Search Results

Search found 7007 results on 281 pages for 'third party'.

Page 127/281 | < Previous Page | 123 124 125 126 127 128 129 130 131 132 133 134  | Next Page >

  • Filtering downloading a file

    - by Ozgun Sunal
    people. i know there are several types of firewalls operating at different layers of OSI. ACLs(layer 3 firewalls filter based on port numbers and IP addresses), SPI(which examines the patterns of data at layer 3 and realise that data content is malicious or not) and application layer firewalls which is capable of understanding the data at that level. Considering this, i'll give an example and learn what i need to do. Lets say, we have a computer has access to the Internet. i want to download a file or display a web page from a website but block access to the another website/s or downloading. To do this, i cant block access to the web browser on the 3rd party firewall bcos that will shut down all access. ACLs wont already do it. So, which kind of firewall will make it possible to filter specific traffic and how?

    Read the article

  • Practical way of keeping up-to-date backup servers?

    - by ftkg
    What is the approach generally used when you want to have backup physical servers? Currently I have a Linux server running a database, a samba share, a webapp and some scripts; and a Windows Server, running some third-party software. What I would like was to be able to have a ready backup server to enter in production in case of failure, but how to keep them up-to-date? I've seen some expensive solutions for Windows; for Linux I've wondered if I really have to build an array of scripts.

    Read the article

  • Access synced notes from iPhone on Windows other than through Mail/Outlook?

    - by jtimberman
    I see from the iPhone how to page that synced notes on Windows appear in MS Mail or Outlook/Outlook Express. I don't use any of these programs. Can I access the iPhone notes some other way? I don't see indication on Apple's site that such a thing is possible. I would like to do this without a 3rd party iPhone application, and I'd really like to avoid MS Mail/Outlook. For what it's worth, this is for my wife and she's using Windows. I sync my iPhone with a Mac. She's loathe to use a bunch of different programs.

    Read the article

  • Why hasn't anyone made a way for TimeMachine to wirelessly backup to Amazon S3?

    - by Jordan
    Seriously. I'm looking at you, Apple. If TimeMachine is supposed to be 'simple backup that just works' why is it impossible to backup into my S3 filespace? Why hasn't some 3rd party developer (JungleDrive???) made it so that TimeMachine will be OK with backing up to amazon s3 storage? It just seems like the most convenient, robust answer. I'd gladly pay the $20-25 a month for complete, unlosable backups that I can sync with wirelessly on a proper scheme.

    Read the article

  • Fastest security check of file tree on NFS

    - by fungs
    I am currently experiencing very bad performance using the following on an NFS network folder: time find . | while read f; do test -L "$f" && f=$(readlink -m $f); grp="$(stat -c %G $f)"; perm="$(stat -c %A $f)"; done Question 1) Within the loop permissions are checked using the variables grp and perm. Is there a way to lower the amount of disc I/O for these kind of checks over the network (e.g. read all meta data at once using find)? Question 2) It seems like the NFS isn't tuned very well, the same operation on a similar network link via SSHFS take only one third of the time. All parameters are auto-negotiated. Any suggestions?

    Read the article

  • How to synchronize tasks on multiple computers

    - by SysGen
    I would like to be able to run similar tasks on several computers that must be precisely synced. More specifically I need 4 laptops to be synced, probably over local network, and I need to use one of them to start a task (play a video) on all of them at the same time (different video files on different laptops). All of them are running Windows. Is there a third-party software or any easier way to do so over LAN without significant delay? I need virtually no response time - if there would be a single video streaming on all laptops then people should not recognize the delay.

    Read the article

  • Internal SATA hard disk shows up as removable device on Windows 7

    - by neutron80k
    I am running Windows 7 on an Acer Aspire M7720 with three internal SATA drives; drive #2 and #3 are on a removable HDD rack. Drive #3 (on the second removable HDD rack) shows up as removable device in the system tray. If I take drive #3 and put it in the first rack, it shows up as an internal drive. If I put any other drive in the second removable rack, that drive is also shown as removable device. I would like to fix that so that the drive in the second removable rack also is listed as internal drive. Since this seems to be independent of the actual drive in the rack, I checked the BIOS, but that third SATA port uses the same configuration as the second rack. So far, I could not find a solution for this problem (it's really more an annoyance than a problem), any ideas are welcome.

    Read the article

  • Linux command line based spam checker?

