Known Vulnerabilities for License Utilities by Veritas

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationVeritasLicense Utilities-AllAllAll

Popular searches for License Utilities

Veritas NetBackup™ Commands Reference Guide

Veritas NetBackup Commands Reference Guide Reset password Old passwordYour password must be at least 8 characters long, cannot be your email address, must contain 1 or more numbers and must contain 1 or more letters.New passwordConfirm new passwordPlease enter search query.Search ... Veritas NetBackup Commands Reference Guide Last Published: 2018-02-16 Product s : NetBackup 8.1.1 . nbdeployutil --gather --bpimagelist=options --capacity --traditional --client hostname1, hostname2, ... | --clientlist=filename --hoursago=number --log=filename --master=hostname --nolog --output=directory --runtimestats -start date -end date . nbdeployutil --report --capacity --traditional --day-boundary=time dir1 dir2 dir# | --dirsfile=filename | --parentdir=directory --log=filename --nolog --overlap-details --runtimestats . The default report window starts at midnight and runs to 11:59:59 P.M. Specify the time value as hh:mm in 24 hour notation, where 6:00 A.M. is 06:00 and 6:00 P.M. is 18:00. NetBackup Filename Directory (computing) Command (computing) Veritas Technologies Password Log file Server (computing) Client (computing) Software license Input/output Utility software Data Software deployment Hostname Email address Reset (computing) Web search query 24-hour clock Window (computing)

Login | My HPE Software Center | My HPE Software Center

Login | My HPE Software Center | My HPE Software Center Sign in using your HPE Passport account to activate your software entitlements, obtain evaluations, manage your licenses, obtain free and updated software downloads. Hewlett Packard Enterprise Software Ubuntu Software Center Login Server (computing) Software license Free software Information technology Hewlett Packard Enterprise Networking Computer data storage Computer network Patch (computing) Subscription business model Cloud computing FAQ Internet of things Hybrid kernel Information Telecommunication Microsoft Access

© 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license. and Source URL Uptime Status