
Using this “Virtual Private Network” (VPN) connection allows you to access services that are restricted to machines within the institute’s network or that authenticate your access based on your machine being on the institute’s network. We run a Cisco VPN concentrator that allows a remote user to connect to a server at the institute so their machine can appear to be running from within the institute’s network. What follows is more or less literally copied from the computing support pages of the Harvey Mudd College Department of Mathematics, Claremont, CA.
SETTING UP A VPN PROXY SERVER FOR MY MAC HOW TO
How to use your iPhone as a document scanner. How to display the cellular signal strength in dB mW. Configuring Mac OS X Server 10.5 Software Update for Mac OS X 10.6 and 10.7. Connecting to our VCS using a Mac or Windows PC. Searching the Exchange Global Address List. How to send a SMS text from the command line. More than one dot in a graphics filename. Using OpenSSH keys with a Tectia SSH server. What is Secure Shell (SSH) and why do I need it?. Secure Shell (SSH) and encryted connections. Managing access control lists and extended file attributes. Wiederherstellung aus einem Time Machine Backup. Installing Xcode 3.2.6 on Mac OS X 10.7.
Authorize users to run a program from within Xcode. Using an external USB Bluetooth interface. Listing the configured directory services. Scrolling problems with the Apple mouse.
File create fails in /System/Library/Caches.MATLAB license provisioning for MacBooks.