Monthly Archives

Articles indexed in July 2012

Page 72/169 | < Previous Page | 68 69 70 71 72 73 74 75 76 77 78 79  | Next Page >

  • setting up static ip on linux

    - by user64908
    I understood the interface file in linux needs to be edited and the corresponding lines added. I don't understand what network and broadcast are for, it seems extra versus a windows static ip configuration. In my case my gateway is 192.168.5.1 and my machine ip is 192.168.5.101, what would be my network and broadcast address, is the below correct and what exactly do they mean? iface eth0 inet static address 192.168.5.101 gateway 192.168.5.1 netmask 255.255.255.0 network 192.168.5.0 broadcast 192.168.5.255

    Read the article

  • Would you embrace a new technology that worked better than a VPN?

    - by Jumpto
    Ok so VPNs have been around for ages. Business has been addicted to them as the only method of securing their home servers with their workstations in the field. Even with all their problems and shortcomings. So my question is this: How likely are you to embrace a new technology that promises to work better, secure better and have more features than a VPN? State your reasons for or against. Extra points if you point out what steps the new technology would have to take to knock VPN off its throne.

    Read the article

  • Computer freeze at night

    - by matmat07
    Every night except one this week my laptop froze over night. I tried to check the event viewer, but there's no real help there. Tonight I'll do a memtest to check the RAM. And this shouldn't be a temperature issue since I can play game without any problem (Diablo 3, League of legend) Is there any diagnosys tool I could use. Maybe something that would write time down every minute so I know the precise time when it freeze? I have win7 and 8gb of RAM I installed myself Answer to comment:Asus N71JQ Unknown time, but it seems differents if I look at the last entry in the logs I have no information to tell you, that's why I ask for tool and not the solution. I usualy go to sleep after midnight, but I have AVG free edition as antivirus

    Read the article

  • NK2 files doesn't keep the email addresses in memory

    - by r0ca
    When I send an email to someone outside the firm, when I only type the first letters of its name (Contact), I get the auto-suggest of the "Already-sent" users. So now, since a few days, the emails are not kept in memory by Outlook (NK2 file). I see that that file is only 2kb and on my old machine, it's almost 200kb (So a lot more email addresses kept in memory) Should I just rebuilt the Outlook profile or the whole Windows Profile? A simple Outlook reinstall or to build a new PC?

    Read the article

  • Share laptop wifi with router

    - by obie
    I hi guys i'm trying to accomplish something: i have a modem (ADSL) which servers as a wireless router as well. There's a laptop connected to it through cable. On the other room i have a laptop which is connected through the router wirelessly. Now the problem is, since i have other appliances that need to get connected but are not wifi cable i have another wifi router. What i want to know is how can i share the second laptop's wifi with the second router so that the router can then serve as an access point to give internet to my other applinaces through ethernet cables. so in breaf i want: INTERNETMODEM (WIFI)LAPTOP 1 (WIFI)LAPTOP 2 (WIFI)Router 2 (ETHERNET)DREAMBOX & WDTV

    Read the article

  • Thumbnail generation with imagemagick doesn't render the correct colors

    - by Bastien
    Generating thumbnails of PDFs with imagemagick sometimes renders incorrect colors. We're using an old version of imagemagick (6.5.7-8, that's the version installed on the heroku servers). Here is the command we're currently using: convert -size "725x1200>" -colorspace RGB -flatten -density 300 -quality 100 input.pdf output.jpg I've tried using different colorspaces like sRGB,YIQ,.. but none of them are rendering the color correctly. Using imagemagick-6.7.7-6 locally works so I've tried to bundle the 'convert' command within my application /bin directory, the command works but the result is still wrong, so it seems that the problem comes either from another imagemagick command used by 'convert' or from another library. Here's an example of the outputs: Correct output: http://i.stack.imgur.com/gf9eG.jpg Wrong output: http://i.stack.imgur.com/imUeD.jpg Strangely, with some pages of the same pdf the output is always correct. Any idea which library or command could be the issue, or if there is a proper set of options to pass to imagemagick to always get it right? Thanks in advance for your help.

    Read the article

  • Is there a way to determine the original size or file count of a 7-zip archive?

    - by Zac B
    I know that when I compress an archive with the 7za utility, it gives me stats like the number of files processed and the amount of bytes processed (the original size of the data). Is it possible, using the commandline (on linux) or some programming language, to determine: the original size of an archive, before it was compressed? the number of files/directories contained within an archive? The answer might be "no, just decompress the whole archive and do counting/sizing then", but it would be useful to know if there was a faster/less space-greedy way.

