Search Results

Search found 12846 results on 514 pages for 'ghost answer'.

Page 110/514 | < Previous Page | 106 107 108 109 110 111 112 113 114 115 116 117  | Next Page >

  • (Why) are IEC C5/C6 connectors a necessity? Why not use C13/C14?

    - by Mike
    That's a question I was asking myself the first time I saw such a weird C5 plug. That was a while ago, but I came across it again and haven't found an answer yet. The only thing I could find out is that C5 is with 2.5A and C13 with 10A. But I guess it would technically be no problem building an AC adapter (e.g. for laptops) in which you plug the far more common C13 connector. http://en.wikipedia.org/wiki/IEC_connector

    Read the article

  • Rules for setting hostname [duplicate]

    - by Ilia Rostovtsev
    This question already has an answer here: Hostnames - What are they all about? 5 answers Setting the hostname: FQDN or short name? 6 answers It's thought that for the hostname should be used FQDN. I have a doubts about whether using: host.domain.ltd and domain.ltd for the hostname is the same thing and will be equally correct / acceptable? I'm willing to use domain.ltd for the hostname. Is it alright?

    Read the article

  • Why is BIND giving me a SERVFAIL in this case? (Notes inside)

    - by imaginative
    Woke up this morning to a bunch of the following: root@foo:/etc/bind# dig @1.2.3.4 foo.example.com ; <<>> DiG 9.6.1-P2 <<>> @1.2.3.4 foo.example.com ; (1 server found) ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 36121 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;;foo.example.com. IN A ;; Query time: 0 msec ;; SERVER: 1.2.3.4#53(1.2.3.4) ;; WHEN: Thu Apr 1 09:57:59 2010 ;; MSG SIZE rcvd: 31 Some background on the fictitious "1.2.3.4". It's a slave name server in my nameserver "farm". Technically I have ns1 (being the master) and ns2/ns3. Currently ns1/ns2 are down for maintenance, so I left ns3 at it serving live traffic. That's the point, DNS is supposed to be resilient. Now the odd part is, "1.2.3.4" was serving requests for example.com just fine for the last 4-5 days. This morning I get a phone call that it's non-responsive. After investigation I see the message you see above, SERVFAIL. I looked into the zone file and saw the following: example.com IN SOA ns1.example.com. hostmaster.mail.example.com. ( I wondered if at this point that the nameserver thought it was not authoritative over example.com and adjusted it to the following: example.com IN SOA ns3.example.com. hostmaster.mail.example.com. ( After that, it started responding again for all authoritative queries for example.com. I have no idea why. I thought these things were supposed to be normalized upon zone transfer from ns1 - ns3? Can someone please example why this happened and how to prevent it from happening in the future? I've never had a similar problem, and because I don't understand it well, I might be missing some critical information in this question. So please let me know if I can further add any detail to make things clearer as well. One more thing to note: I have other domains that I'm authoritative for that have their SOA still saying ns1.example.com. and not ns3.example.com. Those domains are serving requests just fine! Is it a matter of time before they stop also and I have to change SOA to ns3.example.com? Is this also only required because ns1 and ns2 are currently offline?

    Read the article

  • What should I do about this user?

    - by Tim Brigham
    What should I do about this user? The user is: Downloading pornography Attempting unauthorized access Running hacking software Sending unsolicited email Installing software / tampering with the system etc This is intended as a generic answer for employee behavioral problems, a la Can you help me with my software licensing question? I could see where acceptable use issues are a touch out of scope for SF, however it is one of those things most sysadmins will run into. I don't want to keep rewriting similar answers.

    Read the article

  • How to add a font to the Cmd window choices in Windows 7 64-bit?

    - by Mark Ransom
    I tried following the procedure outlined in this previous answer and it doesn't work: http://superuser.com/a/5079/2366 Specifically I'm trying to add Lucida Sans Typewriter Regular to the choices of Consolas and Lucida Console that the Cmd window currently allows. Lucida Console is in registry key "0" and Consolas is in registry key "00", so I'm adding key "000" but it's not affecting the available choices in the Font tab under Properties, even after rebooting the system. P.S. I also tried adding Courier New to the choices and it shows up, but appears to select Italic instead.

    Read the article

  • How to limit a process to a single CPU core?

    - by Jonathan
    How do you limit a single process program run in a Windows environment to run only on a single CPU on a multi-core machine? Is it the same between a windowed program and a command line program? UPDATE: Reason for doing this: benchmarking various programming languages aspects I need something that would work from the very start of the process, therefore @akseli's answer, although great for other cases, doesn't solve my case

    Read the article

  • What is the difference between running a Windows service vs. running through shell?

    - by Zack
    I am trying to troubleshoot an issue on a Windows 2008 server where running attempting to connect to a "Timberline Data Source" ODBC driver crashes if the call is in a "service" context, but succeeds if the call is initiated manually in a Remote Desktop session. I have set the service to run as my user. I'm wondering if, all else being equal (user, machine, etc), are there any fundamental security/environment differences between running a process as a service vs manually? --- Implementation Details --- In case it is helpful for anyone, I had a system that started as an attempt to connect to a Timberline Database using ODBC and a Python CGI script called via IIS 7. The script itself works fine, however, as soon as I attempt to perform the ODBC connect function, the script crashes without throwing an exception. The script was able to connect fine when executed via command line. The same thing happened when using a C#/.net service, attempting to run via Apache, Windows Scheduler or even a 3rd party scheduling tool. With the last option (the 3rd party scheduling tool, pycron) I set the service up log in as my user and had the same issue (I confirmed via Task Manager that the process running user was, in fact, me). It just doesn't make sense to me why a service, which should be running as my user, appears to still be operating in a different security context or environment. Also, if it's important, the Timberline database is referenced by computer name on the network ("\\timberline-server\Timberline Office\Accounts\AT" or something to that effect) I also realized that, as Joel pointed out, the server DOES have a mapped drive ("Y:" which is mapped to "\\timberline-server\Timberline Office") The DSN is set up at the "System DSN" level which, according to the ODBC Administration Tool, means that the DSN is available to users and services Since I'm not allowed to answer this question yet, I'll post the solution that I arrived on: As Joel Coel mentioned, there actually was a mapped drive scenario. I didn't realize this because the DSN specified a path using UNC. However, it seems as though the actual Timberline Driver referred to a mapped drive. Since services don't start with the mapped drive, I was forced to add the drive mapping code into my service. Since it was written in python, I used code from a Stackoverflow answer that was able to map the drive on the fly.

