| [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] UImport data files creating (awk) 2nd 3rd 4th UImport utility data file formats data files invoking functional overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th import control field definitions 2nd 3rd usage guidelines 2nd import modes 2nd installation requirements limitations of 2nd MAKEUSER.EXE utility roots mass user creation sample control file 2nd unauthorized security access security overview 2nd Unicode table initialization (NDS) University of Delaware Web site NTP server status checks Unix bindery services enabling eDirectory cache subsystems 2nd file system selection 2nd performance tuning considerations 2nd 3rd 4th 5th 6th 7th 8th 9th thread usage 2nd 3rd eDirectory backups restoring (ndsbackup utility) 2nd 3rd 4th grep utility sed utility Unix platform LDAP Server for NDS tools Unix systems DIB sets locating 2nd 3rd resources LinuxShelf.com Web site VERITAS file system 2nd unknown objects as cause of data inconsistencies troubleshooting 2nd 3rd 4th 5th 6th 7th 8th unmanageable objects icon indicator unscoped scope (SLP) 2nd updating multiple objects 2nd URLs SLP services bindery.novell ldap.novell ndap.novell nlsmeter.novell nwserver.novell portal.novell rconsole.novell rms.novell sapsrv.novell securerconsole.novell smdr.novell srs.novell timesync.novell Usenet newsgroups hacker resources user accounts lost recovering (third-party data recovery tools) 2nd 3rd user agents (UAs) SLP agent type 2nd 3rd User Defined indexes (eDirectory) user-created partitions ID number parent-child relationships 2nd replica types 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th users groups adding to 2nd multiple accounts identifying 2nd 3rd restriction options Auditcon utility security equivalencies checking 2nd 3rd utilities knowledgability management strategies 2nd 3rd ReadAttr32.EXE ReadClass32.EXE |