Translations by wangajing

wangajing has submitted the following strings to this translation. Contributions are visually coded: currently used translations, unreviewed suggestions, rejected suggestions.

15 of 5 results
1.
ubuntu-doc@lists.ubuntu.com (Ubuntu Documentation Project)
2008-05-28
ubuntu-doc@lists.ubuntu.com(Ubuntu文档工程)
9.
Computer networks are often comprised of diverse systems, and while operating a network made up entirely of Ubuntu desktop and server computers would certainly be fun, some network environments must consist of both Ubuntu and <trademark class="registered">Microsoft</trademark><trademark class="registered">Windows</trademark> systems working together in harmony. This section of the <phrase>Ubuntu</phrase> Server Guide introduces principles and tools used in configuring your Ubuntu Server for sharing network resources with Windows computers.
2008-05-28
12.
<emphasis role="bold">File and Printer Sharing Services</emphasis>. Using the Server Message Block (SMB) protocol to facilitate the sharing of files, folders, volumes, and the sharing of printers throughout the network.
2008-05-28
<emphasis role="bold">文件与打印机共享服务</emphasis>. 服务器信息块(Server Message Block,SMB)协议可以使文件、文件夹、系统卷和打印机的共享变得更加容易。
13.
<emphasis role="bold">Directory Services</emphasis>. Sharing vital information about the computers and users of the network with such technologies as the Lightweight Directory Access Protocol (LDAP) and Microsoft <trademark class="registered">Active Directory</trademark>.
2008-05-28
<emphasis role="bold">目录服务</emphasis>。借助轻量目录访问协议(Lightweight Directory Access Protocol ,LDAP) 和微软的活动目录( Microsoft <trademark class="registered">Active Directory</trademark>)等技术,可以共享网络计算机和用户的重要信息。
14.
<emphasis role="bold">Authentication and Access</emphasis>. Establishing the identity of a computer or user of the network and determining the information the computer or user is authorized to access using such principles and technologies as file permissions, group policies, and the Kerberos authentication service.
2008-05-28
<emphasis role="bold">认证和权限</emphasis>。借助于文件权限、组策略、Kerberos认证服务等原理和技术,可以建立网络中计算机和用户身份的识别和信息的授权访问。