Daily Archives

Articles indexed Tuesday September 18 2012

Page 9/17 | < Previous Page | 5 6 7 8 9 10 11 12 13 14 15 16  | Next Page >

  • Netboot Intel Macs without BSDP

    - by notpeter
    I have a netboot setup with DeployStudio that works great in my lab, but doesn't work on our main network. After some digging, I believe it's because our network admins are filtering BSDP (Boot Service Discovery Protocol) on our subnet at the switch level. Is it possible to hard code which server my clients (early 2007 iMac Core2Duos) should boot from without relying on BSDP? Perhaps relevant details: I do not have control over switch configs or DHCP settings. Client and server are running 10.6 Snow Leopard. The clients see the netboot server advertising itself in the 'Startup Disk' system preferences pane, but when I go to netboot it just leaves me with a flashing globe.

    Read the article

  • Do entries in local 'hosts' files override both forward and reverse name lookups?

    - by Murali Suriar
    If I have the following entries in a hosts file: 192.168.100.1 bugs 192.168.100.2 daffy.example.com 192.168.100.3 elmer.example.com. Will IP-name resolution attempts by local utilies (I assume using 'gethostbyaddr' or the Windows equivalent) honour these entries? Is this behaviour configurable? How does it vary between operating systems? Does it matter whether the 'hosts' file entries are fully qualified or not? EDIT: In response to Russell, my test Linux system is running RHEL 4. My /etc/nsswitch.conf contains the following 'hosts' line: hosts: files dns nis If I ping any of my hosts by name (e.g. bugs, daffy), the forward resolution works correctly. If I traceroute any of them by IP address, the reverse lookup functions as expected. However, if I ping them by IP, ping doesn't appear to resolve their host names. My understanding was that Linux ping would always attempt to resolve IPs to names unless instructed otherwise. Why would traceroute be able to handle reverse lookups in hosts files, but ping not?

    Read the article

  • Windows, why 8 GB of RAM feel like a few MB?

    - by Desmond Hume
    I'm on Windows 7 x64 with 4-core Intel i7 and 8 GB of RAM, but lately it feels like my computer's "RAM" is located solely on the hard drive. Here is what the task manager shows: The total amount of memory used by the processes in the list is just about 1 GB. And what is happening on my computer for a few days now is that one program (Cataloger.exe) is continually processing large quantities of (rather big) files, repeatedly opening and reading them for the purposes of cataloging. But it doesn't grow too much in memory and stays about that size, about 90 MB. However, the amount of data it processes in, say, 30 minutes can be measured in gigabytes. So my guess was that Windows file caching has something to do with it. And after some research on the topic, I came across this program, called RamMap, that displays detailed info on a computer's RAM. Here is the screenshot: So to me it looks like Windows keeps in RAM huge amounts of data that is no longer needed, redirecting any RAM allocation requests to the pagefile on the hard drive. Even when I close Cataloger.exe, the RamMap reports the size of the mapped file as about the same for a long time on. And it's not just this particular program. Earlier I noticed that similar slowdown occurred after some massive file operations with other programs. So it's really not an exception. Whatever it is, it slows down the computer by like 50 times. Opening a new tab in Chrome takes 20-30 seconds, opening a new program can take up to a minute. Due to the slowdown, some programs even crash. So what do you think, is the problem hiding in file caching or somewhere else? How do I solve it?

    Read the article

  • Updating GeForce 9200 driver on Vista (64-bit) yields installer failed

    - by weka
    OK, so I have a Windows Vista... more specifically this: http://www.newegg.com/Product/Product.aspx?Item=N82E16883103182 a Acer Aspire AX3200-U3600A Desktop. I have DirectX 11 and I am trying to update my drivers... During the update of the latest one: GeForce 306.23 Driver my screen flashes a bit and goes black. This is standard when updating GRAPHIC DRIVERS. Then... my screen shifts 50 pixels or so to the left... OFFSCREEN. Not even Auto Image Adjust will fix the screen back... Then after that happens, I get this: Help, please? I just want to update my graphic drivers....

    Read the article

  • systemctl (Fedora 17) and interacting spawned processes's consoles

    - by Sean
    Introduction I've recently upgraded to Fedora 17 and I'm getting used to the newer systemctl daemon manager versus shell init scripts. A feature I need on some of my daemons is the ability to interact with their consoles because unclean shutdowns not initiated by the process itself can cause database corruption. So, performing a systemctl stop service-name.service for example might cause irreversible data loss. These consoles read user input through stdin or similar methods, so what I've been doing on my old OS is to place those daemons foregrounded in a screen session, and I suspended that screen session with ^A ^z. It's also worth noting that I've now made systemctl do this automatically if the computer reboots, but it still doesn't solve my potential data corruption problem I'm trying to avoid. My Question Is there a way to use systemctl in order to directly interact with the console of processes it spawns? Can I hook a process through systemctl to get access to its console? Thanks You guys always give great answers, so I'm turning to you!

