Monthly Archives

Articles indexed in March 2011

Page 119/223 | < Previous Page | 115 116 117 118 119 120 121 122 123 124 125 126  | Next Page >

  • Displaying XML in Chrome Browser

    - by Josh
    I love the Chrome browser but I use XML quite a lot in my development work and when I view it in Chrome I just get the rendered text. I know that the source view is slightly better but I'd really like to see the layout and functionality that IE adds to XML namely: Highlighting Open/close nodes Any ideas how I can get this on Chrome? Thanks, Josh UPDATE: The XMLTree Extension is available on Google Chrome Extension Beta Site. Thanks again for your help.

    Read the article

  • Why is OpenSSH not using the user specified in ssh_config?

    - by Jordan Evens
    I'm using OpenSSH from a Windows machine to connect to a Linux Mint 9 box. My Windows user name doesn't match the ssh target's user name, so I'm trying to specify the user to use for login using ssh_config. I know OpenSSH can see the ssh_config file since I'm specifying the identify file in it. The section specific to the host in ssh_config is: Host hostname HostName hostname IdentityFile ~/.ssh/id_dsa User username Compression yes If I do ssh username@hostname it works. Trying using ssh_config only gives: F:\>ssh -v hostname OpenSSH_5.6p1, OpenSSL 0.9.8o 01 Jun 2010 debug1: Connecting to hostname [XX.XX.XX.XX] port 22. debug1: Connection established. debug1: permanently_set_uid: 0/0 debug1: identity file /cygdrive/f/progs/OpenSSH/home/.ssh/id_rsa type -1 debug1: identity file /cygdrive/f/progs/OpenSSH/home/.ssh/id_rsa-cert type -1 debug1: identity file /cygdrive/f/progs/OpenSSH/home/.ssh/id_dsa type 2 debug1: identity file /cygdrive/f/progs/OpenSSH/home/.ssh/id_dsa-cert type -1 debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3p1 Debia n-3ubuntu5 debug1: match: OpenSSH_5.3p1 Debian-3ubuntu5 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_5.6 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-ctr hmac-md5 none debug1: kex: client->server aes128-ctr hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: Host 'hostname' is known and matches the RSA host key. debug1: Found key in /cygdrive/f/progs/OpenSSH/home/.ssh/known_hosts:1 debug1: ssh_rsa_verify: signature correct debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: Roaming not allowed by server debug1: SSH2_MSG_SERVICE_REQUEST sent debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Trying private key: /cygdrive/f/progs/OpenSSH/home/.ssh/id_rsa debug1: Offering DSA public key: /cygdrive/f/progs/OpenSSH/home/.ssh/id_dsa debug1: Authentications that can continue: publickey debug1: No more authentication methods to try. Permission denied (publickey). I was under the impression that (as outlined in this question: How to make ssh log in as the right user?) specifying User username in ssh_config should work. Why isn't OpenSSH using the username specified in ssh_config?

    Read the article

  • Can I set up a 2nd home wireless router, with router2 connecting to the internet through a desktop which is wirelessly connected to router1?

    - by gil b.
    Hi, I apologize for the crudeness of my MSPaint drawing, but please view my diagram of what I'd like to accomplish: Proposed home network architecture Currently, all devices are connected to 1 wireless router. I would like to make my own subnet, with a box in-between my subnet and the shared wireless router, so that I can learn about IDS, traffic analysis, etc. I was also given a cisco PIX firewall to play around with, and it'd be an added bonus if I could incorporate that into my network. The reason for this proposed architecture is so that I can monitor all MY traffic, without seeing anything going on with my roommates' traffic. my MAIN Question is, is it possible to have my desktop connect to the wireless router with internet via wireless card AND share that connection via the ethernet card, hooked to wireless router 2? cable modem - wireless router - desktop pc connected wirelessly - wireless router 2 getting internet from wired connection to desktop pc - laptops connected wirelessly The PIX can be left out for now, but I'm wondering if it could eventually be incorporated? THANKS!

