Daily Archives

Articles indexed Thursday June 23 2011

Page 10/14 | < Previous Page | 6 7 8 9 10 11 12 13 14  | Next Page >

  • Xorg configuration file on Debian Testing

    - by nubicurio
    I cannot find the Xorg configuration file on my newly installed Debian on my tablet-pc, so I followed this tutorial http://wiki.debian.org/Xorg and ran the command "Xorg -configure", to which I got the following error messages: (EE) Failed to load module "vmwgfx" (module does not exist, 0) (EE) vmware: Please ignore the above warnings about not being able to load module/driver vmwgfx (++) Using config file: "/root/xorg.conf.new" (==) Using system config directory "/usr/share/X11/xorg.conf.d" FATAL: Module fbcon not found. Number of created screens does not match number of detected devices. Configuration failed. Dose anyone know what this means and how I should proceed? Why is there a warning about vmware, and what is this fbcon module?

    Read the article

  • Tools/Tips to reduce the files/directories in C: which is SSD on Windows 7.

    - by prosseek
    I bought a SSD to install it as C: drive on Windows 7. As the SSD size is relatively small, I need to come up with an idea to reduce the files/directories in C:. What I found is as follows. Run WinDirStat to check how the C: is used. Remove the hibernate file (if you don't use it) powercfg –h off http://helpdeskgeek.com/windows-7/windows-7-delete-hibernation-file-hiberfil-sys/ Symbolic link files and directories to different drive. I'm not sure if this is safe way to go, I asked another post to ask about it. mklink /d e:\windows\installer c:\windows\installer Install software to E: directory, not C: directory. Create E:\Program Files What other tools or tips do you have?

    Read the article

  • How to detect a background program (in Windows 7) which takes active focus automatically?

    - by Sachin Shekhar
    A background process/program steals focus from my currently active application. It disturbs me a lot when I type in an app or control an app using keyboard or play online flash games in full-screen. I want to remove this program from my PC, but I'm unable to detect it. I've analyzed all processes & scanned for viruses. All things are right from this side. I don't want to change focus behavior using registry tweak. Please, help me detecting that app..

    Read the article

  • How do you change color of gradient image found on the net?

    - by askmoo
    For example, I found this gradient image (randomly chosen) How do you change its color in Photoshop or GIMP? I tried overlay but it covers everything with that color. For example I want to have white-to-red gradient image. Possible to do it in a quick way via any of these tools or I have to make it from the scratch? This is the image before and after I use the tool suggested. You can see the horizontal striped on the after image.

    Read the article

  • On an unencrypted public wi-fi hotspot, what exactly is a packet sniffer doing to get another computer's packet?

    - by hal10001
    I get mixed results when reading information security articles, some of them stating that in order to do something similar you need to also setup some sort of honeypot with a running access point and local Web server to intercept traffic. Then other articles seem to indicate you don't need that, and you can just run Wireshark, and it will detect all packets being sent on the network. How could that be, and what exactly is a packet sniffer doing to get those packets? Does this involve intercepting wireless signals transmitted over the wireless protocol and frequency via the NIC on the computer running a program like Wireshark?

    Read the article

  • Restoring a SD card after using it to root a device

    - by Raz
    I recently purchased the Nook Touch reading device. I rooted it using the instructions on nookdevs.com Rooting included using win32diskimager to somehow transfer an .img file onto the card. Rooting is now completed and as far as I can tell, I don't need to keep the files used on the SD card, which has been reduced from a 3.5 GB or so unit to a 75 MB unit. Is there a simple way for me to somehow reformat the SD card to its original state or at least 3.5 GB. I cannot simply format it.

    Read the article

  • Method for imaging a HDD? [closed]

    - by Sonny Ordell
    Possible Duplicate: Imaging new hard drive in Windows 7 laptop? I have to image my 320gb Laptop HDD before I send it in for repairs. The HDD is likely going to get replaced, and I would ideally like to be able to restore everything as I have it now without having to reinstall my OSes, programs and place all my files back again. I can make space on an external HDD I have, so am just looking for how I should go about this. Should I just use dd with a linux rescue cd? Or is there perhaps a more suitable program with its own rescue disk?

    Read the article

  • Is there a way to add a custom favicon to an App Tab?

