Daily Archives

Articles indexed Friday March 18 2011

Page 9/12 | < Previous Page | 5 6 7 8 9 10 11 12  | Next Page >

  • When to use an MS SQL instance vs. different database on same instance

    - by BoxerBucks
    We have some MS SQL servers that are setup with different instances on the same server to separate applciation DB's as well as some servers that are setup with all DB's on the same instance, just separated with security settings. When is it advisable to create a new instance for SQL server and install your DB's in that instance as opposed to just creating a new DB on the same instance and putting security around the database itself? Is there more to the decision that just a security aspect?

    Read the article

  • How can I enable logging for requests going through mod proxy

    - by Kariem
    Is there a way to log requests going through mod proxy? I need a way to debug my configuration, because I don't seem to be getting where I should be. I need the following information: headers of incoming requests what is being sent to the proxy target Maybe a related question: is there a way to strip some headers? I tried the following: ProxyPass /proxy/other http://not.under.my.control/ <Location /proxy/other> ProxyPassReverse / RequestHeader unset Authorization </Location> I don't really know whether this is ok, because I don't see anything. Thank you, Kariem

    Read the article

  • TLS_REQCERT and PHP with LDAPS

    - by John
    Problem: Secure LDAP queries via command-line and PHP to an AD domain controller with a self-signed certificate. Background: I am working on a project where I need to enable LDAP look-ups from a PHP web application to a MS AD domain controller that is using a self-signed certificate. This self-signed certificate is also using a domain name that is not a FQDN - think of something like people.campus as the domain name. The web application would take the user's credentials and pass them on to the AD domain controller to verify if the credntials are a match or not. This seems simple, but I am having problems trying to get PHP and the self-signed certificate to work. Some people have suggested that I changed the TLS_REQCERT variable from "request" to "never" within the OpenLDAP configuration. I am concerned that this might have larger implications such as a man-in-the-middle attack and I am not comfortable changing this setting to never. I have also read some places online where one can take a certificate and place it as a trusted source within the openldap configuration file. I am curious if that is something that I could do for the situation that I have? Can I, from the command line, obtain the self-signed certificate that the AD domain controller is using, save it to a file, and then have openldap use that file for the trust that it needs so that I do not need to adjust the variable from request to never? I do not have access to the AD domain controller and as a result cannot export the certificate. If there is a way to obtain the certificate from the command line, what commands do I need to use? Is there an alternate method of handling this issue that would be better in the long run? I have some CentOS servers and some Ubuntu servers that I am working with to try and get this going on. Thanks in advance for your help and ideas.

    Read the article

  • Unable to map to web folder using WebDAV client on Windows Server 2008 R2

    - by user74989
    Hello, I have a client running Windows Server 2008 R2 on several servers. One of the servers is also running SharePoint 3.0 and my client has created a web folder to map to. I can map to the web folder from all Server 2008 R2 boxes that have the WebDAV client (part of Desktop Experience feature) installed, except for the server the folder resides on. When I attempt to map to the web folder on the server which the folder resides, I am repeatedly prompted to enter my credentials. I am using the same account that I used to map the web folder on the other servers. I have also tried mapping from the command line and receive 'Access Denied' What may be causing the problem? I would think that if I can map to the drive from one server, I should be able to map the drive from the rest as long as the WebDAV client is installed, especially on the server where the folder is located. Jesse

    Read the article

  • What I should know about memory management?