    Read the article

  • Wireless N extend G range?

    - by Sam
    I've searched all over the internet for an answer to this and I can't find one. If I purchase a wireless N router, with greater range than my current G router will the range of the wireless G signal go as far as the wireless N signal? I say this because Wireless N routers are supposed to be compatible with wireless G devices. Is the wireless G a lesser signal coming out of the router? Sorry if I confused you, I am a little confused myself.

    Read the article

  • WAMP - phpMyAdmin is loading a blank browser (Firefox)

    - by Michael
    I recently uninstalled an older version of WAMP then installed the latest version. The link to the localhost displays the WAMPSERVER home page successfully. However, the http://localhost/phpmyadmin/ returns only a blank browser - it displays nothing. localhost/sqlitemanager/ returns a Forbidden You don't have permission to access /sqlitemanager/ on this server. This seems to be a 403 forbidden error I've looked everywhere for an answer to this. Help please

    Read the article

  • Are neighbors formed in EIGRP and OSPF always directly connectly?

    - by xczzhh
    I always thought that neighbors formed in EIGRP were not necessarily directly connected because the only requirement for two routers to be neighbors is that they share the same Autonomous System and K-values, but it seems that I was wrong. I have looked up several books, they do not seem to give a clear answer. And I am even more confused with OSPF... Please, give me some light here. Thank you.

    Read the article

  • 403 error with codeignitor

    - by DJB
    When I type in the standard web address for my site, I get a 403 error. However, when I type in a more exact address, say pointing to an index.php file, everything shows up fine. I'm using Anodyne Productions' Nova (SMS 3) which uses codeignitor. All accompanying software (PHP/MySQL) is compatible. I'm not a very technical person, so I'm hoping that this is an easy fix. Thanks for taking the time to answer.

    Read the article

  • Finding out with process binds a hotkey [duplicate]

    - by Christian
    This question already has an answer here: How can I determine which process owns a hotkey in Windows? 2 answers Somehow I have set a hotkey that start DoubleCommander whenever I press AltGr+s. Unfortunately I forgot which program is responsible for that behavior and therefore how to change it back. How do I find out which program is responsible to change it back?

    Read the article

  • Alternative Remote Desktop Software

    - by squillman
    What are good alternatives to the Windows builtin remote desktop client? I have tried Terminals and it is great but I've have run into numerous bugs with the latest release (currently 1.7e). Can anyone recommend an alternative similar to Terminals? EDIT (in response to Adam Gibbins' answer): One of the biggest things I'm looking for is session management and a tabbed environment similar to the Terminals interface.

    Read the article

  • What does a green colored file name mean? [duplicate]

    - by user178744
    This question already has an answer here: What do green folders mean in Windows 7 Explorer? 2 answers I downloaded a .zip file the other day and extracted it using 7zip from my desktop to my laptop over my home network, when it finished, its filename and the filename of its contents was green. What does this mean, can i revert it to normal, has anything been modified and is there a list somewhere of color codes for windows file names.. ? (I can recall seeing blue somewhere before).

    Read the article

  • Multiple computers in SBS domain that need a Remote Desktop Connection with a sub domain

    - by Mark
    Hi all, I've been searching the internet for a while for this answer. I have a bunch of computers that are part of a small business server domain and would like to be able to connect to each one individually with remote desktop connection using a subdomain, like: computer1.mydomain.org computer2.mydomain.org etc... I can currently connect to the server easily using an A record with the subdomain pointing to the static IP address with home.mydomain.org, so computer1.home.mydomain.org would also be cool. Thanks!

    Read the article

  • Can I stop SharePoint from prompting during file edit?

    - by uSlackr
    We use a SharePoint 2007 site internally with Office 2010. Whenever I open a Word document to edit it, I get a prompt saying: Some files can harm your computer. If the file information below looks suspicious, or you do not fully trust the source, do not open the file. I've been unable to find a reliable answer around the web. Some suggested using the Windows File Types dialog to remove the prompt on download option, but this dialog is not available in Windows 7.

    Read the article

  • Learn to use both sides of the keyboard

    - by brewerja
    I'd like to force myself to use the correct (right side or left side) Shift, Ctrl, and Alt keys depending on what letter I'm typing. For instance I'd like to use the right Shift key when typing 'A' and the left Shift key when typing 'P'. I find myself using only the left side a lot and I'm looking for a way to set the mappings on my machine so that it only responds to correct pairings. I'm running Fedora, but any Linux distro support would be an acceptable answer.

    Read the article

  • How can I tell who deleted a folder from a public share?

    - by wizard
    Like a lot of offices we have a few public shares for different teams to save their data. Today I helped someone restore some folders from a shadow copy that had been deleted sometime last week. While I had the shadow copies (and backups elsewhere), I couldn't answer the obvious first question. "Who deleted the files?" We're running Windows 2003 server, everyone has active directory accounts.

    Read the article

< Previous Page | 106 107 108 109 110 111 112 113 114 115 116 117  | Next Page >