    - by Iszi
    Since the release of Firefox "5", I've come to really love the new "App Tabs" feature. However, I've now realized that several internal websites at work do not have favicons. So, when I make an App Tab out of these sites, there's only a "blank page" icon in the tab. Perhaps I wouldn't mind so much if there was only one, but there's at least two or three of these. So, it's just a bit annoying to have to mouse-over the App Tabs to figure out which is what. I've tried using Favicon Picker 2 to change the bookmark icons, but it only does exactly that - changes the icon in the bookmarks folder. It doesn't change the favicon that's displayed next to the URL in the Address Bar, or the one next to the page title in tabs - the latter being that which is used for the App Tab icon. So, is there a plugin or other client-side (and preferably "Joe User" friendly) method to assign an icon to a web page or domain, that will be used in the tab bar?

    Read the article

  • How copy with shell commands(Linux) from 1 computer have (permanent url + open port) to 2 computer (secure way)?

    - by BenBen
    How copy with shell commands(Linux) from remote(my office computer) computer (permanent url + open port) to my (home) computer home/remote_computer_user/Desktop/test1.txt to my home computer home/home_computer_user/Downloads/ ? What I am doing: 1. ssh <user>@<computer1address> -p <port> :: success to get remote computer shell () 2. (I think I should use scp , but I dont how exactly in my case) Please if you can, write the exact commands that i should to from the shell Thanks in advance

    Read the article

  • How to chain GRUB2 for Ubuntu 10.04 from Truecrypt & its bootloader (multi boot alongside Windows XP partition)?

    - by Rob
    I want Truecrypt to ask for password for Windows XP as usual but with the standard [ESC] option, on selecting that, i.e via Escape key, I want it to find the grub for the (unencrypted) Ubuntu install. I've installed Windows XP on the 120Gb hard drive of a Toshiba NB100 netbook then partitioned to make room for Ubuntu 10.04 and installed that after the Windows XP install. When I encrypt Windows XP, Truecrypt will overwrite the grub entry in the master boot record (MBR), I believe (?) and I won't be able to choose between XP and Ubuntu anymore. So I need to restore it back. I've searched fairly extensively for answers on Ubuntu forums and elsewhere but have not yet found a complete answer that covers all eventualities, scenarios and error messages, or otherwise they talk of legacy GRUB and not GRUB2. Ubuntu 10.04 uses GRUB2. My setup: Partitions: Windows XP, NTFS (to be encrypted with Truecrypt), 40Gb /boot (Ext4, 1Gb) Ubuntu swap, 4Gb Ubuntu / (root) - main filesystem (20gb) NTFS share, 55Gb I know that the Truecrypt boot loader replaces the GRUB when boot up because I've already tried it on another laptop. I want boot loader screen to look something like the usual: Truecrypt Enter password: (or [ESC] to skip) password is for WindowsXP and on pressing [ESC] for it to find the Ubuntu grub to boot from Thanks in advance for your help. The key area of the problem is how to instruct Truecrypt when escape key is pressed, and how the Grub/Ubuntu can be made visible to the truecrypt bootloader to find it, when the esc key is pressed. Also knowing as chaining.

    Read the article

  • Vim Misbehaving

    - by zchtodd
    I'm not sure what changed, but lately Vim has been driving me nuts. Whenever I try to do a column mode insert, vim takes my current character and adds to the last character I inserted. For example, the first time I do a block comment by inserting # on multiple lines, it works fine. The next time, however, I end up with ## inserted on every line, and the problem just compounds from there. To do this, I'm hitting Ctrl-V, down or up arrow, Shift-I, #, and then Esc. This worked for months, but now it seems to be pasting extra stuff in. I've tried disabling all .vimrc files, but the behavior remains the same. Any ideas?

    Read the article

  • Minimize VirtualBox Hard Drive disk

    - by Aviv
    I have Ubuntu Server 10.04 TLS installed on a Virtual Machine in a VirtualBox. The size of the Hard Drive is dynamic growing hard drive and the maximum is 32GB. At the beginning i had 4GB on the Hard Drive and the size of the .vdi was 4GB. Lately the size of data on the disk is 15GB but the size of the .vdi is almost 32GB. Why is that? How can i pack / optimize / defrag the HD so it will be the same size of the data on the disk? Thanks.