    Read the article

  • How to edit known_hosts when several hosts share the same IP and DNS name?

    - by Frédéric Grosshans
    I regularly ssh into a computer which is a dual-boot OS X / Linux computer. The two OS instance do not share the same host key, so they can be seen as two host sharing the same IP and DNS. Let's say the IP is 192.168.0.9, and the names are hostname and hostname.domainname As far as I understood, the solution to be able to connect to the two host is to add them both to the ~/.ssh/know_hosts file. However, it is easier said than done, because the file is hashed, and has probably several entries per host (192.168.0.9, hostname, hostname.domainname). As a consequence, I have the following warning Warning: the ECDSA host key for 'hostname' differs from the key for the IP address '192.168.0.9' Is there an easy way to edit the known_hosts file, while keeping the hashes. For example, how can I find the lines corresponding to a given hostame? How can I generate the hashes for some known hosts? The ideal solution would allow me to connect to seamlessly to this computer with ssh, no matter whether I call it 192.168.0.9, hostname or hostname.domainname, nor if it uses its Linux hostkey or its OSX hostkey. However, I still want to receive a warning if there is a real man-in-the middle attack, i.e. if another key than these two is used.

    Read the article

  • Starting Redmine at boot using upstart on Ubuntu

    - by joekr
    So after installing redmine from the repositories on Ubuntu 12.04, i've tried to create an upstart script (see below) so it would start up at boot time. While service redmine start does start redmine, it does not start automatically when booting. Also when i run service redmine stop it does stop redmine but simply hangs until i press ctrl+c Also, after stopping starting it again does not work (Also just hangs). From all the upstart examples and tutorials i have seen this should work, so i guess i'm overlooking something. Any hints ? #Redmine description "Redmine" start on started networking stop on stopping networking stop on starting shutdown console output expect daemon exec ruby /usr/share/redmine/script/server webrick -e production -b 188.40.184.155 -p 3000 -d respawn EDIT: Fixed "typo"

    Read the article

  • Scroll bar for vim(curses-based one, not gvim)?

    - by xiaq
    As a Linux user, I have been quite comfortable with CLI and TUI tools, but I miss the little scrollbar present in almost every GUI program. It has always been easier for me to know how long the file is and where I am from the scrollbar instead of "9752 lines, 24%". What I expect is a ASCII scrollbar that looks like | | | | # # # | | | and I can configure to appear on the left or right (and if on the left, the relative position to line numbers and fold marks). Is there already a Vim plugin to do this, or how can I write my own one? Vim's plugin framework doesn't seem to support such UI modifications directly.

    Read the article

  • How to execute a shell script on startup?

    - by vijay.shad
    I have create a script to start a server(my first question). Now I want it to run on the system boot and start the defined server. What should I do to get this done? My findings tell me put this file in /etc/init.d location and it will execute when the system will boot. But I am not able to understand how the first argument on the startup will be start? Is this predefined somewhere to use start as $1? If I want to have a case startall that will start all the servers in the script, then what are the options I can manage. My Script is like this: #!/bin/bash case "$1" in start) start ;; stop) stop ;; restart) $0 stop $0 start ;; *) echo "usage: $0 (start|stop|restart)" ;; esac

    Read the article

  • 100 Years of Earthquakes [Wallpaper]

    - by Jason Fitzpatrick
    If loved the tornado-visualization we posted last month, this visualization of a century of earthquakes around the globe will be right up your alley. Courtesy of the same designer behind the tornado tracks, John Nelson of IDV Solutions, this visualization captures 203,186 magnitude 4 and higher earthquakes that occurred between 1898 and 2003. Hit up the link below to grab a wallpaper-size copy from Flickr. Earthquakes Since 1989 by Magnitude [via Smithsonian] How to Use an Xbox 360 Controller On Your Windows PC Download the Official How-To Geek Trivia App for Windows 8 How to Banish Duplicate Photos with VisiPic

    Read the article

  • VPN vs. SSH Tunnel: Which Is More Secure?

    - by Chris Hoffman
    VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works. An SSH tunnel is often referred to as a “poor man’s VPN” because it can provide some of the same features as a VPN without the more complicated server setup process – however, it has some limitations. How to Use an Xbox 360 Controller On Your Windows PC Download the Official How-To Geek Trivia App for Windows 8 How to Banish Duplicate Photos with VisiPic

    Read the article

  • Quels sont les apports de la virtualisation pour les PME ? Microsoft présente les avantages et ses solutions pour la technologie

    Découvrez les solutions de Microsoft en matière de virtualisation et les apports pour votre PME Les techniques de virtualisation peuvent permettre d'optimiser pratiquement tous les domaines de l'infrastructure informatique (système d'exploitation, applications, serveurs, base de données, etc.). Définie comme une technologie permettant de mutualiser sur une seule machine plusieurs systèmes d'exploitation et/ou plusieurs applications, comme s'ils fonctionnaient sur des machines distinctes, la virtualisation se positionne aujourd'hui comme un levier d'amélioration du rendement et de réduction des couts pour les PME. Pourquoi choisir la virtualisation ? Comment mener un proj...

