Daily Archives

Articles indexed Wednesday February 9 2011

Page 5/13 | < Previous Page | 1 2 3 4 5 6 7 8 9 10 11 12  | Next Page >

  • Creating security permissions for a non-domain-member user in Windows Server 2008

    - by Overhed
    Hello everyone, I apologize in advance for incorrect use of terminology, as I'm not an IT person by trade. I'm doing some remote work via a VPN for a client and I need to add some DCOM Service security permissions for my remote user. Even though I'm on the VPN, the request for access to the DCOM service is using my PCs native user (and since I'm running Vista Home Premium it looks something like: PC-NAME\Username). The request for access comes back with access denied and I can not add this user to the security permissions as it "is not from a domain listed in the Select Location dialog box, and is therefore not valid". I'm pretty stuck and have no clue what kind of steps I need to do here. Any help would be appreciated, thanks in advance. EDIT: I have no control over what credentials are being passed in to the server by my computer. This scenario is occurring in an installation wizard that has a section which requests you point it to the machine running the "server" version of the software I'm installing (it then tries to invoke the relevant COM service, but my user does not have "Remove Activation Permissions" on that service, so I get request denied).

    Read the article

  • C# uploading files to IIS server with FTP

    - by Blottt
    I'm trying to upload an website to an online server programmaticly via C# and using FTP. example C:\website\wwwroot to "ftp://ftp.host.com/website/wwwroot" When I do this, the wesbite says "You do not have permission to view this directory or page." And if I just replaced the webconfig via FileZilla manually , the site starts working. I'm using the edtftp library for .NET Any ideas of whats going on ?

    Read the article

  • Need help on awk/sed/ perl pattern with regex / grep

    - by Jayakumar K
    Sample file output from grep file1:my $dbh = DBI->connect("dbi:mysql:$database_name", $DB_USER, $DB_PASSWD) file2:($dbc,$rc) = mysql_connect($mysql_host,$mysql_user,$mysql_password); The awk pattern should get values databasename, DB_USER And DB_PASSWD from line 1 and mysql_host,mysql_user and mysql_password from line 2 i.e all variables inside the function. Then it should search for the declaration of that variable in file before : (semicolon) ex: databasename in file1 may be $databasename = "dbweb" ; ex: mysql_user in file2 may be $mysql_user="root" ; Result: It should display variable declarations of all 6 variables along with filenames file2:$mysql_host = "db1"; file2:$mysql_user = "root"; file1:$DB_USER = 'user';

    Read the article

  • How to verify if my copy operation is complete in Windows 7?

    - by Tim
    Yesterday, I was leaving some job of copying a directory to run overnight. This morning however, I found the computer had restarted because of Windows Update or something. I was wondering if there is some way to check if the copy is complete? One way I guess would be check the last modified time of the copy, and when the system restarted. But I was wondering where to find the time when the system restarted? I was also wondering if where to find some logging files that have the records. I know Event Viewer, but don't know where to find within it. Other methods are welcome too. I also would like to hear suggestions for other ways to accomplish the copy instead of just simple copy and paste. Thanks and regards!

    Read the article

  • Is it possible to trick iTunes treating an external HD as an iPod?

    - by Boris Pavlovic
    I keep my music collection on my iPod, but since I got my first iPhone two and a half years ago I have quit using the iPod as a portable music device. It's just an external HD. Benefit of having it as an external HD is that when it's connected to some other computer iTunes can play its music and update iTunes database. It would be nice if I could copy data from the iPod to an external USB HD and give away the iPod to somebody who doesn't have one.

    Read the article

  • Outlook 2007 inbox message grouping like the Web App

    - by Heki
    The Outlook Web App has this nice, default, conversation grouping. It hides all earlier messages in a conversation from the message list. When I click a mail, it shows the conversation thread in the reading pane. In Outlook 2007 I have tried grouping on received date, but it groups by minutes and not days. I've also tried grouping by conversation, but then I get this ugly tree in the list pane and I loose the "today", "yesterday", and vice versa groups. So how do I make Outlook 2007 look like the Outlook Web App? Illustration

    Read the article

  • Creating a server of an xp computer?

