| [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] C language NLM development programming for disaster recovery 2nd 3rd 4th 5th 6th source code example telephone attributes, modifying 2nd 3rd 4th C++ language NLM development disadvantages Metrowerks CodeWarrior cache memory directory services (DS) version 7 performance considerations 2nd 3rd directory services (DS) version 8 performance considerations 2nd 3rd eDirectory background cleaner process 2nd configuring (DSTrace utility) 2nd configuring (NDS iMonitor) configuring (NDSDB.INI file) 2nd 3rd 4th 5th 6th limit calculations 2nd 3rd 4th 5th 6th performance considerations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st statistics monitoring 2nd 3rd entry versus block caches performance considerations limit calculations Dynamic Adjust mode 2nd 3rd 4th 5th 6th Hard Limit mode 2nd 3rd 4th 5th 6th low dirty 2nd 3rd maximum dirty 2nd 3rd Unix systems performance tuning 2nd cache statistics check health checks 2nd chaining resolution model (LDAP) 2nd 3rd 4th 5th 6th Change Replica Type operation background processes 2nd 3rd -637 error class flags 2nd 3rd classes (objects) attributes 2nd mandatory 2nd naming 2nd 3rd operational 2nd optional 2nd syntaxes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th auxiliary usage rules 2nd 3rd containment definitions table listing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th effective 2nd mandatory attributes names naming rules/restrictions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th non-effective 2nd 3rd optional attributes schema changes from NDS 8 2nd superclasses client agents servers role in tree-walking clients API library DS errors 2nd 3rd 4th 5th Bindery Service connection issues 2nd Native File Access Pack (NFAP) error codes listing 2nd API library 2nd 3rd 4th 5th 6th 7th server-based API library DS errors 2nd 3rd tree-walking uses 2nd command-line switches DSRepair utility 2nd 3rd 4th 5th 6th 7th communication problem category communication- related DS errors 2nd 3rd components iManager requirements 2nd Comprehensive Perl Archive Network (CPAN) Perl modules concurrent logins maximum limit security risks 2nd 3rd 4th configuring auditing options (Auditcon utility) disk space options (Auditcon utility) reporting options (Auditcon utility) 2nd user restriction options (Auditcon utility) connection tables management of (DHost) Connectotel.com Web site console security kernel debugger breaking into offline attack prevention 2nd 3rd 4th 5th 6th 7th screen locks 2nd 3rd SecureConsole SSLock for NDS 2nd remote access measures NetWare Loadable Modules (NLMs) ConsoleOne DS trees privileges 2nd file system rights troubleshooting 2nd 3rd 4th functional overview 2nd 3rd 4th indexes managing 2nd 3rd 4th main screen 2nd memory leakage partitions management of performance strategies 2nd platform support replicas synchronization checks 2nd Schema Manager schema protection features 2nd schema names NDS versus LDAP terminology 2nd 3rd 4th single-objects managing 2nd 3rd 4th 5th snap-ins loading containers administrative security 2nd auditing (Auditcon utility) 2nd intruder detection administrative account protection NDS 8 FLAIM databases 2nd containment (classes) contexts bindery services setting up 2nd objects naming rules/restrictions controls (LDAP) 2nd 3rd 4th 5th 6th 7th 8th 9th cracking tools crashed SYS volumes data recovery scenarios 2nd 3rd 4th 5th Create Replica operation background processes 2nd creating UImport data files awk language 2nd 3rd 4th creation timestamp Janitor process Critical Value Reset (CVR) channel CRON.NLM automation utility 2nd 3rd 4th 5th CVR (Critical Value Reset) channel |