Lines Matching +full:link +full:- +full:trigger +full:- +full:order +full:- +full:stop
1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
4 <meta http-equiv="content-type" content="text/html;charset=iso-8859-1">
7 <link href="scripts/style.css" type="text/css" rel="stylesheet">
12 <!-- #BeginDate format:En2m -->10-Mar-2014 05:07<!-- #EndDate -->
25 …se vulnerability to configuration errors and possibly hostile attack. The order of restriction pro…
27 … and upgrade circa 2003. Headway violations result in an optional <em>kiss-o'-death</em> (KoD) pac…
35 <p>In the original design the frequency file was written at one-hour intervals. This apparently mak…
45 <p>In order to speed response to initial startup when a reference clock is available, the clock is …
49 <p>The protocol machine is now restarted every several days in order to update certificates and lea…
53 …ization, /demobilization, system and peer restart, system peer change, panic stop and so forth.</p>
54 …the system log are more usefully directed to this file. The reports also trigger a trap packet tha…
55 …-6 monitoring protocol was designed circa 1988 the considered intent was that monitoring functions…
58 <h4>11. Two-step and timestamp capture</h4>
59 … was the two-step protocol in which the transmit timestamp is sent in a following message. However…