    Read the article

  • HTTP responses curl and wget different results

    - by Fab
    To check HTTP response header for a set of urls I send with curl the following request headers foreach ( $urls as $url ) { // Setup headers - I used the same headers from Firefox version 2.0.0.6 $header[ ] = "Accept: text/xml,application/xml,application/xhtml+xml,"; $header[ ] = "text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5"; $header[ ] = "Cache-Control: max-age=0"; $header[ ] = "Connection: keep-alive"; $header[ ] = "Keep-Alive: 300"; $header[ ] = "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7"; $header[ ] = "Accept-Language: en-us,en;q=0.5"; $header[ ] = "Pragma: "; // browsers keep this blank. curl_setopt( $ch, CURLOPT_URL, $url ); curl_setopt( $ch, CURLOPT_USERAGENT, 'Googlebot/2.1 (+http://www.google.com/bot.html)'); curl_setopt( $ch, CURLOPT_HTTPHEADER, $header); curl_setopt( $ch, CURLOPT_REFERER, 'http://www.google.com'); curl_setopt( $ch, CURLOPT_HEADER, true ); curl_setopt( $ch, CURLOPT_NOBODY, true ); curl_setopt( $ch, CURLOPT_RETURNTRANSFER, true ); curl_setopt( $ch, CURLOPT_FOLLOWLOCATION, true ); curl_setopt( $ch, CURLOPT_HTTPAUTH, CURLAUTH_ANY ); curl_setopt( $ch, CURLOPT_TIMEOUT, 10 ); //timeout 10 seconds } Sometimes I receive 200 OK which is good other time 301, 302, 307 which I consider good as well, but other times I receive weird status as 406, 500, 504 which should identify an invalid url but when I open it on the browser they are fine for example the script returns http://www.awe.co.uk/ => HTTP/1.1 406 Not Acceptable and wget returns wget http://www.awe.co.uk/ --2011-06-23 15:26:26-- http://www.awe.co.uk/ Resolving www.awe.co.uk... 77.73.123.140 Connecting to www.awe.co.uk|77.73.123.140|:80... connected. HTTP request sent, awaiting response... 200 OK Does anyone know which request header I am missing or adding in excess?

    Read the article

  • Windows 7 scheduled task returns 0x2

    - by demmith
    I have identical scheduled tasks running in Windows XP Pro and Windows 7. The XP Pro one runs fine, the Windows 7 one always returns 0x2 (which means, "The system cannot find the file specified"; however, executing from the command line is no problem) in the Last Run Result column of the Task Scheduler UI. The scheduled task executes a .bat file daily. The .bat file contains a call to execute a Perl script. As I stated in the previous paragraph, it executes under XP without any trouble but under Windows 7, no dice. The task under Windows 7 is set to "run whether the user is logged on or not." In this case it is me, I am the only user of the system. It is also set to "Run with highest privileges." And it is not hidden. The .bat file executes perfectly well from the command line - it calls the Perl script as expected and the Perl script does its thing. I have searched far and wide looking for an appropriate answer to this issue. So far I have found nothing. What the devil is going on with this Win7 scheduled task? I am ready to pull my hair out.

    Read the article

  • Looking for a Software to harden Windows machines

    - by MosheH
    I'm a network administrator of a small/medium network. I'm looking for a software (Free or Not) which can harden Windows Computers (XP And Win7) for the propose of hardening standalone desktop computers (not in domain network). Note: The computers are completely isolated (standalone), so i can't use active directory group policy. moreover, there are too many restriction that i need to apply, so it is not particle to set it up manual (one by one). Basically what I’m looking for is a software that can restrict and disable access for specific user accounts on the system. For Example: User john can only open one application and nothing else -- He don’t see no icon on the desktop or start menu, except for one or two applications which i want to allow. He can't Right click on the desktop, the task-bar icons are not shown, there is no folder options, etc... User marry can open a specific application and copy data to one folder on D drive. User Dan, have access to all drives but cannot install software, and so on... So far ,I've found only the following solutions, but they all seems to miss one or more feature: Desktop restriction Software 1. Faronics WINSelect The application seems to answer most of our needs except one feature which is very important to us but seems to be missing from WINSelect, which is "restriction per profile". WINSelect only allow to set up restrictions which are applied system-wide. If I have multiple user accounts on the system and want to apply different restrictions for each user, I cant. Deskman (No Restriction per user)- Same thing, no restriction per profile. Desktop Security Rx - not relevant, No Win7 Support. The only software that I've found which is offering a restriction per profile is " 1st Security Agent ". but its GUI is very complicated and not very intuitive. It's worth to mention that I'm not looking for "Internet Kiosk software" although they share some features with the one I need. All I need is a software (like http://www.faronics.com/standard/winselect/) that is offering a way to restrict Windows user interface. So IF anybody know an Hardening software which allows to set-up user restrictions on Windows systems, It will be a big, big, big help for me! Thanks to you all