    - by anonymous-one
    Does a command line based spam checker exist? We have created a mailbox at a 3rd party, and unfortunately decided on spam checking 'disabled' in the initial setup. There is no way to re-enable spam checking, the mailbox must be delete (and thus all contents lost) and re-created. Does anything exist where we can pump in either: A) Subject + from + to + body + all other fields. OR B) Raw message dump (headers + body). And the command line will let us know weather the email is possibly spam? Thanks.

    Read the article

  • Deny IIS6 web request based on URL parameters?

    - by user21146
    I've got a legacy app running a third-party ecommerce system under IIS6. Some spammers recently discovered a bad security vulnerability in one of the store's forms, which are allowing them to send arbitrary emails from our system. Unfortunately, this store "feature" is built into the default.aspx page's code-behind and I have no way to disable it without shutting down the store. How can I filter out URL request with a given querystring parameter? ie, I want to filter out requests to: http://www.mysite.com/store/?id=SendSpam based on the "SendSpam" string.

    Read the article

  • How to get Windows XP to play a sound on mouse clicks

    - by Re0sless
    Is it possible to play a sound each time the mouse button is pressed in Windows? We have some touch screens PC's that run Windows XP, and would like them to beep when pressed so the users know they have registered the click. (the touch screen acts a the left mouse button) I have looked in Sounds and Accessibility options but can not see anything that would work. If there is nothing in windows that would do this is there any third party applications to do the same job. We don't need anything lavish just a simple click or beep would suffice.

    Read the article

  • How can you import a root certificate to a machine level store in Windows 7

    - by ReluctantAdmin01
    I have a service (Running as local system) that uses an SSL connection. Currently this connection fails because the remote host used a private CA to sign it's certificate. For previous operating systems, I used to use the certificate manager to import the CA cert into the local machine's Trusted Root certificates store. Though I can do the steps with a windows 7 machine, it seems after a reboot that the imported certificates are gone. Here are the steps I'm doing in Windows 7: Open mmc Add Certificates Snap-in for Local Machine Navigate to Third-Party Root Certification Authorities/Certificates Import Root CA Cert. The certificate seems to work fine, using internet explorer or the service to test the SSL connection works, but after a reboot it seems like the change is reverted.

    Read the article

  • an issue with VMWare Workstation 10 and three monitors

    - by whtvr
    I'm having a bit of a problem with using three monitors with VMWare Workstation 10. When only two monitors are enabled in the system I have an option to "Cycle Multiple Monitors", available from the View menu (in full screen). When I enable the third monitor that option is no longer in the menu and I can only use one monitor at a time. I've found this article and a "Choose a Monitor Layout" button is mentioned there but I'm unable to see it anywhere. I'm using Windows 8.1 as the host and Ubuntu 14.04 as the guest. The graphics card is AMD Radeon R9 290x with latest beta drivers

    Read the article

  • How can I create a bootable CD-ROM/USB Drive? (With NTFS + USB Drive support)

    - by RonK
    My motherboard got fried and I was forced to get a new hardware set (MB+CPU+RAM) so in most likelyhood I'll need to reinstall my Windows 7. I usually follow procedure and put the OS on the primary partition and my data on a logical partition - so I can format the primary without concern - but this time I made a mistakte and left some crucial items on the primary partition. I want to create a bootable CD-ROM/USB Drive which can read NTFS so I can access this data. If booting via a CD-ROM, I would prefer being able to connect a disk-on-key/My Passport to the computer and be able to access it to transfer the data to it. How can I do it? (free 3rd party applications are most welcome)

    Read the article

  • How can I use my Windows 7 computer to share WiFi connection with PCs that don't have wireless?

    - by Tom Auger
    Long story short: modem and wireless router are downstairs and we're having a LAN party where some visitors don't have wireless. There's no way to run the length of cabling required, so looking for options. My Windows 7 Home Premium PC has a wireless-n connection, and I'd like to see if I can use it as a "hub" or switch of sorts, running an ethernet cable out of the back and into a switch, then splitting off to the other PCs. Is this an option? I know with Internet sharing, you can set up your PC as a wireless access point, but I want to do the opposite.

