Translations by Zubin Bhuyan

Zubin Bhuyan has submitted the following strings to this translation. Contributions are visually coded: currently used translations, unreviewed suggestions, rejected suggestions.

115 of 15 results
3.
GNU Accounting Utilities is a set of utilities which reports and summarizes data about user connect times and process execution statistics.
2008-07-15
GNU Accounting Utilities is a set of utilities which reports and summarizes data about user connect times and process execution statistics.
4.
"Login accounting" provides summaries of system resource usage based on connect time, and "process accounting" provides summaries based on the commands executed on the system.
2008-07-15
"Login accounting" provides summaries of system resource usage based on connect time, and "process accounting" provides summaries based on the commands executed on the system.
12.
Modern computers support the Advanced Configuration and Power Interface (ACPI) to allow intelligent power management on your system and to query battery and configuration status.
2008-07-15
Modern computers support the Advanced Configuration and Power Interface (ACPI) to allow intelligent power management on your system and to query battery and configuration status.
17.
add and remove users and groups
2008-07-15
Add and remove users and groups
18.
This package includes the 'adduser' and 'deluser' commands for creating and removing users.
2008-07-15
This package includes the 'adduser' and 'deluser' commands for creating and removing users.
19.
- 'adduser' creates new users and groups and adds existing users to existing groups; - 'deluser' removes users and groups and removes users from a given group.
2008-07-15
- 'adduser' creates new users and groups and adds existing users to existing groups; - 'deluser' removes users and groups and removes users from a given group.
20.
Adding users with 'adduser' is much easier than adding them manually. Adduser will choose appropriate UID and GID values, create a home directory, copy skeletal user configuration, and automate setting initial values for the user's password, real name and so on.
2008-07-15
Adding users with 'adduser' is much easier than adding them manually. Adduser will choose appropriate UID and GID values, create a home directory, copy skeletal user configuration, and automate setting initial values for the user's password, real name and so on.
21.
Deluser can back up and remove users' home directories and mail spool or all the files they own on the system.
2008-07-15
Deluser can back up and remove users' home directories and mail spool or all the files they own on the system.
22.
A custom script can be executed after each of the commands.
2008-07-15
A custom script can be executed after each of the commands.
29.
Advanced Intrusion Detection Environment - static binary
2008-07-15
Advanced Intrusion Detection Environment - static binary
30.
This package contains the statically linked binary for "normal" systems.
2008-07-15
This package contains the statically linked binary for "normal" systems.
31.
Advanced Intrusion Detection Environment - Common files
2008-07-15
Advanced Intrusion Detection Environment - Common files
32.
AIDE is an intrusion detection system that detects changes to files on the local system. It creates a database from the regular expression rules that it finds from the config file. Once this database is initialized it can be used to verify the integrity of the files. It has several message digest algorithms (md5, sha1, rmd160, tiger, haval, etc.) that are used to check the integrity of the file. More algorithms can be added with relative ease. All of the usual file attributes can also be checked for inconsistencies.
2008-07-15
AIDE is an intrusion detection system that detects changes to files on the local system. It creates a database from the regular expression rules that it finds from the config file. Once this database is initialized it can be used to verify the integrity of the files. It has several message digest algorithms (md5, sha1, rmd160, tiger, haval, etc.) that are used to check the integrity of the file. More algorithms can be added with relative ease. All of the usual file attributes can also be checked for inconsistencies.
33.
This package contains base and configuration files that are needed to run the actual binaries.
2008-07-15
This package contains base and configuration files that are needed to run the actual binaries.
34.
You will almost certainly want to tweak the configuration file in /etc/aide/aide.conf or drop your own config snippets into /etc/aide/aide.conf.d.
2008-07-15
You will almost certainly want to tweak the configuration file in /etc/aide/aide.conf or drop your own config snippets into /etc/aide/aide.conf.d.