    Read the article

  • osx split external hard drive partition

    - by Bart
    Hi, I currently have a 640GB external HD that has 1 partition formatted as HSF+ Now I want to split some of the free space into a new FAT32 partition, without having to reformat the whole HD and losing all my data. I read that I'm supposed to be able to add new partitions in the Hard Disc Utility by clicking the "+" sign, without any loss of data. But in my case the "+" is not clickable and it says that this partition cannot be altered. Can anyone tell me how to proceed. Or is it impossible without reformatting the whole disc? Thanks ps: I'm running osx snow leopard 10.6.6

    Read the article

  • In Windows, a batch file with a recursive for loop and a file name including blanks

    - by uvts_cvs
    Hello, I have a folder tree, like this (it's only an example, it will be deeper in my real case): C:\test | +---folder1 | foo bar.txt | foobar.txt | +---folder2 | foo bar.txt | foobar.txt | \---folder3 foo bar.txt foobar.txt My files have one or more spaces in the name and I need to perform a command on them, so I am interested in foo bar.txt but not in foobar.txt. I tried (inside a batch file): for /r test %%f in (foo bar.txt) do if exist %%f echo %%f where the command is the simple echo. It does not work because the space is skipped and I get no output. This works but it is not what I need: for /r test %%f in (foobar.txt) do if exist %%f echo %%f It prints: C:\test\folder1\foobar.txt C:\test\folder2\foobar.txt C:\test\folder3\foobar.txt I tried using the quotation mark (") but it does not work: for /r test %%f in ("foo bar.txt") do if exist %%f echo %%f It does not work because the quotation mark is still included in the output: C:\test\folder1\"foo bar.txt" C:\test\folder2\"foo bar.txt" C:\test\folder3\"foo bar.txt"

    Read the article

  • Having Trouble Ripping Some CD's

    - by James
    Hi, When I buy CD's I tend to rip them to FLAC right away. When ripping I use Foobar2000 or Exact Audio Copy and enable secure ripping which uses error correction. Recently I bought a 2 CD compilation album brand new but when I tried to rip the second CD on my laptop using Foobar2000 it struggled with the last 2 tracks and was unable to finish. EAC was also unable to get an accurate rip and reports read errors. Ripping in fast mode results in audible errors in the output track. I have tried another computer and having similar problems. I cannot see any damage to the disc and it has not been dropped or anything. The weird thing is that I had similar problems with a different album and different PC a while back. This other CD was a compilation disk so it was also right up to the CD capacity limit and again it was the last few tracks that would not rip. Dozens of other discs have ripped fine So I am wondering if the CD is simply defective, or whether it is something else. How common are defective CD's? Do some CD drives struggle with CD's of this capacity? Or Is this some kind of copy protection? I'm thinking of asking Amazon for a replacement but it would be annoying if I get the same problem again.

    Read the article

  • I need help installing Autokey in CentOS

    - by Kevin Lee
    PLease teach me how to do it, here's the INSTALL file of the autokey folder: This application requires a full Debian package build - it cannot be installed using only the setup.py script: dpkg-buildpackage -us -uc cd ../ For GNOME: sudo dpkg -i autokey-gtk_.deb autokey-common_.deb For KDE: sudo dpkg -i autokey-qt_.deb autokey-common_.deb I'm using CentOS, I don't have any idea how to install this.. Here's the FAQ page of the Autokey application: http://code.google.com/p/autokey/wiki/FAQ Please help me install this.. Thanks!

    Read the article

  • Turn Windows 7 desktop into grayscale

    - by Axarydax
    Is there a universal way to turn Windows 7 Aero desktop, all windows, etc into grayscale? I had an option to do this in Intel video drivers on my old laptop, now I have NVIDIA and don't know how to replicate this effect. There might be a shader or filter that would cause Aero to render stuff into grayscale, but I was unable to find anything. Or must it be explicitly supported by video driver as a bonus?

    Read the article

  • How to find spyware dll launched using svchost.exe

    - by Sheen
    This weekend I found my PC was possibly infected by some virus or spyware. There is one "svchost.exe -k netsvcs" in my task manager, and it is running under my user name, rather than SYSTEM accounts. There is already another same process with same command line options under SYSTEM account. This user account svchost.exe consistently consumes 50% CPU (1 of 2 cores of my CPU). In Process Explorer, I can see it is started by explorer.exe, instead of services.exe. However, I failed to find its real service dll place in registry or disk. Does anyone know how to find this malicious program?

