4.8 - FONCTIONS SPECIALES .................................................................................................... 91
a) Copier ............................................................................................................................................... 92
b) Coller ................................................................................................................................................ 93
4.8.5 - Reverse SSH ................................................................................................................. 94
4.8.6 - Calculatrice Locale ......................................................................................................... 94
4.8.7 - Volume Local ................................................................................................................. 95
5.1.1 - Mode d'accès ............................................................................................................... 100
a) Equilibrage de charge ..................................................................................................................... 100
b) Passerelle RDS ou TS .................................................................................................................... 100
5.1.3 - Authentification............................................................................................................. 102
5.1.7 - Performances ............................................................................................................... 110
a) Protocole StoreFront ...................................................................................................................... 114
c) Protocole TCP/IP + HTTP............................................................................................................... 115
d) Accès direct .................................................................................................................................... 115
5.2.5 - Authentification............................................................................................................. 118
c) Redirection des ressources ............................................................................................................ 120