    Read the article

  • Domain in a hosted environment

    - by cpgascho
    We have an application we host in a third party data center for our clients. We have multiple clients running the same application on several racks of servers. Most of our clients require that our servers be SAS70 compliant. Currently each server has it's own set of users and security settings that need to be configured. We are creating scripts to do this, but what would be the risks/advantages of joining all the servers to the domain for User Management and Group policy for enforcing security settings? The rational of some is that if the DC is hacked the whole network would be compromised where as if one stand alone hosted server is hacked everything else should be safe.

    Read the article

  • how to proxy sql queries (INSERT, UPDATE e.t.c.)

    - by XakRu
    I have installed cluster MYSQL (galley with mariadb) As an application server installed Apache. on a server with Apache installed haproxy which proxies requests from php in this case installed for zabbix server cluster. But faced with deadlocks, now I want to proxy requests WRITE, INSERT, UPDATE to the second server. SELECT queries to the second and third server. I would be happy to see your suggestions. Please do not write: use mysql - proxy. I want to see what program it may to proxy SQL requests. scheme: http://www.gliffy.com/pubdoc/4474830/L.png

    Read the article

  • Opinions on Copy Protection / Software Licensing via phoning home?

    - by Jakobud
    I'm developing some software that I'm going to eventually sell. I've been thinking about different copy protection mechanisms, both custom and 3rd party. I know that no copy protection is 100% full-proof, but I need to at least try. So I'm looking for some opinions to my approach I'm thinking about: One method I'm thinking about is just having my software connect to a remote server when it starts up, in order to verify the license based off the MAC address of the ethernet port. I'm not sure if the server would be running a MySQL database that retrieves the license information, or what... Is there a more simple way? Maybe some type of encrypted file that is read? I would make the software still work if it can't connect to the server. I don't want to lock someone out just because they don't have internet access at that moment in time. In case you are wondering, the software I'm developing is extremely internet/network dependant. So its actually quite unlikely that the user wouldn't have internet access when using it. Actually, its pretty useless without internet/network access. Anyone know what I would do about computers that have multiple MAC addresses? A lot of motherboards these days have 2 ethernet ports. And most laptops have 1 ethernet, 1 wifi and Bluetooth MAC addresses. I suppose I could just pick a MAC port and run with it. Not sure if it really matters A smarty and tricky user could determine the server that the software is connecting to and perhaps add it to their host file so that it always trys to connect to localhost. How likely do you think this is? And do you think its possible for the software to check if this is being done? I guess parsing of the host file could always work. Look for your server address in there and see if its connecting to localhost or something. I've considered dongles, but I'm trying to avoid them just because I know they are a pain to work with. Keeping them updated and possibly requiring the customer to run their own license server is a bit too much for me. I've experienced that and it's a bit of a pain that I wouldn't want to put my customers through. Also I'm trying to avoid that extra overhead cost of using 3rd party dongles. Also, I'm leaning toward connecting to a remote server to verify authentication as opposed to just sending the user some sort of license file because what happens when the user buys a new computer? I have to send them a replacement license file that will work with their new computer, but they will still be able to use it on their old computer as well. There is no way for me to 'de-authorize' their old computer without asking them to run some program on it or something. Also, one important note, with the software I would make it very clear to the user in the EULA that the software connects to a remote server to verify licensing and that no personal information is sent. I know I don't care much for software that does that kinda stuff without me knowing. Anyways, just looking for some opinions for people who have maybe gone down this kinda road. It seems like remote-server-dependent-software would be one of the most effective copy-protection mechanisms, not just because of difficulty of circumventing, but also could be pretty easy to manage the licenses on the developers end.

    Read the article

  • about Linux read/write only permissions

    - by Bimal
    My question looks similar to another thread: Linux directory permissions read write but not delete Here, I want to create a directory where I can give the permissions like: A user can create/upload any files. A user can re-upload and overwrite the files. A user cannot remove the file anymore. I am on CentOS 5.5, basic user only. How can I do that? Or is there any third party software that can be installed to do this? Or, create a new process which will lock the permissions right after a new file is uploaded via ssh?

    Read the article

  • How do you hit modifier keys when touch typing?

    - by Bob Ueland
    I am a programmer and I want to learn to touch type. As all programmers know, using modifier keys like Control, Command and Alt are essential. When programming I think that every second or third word I use involves a modifier key. But most touch typing learning software do not address these keys, it is as if they do not exist. Not only do they not let you practice them, they do not even tell you which fingers to use to hit them. Actually there is a touch typing game that I use called StarTyper (http://lidenanna.com) that lets you practice modifier keys and even make up your own custom words containing modifier keys. But not even this game tells you which fingers to use when hitting the modifier keys. Has anybody addressed this problem. Or are there just homespun methods that work for one person but not for the other?