    - by Sweppi
    Hey, I want to create a server for my website since what I'm going to have on the website is far more than I can store web hotel. So I have this xp computer I'd like to use as a server. I did have a guide of this but unfortunately the link broke. But what i understood was that I'd be in need of a windows 2000 disc for this to work. Do you have any good tutorials/guides about how I can remake my xp computer to a server? The computer is running windows xp home edition Service Pack 2 Thank you in advance!

    Read the article

  • Disadvantages of using a swap file/partition on an SSD, even when swappiness is set to 0

    - by pjv
    What are the disadvantages of using a swap file/partition on an SSD, even when swappiness is set to 0 I'm particularly interested in the /proc/sys/vm/swappiness=0 case. How much writes are still done, in practice, to that swap file, and does it have a negative impact to the SSD or any other disadvantage? Or would it nearly compare to not having a swap file? I am pretty aware of what swappiness=0 means, just not of what it amounts to in practice. My question stems from a problem I am experiencing without a swap: http://stackoverflow.com/questions/4567972/error-executing-aapt-all-of-the-sudden. There are similar questions regarding SSD and swap but they don't go in-depth into the swappiness=0: Disadvantages of not having a swap partition, Should I keep my swap file on an SSD drive?

    Read the article

  • Vista Remote Desktop Mouse Drag Not Working

    - by Paul Lynch
    I've been using Remote Desktop to connect from a Windows Vista machine to a Windows XP machine. Everything used to work fine, but a few weeks ago I found that I could not drag things with my mouse. I can click on things just fine, but I cannot move or resize windows or select text with the mouse. I did some experimenting, and it seems that the remote machine behaves as though it gets a mouse up event shortly after it gets the mouse down event, even though I am still holding the button down. On both machines, things work fine outside of Remote Desktop. I did reinstall the OS and software on my Windows Vista machine a couple of months ago, and that might have been about the same time that this problem appeared. I don't frequently use Remote Desktop, so I can't be sure. Does anyone have any suggestions?

    Read the article

  • Anti-virus protection question?

    - by DaBaer
    About 4 years ago, I found Kaspersky and have been using the most current version since. Most people try and argue the use of AVG or Avast to me, and there are some very solid reasons I do not go that route. Over the years, I have found Kasp to become bulkier and bulkier, and have had issues setting it up for friends/family/clients. I am just curios on possible recommendations from other users, with my criteria in mind: What I like about Kasp in the past: The license sold in stores in a 3 pack, is considered a commercial license, and emails from Kasp in response to my questions, make it clear that I can do with the 3 licenses that I want, providing I do not use more than 3 installs per Key. So, allowed me to buy 3, 5, and 7 packs, and resell to users at a cheaper cost than what they would pay if they bought their own license. The ability to easily obtain a currently updated .exe for installation on multiple peoples machines. Power of the scan. Kasp has been a good solution for me (even when using a trial license) on cleaning up machines that were badly infected (in which AVG and AVAST were unable to.) Speed of install/update. After a cleanup of malwarebytes, spybot, mcafee stinger, ccleaner, and combofix, I used to be able to get Kasp Int Security installed and updated in around 5 minutes. The issues that I have with the free AV, is strength of protection. In my opinion for someone who is a 'power use' these are good alternatives, because such a user should be trained or knowledgeable enough to be careful and not get themselves in trouble. Most of the users I assist, are too PC ignorant to know any better, and go hogwild on the web. It has been my experience that the number of people coming back to me with spyware/malware/virus issues since I have converted from AVG to Kasp has been cut down to around 20% of what it used to be 4 or 5 years ago. In a perfect world, I could install and use Kasp Internet Security 2008, and be very happy. But this is not the case anymore. So after this long description of what I used, and have used, does anyone have any good recommendations on AV that isn't going to cost me too much per install?

    Read the article

  • Advanced call forwarding in Skype

    - by Ivan
    Hi all, I'd like to forward calls from a Skype account to another Skype account (both online), but so that it calls and then enters a number. E.g., I have two accounts: acc1 and acc2. I want all calls from acc1 to be forwarded to acc2, and when the call is established to enter "#123". Is that possible? Thanks. EDIT: The question is basically how to call a user and add the extension directly, before the call has been established (e.g., to call directly acc2:#123).