    Read the article

  • Windows Vista: TCP/IP stack is smashed, how to reinstall the LAN-Devices?

    - by Ice
    the TCP/IP stack is smashed, thats why no LAN-Connections are running. I want to download the LAN drivers from another computer and uninstall and reinstall the LAN devices on this system. Hopefully that should recreate the stack. But what to download? What uninstall? How to install? Windows Vista is protected against such changes, so how to achieve that job? please help. Update per 2011-03-11: I found all the tipps and hints about "TCP/IP Repair, LSP Fix, and WinSock Fix" according to windows vista but nothing helped to bring back network access. What can i do as next step or which opportunities are left?

    Read the article

  • YUI Compressor java

    - by Alexander
    Hi I want to use Yahoo's compressor for compressing js and css files. Which can be found here: http://developer.yahoo.com/yui/compressor/ My only problem is that i have never used Java before. I have no idea how to execute or use this command line. I only have experience with js, jquery and php. It simply says: Usage: java -jar yuicompressor-x.y.z.jar [options] [input file] How should I proceed?

    Read the article

  • Vista Home Premium won't connect to network.

    - by Ice
    I deinstalled some software (e.g. some Toolbars for IE and Norton security suite, because the free trial period of 60 days is run out and so i want to switch to microsofts free security essentials). But now i cannot connect to the network again: Neither over LAN nor over WiFi. Neither with standard DHCP ON (sets a 169.254.x.y address) nor with fixed IP-Address. No error during changing the settings. Ping to the Gateway e.g. doesn't work and gives "generall failure". The DHCP-Client sets no IP-Address. There is allways only 'local access' on every network-connection. i ran out of ideas, please help. UPDATE per 2011-03-11: I followed each and every hint but nothing changed. I did a research on microsofts homepage through all the sites belonging to network but nothing helped. What can i do next?

    Read the article

  • Do I need the meta-key for vim?

    - by Riyaah
    I'm looking in to learning emacs or vim. I started out with emacs but found the need for a meta key to be a hassle, especially since I have a non-english keyboard layout on my macbook. So far I haven't seen any references to meta in vim, so my question is: Can I live without meta in vim? If so that'll settle the vim vs. emacs question for me, otherwise I'll just have to learn to live with some workaround.

    Read the article

  • File filtering_Python 3.2 [closed]

    - by user71261
    I'm trying to write a short file filtering code in Python that will find my desired string. I've got it worked out logically, but my Command Feed is sending me an error message for the print statement. This is how it works as of now: filename = input('give file name: ') n = input('give desired string: ') f = open line = f.readline() while line: if n in line: print line line = f.readline() Error Statement: Traceback (most recent call last): File "<string>", line 7, in <fragment> Syntax Error: print line: <string>, line 718 I know this is a simple problem but the answer is not obvious to me. please help.