    - by bua
    first of all: I don't use stackadmin or similar so please don't vote for moving there, I'm reading man top and paper "what every programmer should know about memory ..." I need really simple explanation like for retard ;) Having following top dump: top - 11:21:19 up 37 days, 21:16, 4 users, load average: 0.41, 0.75, 1.09 Tasks: 313 total, 5 running, 308 sleeping, 0 stopped, 0 zombie Cpu(s): 0.4%us, 0.6%sy, 0.9%ni, 96.2%id, 0.1%wa, 0.0%hi, 1.9%si, 0.0%st Mem: 132103848k total, 131916948k used, 186900k free, 54000k buffers Swap: 73400944k total, 73070884k used, 330060k free, 13931192k cached PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 3305 tudb 25 10 144m 52m 940 R 6.0 0.0 1306:09 app 3011 tudb 15 0 71528 19m 604 S 3.3 0.0 171:57.83 app 3373 tudb 25 10 209m 93m 940 S 3.0 0.1 1074:53 app 3338 tudb 25 10 144m 47m 940 R 2.7 0.0 780:48.48 app 4227 tudb 25 10 208m 99m 904 S 1.3 0.1 198:56.01 app 8506 tudb 25 10 80.7g 49g 932 S 2.0 39.6 458:31.22 app I'm wondering what is: RES (my expl. physical memory consumption ? see 49GB) VIRT (memory mapped disk to cache? see 80GB) SHR (shared pages?) Swap: (is this cached label - for memory mapped disk into swap cache?) Should sum of RES give MEM: X used? or maybe sum of VIRT?

    Read the article

  • why can't i delete this file on my pc

    - by ooo
    i am trying to install some software and it requires removing the following file: cd %SYSTEMROOT%\assembly\GAC rename Microsoft.Office.Interop.Outlook Microsoft.Office.Interop.Outlook.Old the problem is when i do the rename it looks like its successful but it doesn't seem to actually delete Microsoft.Office.Interop.Outlook i tried to explicitally do: del Microsoft.Office.Interop.Outlook and again it looks like it works but then when i do a "dir" i still see that file. Do you have any suggestions on why this wouldn't allow me to delete this file. I have outlook closed when i am doing this so i wouldn't think outlook is locking the file.

    Read the article

  • Windows 7 F6 Drivers off a USB Drive

    - by altCognito
    I'm doing a fresh install of Windows 7 and I have an on board software RAID. I "need" to install the drivers via the infamous F6 process. Technically, it should be possible to do so after the OS has been booted, but long story short, this isn't going to work well for me. Is it possible to install F6 drivers during the installation using a USB, or must that always be done using floppies? What are my alternatives?

    Read the article

  • Cross platform KVM over ethernet

    - by Falmarri
    I'm not sure if this exists, but this is what I'd like to do. I have a laptop and a desktop that I work on about equally. The laptop runs windows 7 and the desktop is on kubuntu 10.04. What I want to be able to do is be able to drag my mouse accross my screen and have it act like my laptop is a second monitor. Whereby I can use my desktop mouse, drag it say to the left off of my desktop monitor, and use it on my laptop (I don't care about the keyboard, just the mouse). Is that possible? Are there any other solutions that exist? I'd prefer not to have a physical kvm switch.

    Read the article

  • Hell: NTFS "Restore previous versions"...

    - by ttsiodras
    The hell I have experienced these last 24h: Windows 7 installation hosed after bluetooth driver install. Attempting to recover using restore points via "Repair" on the bootable Win7 installation CD. Attempting to go back one day in the restore points. No joy. Attempting to go back two days in the restore points. No joy. Attempting to go back one week in the restore points. Stil no joy. Windows won't boot. Apparently something is REALLY hosed. And then it hits me - PANIC - the restore points somehow reverted DATA files to their older versions! Word, Powerpoint, SPSS, etc document versions are all one week old now. Using the "freshest" restore point. Failed to restore yesterday's restore point!!! I am stuck at old versions of the data!!! Booting KNOPPIX, mounting NTFS partition as read-only under KNOPPIX. Checking. Nope, the data files are still the one week old versions. Booting Win7 CD, Recovery console - Cmd prompt - navigating - yep, data files are still one week old. Removing the drive, mounting it under other Win7 installation. Still old data. Running NTFS undelete on the drive (read-only scan), searching for file created yesterday. Not found. Despair. At this point, idea: I will install a brand new Windows installation, keeping the old one in Windows.old (default behaviour of Windows installs). I boot the new install, I go to my C:\Data\ folder, I choose "Restore previous versions", click on yesterday's date, and click open... YES! It works! I can see the latest versions of my files (e.g. from yesterday). Thank God. And then, I try to view the files under the "yesterday snapshot-version" of c:\Users\MyAccount\Desktop ... And I get "Permission Denied" as soon as I try to open "Users\MyAccount". I make sure I am an administrator. No joy. Apparently, the new Windows installation does not have access to read the "NTFS snapshots" or "Volume Shadow Snapshots" of my old Windows account! Cross-installation permissions? I need to somehow tell the new Windows install that I am the same "old" user... So that I will be able to access the "Users\MyAccount" folder of the snapshot of my old user account. Help?