    Read the article

  • how to stop powershell mangling command line options for program executed from shell?

    - by kem
    From the powershell prompt, when I try to run a program and feed it a command line option, powershell ends up mangling the option. Why does this happen? Is there any way to stop it besides enclosing the option in quotes? For example, from the powershell prompt: PS Microsoft.PowerShell.Core\FileSystem::\\mach\share .\myprog.exe -file=input.txt myprog.exe ends up getting two arguments: 1) -file=input 2) .txt I need to run it like: .\myprog.exe "-file=input.txt" or .\myprog.exe '-file=input.txt' to force it to be one argument. No other shell does this.

    Read the article

  • How to forbid postfix to send to external domains [closed]

    - by elhoim
    I have a local postfix server, and i want it to only relay emails to the only local domain (localdomain.be): myhostname = localdomain.be mydomain = localdomain.be alias_maps = hash:/etc/aliases alias_database = hash:/etc/aliases myorigin = $myhostname mydestination = $myhostname relay_domains = $mydomain default_transport = smtp relayhost = mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128 10.0.0.0/24 mailbox_size_limit = 64000000 message_size_limit = 1000000 recipient_delimiter = + inet_interfaces = all inet_protocols = all smtp_host_lookup = native This configuration works fine to allow relay mail locally and on external destination domains, but i would like it to be an impossibility to send to other domains (ie: gmail.com). relay_domains is supposed to ensure that but it does not seem to really filter since i can still send to my gmail address.

    Read the article

  • Is SQL Express 2008 subject to the same 5 connection limitation as file sharing on Windows XP?

    - by RichieACC
    File sharing on Windows XP has a 5 client limitation. Our solution uses both file sharing and SQL Express. The way I see it, we have 2 options here: -Reload the machine that they want to use as a server with Windows Server, or; -Supply them with a dedicated NAS server, and keep their server machine on Windows XP The second option is the preferred one, for reasons I'm not going to go into. I just need to confirm that the 5 client limitation applies to the file sharing only.

    Read the article

  • GeekTool logs "command not found" for commands that work fine in Terminal

    - by Kevin Dowling
    I'm trying to run simple commands so I can have GeekTool output date/time etc. to my desktop. Should be simple enough to do but it never actually outputs anything into the boxes. Console log shows it's getting spammed by GeekTool to say 'command not found', though the same command (e.g. date +"%H:%M") works fine in Terminal. All I want to achieve is the ability to output a clock displaying time/date on my desktop that fits into my wallpaper. I've tried changing the format of the commands, using the built-in editor window as well as the command line box on the Properties tab. I had a look at the permissions in '/' (because GeekTool runs commands from there) and nothing unusual comes up. None of these solved the issue. When I use a command that simply echo's a string it works (e.g. echo "hello" displays the word hello). Does anyone have experience with GeekTool, and understand why it won't run basic commands? As I say, it's spamming my console with 'command not found' despite them working in terminal... Running OS X 10.6.6 on a MacBook Pro (mid-2010).

