Search Results

Search found 15423 results on 617 pages for 'uses clause'.

Page 120/617 | < Previous Page | 116 117 118 119 120 121 122 123 124 125 126 127  | Next Page >

  • OS X printing to HP Photosmart black only

    - by churnd
    When you print something to a Photosmart printer in OS X, by default it prints color. If you want black and white, you have to manually change the settings. How do I fix it to where it prints black and white by default, and if you want color, you have to change the settings? More specifically, I want the default to be black and white that uses only the black cartridge.

    Read the article

  • How can user change the jre parameter values after the exe is generated in Launch4j?

    - by Wing C. Chen
    Is it possible to change the jre parameter values after the exe file is generated through Launch4j? The ideal scenario is like this: The default parameter values are applied when the program is started. However, when the user wants to change some jre parameter values, he goes to a .ini file, MyProgram.ini for example, changes the values there, and the new values will be applied next time the program is started. I think eclipse uses the same way for its memory and some other parameter settings.

    Read the article

  • Is there a way to unhook a global hotkey in windows?

    - by jonfuller
    I'm running Windows 7, and I installed an application that installed a global hot key (ctrl+shift+space) which conflicts with another application (Visual Studio) that uses that hotkey (though, not globally, only applications specific). The question is, knowing which application it is (ScanSnap Manager) and that it doesn't have a setting to turn off the hot key, is there a way I disable it through Windows somehow? Thanks!

    Read the article

  • Finder Using Nearly 100% CPU

    - by jerwood
    I'm having a problem where the Finder uses WAY too much CPU time. It's using up to 100% of one of my cores. I'm running 10.6.2 on a MacBook Pro w/ 6GB of RAM, plenty of fast (SSD) disk space. I also run DropBox and BackBlaze. I've tried disabling my third party stuff (DropBox and BackBlaze), but that doesn't seem to help. It's killing my battery life!

    Read the article

  • Which wiki satisfies ACL ADI and API ?

    - by goutham
    Hi , is there any wiki that supports ACL , ADI and API ? and my requirement is we need a wiki that does three things 1. Uses ACL (Access Control lists - who can access what pages) 2. Needs AD (active directory integration) 3. Is scriptable via an API (meaning I can create a wiki page through an API in a program instead of logging in and manually typing in the page.) Ur help is appreciated Thanks in Advance Goutham

    Read the article

  • How to get Tenda W322U V2.0 Wireless adapter running on Windows 7?

    - by dircowander
    My Tenda W322U V2.0 Wireless USB Adapter used to work with Ralink drivers and I can't make it work on the new Windows 7. Every time the network adapter is booted, it keeps looking for a driver update and after updating, no wireless connection shows in the launcher in the panel. I was wondering whether the adaptor uses the Ralink chipset at all. Is there a version available with a wider choice of drivers?

    Read the article

  • Executing Windows administrative shell commands on Windows using Python

    - by at0m
    I have a batch script using Windows shell commands to perform several administrative actions. The script is running great on Windows 7 but when i try launching it from Python 2.6 nothing happens: import os a = os.popen("somebatchfile.bat") I assume that this is because the bat file uses several commands that require an administrative privileges but i don't want to prompt to a password using runas.exe or embedding the password within the code. Is there any way to make UAC prompt for user approval or something?

    Read the article

  • Configure LAN Router To Prevent Illegal Torrenting?!

    - by Goober
    Scenario I have a typical broadband setup at home (It's a flatshare I have no control over who uses the house) and I want to prevent anyone using it from illegally downloading via torrents etc. Question Is there a way in which I can configure the router to block all forms of illegal downloads?

    Read the article

  • Language for google search field in firefox toolbar is wrong

    - by Andrew
    I've got a fresh install of Ubuntu 9.10 (64 bit) and for some reason the Google search field in the Firefox toolbar always searches google.jp. Given that I'm in Australia and struggle to read Japanese this is somewhat less than useful to me. Does anyone know how I can change the language/Google site that search field uses?

    Read the article

  • framebuffer not available. How to install the device /dev/fb/0 on Ubuntu?

    - by Aleyna
    I am trying to run an application that uses framebuffer on 2.6.31-14-generic #48-Ubuntu. All need to do is to install a framebuffer device to get rid of the following error. /dev/fb/0: No such file or directory framebuffer not available. FATAL: no framebuffer available I googled through and found some resources indicating to do that on Grub2 I got nothing though I followed them seamlessly. Any ideas? Thanks

    Read the article

  • Why are there many processes listed under the same title in htop?

    - by javanix
    Can anyone explain to me why there are sometimes 10 or 15 processes with the same title and "stats" listed in htop? I'm guessing there are multiple threads running - but that many of them obviously couldn't be running concurrently. Is there any sort of performance hit taken if a process uses say, 15 non-concurrent threads vs. 10 non-concurrent threads?

    Read the article

  • How to know which speed of RAM can I use

    - by Phuong Nguyen
    I have a Dell Vostro 1000 which uses ATI RS480 mainboard. Specification says that the front bus of such mainboard is 1Ghz. However, the default RAM came with mainboard is PC4200 (533Mhz). I wonder if I can replace them with PC6400 (800Mhz) or at least PC5300 (667Mhz)?

    Read the article

  • networking tunnel adapter connections?

