servers, ATM by the database server implementation of the corresponding operation and operating res