553 results found for “Thrifty medicines https://simplemedrx.top”
-
KerioControl - Interface Articles
Changing MAC Addresses of Network Interfaces
Overview MAC addresses are unique identifiers that identify devices in a network. Some routers or ISPs (Internet Service ...
-
KerioControl - Administration Articles
Using Safesearch in Kerio Control
Overview The SafeSearch module in Kerio Control blocks inappropriate or explicit content in search results of Kerio Cont ...
-
KerioControl - Administration Articles
Disabling 2-Step Verification in Kerio Control Statistics
Overview If you lose your mobile device, ask your system administrator to disable the 2-step verification for you. If yo ...
-
KerioControl - General Information Articles
Configuring URL Groups for Content Rules
Overview URL groups help the administrator to define content rules. A URL group rule is processed faster than separate r ...
-
KerioControl - Reseller Account Articles
Unable to View Customer's License From Reseller Account in the GFI Accounts Portal
Overview GFI Resellers have the ability to view their customer's information in their GFI Accounts Portal account. This ...
-
KerioControl - Licensing Issue Articles
Customer Impersonation done by GFI Support Agents
Overview GFI Support agents have access to the GFI Accounts Portal and are able to see customer's account information as ...
-
KerioControl - General Information Articles
Troubleshooting Slow WiFi in Kerio Control
Issue encountered WiFi connection is slow. Cause Another WiFi access point interferes with your device. Solutions Change ...
-
KerioControl - Administration Articles
Creating an SSL Certificate Signed by Local Authority
Overview This article will show you how to create a new SSL certificate if the old one is not valid anymore. Back to t ...
-
KerioControl - Administration Articles
Configuring Parameter 66 in DHCP Server
Overview The DHCP protocol assigns IP addresses. Apart from these addresses, you can also send additional parameters via ...
-
KerioControl - Administration Articles
Configuring Protocol-Specific Intrusions
Overview Some intrusions may target security weaknesses in specific application protocols. Therefore, some security rule ...