    Read the article

  • VLC sur Android : première beta, le lecteur open-source arrive sur terminaux mobiles après l'imbroglio autour de sa version pour iOS

    VLC sur Android : première beta Le lecteur open-source arrive sur mobile après l'imbroglio autour de sa version pour iOS VLC est un lecteur multimédia de référence sur PC. Il est aussi un des projets open-source les plus importants pour le grand public au côté de Firefox. C'est d'ailleurs pour une histoire de compatibilité de la licence GPL avec l'AppStore et de DRM attaché à l'application une fois sur la galerie que le portage sur iOS a été abandonné ? alors même qu'il était finalisé. Résultat, VLC avait été retiré de l'AppStore quelques semaines seulement après y avoir été validé. Cet épisode avait créé au passage de fortes dissensions entre Remi Denis-Courmont ? un des...

    Read the article

  • Oracle Linux sort en version 6.3 : améliorations du système de fichiers Btrfs, des performances et optimisations du Kernel

    Oracle Linux sort en version 6.3 améliorations du système de fichiers Btrfs, des performances et optimisations du Kernel Oracle a publié récemment la version 6.3 de son système d'exploitation Oracle Linux. Créée à partir du clonage des sources de la distribution Red Hat Enterprise Linux (RHEL), cette mouture contient toutes les améliorations et nouveautés de RHEL 6.3. La plus grande différence entre Oracle Linux 6.3 et RHEL 6.3 est l'utilisation du noyau optimisé 2.6.39, qui dispose de plusieurs améliorations et corrections par rapport à l'original, et l'installation par défaut de « Unbreakable Enterprise Kernel 3.0.16 ». Oracle Linux 6.3 propose également la mise à jour de plusi...

    Read the article

  • Le nombre de malwares Android augmente de 400% au second trimestre, déjouant les prévisions des cabinets de sécurité

    Le nombre de malwares Android augmente de 400% au second trimestre déjouant les prévisions des cabinets de sécurité Le nombre d'utilisateurs des terminaux Android évolue à un rythme infernal. L'OS mobile enregistre environ 1 million d'activations par jour. La rançon de ce succès est l'intérêt croissant des pirates pour la plateforme. La courbe du nombre de malwares ciblant Android s'aligne quasiment avec le rythme d'adoption de l'OS, déjouant les statistiques des cabinets de sécurité. Le cabinet de sécurité Trend Micro, dans son rapport pour le second trimestre 2012, a découvert près de 25 000 applications malveillantes pour l'OS mobile de Google, soit une augmentation de près de 4...

    Read the article

  • Peut-on réaliser un bon design Web sans Web-designer ? Quelques pistes de réflexions pour tenter d'y arriver

    Le design des sites aujourd'hui est un point "critique". Et bien souvent les utilisateurs préfèreront un "beau" site à son concurrent moins "évolué" graphiquement. Malheureusement, il n'est pas toujours possible d'avoir à ses côtés un web designer. Dans ce cas, il faut se retrousser les manches et tenter de faire du mieux que l'on peut. Savoir créer un design attrayant ne s'apprend pas en quelques lignes. Cependant voici un petit guide pour débutant qui vous aidera dans la création de votre graphisme. Les contraintes sont nécessaires Même si ça peut sembler contre-intuitif, un bon design part toujours de contraintes bien établies. Si vous pensez que votre projet n'...

    Read the article

  • Un bug de la barre de recherche de Chrome 20 fait croire à un malware, comment y remédier

    Un bug de la barre de recherche de Chrome 20 fait croire à un malware Comment y remédier Depuis sa version 20, Chrome contient un bug assez ennuyeux : la barre de recherche mène automatiquement sur une page blanche. Le 1er réflexe de nombreux utilisateurs a été de penser que ce comportement était dû à un nouveau malware. En fait, il n'en est rien. Si vous faîtes partie de ceux qui se sont inquiétés, rassurez vous. La solution temporaire est très simple ? bien que laborieuse. Il suffit de supprimer "blank.html" de l'URL générée. Cette solution a été trouvée après 116 messages sur le Google Group dédié au problème. [IMG]http://ftp-developpez...

