Search Results

Search found 47679 results on 1908 pages for 'web admin'.

Page 1004/1908 | < Previous Page | 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011  | Next Page >

  • Re-generating SQL Server Logins

    SQL Server stores all login information on security catalog system tables. By querying the system tables, SQL statements can be re-generated to recover logins, including password, default schema/database, server/database role assignments, and object level permissions. A comprehensive permission report can also be produced by combining information from the system metadata. The Future of SQL Server Monitoring "Being web-based, SQL Monitor 2.0 enables you to check on your servers from almost any location" Jonathan Allen.Try SQL Monitor now.

    Read the article

  • Snap Spiffy Linux Screenshots with Shutter

    <b>LinuxPlanet:</b> "Paul Ferrill introduces us to the Shutter screen grab for Linux application. Shutter offers a simple interface and a whole lot of functionality. including cursor capture, whole Web page capture, and annotations."

    Read the article

  • How to Build a Website With 2 Simple Tools

    Building your own web page or website shouldn't be as difficult a process as you may at first have thought. As with other various issues in life, the simple act of merely believing that everything pertaining to constructing an internet website is beyond your capabilities only make things worse than they actually are.

    Read the article

  • Mozilla développe un moteur DOM multi-thread, première application pratique du langage concurrentiel "Rust" créé par la fondation

    Mozilla développe un moteur DOM multi-thread Première application pratique du langage concurrentiel "Rust" créé par la fondation Durant la conférence « Velocity » clôturée hier à Santa Clara, la fondation Mozilla a affiché ses ambitions de créer un moteur DOM multithread, permettant à plusieurs coeurs du processeur de participer au rendu des pages Web. L'open source évangéliste Chris Blizzard croit fort en tout cas à ce projet, affirmant durant sa présentation qu'il s'agit là d'un domaine de recherche actif auquel il convie tous les développeurs. Le projet n'en est qu'à ses balbutiements et sera l'une des premières applications sérieuses

    Read the article

  • Addressing threats introduced by the BYOD trend

    - by kyap
    With the growth of the mobile technology segment, enterprises are facing a new type of threats introduced by the BYOD (Bring Your Own Device) trend, where employees use their own devices (laptops, tablets or smartphones) not necessarily secured to access corporate network and information.In the past - actually even right now, enterprises used to provide laptops to their employees for their daily work, with specific operating systems including anti-virus and desktop management tools, in order to make sure that the pools of laptop allocated are spyware or trojan-horse free to access the internal network and sensitive information. But the BYOD reality is breaking this paradigm and open new security breaches for enterprises as most of the username/password based systems, especially the internal web applications, can be accessed by less or none protected device.To address this reality we can adopt 3 approaches:1. Coué's approach: Close your eyes and assume that your employees are mature enough to know what he/she should or should not do.2. Consensus approach: Provide a list of restricted and 'certified' devices to the internal network. 3. Military approach: Access internal systems with certified laptop ONLYIf you choose option 1: Thanks for visiting my blog and I hope you find the others entries more useful :)If you choose option 2: The proliferation of new hardware and software updates every quarter makes this approach very costly and difficult to maintain.If you choose option 3: You need to find a way to allow the access into your sensitive application from the corporate authorized machines only, managed by the IT administrators... but how? The challenge with option 3 is to find out how end-users can restrict access to certain sensitive applications only from authorized machines, or from another angle end-users can not access the sensitive applications if they are not using the authorized machine... So what if we find a way to store the applications credential secretly from the end-users, and then automatically submit them when the end-users access the application? With this model, end-users do not know the username/password to access the applications so even if the end-users use their own devices they will not able to login. Also, there's no need to reconfigure existing applications to adapt to the new authenticate scheme given that we are still leverage the same username/password authenticate model at the application level. To adopt this model, you can leverage Oracle Enterprise Single Sign On. In short, Oracle ESSO is a desktop based solution, capable to store credentials of Web and Native based applications. At the application startup and if it is configured as an esso-enabled application - check out my previous post on how to make Skype essso-enabled, Oracle ESSO takes over automatically the sign-in sequence with the store credential on behalf of the end-users. Combined with Oracle ESSO Provisioning Gateway, the credentials can be 'pushed' in advance from an actual provisioning server, like Oracle Identity Manager or Tivoli Identity Manager, so the end-users can login into sensitive application without even knowing the actual username and password, so they can not login with other machines rather than those secured by Oracle ESSO.Below is a graphical illustration of this approach:With this model, not only you can protect the access to sensitive applications only from authorized machine, you can also implement much stronger Password Policies in terms of Password Complexity as well as Password Reset Frequency but end-users will not need to remember the passwords anymore.If you are interested, do not hesitate to check out the Oracle Enterprise Single Sign-on products from OTN !

