Solved

Backup routines and VLM/ODI

Posted on 1997-05-29
1
307 Views
Last Modified: 2008-03-06
Which backup routine is the best to use for a server.Which VLM is neccesary to connect with server, login-precedure and printer?can you give me a description what the different vlm do?
0
Comment
Question by:crimz
1 Comment
 
LVL 3

Accepted Solution

by:
brauner071697 earned 50 total points
ID: 1589977
I think Cheyennes Arcserve 6.0 is for the Novell Server.
To your second question:

CONN.VLM     - NetWare connection table manager  
IPXNCP.VLM   - NetWare IPX transport module  
TRAN.VLM     - NetWare transport multiplexor module  
SECURITY.VLM - NetWare security enhancement module  
NDS.VLM      - NetWare directory services protocol module  
BIND.VLM     - NetWare bindery protocol module  
PNW.VLM      - Personal NetWare protocol module  
NWP.VLM      - NetWare DOS Requestor NetWare protocol module  
FIO.VLM      - NetWare file input-output module  
GENERAL.VLM  - NetWare general purpose function module
REDIR.VLM    - NetWare DOS redirector module  
PRINT.VLM    - NetWare printer redirection module
NETX.VLM     - NetWare workstation shell module
AUTO.VLM     - NetWare auto-reconnect module
RSA.VLM      - NetWare RSA authentication module

If you need more info I think you should look at Novell
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How do I image Dell Laptop 5 351
Finding Zenworks Server version 1 478
Trusted Applications 1 443
Sync Widnows 2008 Active Directory with eDirectory 5 1,444
Google always has something new and amazing up its sleeve, and the most current thing that they have been working on is another step in the evolution of Google Search, from machine learning to its brilliant successor, deep learning.
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question