    Read the article

  • Cisco VPNClient from Mac won't connect using iPhone Tethering

    - by Dan Short
    I just set up iPhone tethering from my Snow Leopard Macbook Pro to my iPhone 3GS with the Datapro 4GB plan from AT&T. When attempting to connect to my corporate VPN from the MacBook Pro with Cisco VPNClient 4.9.01 (0100) I get the following log information: Cisco Systems VPN Client Version 4.9.01 (0100) Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Mac OS X Running on: Darwin 10.6.0 Darwin Kernel Version 10.6.0: Wed Nov 10 18:13:17 PST 2010; root:xnu-1504.9.26~3/RELEASE_I386 i386 Config file directory: /etc/opt/cisco-vpnclient 1 13:02:50.791 02/22/2011 Sev=Info/4 CM/0x43100002 Begin connection process 2 13:02:50.791 02/22/2011 Sev=Warning/2 CVPND/0x83400011 Error -28 sending packet. Dst Addr: 0x0AD337FF, Src Addr: 0x0AD33702 (DRVIFACE:1158). 3 13:02:50.791 02/22/2011 Sev=Warning/2 CVPND/0x83400011 Error -28 sending packet. Dst Addr: 0x0A2581FF, Src Addr: 0x0A258102 (DRVIFACE:1158). 4 13:02:50.792 02/22/2011 Sev=Info/4 CM/0x43100004 Establish secure connection using Ethernet 5 13:02:50.792 02/22/2011 Sev=Info/4 CM/0x43100024 Attempt connection with server "209.235.253.115" 6 13:02:50.792 02/22/2011 Sev=Info/4 CVPND/0x43400019 Privilege Separation: binding to port: (500). 7 13:02:50.793 02/22/2011 Sev=Info/4 CVPND/0x43400019 Privilege Separation: binding to port: (4500). 8 13:02:50.793 02/22/2011 Sev=Info/6 IKE/0x4300003B Attempting to establish a connection with 209.235.253.115. 9 13:02:51.293 02/22/2011 Sev=Warning/2 CVPND/0x83400018 Output size mismatch. Actual: 0, Expected: 237. (DRVIFACE:1319) 10 13:02:51.894 02/22/2011 Sev=Warning/2 CVPND/0x83400018 Output size mismatch. Actual: 0, Expected: 237. (DRVIFACE:1319) 11 13:02:52.495 02/22/2011 Sev=Warning/2 CVPND/0x83400018 Output size mismatch. Actual: 0, Expected: 237. (DRVIFACE:1319) 12 13:02:53.096 02/22/2011 Sev=Warning/2 CVPND/0x83400018 Output size mismatch. Actual: 0, Expected: 237. (DRVIFACE:1319) 13 13:02:53.698 02/22/2011 Sev=Warning/2 CVPND/0x83400018 Output size mismatch. Actual: 0, Expected: 237. (DRVIFACE:1319) 14 13:02:54.299 02/22/2011 Sev=Warning/2 CVPND/0x83400018 Output size mismatch. Actual: 0, Expected: 237. (DRVIFACE:1319) 15 13:02:54.299 02/22/2011 Sev=Info/4 IKE/0x43000075 Unable to acquire local IP address after 5 attempts (over 5 seconds), probably due to network socket failure. 16 13:02:54.299 02/22/2011 Sev=Warning/2 IKE/0xC300009A Failed to set up connection data 17 13:02:54.299 02/22/2011 Sev=Info/4 CM/0x4310001C Unable to contact server "209.235.253.115" 18 13:02:54.299 02/22/2011 Sev=Info/5 CM/0x43100025 Initializing CVPNDrv 19 13:02:54.300 02/22/2011 Sev=Info/4 CVPND/0x4340001F Privilege Separation: restoring MTU on primary interface. 20 13:02:54.300 02/22/2011 Sev=Info/4 IKE/0x43000001 IKE received signal to terminate VPN connection 21 13:02:54.300 02/22/2011 Sev=Info/4 IPSEC/0x43700008 IPSec driver successfully started 22 13:02:54.300 02/22/2011 Sev=Info/4 IPSEC/0x43700014 Deleted all keys 23 13:02:54.300 02/22/2011 Sev=Info/4 IPSEC/0x4370000D Key(s) deleted by Interface (192.168.0.171) 24 13:02:54.300 02/22/2011 Sev=Info/4 IPSEC/0x43700014 Deleted all keys 25 13:02:54.300 02/22/2011 Sev=Info/4 IPSEC/0x43700014 Deleted all keys 26 13:02:54.300 02/22/2011 Sev=Info/4 IPSEC/0x43700014 Deleted all keys 27 13:02:54.300 02/22/2011 Sev=Info/4 IPSEC/0x4370000A IPSec driver successfully stopped The key line is 15: 15 13:02:54.299 02/22/2011 Sev=Info/4 IKE/0x43000075 Unable to acquire local IP address after 5 attempts (over 5 seconds), probably due to network socket failure. I can't find anything online about this. I found a single entry for the error message in Google, and it was a swedish (or some other nordic language site) that didn't have an answer to the question. I've tried connecting through both USB and Bluetooth tethering to the iPhone, and they both return the exact same results. I don't have direct control over the firewall, but if changes are necessary to make it work, I may be able to get the powers-that-be to make adjustments. A solution that doesn't require reconfiguring the firewall would be far better of course... Does anyone know what I can do to make this behave? Thanks, Dan

