How does Kerberos use timestamps?
Kerberos is based on encrypted timestamps. If theres more than a 5-minute difference between the KDC, client, and service computers,…
How can I tell what sites have links to (inbound links) to my site according to Google? How can I tell what my Google PageRank is?
How can I tell what sites have links to (inbound links) to my site? There are two ways to do…
What is the sticky bit and where is it used?
The sticky bit is set for the /Users/Shared folder by default. This makes this folder append only so that users…
FileMaker & Active Directory
How can security be implemented with FileMaker external authentication with Windows Active Directory? How does the username & password work…
What is important about how sending passwords over open networks and kerberos? What does the user see? Explain Apples vision of highest security in open and shared wireless networks using a mix of Mac OS X client and server products and Kerberos. How is Kerberos better than everything that came before it? Where was Kerberos developed and what mythological allusion does it derive its name from?
Kerberos does not send passwords in the clear or encrypted — in fact, it uses a three-part key-based scheme to…
enable/disable File Access Control List
How does enable/disable File Access Control List on a volume affect whether or not you can “Use Standard POSIX behavior”…
New Login features in OS X 10.4
– Show input menu (shows list of users) – use VoiceOver at log-in window (will speak everything to you at…
Identify new features of User account creation in Mac OS X 10.4?
Parental Controls: mail – allowed mail to be sent to list Finder – Some limits, simple finder – open all…
What is a computer list account and what does it define?
a list of computers that have the same preference settings and are available to the same set of users and…
Where is the apache configuration file as installed by default for a Mac OS X ?
/etc/httpd/httpd.conf