    Read the article

  • Issue with emails with attached emails.

    - by Jake
    There is this problem with our email in my organisation that happens to some people. When a remote sender sends an email that has an attached email, the reciever gets the email but the attached email is blank. The recieving mail server is MDaemon Pro. I also notice that the email header could be corrupted. I checked the MDaemon KB and find nothing regarding this issue. but I also highly doubt that this is an MS Outlook 2007 issue. Anyone have any ideas? Putting this issue aside, I feel that we really should not attach emails to emails. There is a reason for the "Forward" button. I can't understand why is it so difficult for them to just forward that email instead of drag and drop one into the other using outlook. Furthermore, if the attached email also has its own attachments, the resulting nesting will be quite unbearable. Don't you think so?

    Read the article

  • Copy files off FreeBSD

    - by Josh
    I have a FreeBSD machine that I have to copy everything off the drive. The fielsystem is UFS and not readable by any other operating system. (great...) I have a USB flash drive (FAT32) I need to copy everything to from the SATA in the bsd machine. I looked up cp commands, and got it to partially work, but it seems to copy to the wrong directory. I cannot find out the "name" of the USB drive, and if it can even copy to it.

    Read the article

  • Internet Explorer 9 about:tabs data location

    - by TheBlueSky
    Internet Explorer 9 about:Tabs page lists the most visited sites (or this is what it's supposed to do); however, it doesn't work as expected. I came to several occasions where: 1. the list doesn't display the sites that I visit often, 2. a recently visited page show up in the list 3. the list got reset or many sites removed from it if Internet Explorer was forcibly closed 4. and so on where does it store the information about the sites? And is it possible to hack the list and force to display the sites that you want/expect?

    Read the article

  • create replica of ext4 filesystem and re-use it

    - by Jatin
    Is there a way that I can use my Linux ext4 file system, as such and then use it on some other computer. I have a dual-boot of Windows 7 and Ubuntu 10.04 and my partition table looks like this: My question might not be clear, so explaining it with an example. Can I copy my Linux partition on a flash drive and then use it on a different PC, with or without any need to install Ubuntu on new PC, by simply booting from the copied ext4 partition. This way, I can easily port my Ubuntu packages and other applications, settings etc. from one PC to other. If it's a very stupid question, please don't mind.

    Read the article

  • How can I automate or script daily downloads for any new anti- virus databases, and then have the program scan my drive?

    - by Macgrimm
    Howdy all Super Users" I humbly ask if any Super User can direct this long time, gray haired Apple Tech in the right direction on this issue. I believe there probably are many ways to skin this cat. But I am looking to find simply the best, most unattended way to get it done. Any help will be greatly appreciated. also (I know there are much better softwares out there for the Mac so please don't go there! The politics of this company dictate which Anti virus we have to use) anyway without any further wait: basically I am trying to automate 2 very important functions of Mc'Afee anti-virus for Mac. First I want to automate the process of retrieving new virus definition files, and second I want to automate the process of scanning for viruses. It turns out that Using Mc'Afee Anti-Virus for the Mac are both manual functions. And they left up to the user (per user account) to perform. Depending on all of about 150 MAc users to perform these 2 tasks themselves is around 65% compliance. My question then is: If I wanted to use the command line such as (open /Applications/McAfee\ Security.app) It will open up the Security Console. But how can I make command Mc'Afee go out and grab the definition files and scan the computer? I have to admit I am at a crossroad and Macaltimers has set in. I would really appreciate it if any of you "Super ~ Users" can help me out with this MacAltimers loss of how to what to do. Thanks to All up Front Macgrimm