    Read the article

  • Using TrueCrypt with File Replication on Windows Server

    - by neildeadman
    We have a few folders that are set to replicate to a DR file server off-site. One of these folders contains a file that is a TrueCrypt volume container. When this file is mounted in TrueCrypt, the file won't replicate (fair enough!). I'm looking at alternatives to improve this situation. One solution I currently have is to have a scheduled task to unmount the volume and then every morning as the volume is needed, have someone mount it. This is a pain slightly because the password is known by a few people (I'm not one and neither are my colleagues who would be performing the mounting operation) so we'd need to continually get them to come over and type it in. The other I had was to have one TrueCrypt container on each server and replicate the contents when they are mounted. I wasn't able to get TrueCrypt to see the mounted volume so I guess this is a no go. Any other solutions I have missed or a fix for the above?

    Read the article

  • How do I get rid of "Trusted Drive Manager"?

    - by Earlz
    I have a Dell laptop that's been experiencing some weirdness lately. Apparently Dell puts "Trusted Drive Manager" on their hardware.. Well, now I keep getting these errors: I tried uninstalling Dell Data Protection, but it says some other package is required for the installation, which I can't install because I'll get another generic error (Dell Data Protection Access Drivers). This error pops up when I first boot, when I open a save file dialog, when I try to do a disk cleanup. How the hell do I get rid of this!?

    Read the article

  • Finding BCC in Internet mail headers

    - by dangowans
    I am running Outlook 2010 connected to an Exchange 2003 server. Often times, the spam that I received is sent to "undisclosed-recipients". I'm guessing that's because my email address (or an email address for a group I am part of) is in the BCC field. Is there a way to find out what BCC address was used to reach me? I looked at the Internet Headers for the message, but am not seeing "Envelope-to", described in a similar question.

    Read the article

  • Run .sh file in linux machine via putty

    - by Prateek
    I want run an .sh file which take an argument in a Linux machine. I'm using plink.exe to execute this .sh file from a windows machine. But I don't know what to write in the batch file in order to run plink.exe which in turn executes the .sh file and this file arguement. I have written following batch command: @echo off start C:\Users\Prateek\Desktop\PLINK.EXE -ssh -P 22 user@host -pw password sh -x "/home/user/copy.sh" On executing it, I get: + echo '' + echo 'Enter partner id' Enter partner id + read pid : Actually 'Enter partner id' is the argument, which I need to pass.

    Read the article

  • Change install path to /usr/bin instead of /usr/local/bin

    - by user1678788
    A simple question, but I have no concrete documentation to confirm my answer. When installing software with the make install command under a unix machine, the default path is going over to /usr/local/bin. I would like to update a package system-wide under /usr/bin. How (and where) do I change the command under make or make install to /usr/bin? Also - Can the package remain on /usr/local/bin but the systemwide usage of Python (the update being installed) be changed to /usr/local/bin from /usr/bin to avoid modifying the original installed version ?

    Read the article

  • "Press Tab to search <site>" in Chrome not working

    - by YatharthROCK
    The problem After partially entering a URL like meta.st, Chrome adds in the rest of the URL slected in blue and says "Press Tab to search Meta Stack Overflow". But on pressing, it just moves the cursor to the next item like in a normal text-field. Other info I'm on Windows 7 Home Basic. My Chrome version number is 22.0.1229.52 beta-m (beta channel). This was working before. What I've tried I've reported it in Chrome (by going to Options Tools Report an issue...). I've also tried deleting all my custom search engines (they might've been interfering) and also tried creating a new profile. I also googled, but to no avail. How do I fix this? Thanks.

    Read the article

  • Open ports in Windows 7, firewall, public network, port 445

    - by chris
    I selected "public network" in Windows 7. Windows is listening on TCP port 445: TCP 0.0.0.0:445 WIN7TEST:0 ABHÖREN The corresponding incoming firewall rule isn't activated (4th column): When I choose "workplace network" the SMB incoming port 445 rule is still disabled in the advanced windows firewall configuration. I thought "public network" / "workplace network" and so on is influencing the windows firewall rules!? Where's the difference between workplace and public network then? http://www.abload.de/image.php?img=winfire2nxku0.png

    Read the article

  • Macbook Pro + Windows 7 (bootcamp) = Terrible battery life

    - by Scott Beeson
    I recently put Windows 7 Ultimate x64 on my wife's Macbook pro because of some software she bought for her business. Since then, the battery life has been abysmal. I've identified and researched one of the problems, which is display brightness. There is no brightness control in the windows power options, but I did manually turn it down in Bootcamp. However, it is still reporting very low battery life estimates. I'm wondering if this is because Windows thinks the display is at full brightness. Can anyone shed any light on this? (Pun intended). Also, are there any other things to look out for that may improve the battery life? (I mean in the context of Mac + Windows, not in general)

    Read the article

  • Which twitter client can synchronize unread tweets?