    Read the article

  • /etc/security/limits.conf for setting program limits in Linux

    - by Flavius Akerele
    I have the following inside /etc/security/limits.conf (I have specified root separately because * will not include it.) user2 - core unlimited * - core 0 root - core 0 * - rss 512000 root - rss 512000 * - nproc 100 root - nproc 100 * - maxlogins 1 root - maxlogins 1 I run a program as user2 (./programname) but /proc/3498/limits says cores are disabled: Limit Soft Limit Hard Limit Units Max cpu time unlimited unlimited seconds Max file size unlimited unlimited bytes Max data size unlimited unlimited bytes Max stack size 8388608 unlimited bytes Max core file size 0 0 bytes Max resident set 524288000 524288000 bytes Max processes 100 100 processes Max open files 1024 1024 files Max locked memory 65536 65536 bytes Max address space unlimited unlimited bytes Max file locks unlimited unlimited locks Max pending signals 14001 14001 signals Max msgqueue size 819200 819200 bytes Max nice priority 0 0 Max realtime priority 0 0 Max realtime timeout unlimited unlimited us Both ulimit -Sa and ulimit -Ha output that cores are disabled: core file size (blocks, -c) 0 data seg size (kbytes, -d) unlimited scheduling priority (-e) 0 file size (blocks, -f) unlimited pending signals (-i) 14001 max locked memory (kbytes, -l) 64 max memory size (kbytes, -m) 512000 open files (-n) 1024 pipe size (512 bytes, -p) 8 POSIX message queues (bytes, -q) 819200 real-time priority (-r) 0 stack size (kbytes, -s) unlimited cpu time (seconds, -t) unlimited max user processes (-u) 100 virtual memory (kbytes, -v) unlimited file locks (-x) unlimited Why are cores disabled ?

    Read the article

  • Stop Believing TV’s Lies: The Real Truth About "Enhancing" Images

    - by Eric Z Goodnight
    You’ve seen it over and over. The FBI uses their advanced technology to “enhance” a blurry image, and find a villain’s face in the worst possible footage. Well, How-To Geek is calling their bluff. Read on to see why. It’s one of the most common tropes in television and movies, but is there any possibility a government agency could really have the technology to find faces where there are only blurry pixels? We’ll make the argument that not only is it impossible with current technology, but it is very unlikely to ever be a technology we’ll ever see. Stick around to see us put this trope under the lenses of science and technology, and prove it wrong once and for all Latest Features How-To Geek ETC Stop Believing TV’s Lies: The Real Truth About "Enhancing" Images The How-To Geek Valentine’s Day Gift Guide Inspire Geek Love with These Hilarious Geek Valentines RGB? CMYK? Alpha? What Are Image Channels and What Do They Mean? How to Recover that Photo, Picture or File You Deleted Accidentally How To Colorize Black and White Vintage Photographs in Photoshop A History of Vintage Transformers: Decepticons Edition [Infographic] How to Determine What Kind of Comment to Leave on Facebook [Humorous Flow Chart] View the Cars of Tomorrow Through the Eyes of the Past [Historical Video] Add Romance to Your Desktop with These Two Valentine’s Day Themes for Windows 7 Gmail’s Priority Inbox Now Available for Mobile Web Browsers Touchpad Blocker Locks Down Your Touchpad While Typing

    Read the article

  • La fabrication de l'iPad 2 plus fin et léger que le modèle précédent serait déjà en cours, d'après le Wall Street Journal

    La fabrication de l'iPad 2 serait déjà en cours d'après le Wall Street Journal Les rumeurs vont bon train sur le net depuis quelques mois concernant la prochaine tablette d'Apple. Le Wall Street Journal dans un article vient confirmer quelque une de ces rumeurs. Le journal, des sources proches du projet a annoncé qu'Apple aurait déjà commencé avec la production de l'iPad 2. La nouvelle tablette d'Apple sera beaucoup plus fine et plus légère que la précédente. Elle comprendra un processeur plus rapide, une plus grande mémoire, une caméra intégrée pour la vidéoconférence et un écran analogue au modèle actuel (Les rumeurs faisaient état d'un nouvel écran Retina). Le...

    Read the article

  • Dell annonce une tablette 10 pouces sous Windows 7 à destination des entreprises pour fin 2011

    Dell annonce la construction d'une tablette 10 pouces sous Windows 7 pour les entreprises Dell va lancer une tablette de 10 pouces sous Windows 7 au plus tard en fin de cette année. Le constructeur lors d'une conférence de presse à San Francisco a annoncé une actualisation majeure de ses PC, ordinateur portable et stations de travail et la sortie d'une tablette Windows 7 principalement destinée aux marchés verticaux comme l'éducation, l'aviation, les finances? La firme lors de cet événement a présenté juste la maquette de sa future tablette baptisée « Windows 7 Business Tablet » tournant sur Windows 7 et utilisant sa prochaine génération de processeurs Intel Atom, connue sous...