    Read the article

  • rsync to cifs mount but preserve permissions

    - by weberwithoneb
    I'm backing up a linux server to a windows share. I'm currently mounting the windows share with cifs and using rsync for incremental backups. File permissions and ownership are not being preserved, as should be expected after reading this samba document: The core CIFS protocol does not provide unix ownership information or mode for files and directories. Because of this, files and directories will generally appear to be owned by whatever values the uid= or gid= options are set, and will have permissions set to the default file_mode and dir_mode for the mount. How can I achieve my goal of preserving unix file permissions while writing to a windows share? Is there another network file system that would allow me to do this? Thanks.

    Read the article

  • Geek Deals: Cheap SSDs, Discounted Monitors, and Free Apps

    - by Jason Fitzpatrick
    Looking to save some cash while stocking up on computers, peripherals, apps, and other goodies? Hit up our deal list for discounts on all manner of geeky gear. We’ve combed the net and grabbed some fresh off the press deals for you to take advantage of. Unlike traditional brick and mortar sales internet deals are fast and furious so don’t be surprised if by the time you get to a particularly hot deal the stock is gone or the uses-per-coupon rate has been exceeded. What is a Histogram, and How Can I Use it to Improve My Photos?How To Easily Access Your Home Network From Anywhere With DDNSHow To Recover After Your Email Password Is Compromised

    Read the article

  • June 23, 1983: First Successful Test of the Domain Name System [Geek History]

    - by Jason Fitzpatrick
    Nearly 30 years ago the first Domain Name System (DNS) was tested and it changed the way we interacted with the internet. Nearly impossible to remember number addresses became easy to remember names. Without DNS you’d be browsing a web where numbered addresses pointed to numbered addresses. Google, for example, would look like http://209.85.148.105/ in your browser window. That’s assuming, of course, that a numbers-based web every gained enough traction to be popular enough to spawn a search giant like Google. How did this shift occur and what did we have before DNS? From Wikipedia: The practice of using a name as a simpler, more memorable abstraction of a host’s numerical address on a network dates back to the ARPANET era. Before the DNS was invented in 1983, each computer on the network retrieved a file called HOSTS.TXT from a computer at SRI. The HOSTS.TXT file mapped names to numerical addresses. A hosts file still exists on most modern operating systems by default and generally contains a mapping of the IP address 127.0.0.1 to “localhost”. Many operating systems use name resolution logic that allows the administrator to configure selection priorities for available name resolution methods. The rapid growth of the network made a centrally maintained, hand-crafted HOSTS.TXT file unsustainable; it became necessary to implement a more scalable system capable of automatically disseminating the requisite information. At the request of Jon Postel, Paul Mockapetris invented the Domain Name System in 1983 and wrote the first implementation. The original specifications were published by the Internet Engineering Task Force in RFC 882 and RFC 883, which were superseded in November 1987 by RFC 1034 and RFC 1035.Several additional Request for Comments have proposed various extensions to the core DNS protocols. Over the years it has been refined but the core of the system is essentially the same. When you type “google.com” into your web browser a DNS server is used to resolve that host name to the IP address of 209.85.148.105–making the web human-friendly in the process. Domain Name System History [Wikipedia via Wired] What is a Histogram, and How Can I Use it to Improve My Photos?How To Easily Access Your Home Network From Anywhere With DDNSHow To Recover After Your Email Password Is Compromised

    Read the article

  • How Fiber Optic Cables Are Made and Laid Across the Sea [Science]

    - by Jason Fitzpatrick
    We don’t know about you but yesterday’s video about how fiber optic cables work just made us more curious. Check out how the cables are made and laid across the sea. In the above video we see how fiber optic strands are manufactured, including how the draw tower mentioned in yesterday’s video works. Once the strands are manufactured, where do they go and how are they used? In the video below we see Alcatel-Lucent’s Ile de Sein, one of the largest and most powerful cable laying ships in the world. Check out the video to see cable storage wells that look like small stadiums. Finding out how the cables are made and what kind of planning and machinery it takes to lay them across the ocean is just as interesting as how they work. How It’s Made: Fiber Optics [YouTube] Undersea Cable [YouTube] What is a Histogram, and How Can I Use it to Improve My Photos?How To Easily Access Your Home Network From Anywhere With DDNSHow To Recover After Your Email Password Is Compromised