    Read the article

  • iGoogle : Google met fin à son Netvibes maison et à plusieurs autres services, allez-vous être impacté ?

    iGoogle : Google met fin à son Netvibes maison et à plusieurs autres services, allez-vous être impacté ? La désormais traditionnelle opération d'abandon de certains de ses projets par Google afin de rationaliser sa gamme de produits continue. La société vient d'annoncer la fermeture de plusieurs projets qui n'ont pas obtenu le succès escompté ou dont des alternatives ont été développées, dans le cadre de son nettoyage de printemps pendant l'été. C'est donc un ensemble de cinq produits qui seront mis aux oubliettes parmi lesquels figure la solution iGoogle. Lancé en 2005, le portail d'accueil iGoogle permet aux utilisateurs de créer des pages personnalisées, contenant...

    Read the article

  • BlackBerry 10 : RIM prévoit de lancer 4 modèles de smartphones et une tablette en 2013, la RoadMap du constructeur dévoilée

    BlackBerry 10 : RIM prévoit de lancer 4 modèles de smartphones et une tablette en 2013 la RoadMap du constructeur dévoilée La dernière carte dont dispose probablement RIM pour sortir du gouffre dans lequel il se trouve est BlackBerry 10, l'OS sur lequel le constructeur canadien repose tous ses espoirs. Le site spécialisé BlackberryOS.com a obtenu des informations d'une RoadMap de RIM, qui prévoit de lancer plusieurs dispositifs en 2013. [IMG]http://rdonfack.developpez.com/rim-roadmap2013.jpg[/IMG] Le constructeur canadien doit marquer un gros coup, et pour cela, la firme envisage de commercialiser au moins quatre nouveaux modèles de smartphones BlackBerry au...

    Read the article

  • Interessante Neuigkeiten zu "Customer Experience"

    - by pweckerl
    "Customer Experience is NOW" - Unter diesem Titel stellte Mark Hurd vor kurzem unsere Neuigkeiten und Strategien im Bereich Customer Experience, einem immer wichtiger werdendem Bereich der Verschmelzung verschiedenster Kanäle zu einer durchgängigen Kundenkommunikation vor. Mehr zum Thema Customer Experience finden Sie auch auf dem Oracle WebCenter Blog unter https://blogs.oracle.com/webcenter/entry/the_experience_revolution Customer Experience is NOW

    Read the article

  • LDoms with Solaris 11

    - by Orgad Kimchi
    Oracle VM Server for SPARC (LDoms) release 2.2 came out on May 24. You can get the software, see the release notes, reference manual, and admin guide here on the Oracle VM for SPARC page. Oracle VM Server for SPARC enables you to create multiple virtual systems on a single physical system.Each virtual system is called alogical domain and runs its own instance of Oracle Solaris 10 or Oracle Solaris 11. The version of the Oracle Solaris OS software that runs on a guest domain is independent of the Oracle Solaris OS version that runs on the primary domain. So, if you run the Oracle Solaris 10 OS in the primary domain, you can still run the Oracle Solaris 11 OS in a guest domain, and if you run the Oracle Solaris 11 OS in the primary domain, you can still run the Oracle Solaris 10 OS in a guest domain In addition to that starting with the Oracle VM Server for SPARC 2.2 release you can migrate guest domain even if source and target machines have different processor type. You can migrate guest domain from a system with UltraSPARC  T2+ or SPARC T3 CPU to a system with a SPARC T4 CPU.The guest domain on the source and target system must run Solaris 11 In order to enable cross CPU migration.In addition to that you need to change the cpu-arch property value on the source system. For more information about Oracle VM Server for SPARC (LDoms) with Solaris 11 and  Cross CPU Migration refer to the following white paper

    Read the article

  • Viewing the NetBeans Central Registry (Part 2)