    Read the article

  • Importance of Attractive Website Footer

    Normally you website visitors can not see your website footer if that is not attractive one. However, you can sale your products or get online leads using attractive website footer. If your intention... [Author: Bryan Young - Web Design and Development - May 12, 2010]

    Read the article

  • My schoolmates are playing too much and talk loudly, what should I do ? report them ? [closed]

    - by jokoon
    I'm a in a private game programming school class (there are also 3D/art classes in the school), and at least half or two third of the 12 people in my class play at various games (Age of Empires, web games, online card games, etc). They are talking quite loudly on top of that, and I'm getting hard times trying to concentrate: it feels like I'm in a cybercafe full of teenagers. I don't know if I have Hyperacusis (http://en.wikipedia.org/wiki/Hyperacusis),

    Read the article

  • Could not display chart. The control is not properly registered. (4 replies)

    I've seen other people raise this in searching the web but can't find any definitive answers so apologies if this has been answered previously (but please point me in that direction). I have two XP Pro SP2 workstations one works fine in that it shows the result graphs in ACT (v1.0.536.0) and the other gives the error &quot;Could not display chart. The control is not properly registered.&quot;. Both systems ...

    Read the article

  • Week in Geek: Malware for Android has Increased 472% since July

    - by Asian Angel
    This week we learned how to safely eject your USB devices from the desktop context menu, make the Kindle Fire Silk Browser *actually* fast, “disable Windows startup programs, use DNS names on your home network, & restore a vintage keyboard”, print or save a directory listing to a file, make your computer press a key every X seconds, and more. How to Make the Kindle Fire Silk Browser *Actually* Fast! Amazon’s New Kindle Fire Tablet: the How-To Geek Review HTG Explains: How Hackers Take Over Web Sites with SQL Injection / DDoS

    Read the article

  • SQL Server Compressed Backups Disk Space Needs

    SQL Server 2008 and later offers the ability to create compressed backup files. When creating the compressed backup, how much space is really needed and when does the space get allocated for the backup file? The Future of SQL Server Monitoring "Being web-based, SQL Monitor enables you to check on your servers from almost any location" Jonathan Allen.Try SQL Monitor now.

    Read the article

  • SQL Server Functions: The Basics

    SQL Server's functions are a valuable addition to T-SQL when used wisely. Jeremiah Peshcka provides a complete and comprehensive guide to scalar functions and table-valued functions, and shows how and where they are best used. The Future of SQL Server Monitoring "Being web-based, SQL Monitor enables you to check on your servers from almost any location" Jonathan Allen.Try SQL Monitor now.

    Read the article

  • Keyword Analysis Tool - Right Method For SEO

    Keyword analysis tool have become a vital element to effective online marketing. This particular tool provides great understanding for the words and phrases people use to search the web for info and products. With that information you can make much better choices in your marketing strategies. They can help you see inside the entire market of online users.

    Read the article

  • What problems can arise from emulating concepts from another languages?

    - by Vandell
    I've read many times on the web that if your language doesn't support some concept, for example, object orientation, or maybe function calls, and it's considered a good practice in this other context, you should do it. The only problem I can see now is that other programmers may find your code too different than the usual, making it hard for them to program. What other problems do you think may arise from this?

    Read the article

  • Mis à jour : Configuration d'une infrastructure à clés publiques à 2 niveaux sous Windows Server 200

    Configuration d'une infrastructure à clés publiques à 2 niveaux sous Windows 2008 (R2), par Michaël Todorovic Citation: Ce document va vous permettre de mettre en place une infrastructure à clés publiques (aussi nommée PKI) à deux niveaux grâce à Microsoft Windows 2008. Cette PKI pourra vous être utile dans beaucoup de cas : serveur web sécurisé, serveur de messagerie sécurisé, distribution automatisée de cert...