    Read the article

  • Microsoft`s SkyDrive Abandons Silverlight

    SkyDrive Microsoft s cloud storage service has just received a hefty makeover that has its users as well as Silverlight developers talking. SkyDrive s site is new and improved and is successful in providing a better user experience but the changes may have some Silverlight developers feeling a bit worried when it comes to Microsoft s future plans for their beloved framework.... Display the VeriSign seal And increase sales by an average of 24%. Start your trial today

    Read the article

  • WhisperCore : une application qui permet de contrôler l'accès aux données personnelles contenues sur les smartphones Android

    WhisperCore : une application qui permet de contrôler l'accès aux données personnelles Contenues sur le smartphone L'accès et la manipulation des données personnelles des utilisateurs des terminaux mobiles par les applications est au coeur de l'actualité. Un chercheur en sécurité vient cependant de publier une application gratuite (plus exactement une mise à jour de la beta) sous Android qui permet de mieux contrôler les données auxquelles auront accès les applications tiers installées sur le téléphone. L'application WhisperCore est donc une solution de sécurisation des contenus de smatphones. Elle peut par ex...

    Read the article

  • Un iPhone 5 pour septembre ? Il embarquerait un processeur double coeur A5 et iOS 5

    Un iPhone 5 pour septembre ? Il embarquerait un processeur double coeur A5 et iOS 5 Selon Bloomberg, Apple devrait lancer officiellement son nouvel iPhone (iPhone 4S ou iPhone 5) en septembre prochain. La prochaine version du smartphone sera équipée du processeur double coeur A5 déjà à l'oeuvre dans l'iPad2. Ce processeur devrait améliorer considérablement la vitesse d'exécution des applications iPhone. L'iPhone 5 disposera par ailleurs d'un appareil photo de 8 mégapixels au lieu de 5 sur l'iPhone 4. Côté OS, le smartphone sera équipé - sans surprise - d'iOS 5, dévoilé au début du mois lors du WWDC. Le nouvel OS, a...

    Read the article

  • Android : la plainte d'Oracle risque de perdre de l'ampleur, l'organisme officiel chargé des brevets rejette 17 demandes d'Oracle

    Android : La plainte d'Oracle contre Google risque de perdre de l'ampleur L'organisme officiel chargé des brevets rejette 17 demandes d'Oracle Mise à jour du 23/06/11 L'organisme officiel américain chargé des brevets vient d'entrer en jeu dans l'affaire entre Oracle et Google sur l'utilisation de Java dans Android. Oracle accuse Google de violation de 7 de ses brevets (ou plus exactement de brevets dont il a hérité avec le rachat de Sun). Pour chaucun, les avocats d'Oracle ont déposé plusieurs demandes (des « claims »). Après examen du premier brevet, le US Patent and Trademark Office (USPTO) vient d'invalider 17 des 21 demandes d'Oracle...

    Read the article

  • Nuads : les débuts de la publicité interactive avec Kinect, par Microsoft

    Nuads : les débuts de la publicité interactive avec Kinect Par Microsoft Le capteur de mouvements de Microsoft peut être exploité dans de multiples scénarios différents. Y compris la publicité. Il fallait s'y attendre, lors du salon International Advertising Festival qui se déroule actuellement à Cannes, Microsoft a levé le voile sur une nouvelle technologie exploitant les capacités du Kinect pour ouvrir la voie à la publicité interactive à la télévision. La technologie, baptisée Nuads (Natural User Interface Ads), utilise la reconnaissance gestuelle couplée à la reconnaissance vocale, qui a été introduite récemmen...

    Read the article

  • Java EE 5, d'Antonio Goncalves, critique par Philippe Vialatte

    Je vous propose une critique pour le livre Java EE5 : EJB 3.0 - JPA - JSP - JSF - Web services - JMS - GlassFish 3 - Maven 3: Amazon.fr: Antonio Goncalves: Livres [IMG]http://images-eu.amazon.com/images/P/2212126581.08.LZZZZZZZ.jpg[/IMG] Citation: Ce cahier détaille la conception d'un site de e-commerce avec UML et Java Enterprise Edition 5. Inspirée du Java Petstore, l'étude de cas se construit au fil des chapitres en appliq...

    Read the article

< Previous Page | 6 7 8 9 10 11 12 13 14  | Next Page >