    - by Geertjan
    Jens Hofschröer, who has one of the very best NetBeans Platform blogs (if you more or less understand German), and who wrote, sometime ago, the initial version of the Import Statement Organizer, as well as being the main developer of a great gear design & manufacturing tool on the NetBeans Platform in Aachen, commented on my recent blog entry "Viewing the NetBeans Central Registry", where the root Node of the Central Registry is shown in a BeanTreeView, with the words: "I wrapped that Node in a FilterNode to provide the 'position' attribute and the 'file extension'. All Children are wrapped too. Then I used an OutlineView to show these two properties. Great tool to find wrong layer entries." I asked him for the code he describes above and he sent it to me. He discussed it here in his blog, while all the code involved can be read below. The result is as follows, where you can see that the OutlineView shows information that my simple implementation (via a BeanTreeView) kept hidden: And so here is the definition of the Node. class LayerPropertiesNode extends FilterNode { public LayerPropertiesNode(Node node) { super(node, isFolder(node) ? Children.create(new LayerPropertiesFactory(node), true) : Children.LEAF); } private static boolean isFolder(Node node) { return null != node.getLookup().lookup(DataFolder.class); } @Override public String getDisplayName() { return getLookup().lookup(FileObject.class).getName(); } @Override public Image getIcon(int type) { FileObject fo = getLookup().lookup(FileObject.class); try { DataObject data = DataObject.find(fo); return data.getNodeDelegate().getIcon(type); } catch (DataObjectNotFoundException ex) { Exceptions.printStackTrace(ex); } return super.getIcon(type); } @Override public Image getOpenedIcon(int type) { return getIcon(type); } @Override public PropertySet[] getPropertySets() { Set set = Sheet.createPropertiesSet(); set.put(new PropertySupport.ReadOnly<Integer>( "position", Integer.class, "Position", null) { @Override public Integer getValue() throws IllegalAccessException, InvocationTargetException { FileObject fileEntry = getLookup().lookup(FileObject.class); Integer posValue = (Integer) fileEntry.getAttribute("position"); return posValue != null ? posValue : Integer.valueOf(0); } }); set.put(new PropertySupport.ReadOnly<String>( "ext", String.class, "Extension", null) { @Override public String getValue() throws IllegalAccessException, InvocationTargetException { FileObject fileEntry = getLookup().lookup(FileObject.class); return fileEntry.getExt(); } }); PropertySet[] original = super.getPropertySets(); PropertySet[] withLayer = new PropertySet[original.length + 1]; System.arraycopy(original, 0, withLayer, 0, original.length); withLayer[withLayer.length - 1] = set; return withLayer; } private static class LayerPropertiesFactory extends ChildFactory<FileObject> { private final Node context; public LayerPropertiesFactory(Node context) { this.context = context; } @Override protected boolean createKeys(List<FileObject> list) { FileObject folder = context.getLookup().lookup(FileObject.class); FileObject[] children = folder.getChildren(); List<FileObject> ordered = FileUtil.getOrder(Arrays.asList(children), false); list.addAll(ordered); return true; } @Override protected Node createNodeForKey(FileObject key) { AbstractNode node = new AbstractNode(org.openide.nodes.Children.LEAF, key.isFolder() ? Lookups.fixed(key, DataFolder.findFolder(key)) : Lookups.singleton(key)); return new LayerPropertiesNode(node); } } } Then here is the definition of the Action, which pops up a JPanel, displaying an OutlineView: @ActionID(category = "Tools", id = "de.nigjo.nb.layerview.LayerViewAction") @ActionRegistration(displayName = "#CTL_LayerViewAction") @ActionReferences({ @ActionReference(path = "Menu/Tools", position = 1450, separatorBefore = 1425) }) @Messages("CTL_LayerViewAction=Display XML Layer") public final class LayerViewAction implements ActionListener { @Override public void actionPerformed(ActionEvent e) { try { Node node = DataObject.find(FileUtil.getConfigRoot()).getNodeDelegate(); node = new LayerPropertiesNode(node); node = new FilterNode(node) { @Override public Component getCustomizer() { LayerView view = new LayerView(); view.getExplorerManager().setRootContext(this); return view; } @Override public boolean hasCustomizer() { return true; } }; NodeOperation.getDefault().customize(node); } catch (DataObjectNotFoundException ex) { Exceptions.printStackTrace(ex); } } private static class LayerView extends JPanel implements ExplorerManager.Provider { private final ExplorerManager em; public LayerView() { super(new BorderLayout()); em = new ExplorerManager(); OutlineView view = new OutlineView("entry"); view.addPropertyColumn("position", "Position"); view.addPropertyColumn("ext", "Extension"); add(view); } @Override public ExplorerManager getExplorerManager() { return em; } } }

    Read the article

  • Analyzing the errorlog

    - by TiborKaraszi
    How often do you do this? Look over each message (type) in the errorlog file and determine whether this is something you want to act on. Sure, some (but not all) of you have some monitoring solution in place, but are you 100% confident that it really will notify for all messages that you might find interesting? That there isn't even one little message hiding in there that you would find valuable knowing about? Or how about messages that you typically don't are about, but knowing that you have a high...(read more)

    Read the article

< Previous Page | 68 69 70 71 72 73 74 75 76 77 78 79  | Next Page >