    Read the article

  • Oracle présente « Cloud File System », son nouveau système de fichiers destiné à faciliter le déploiement des Clouds privés

    Oracle présente « Cloud File System », son nouveau système de fichiers Destiné à faciliter le déploiement des Clouds privés Oracle vient d'annoncer la disponibilité d'un nouveau système de fichiers destiné à faciliter le déploiement des applications et des bases de données des entreprises dans le Cloud privé. Baptisé « Oracle Cloud File System », ce système devrait apporter aux Clouds de stockage les mécanismes avancés des systèmes de fichiers en grappe, rendant ainsi plus efficace la mise en commun du stockage à travers un Cloud extensible et accessible en réseau. Ce système aide les entreprises à se munir d'un espace de stockage partagé et doté d'un espace...

    Read the article

  • Firefox 4 beta 11 est disponible avec la fonction «Do Not Track» pour contrôler le traçage en ligne

    Firefox 4 beta 11 est disponible [SIZE="1"Avec la fonction « Do Not Track » pour contrôler le traçage en ligne [/SIZE] Mise à jour du 09/02/11, par Hinault Romaric La fondation Mozilla vient d'annoncer la disponibilité de la onzième et avant dernière beta du navigateur Firefox 4 (lire ci-avant). Cette nouvelle beta intègre une fonction de confidentialité, baptisée « Do Not Track », pour donner la possibilité aux utilisateurs de mieux contrôler le traçage de leur activité en ligne. Do Not Track est disponible dans les options du navigateur et ne sera pas acti...

    Read the article

  • Microsoft met fin à l'AutoRun des périphériques USB sur les anciennes versions de Windows, mais le maintient pour les CD/DVD

    Microsoft met fin à l'AutoRun des périphériques USB Sur les anciennes versions de Windows, mais le maintient pour les CD/DVD Une mise à jour spéciale de Windows vient d'être délivrée dans le cadre du « Patch Tuesday » de ce mois de février. Elle concerne le comportement de l'AutoRun (exécution automatique) sur les versions de Windows antérieures à Windows 7 et Windows Server 2008 R2. Après l'application de ce match (KB971029), l'apparition automatique du menu d'options à exécuter sur le périph...

    Read the article

  • JSP et Servlets efficaces : production de sites dynamiques en Java de Jean-Luc Déléage, critique par Benwit

    A l'occasion de ma critique de l'ouvrage JSP et Servlets efficaces : Production de sites dynamiques en Java, j'aimerai vous demander comment vous avez appris à coder des sites web en Java ? Citation: Ce livre s'adresse aux développeurs qui utilisent Java dans la production de sites et à ceux qui souhaitent découvrir l'aspect serveur web. Il permettra aussi un apprentissage concret de ces technologies aux étudiants en informatique en fin de licence et en mas...

    Read the article

  • What are the crappy code games - the background?

    - by simonsabin
    This is part of a series on the Crappy Code Games The background Who can enter? What are the challenges? What are the prizes? Why should I attend? Tips on how to win   The Background Fusion IO came to us a while back wanting to run a competition to highlight the how bad code can really impact your system. We’ve all seen it, I saw an example yesterday where someone had implemented a cursor on a whole table just to update a few rows, something like this. declare cUpdateCursor cursor for  ...(read more)

    Read the article

  • User Experience Guidance for Developers: Anti-Patterns

    - by ultan o'broin
    Picked this up from a recent Dublin Google Technology User Group meeting: Android App Mistakes: Avoiding the Anti-Patterns by Mark Murphy, CommonsWare Interesting approach of "anti-patterns" aimed at mobile developers (in this case Android), looking at the best way to use code and what's in the SDK while combining it with UX guidance (the premise being the developer does the lot). Interestingly, the idea came through that developers need to stop trying to make one O/S behave like another--on UX grounds. Also, pretty clear that a web-based paradigm is being promoting for Android (translators tell me that translating an Android app reminded them of translating web pages too). Haven't see the "anti"-approach before, developer cookbooks and design patterns sure. Check out the slideshare presentation.

    Read the article

< Previous Page | 1 2 3 4 5 6 7 8 9 10 11 12  | Next Page >