    Read the article

  • Instapaper Updates; Sports Native Social Media Sharing, Browsing, and More

    - by Jason Fitzpatrick
    Popular web content manager Instantpaper has updated to version 3.0 and brings a host of new features like native support for social media sharing, a recommendation system, in-app web browsing and more. Last year we shared a detailed guide with you on how to use Instapaper to save content from the web to your iOS device for later reading–definitely check it out if you’re unfamiliar with Instapaper. Some of the new features in Instapaper 3.0 include a social recommendation system where you can follow other Instapaper users and see the articles they are liking/sharing, native support for sharing to Twitter, Facebook, and other social media systems, smart rotation lock on the display, and more efficient article downloading and storage. Check out the link below to read a full rundown of the new features on the Instapaper blog. Instapaper 3.0 Is Here! [Instapaper via O'Reilly Radar] HTG Explains: What Are Character Encodings and How Do They Differ?How To Make Disposable Sleeves for Your In-Ear MonitorsMacs Don’t Make You Creative! So Why Do Artists Really Love Apple?

    Read the article

  • Friday Fun: Naruto Star Students

    - by Asian Angel
    The best day of the week is finally here again, so something fun to make those torturous last few hours pass by quickly is always a good thing. This week your mission is to safely escort Tazuna to his home while battling an army of ninjas and the assassin Zabuza. Are your ninja skills up to the challenge?HTG Explains: What Are Character Encodings and How Do They Differ?How To Make Disposable Sleeves for Your In-Ear MonitorsMacs Don’t Make You Creative! So Why Do Artists Really Love Apple?

    Read the article

  • HTG Explains: What Are Character Encodings and How Do They Differ?

    - by YatriTrivedi
    ASCII, UTF-8, ISO-8859… You may have seen these strange monikers floating around, but what do they actually mean? Read on as we explain what character encoding is and how these acronyms relate to the plain text we see on screen.HTG Explains: What Are Character Encodings and How Do They Differ?How To Make Disposable Sleeves for Your In-Ear MonitorsMacs Don’t Make You Creative! So Why Do Artists Really Love Apple?

    Read the article

  • How to Create Progress Bars in Excel With Conditional Formatting

    - by Erez Zukerman
    Progress bars are pretty much ubiquitous these days; we’ve even seen them on some water coolers. A progress bar provides instant feedback on a given process, so why not bring some of that graphical pizzazz into your spreadsheet, using Excel’s Conditional Formatting feature?HTG Explains: What Are Character Encodings and How Do They Differ?How To Make Disposable Sleeves for Your In-Ear MonitorsMacs Don’t Make You Creative! So Why Do Artists Really Love Apple?

    Read the article

  • Windows Embedded : Microsoft adapte sa gamme d'OS embarqués à un secteur en forte expansion et riche en opportunités pour les développeurs

    Windows Embedded : Microsoft adapte sa gamme d'OS embarqués à un secteur en forte expansion Riche d'opportunités pour les développeurs Dans la famille Windows, les noms de XP, Vista, 7, Server ou même Azure sont certainement plus connus que « Embedded ». Il faut dire que les déclinaisons embarquées de Windows sont à elles seules une gamme complète dans laquelle il peut être souvent assez difficile de s'y retrouver. Pourtant, les développeurs auraient tort de se décourager, tant les déclinaisons de Windows Embedded couvrent un nombre impressionnant de besoins allant du terminal mobile durci (lecteur de code barre avec écran par exemple) à la robotique en passant par les boîtiers multimédia...