    - by Tom Burger
    Right now I'm forced to read all the tweets in a single client on a single device (TweetDeck on my Android phone). If I would switch to another device and/or client, I would need to search for the last unread tweet, which is sometimes complicated (too many tweets). So, the question: Is there a client who can keep the status (read/unread) on tweets across multiple devices? My target systems would be now Android and MS Windows, but also Linux might be handy.

    Read the article

  • Video screen recording + add text (subtitle), export as .flv. What programs?

    - by RasmusWriedtLarsen
    I have to record a video to showcase a tool I've made. It's going to include my talking, but I also want some overlay text (subtitles) for people who doesn't have sound. I'm looking for a program that will let me add a text overlay (as subtitle) for my video, and if possible, export it as .flv . I've tried this so far: Used CamStudio for recording, using their lossless format. Converted the .avi file to a .flv using Any Video Converter (free version) I've been having some trouble with the output of CamStudio, some programs can't play the file right, it skips forward and backward. (VLC, Adobe Media Encoder CS4) So I'm looking for a program that accepts videos from CamStudio*, can add text to my video, and hopefully export as flv. *(If that's not possible I'm open for other recording programs). I'd like to ONLY use free programs, and I'm on Windows XP. Looking forward to your help :)

    Read the article

  • How can I mount an AES-128 encrypted DMG file using the NTFS file system under Windows XP?

    - by flarn2006
    I found HFSExplorer, which can handle encrypted DMG files, but it only supports HFS, and the DMG I want to open is NTFS. I can't just use any image mounter since the DMG file is encrypted, and I don't want to need to copy it over to my main hard drive first. (The DMG is on an external hard drive.) If copying it is the only way, however, I'd be willing to settle for that, but I'd rather just leave it on the external hard drive in an encrypted form.

    Read the article

  • How to sync bookmarks across Google Chrome and Mozilla Firefox bookmarks?

    - by ViliusK
    How to sync bookmarks across Google Chrome and Mozilla Firefox bookmarks? As I, currently, understand, Google Chrome puts bookmarks seperatly from Google Bookmarks, which is accessible in Firefox by using Google Toolbar for Firefox. Right? So how should I synchronize my browsers? I use Google Chrome as my primary browser and it works good and bookmarks are synchronized across number of computers I'm using. Thanks, viliusk

    Read the article

  • LastPass Now Monitors Your Accounts for Security Breaches

    - by Jason Fitzpatrick
    Staying on top of security breaches and how they may or may not affect you is time consuming. Sentry, a new and free addition to the LastPass password management tool, automates the process and notifies you of breaches. In response to all the recent and unfortunate high-profile security breaches LastPass has rolled out Sentry–a tool that monitors breach lists to notify you if your email appears in a list of breached accounts. The lists are supplied by PwnedList, a massive database of security breach data, and securely indexed against your accounts within the LastPass system. If there is a security breach and your email is on the list, you’ll receive an automated email notice indicating which website was compromised and that your email address was one of the positive matches from the breach list. LastPass Sentry is a free feature and, as of yesterday, is automatically activated on all Free, Premium, and Enterprise level accounts. Hit up the link below to read the official announcement. Introducing LastPass Sentry [The LastPass Blog] How To Create a Customized Windows 7 Installation Disc With Integrated Updates How to Get Pro Features in Windows Home Versions with Third Party Tools HTG Explains: Is ReadyBoost Worth Using?

    Read the article

  • Grand Theft Auto IV – Awesome Ghost Rider Mod [Videos]

    - by Asian Angel
    Recently we shared the video for a terrific Back to the Future GTA IV mod with you and today we are back with videos for a wicked Ghost Rider mod. One thing is sure, with Ghost Rider cruising through town the nights in Liberty City have never been hotter! Note: Videos contain some language that may be considered inappropriate. The first video focuses on the main working mod while the second focuses on the new ‘Wall Ride’ feature that sees Ghost Rider going up and down walls. How To Create a Customized Windows 7 Installation Disc With Integrated Updates How to Get Pro Features in Windows Home Versions with Third Party Tools HTG Explains: Is ReadyBoost Worth Using?