    Read the article

  • itunes equalizer per track settings

    - by DA
    I'm a little confused about iTune's ability to set eq presets on a per-song basis. I have a song that I open, set to a given EQ preset, then close. When I play this song, however, the audio isn't being adjusted. If I open the EQ and turn it 'on', though, it then obeys the song's eq setting. Of course, if I leave the EQ on, then songs that do not have their own EQ setting default to whatever the EQ was originally set at. Not a HUGE deal, but it means that I would then normally have to have EQ always turned on, set to flat, so that any song that I HAVE given a EQ setting to will use it. Am I understanding how that works correctly? Is there a way to have individual songs use their EQ setting without having to turn on the EQ for everything?

    Read the article

  • How to assign hotkeys in OSX-snow-leopard

    - by 2816
    I am trying to assign a hotkey to open a folder in snow leopard. For example, in windows i could simply press the Windows+E to open the My Computer folder (or manually assign whatever folder i wanted to open). Is there a way to get this same behavior in OSX? I want to be able to launch applications, and open folder with my own keyboard mappings. For launching applications I use automator, create a service that receives no input to 'launch application' (from the utilities library). Then i can assign a keyboard shortcut to this service. Now i can launch applications with keyboard shortcuts. I still dont know how to open a folder. I know this can be done using quicksilver - but am looking for an organic approach that does not require any additional installs.

    Read the article

  • looking for the best power supply-- building computer--- [closed]

    - by fello
    What would be an appropriate power supply and form factor for those specifications below? CPU -Intel Core i7-950 Bloomfield 3.06GH Motherboard -- ASRock X58 Extreme 3 LGA ATX Hard drive-- Seagate Barracuda 7200.11 ST31500341AS 1.5TB 7200 RPM SATA 3.0Gb/s 3.5" Memory-- Kingston HyperX 8GB (2 x 4GB) 240-Pin DDR3 SDRAM DDR3 1600 (PC3 12800) Processor---Intel Core i7-950 Bloomfield 3.06GHz LGA 1366 130W Quad-Core

    Read the article

  • "fopen: No such file or directory" error

    - by Akshay Bhat
    I am getting following cryptic error: akshay@akshay-VirtualBox:/mnt/mmpp$ ./bin/metamap10 /mnt/mmpp/bin/SKRrun.10 -L 2010 /mnt/mmpp/bin/metamap10.BINARY.Linux -Z 10 --debug input.txt fopen: No such file or directory does this error implies that it cannot fopen cannot find a required file or fopen itself is nonexistent, note that both SKRrun.10 and metamap10.BINARY.Linux are present at the correct location I am using this software http://metamap.nlm.nih.gov/ on Ubuntu.

    Read the article

  • Disabling mouse acceleration in X.Org (Linux)

    - by aib
    This is the Linux version of my Disabling mouse acceleration in Mac OS X question. Hopefully I'll get an answer this time. I am tired of mouse acceleration and want to have a completely linear mouse response. This is easily achievable through any of the 5 or so methods (some subtly implied) on the X.Org wiki page on pointer acceleration. However, they also disable velocity scaling. I don't want a 1:1 mapping between device and screen coordinates. I want a 1:N mapping where N is a constant. Any ideas?

    Read the article

  • DropVox Records Voice Memos Right to Your Dropbox Account

    - by Jason Fitzpatrick
    DropVox is a clever and highly specialized application that, quite effectively, turns your iOS device into a voice recorder with Dropbox-based storage. Install the app, launch it, hit the record button, and your recording is uploaded to your Dropbox account in .m4a format as soon as you’re finished creating it. You can also configure DropVox to start recording immediately after launch and to continue recording if the device is locked or other applications are in use. Hit up the link to grab a copy. DropVox is currently $0.99 (50% off for a limited time) and works on the iPhone, iPad, and iPod Touch with microphone attached. DropVox [via Download Squad] HTG Explains: What’s the Difference Between the Windows 7 HomeGroups and XP-style Networking?Internet Explorer 9 Released: Here’s What You Need To KnowHTG Explains: How Does Email Work?