    Read the article

  • Mix content warning on ASPX page

    - by Amit
    Hi, We have started receiving the mixed content warning on ASPX pages on our secured site. We do not have any mix content, we load all our JS, Images, CSS and ASPX files using HTTPS. I dont know why we have started receiving these warnings now. The latest thing which we have added is the third party control for Dialog boxes from Essential Object. We are previously using their Menu control but added dialog box recently. Also we have made our application browser compatible. I feel the reason is something between these two points. Can anyone suggest any solution or any workaround if they know any or have used Essential Object controls and faced simililar issue? Essential object is saying it is not their problem. The mix content warning appears any time and not specifically when the Essential Control dialog box popsup, thats why I am bit confused. Any help is highly appriciated. Thanks.

    Read the article

  • Dual-boot more than two operating systems

    - by aldorado
    I currently run Windows 7 and Ubuntu 12.04 as a dual-boot system. I need Linux, but Ubuntu freezes at least once a day. So I want to replace it with another distribution like Debian or LMDE. On the other hand I am a little concerned that I'll have troubles working with a less user friendly operating system than Ubuntu. So would it be possible to just scale down the Windows partition and install the next Linux as a third system? Thus, with a "triple-boot system" I could keep Ubuntu until I feel familiar with the new system. Afterwards, I guess, it should be possible to replace the Ubuntu partition by expanding the new system?

    Read the article

  • Windows Virtual Machine ping reply fails the first few times

    - by user28471
    I am running a windows Web Server 2008 virtual machine. When I try to ping it from another windows machine the ping reply comes straight back with 100% success. But when I try to ping it from one of the Linux boxes, the ping reply fails with partial or 100% loss the first couple of time and succeeds the third time onwards. I know it is quite strange but can any one think anything that could be causing it. Could anything in the Windows Domain Security or Firewall be "taking time" to allow responding to the ping request? In fact even the firewall is turned off on the virtual machine.

    Read the article

  • Vagrant sahara plugin - multiple snapshots

    - by BazZy
    How I can make more than one snapshot when in sahara sandbox mode? Or, can I see list of all commits I've ever made and rollback to any? Why do I need all this? I just want to setup initial VM. After that I want to compile number of packages from sources, and this takes pretty long time. So right now I thinking of this order: Setup initial ubuntu 12.04 vagrant box Snapshot this state Compile sources, install system wide rbenv (it make compilation also) Snapshot second state Start all my infrastructure experiments Rollback to any of my previous states or commit third state

    Read the article

  • Open Source Outlook and Exchange Alternative (for Calendar and Tasks)

    - by Elmar Weber
    We're using an Exchange Server and Outlook in a private context. Since Exchange is getting more and more of a monster to maintain and is basically the only thing running on a Windows VM Server, I'm looking for an alternative with the following properties: Server based back-end that that can be installed / deployed on my machine and is not dependent on any third party services (e.g. Google Calendar). (Easy) import of existing Outlook calendars, either via some feature of Exchange or by ex- and importing from Outlook. Roughly the basic features of the Outlook calendar (categorizations, series, etc) Synchronization with the iPhone over wireless without a hitch (e.g. double or missing entries) Any recommendations?

    Read the article

  • FFMPEG Splitting MP4 with Same Quality

    - by Pragmatic
    I have one large MP4 file. I am attempting to split it into smaller files. ffmpeg -i largefile.mp4 -sameq -ss 00:00:00 -t 00:50:00 smallfile.mp4 I thought using -sameq would keep the same quality settings. However, I must not understand what that does. I'm looking to keep the same quality (audio/video) and compression with the split files. However, this setting makes the split files much larger. What flag(s) do I need to set to keep the same quality and attributes in the split files while maintaining the same quality to size ratio? For instance if my original file is about 12 GB and is 1920x1080 with a bitrate of 10617kbps and a framerate of 23 frames/sec and 6 channel audio with 317kbps, I would like the split files to be the same only a third of this size (if i split it into three pieces).

    Read the article

< Previous Page | 123 124 125 126 127 128 129 130 131 132 133 134  | Next Page >