    Read the article

  • HTG Explains: Why You Shouldn’t Disable UAC

    - by Chris Hoffman
    User Account Control is an important security feature in the latest versions of Windows. While we’ve explained how to disable UAC in the past, you shouldn’t disable it – it helps keep your computer secure. If you reflexively disable UAC when setting up a computer, you should give it another try – UAC and the Windows software ecosystem have come a long way from when UAC was introduced with Windows Vista. How To Create a Customized Windows 7 Installation Disc With Integrated Updates How to Get Pro Features in Windows Home Versions with Third Party Tools HTG Explains: Is ReadyBoost Worth Using?

    Read the article

  • Windows 8: Paradigm Shift

    You've probably heard a lot about the loss of the Start button in Windows 8. While it isn't completely lost - you can still get to it via a convoluted path - its disappearance is merely a sign of the rethinking that went into the operating system's creation. Window 8's designers made certain assumptions while building the new system: Users will interact with the operating system predominantly through a touch interface. Users will do their computing on mobile devices, and may in fact use several different devices for the same purposes. They may even want to get work done on devices they do n...

    Read the article

  • Google+ compte 400 millions d'utilisateurs dont 100 millions actifs par mois et directement sur le réseau social

    Google+ compte 400 millions d'utilisateurs dont 100 millions actifs Par mois et directement sur le réseau social Un an après le lancement de son réseau social phare en juin 2011, Google annonce qu'il compte aujourd'hui 400 millions d'utilisateurs, dont 100 millions de membres mensuellement et directement actifs sur Google+. [IMG]http://idelways.developpez.com/news/images/google-plus.png[/IMG] Vic Gundotra, vice-président senior ingénierie chez Google, déclare en marge d'une annonce « c'était il y a seulement un an que nous avons ouvert les inscriptions au publique, et nous n'aurions jamais imaginé qu'autant de gens nous rejoindraient en seulement 12 mo...

    Read the article

  • Microsoft met à jour Windows Azure Web Sites et Azure Active Directory pour la gestion d'identité et l'hébergement Web dans le Cloud

    Microsoft met à jour Windows Azure Web Sites et Azure Active Directory pour l'hébergement Web et la gestion d'identité dans le Cloud Microsoft par la voix de Scott Guthrie, Vice-président de la division serveur et Business Tools, vient d'annoncer une mise à jour de Windows Azure Web Sites ainsi que du service Windows Azure Active Directory (WAAD). [IMG]http://ftp-developpez.com/gordon-fowler/windowsazurelogo.jpg[/IMG] Azure Web Sites est une plateforme d'hébergement des sites et applications Web dans le Cloud Azure. L'objectif de l'infrastructure Azure Web Sites est de rendre l'hébergement disponible à la fois sur le Cloud et en local sur les serv...

    Read the article

  • Amazon s'associe à Nokia pour créer son propre service de cartographie, un autre acteur majeur du mobile tourne le dos à Google

    Amazon s'associe à Nokia pour créer son propre service de cartographie Un autre acteur majeur du mobile tourne le dos à Google Maps Après Apple qui lâchera définitivement Google Maps dès la sortie imminente d'iOS 6, c'est maintenant au tour d'Amazon de lancer son propre service de cartographie sur ses tablettes Kindle Fire et Kindle Fire HD. Dans un communiqué adressé à la presse, le porte-parole de Nokia Dr Sebastian Kurme affirme que la société Amazon s'associe à Nokia et se base sur sa plateforme de localisation NLP pour créer un service de cartographie ...

    Read the article

  • Faille zero-day découverte dans Internet Explorer, permettant de prendre à distance le contrôle d'un PC, Microsoft recommande EMET

    Faille zero-day découverte dans Internet Explorer permettant de prendre à distance le contrôle d'un ordinateur, Microsoft recommande EMET Une faille de sécurité critique dans Internet Explorer 6, 7, 8 et 9 vient d'être découverte par des experts en sécurité. Dans un billet de blog sur ZATAZ.com, Eric Romang, un conseiller en sécurité luxembourgeois, déclare avoir découvert la vulnérabilité lorsque son PC a été infecté par le cheval de troie Poison Ivy, qui est utilisé pour voler des données ou prendre le contrôle à distance d'un ordinateur. La faille pourrait être exploitée par des pirates distants qui peuvent obtenir les mêmes privilèges que l'utilisateur local, pour installer de...

    Read the article

< Previous Page | 5 6 7 8 9 10 11 12 13 14 15 16  | Next Page >