    Read the article

  • How an LED-lit LCD Monitor Works [Video]

    - by Jason Fitzpatrick
    There’s a good chance you’re staring at one right now, the common LCD monitor. How exactly does it work? Find out by watching this informative video. Bill Hammack, the engineer behind the Engineer Guy video series, takes apart an LCD monitor and gives a detailed analysis of what’s going on inside as he rebuilds it–including how the pixels function, what the screen is constructed off, and how the light is diffused. LCD Monitor Teardown [YouTube via Hack A Day] HTG Explains: What’s the Difference Between the Windows 7 HomeGroups and XP-style Networking?Internet Explorer 9 Released: Here’s What You Need To KnowHTG Explains: How Does Email Work?

    Read the article

  • Friday Fun: Carveola Incident

    - by Asian Angel
    Has it been a long and boring week at work? Then how about something to liven things up a bit? In this week’s game you receive orders to join a newly formed task force comprised of soldiers from allied and former enemy units at the end of World War 1. Your mission is to investigate strange sightings near a mysterious deserted trench line.HTG Explains: What’s the Difference Between the Windows 7 HomeGroups and XP-style Networking?Internet Explorer 9 Released: Here’s What You Need To KnowHTG Explains: How Does Email Work?

    Read the article

  • How To Remove Vocals From Music Tracks Using Audacity

    - by YatriTrivedi
    Ever get a sudden, inexplicably irresistible desire for karaoke? Maybe you like the music of a song but can’t stand the lead singer? Here’s how to use remove the vocals from most music tracks in a few simple steps.HTG Explains: What’s the Difference Between the Windows 7 HomeGroups and XP-style Networking?Internet Explorer 9 Released: Here’s What You Need To KnowHTG Explains: How Does Email Work?

    Read the article

  • Android : plus de 61% des smartphones embarquent la version 2.2 et moins de 8% sont sur une version 1.x, fin de la fragmentation ?

    Android : plus de 61 % des smartphones embarquent la version 2.2 Et moins de 8% sont sur une version 1.x, la fin de la fragmentation ? Mise à jour du 18/03/11, par Hinault Romaric La version 2.2 est de « très » loin la plus utilisée par les terminaux tournant sur Android d'après l'analyse menée par Google sur les terminaux Android ayant accédé à l'Android Market au cours des deux premières semaines de mars 2011 (du 01 au 14). Actuellement, c'est un total de 61,3% de terminaux qui tournent sur la version 2.2 (Froyo) d'Android au détriment de la version 2.1 (Eclair) qui chute à moins de 30%. [IMG]http://rdonfack.dev...

    Read the article

  • Microsoft pourrait être à l'origine de l'arrêt du Botnet « Rustock », le plus prolifique de l'histoire du spam

    Microsoft pourrait être à l'origine de l'arrêt du Botnet « Rustock » Le plus prolifique de l'histoire du spam Un groupe anonyme d'experts en sécurité a réussi à paralyser les opérations de spams produites depuis des années par Rustock, le plus prolifique Botnet de l'histoire de l'Internet. Depuis l'après-midi du 16, aucun des serveurs de contrôle et commande (CnC) de Rustock ne répond plus. Un exploit qui concorde avec une baisse drastique du nombre de pourriels à l'échelle mondiale. [IMG]http://idelways.developpez.com/news/images/rustock.png[/IMG] Bien que cette opération n'ait pas encore été revendiquée officiellement, une enquête du Wall St...

    Read the article

< Previous Page | 5 6 7 8 9 10 11 12  | Next Page >