    Read the article

  • Les Google TV n'arriveront pas avant 2012 en France, les chaînes télévisées s'opposent à ses caractéristiques d'affichage

    Les Google TV n'arriveront pas avant 2012 en France, les chaînes télévisées s'opposent à ses caractéristiques d'affichage Mise à jour du 11.03.2011 par Katleen Il y a quelques jours, Jean-Marc Tassetto, le PDG de Google France, s'est exprimé à l'occasion de la remise d'un rapport au ministère des Finances. Il y a donné de mauvaises nouvelles concernant les Google TV, ces téléviseurs fabriqués par Sony et connectés à Internet. Si le concept a déjà été mal accueilli aux Etats-Unis, où il peine à se faire une place, il suscite également une certaine animosité dans notre pays. En effet, les grands groupes audiovisuels français ne voient pas cette arrivée d'un bon oeil, et se sont d'ailleur...

    Read the article

  • « Entity Framework : structurez et optimisez votre couche d'accès aux données », invitation à la conférence gratuite de Microsoft du 18 mars

    Entity Framework : structurez et optimisez votre couche d'accès aux données Assistez gratuitement aux après-midi du développement de Microsoft Les après-midi du développement sont des conférences gratuites organisées par Microsoft qui permettent aux développeurs de découvrir de nouvelles problématiques. L'occasion de monter en compétence et d'échanger avec des experts sur un sujet précis. La première conférence de 2011 se tiendra le 18 mars entre 14h et 18h sur le campus de Microsoft France. Elle permettra de découvrir la technologie d'accès aux données introduite par le Framework .NET 3.5 SP1 : Entity Framework. Au cours de cette session, l'utilisation d'Entity Framework dans les scénar...

    Read the article

  • Un constructeur russe dévoile un modèle de Netbook sous MeeGo, une bonne nouvelle pour l'OS open-source de Intel et de Nokia

    Un constructeur russe dévoile un modèle de Netbook sous MeeGo Une bonne nouvelle pour l'OS open-source de Intel et de Nokia Quelques jours après la publication de l'interview d'un responsable d'Intel, très confiant sur l'avenir et le potentiel de MeeGo sur le long terme, un constructeur russe dévoile un modèle de Netbook embarquant cet OS. Cette machine de 10.1 pouces est baptisée « DNS » et cible essentiellement le marché local. En dehors de l'OS, sa configuration ne défraie pas la chronique. DNS est propulsé par le processeur Intel Atom N550 cadencé à 1.5 GHz et équipé d'une carte graphique Intel GMA 3150...

    Read the article

  • Sondage : les bureaux virtuels séduisent de plus en plus les PME pour leur flexibilité et la réduction des coûts qu'ils permettent

    Sondage : les bureaux virtuels séduisent de plus en plus les PME En tête des motivations, flexibilité et réduction des coûts Virtual PBX, fournisseur de solutions virtuelles, vient de publier les résultats d'un sondage sur l'utilisation des bureaux virtuels, désormais au coeur de la politique IT de nombreuses PME. En tête des raisons évoquées par les PDG, propriétaires, partenaires et directeurs de ventes interrogés, arrive le souci de flexibilité (61 %) suivi de près par la « réduction des coûts » avec 54 %. Parmi ces décideurs, 43 % d'entre eux affirment économiser 1.000 dollars ou plus chaque mois sur la location, les équipements IT, la téléphonie et les fournitu...

    Read the article

  • Le premier virus sur PC a 25 ans, le Directeur du Laboratoire de Recherche de F-Secure retrace son histoire en vidéo depuis le Pakistan

    Le premier virus sur PC a 25 ans L'éditeur F-Secure retrace son histoire en vidéo En collaboration avec Gordon Fowler Le premier virus ayant infecté un PC a été découvert en 1986. Et curieusement pour aujourd'hui, ce virus contenaient les contacts de ses auteurs au Pakistan. A l'occasion de cet anniversaire, Mikko Hyppönen, Directeur du Laboratoire de Recherche de F-Secure, s'est donc rendu dans la ville de Lahore au Pakistan pour retrouver ces créateurs, deux frères, Amjad et Basit Farooq Alvi. qui sont aujourd'hui à la tête d'un FAI florissant (Brain Telecommunication Ltd). F-Secure propose un reportage v...

    Read the article

< Previous Page | 115 116 117 118 119 120 121 122 123 124 125 126  | Next Page >