    - by Karthik Balaguru
    I understand that Tunnel Adapter LAN is for encapsulating IPv6 packets with an IPv4 header so that they can be sent across an IPv4 network. Few queries popped up in my mind based on this :- If i do 'ipconfig', Apart from ethernet adapter LAN details, I get a series of statments as below - Tunnel adapter Local Area Connection* 6 Tunnel adapter Local Area Connection* 7 Tunnel adapter Local Area Connection* 12 Tunnel adapter Local Area Connection* 13 Tunnel adapter Local Area Connection* 14 Tunnel adapter Local Area Connection* 15 Tunnel adapter Local Area Connection* 16 Except for the *16, all the other Tunnel Adapter Local Area Connections show Media Disconnected. Why is the numbering for the Tunnel adapter LAN not sequential? It is like 6, 7, 12, 13, 14, 15, 16. A strange numbering scheme! I tried to figure it out by thinking of some arithmetic series. But, it does not seem to fit in. There is a huge gap between 7 and 12. Any ideas? What is the need for so many Tunnel Adapter LAN connections? Can you tell me a scenario that requires all of those ? I did ipconfig /all to get more information. From the listing, I understand that: 16, 15, 14, 12 are Microsoft 6to4 Adapters 13, 6 are isatap Adapters 7 is Teredo Tunneling Pseudo-interface I understand that the above are for automatic tunneling so that the tunnel endpoints are determined automatically by the routing infrastructure. 6to4 is recommended by RFC3056 for automatic tunneling that uses protocol 41 for encapsulation. It is typically used when an end-user wants to connect to the IPv6 Internet using their existing IPv4 connection. Teredo is an automatic tunneling technique that uses UDP encapsulation across multiple NATs. That is, It is to grant IPv6 connectivity to nodes that are located behind IPv6-unaware NAT devices ISATAP treats the IPv4 network as a virtual IPv6 local link, with mappings from each IPv4 address to a link-local IPv6 address. That is to transmit IPv6 packets between dual-stack nodes on top of an IPv4 network. That is, to put in simple words, ISATAP is an intra-site mechanism, while the 6to4 and Teredo are for inter-site tunnelling mechanisms. It seems that Teredo should alone enabled by default in Vista, But my system does not show it to be enabled by default. Interestingly, it shows a 6to4 tunnel adapter (Tunnel adapter LAN connection 16) to be enabled by default? Any specific reasons for it? If i do ipconfig /all, why is only one Teredo present while four 6to4 are present ? I searched the internet for answers to the above queries, but I am unable to find clear answers.

    Read the article

  • Redhat cpanel how to limit cpu for a perticular user.

    - by Ahmed M Fituri
    Hello, I have a web server with multiple users in it. one of these users uses mambo, and the cpu usage of this user is more than 90% which leads to a very slow performance of the machine, I have installed cpulimit version 1.1. but there is no particular command that limits the cpu per user. I need to limit this user for at least 50% . please help me ASAP. Thank you.

    Read the article

  • What are the icons contained in the Windows 7 shell32.dll

    - by ahsteele
    I wanted to change the icon used for a Custom Library I've created in Windows 7. I found a great article How to Customize the Library Icons in Windows 7 which describes exactly how to do that. However, the article uses shell32.dll and a icon location to do so. I have found an image map detailing the icons location in shell32.dll in Windows XP but was wondering if anyone knew of something similar for Windows 7.

    Read the article

  • Serving Ruby pages without Rails?

    - by Miko
    How would I go about displaying Ruby-generated dynamic pages without relying on a framework, such as Rails? My intention is to serve Ruby .erb pages just as I would with .php files. My server uses EngineX, which seems to play well together with Passenger.

    Read the article

  • SMTP for multiple domains on virtual interfaces

    - by Pawel Goscicki
    The setup is like this (Ubuntu 9.10): eth0: 1.1.1.1 name.isp.com eth0:0 2.2.2.2 example2.com eth0:1 3.3.3.3 example3.com example2.com and example3.com are web apps which need to send emails to their users. 2.2.2.2 points to example2.com and vice-versa (A/PTR). MX - Google. Google handles all incoming mail. 3.3.3.3 points to example3.com and vice-versa (A/PTR). MX - Google. Google handles all incoming mail. Requirements: Local delivery must be disabled (must deliver to MX specified server), so that the following works (note that there is no local user bob on the machine, but there is an existing bob email user): echo "Test" | mail -s "Test 6" [email protected] I need to be able to specify from which IP/domain name the email is delivered when sending an email. I fought with sendmail. With not much luck. Here's some debug info: sendmail -d0.12 -bt < /dev/null Canonical name: name.isp.com UUCP nodename: host a.k.a.: example2.com a.k.a.: example3.com ... Sendmail always uses canonical name (taken from eth0). I've found no way for it to select one of the UUCP codenames. It uses it for sending email: echo -e "To: [email protected]\nSubject: Test\nTest\n" | sendmail -bm -t -v [email protected]... Connecting to [127.0.0.1] via relay... 220 name.isp.com ESMTP Sendmail 8.14.3/8.14.3/Debian-9ubuntu1; Wed, 31 Mar 2010 16:33:55 +0200; (No UCE/UBE) logging access from: localhost(OK)-localhost [127.0.0.1] >>> EHLO name.isp.com I'm ok with other SMTP solutions. I've looked briefly at nbsmtp, msmtp and nullmailer but I'm not sure thay can deal with disabling local delivery and selecting different domains when sending emails. I also know about spoofing sender field by using mail -a "From: <[email protected]>" but it seems to be a half-solution (mails are still sent from isp.com domain instead of proper example2.com, so PTR records are unused and there's more risk of being flagged as spam/spammer).

    Read the article

  • Does disabling root login enhance security?

    - by PJ
    I have recently found an argument against disabling a root user login in Linux at http://archives.neohapsis.com/archives/openbsd/2005-03/2878.html I assume that, if everybody uses a public key authentication, there's no risk at losing the root password. Is it always better to disable the root login via ssh?

    Read the article

< Previous Page | 116 117 118 119 120 121 122 123 124 125 126 127  | Next Page >