    Read the article

  • Facebook integration in Empathy doesn't work in 12.10

    - by skerit
    The new web apps feature is fun, I've set up everything as it should be, but Empathy still doesn't connect to Facebook. When I go to the "Online-accounts" dialog and open the Empathy options dialog in the Facebook tab this shows up: Identification is blank and can't be edited Alias is blank, but can be edited A notification saying "Go online to edit your personal data" is visible I've tried logging into Facebook using my email address AND my username, both with the same results.

    Read the article

  • how can I update my Firefox 4.0 beta in Ubuntu 11.04 natty 64bit ?

    - by Denja
    Hi community, I'm using Ubuntu 11.04 natty 64bit with the integrated Firefox 4.0 beta Firefox 4.0 is not yet stable as beta and has lots of bugs when I open mainly Java applications in the web.Usually it freeze and even mess with Ubuntu gnome panel. It seems I cannot find any PPA related with Firefox beta updates in my Software source . How can I update my Firefox 4.0 beta in Ubuntu 11.04 natty 64bit?

    Read the article

  • USB 3.0 controller is not recognized by Ubuntu 12.04

    - by BlueWanderer
    I have a Thinkpad E430 notebook, and the intel's USB 3.0 controller can not be recognized by Ubuntu 12.04. The LED on my USB-HDD is white instead of blue (And in Windows 7, it is blue when connected to USB 3.0 port, and is white when connected to 2.0). And the transfer speed is around 25MB/s instead of 65MB/s in Windows 7. I'm not familiar with Linux systems, so I've no clue about what's going wrong. I've searched the web, but got no solution.

    Read the article

  • StarterSTS v1.5 CTP

    - by Your DisplayName here!
    I just uploaded a new version of StarterSTS to Codeplex. There have been some dramatic changes since the last public version, so any feedback would be appreciated. This new version is now a .NET 4.0 web application project, and includes all the necessary plumbing and configuration to deploy StarterSTS to Azure. In fact it is just a configuration change to choose between the Azure and on-premise version. Download: http://startersts.codeplex.com/releases/view/52214 More info: Moving StarterSTS to the (Azure) Cloud

    Read the article

  • Google I/O 2012 - SPDY: It's Here!

    Google I/O 2012 - SPDY: It's Here! Roberto Peon SPDY makes your web pages faster over SSL than they'd be over HTTP. We'll talk about why you should care, give tips about how to take advantage of its features, talk about working implementations, and tell you about the future. For all I/O 2012 sessions, go to developers.google.com From: GoogleDevelopers Views: 290 22 ratings Time: 43:50 More in Science & Technology

    Read the article

  • Google Fiber to the Home - Joplin Edition

    - by Malcolm Anderson
    if you are within 30-40 miles of Joplin, you have got to check out http://www.broadbandbeyondborders.com/ Google is going to provide fiber-to-the-home in one community in the US. Broadband Beyond Borders will give them the experience of dealing with 6 counties, 3 states, and 10 nations (the US and 9 native american n...ations.) Follow the instructions on the web page. It was pretty simple.

    Read the article

  • i'm confused what skill shall i learn at my internship

    - by iyad al aqel
    i'm a software Engineering student having my internship this summer. the company asked me to choose one or two skills that i want to master and they will coordinate me and give me small tasks to medium projects to master it . Now , i'm confused shall i continue with web development and learn .NET given that i've been working with PHP for 2 years OR entering the mobile development world and learn Android. any advice guys ?

    Read the article

  • New Videos in the Tailspin Spyworks series live.

    Weve posted a few new videos in the Tailspin Spyworks tutorial serials. Many more in the works ! http://www.asp.net/web-forms/fundamentals http://www.asp.net/aspnet-4/videos http://www.asp.net/aspnet-4/videos/tailspin-spyworks-display-the-product-list http://www.asp.net/aspnet-4/videos/tailspin-spyworks-display-per-product-details...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

< Previous Page | 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011  | Next Page >