Search Results

Search found 74706 results on 2989 pages for 'did you know'.

Page 133/2989 | < Previous Page | 129 130 131 132 133 134 135 136 137 138 139 140  | Next Page >

  • Best open source server notification software

    - by Adam Evers
    I am looking for an open source notification/monitoring software which will work much like growl does with a mac. It would be awesome if I could receive certain messages to my mac computer from my server when lets say it restarts or some predefined error happens etc. Anyone know of anything like that? I know of Nagios but I am thinking not as complex.

    Read the article

  • What are some general tips to make InnoDB for MySQL perform at its highest?

    - by James Simpson
    I've been using MyISAM exclusively for several years now and know the ins-and-outs pretty well of how to optimize it, but I've just recently started using InnoDB for some of my tables and don't know that much about it. What are some general tips to help improve the performance of these InnoDB tables (they were converted from MyISAM and have anywhere from 100k - 2M rows and most won't use transactions).

    Read the article

  • Group traffic shaping with traffic control?

    - by mmcbro
    I'm trying to limit the output bandwidth generated by an application with linux tc. This application sends me the source port of the request that I use has a filter to limit each user at a given downloadspeed. I feel that my setup could be managed way better if I had a better knowledge of linux tc. At the application level users are categorized as members of a group, each group have a limited bandwidth. Example : Members of group A : 512kbit/s Members of group B : 1Mbit/s Members of group C : 2Mbit/s When a user connects to the application, it retrieves the source port to the origin of the request from the user and sends me the source port and the bandwidth at which the user must be limited depending on group to which it belongs. With these informations I must add the appropriate rules so that the user (the source port in reality) is limited to the right bandwidth. If the user that connect isn't a member of any group it should be limited at a default bandwidth speed. I'm actually managing this by using a self made daemon that add or remove rules from when it receive a request from the application. With my little knowledge of tc I'm not able to limit other users (ones that aren't in a group, all others in fact) at a default speed and my configuration seems awful to me. Here is the base of my tc qdisc and classes : tc qdisc add dev eth0 root handle 1: htb tc class add dev eth0 parent 1: classid 1:1 htb rate 100mbps ceil 125mbps To classify a user at a given speed I have to add one subclass and then associate one filter to it : # a member of group A tc class add dev eth0 parent 1:1 classid 1:11 htb rate 512kbps ceil 512kbps # tts associated filter to match his source port tc filter add dev eth0 protocol ip parent 1:0 prio 1 u32 match ip sport 50001 flowid 1:11 # a member of group A again tc class add dev eth0 parent 1:1 classid 1:12 htb rate 512kbps ceil 512kbps # tts associated filter to match his source port tc filter add dev eth0 protocol ip parent 1:0 prio 1 u32 match ip sport 61524 flowid 1:12 # a member of group B again tc class add dev eth0 parent 1:1 classid 1:13 htb rate 1000kbps ceil 1000kbps # tts associated filter to match his source port tc filter add dev eth0 protocol ip parent 1:0 prio 1 u32 match ip sport 57200 flowid 1:13 I already know that a source port could be the same if its coming from a different IP address the thing is the application is behind a proxy so I don't have to manage any IP address in that situation. I would like to know how to manage the fact that for all other users (request/source port, whatever you name it) could be limited at a given speed each. I mean that each connection should be able to use at max 100kbit/s for example, not a shared 100kbit/s. I also would like to know if there is a way to simplify my rules. I don't know if it is possible to use only one class per group and associate multiple filters to the same class so each users could be handled by one class and not one class per user. I appreciate any advice, thanks.

    Read the article

  • Would Windows 8 may increase the Cap of more than 2 GB?

    - by Pisaro
    I have a old Laptop Dell Latitude D430 that I just upgraded to Windows 8. The Ram that I have installed is 2GB (Max Ram that this laptop can handle) but I am wondering if by installing windows 8 can help also to increase the cap of the total Ram that the laptop can handle. I know that some laptops have a cap of RAM by the Bios but I am wondering if any of you know if by installing a new OS can actually change this? thanks, Robert

    Read the article

  • Where are AD registry settings

    - by erdogany
    As you might already know AD does not let you change the password through LDAP if you don't have a secure connection to AD. I heard that there is a registry setting to change this behavior but so far couldn't find where it is... Anyone of you know how can I can change this behavior?

    Read the article

  • How to install Reddit Open Source on a web server

    - by Shubz
    I have been playing around with the Reddit open source software and have been getting no where fast. I was wondering if anybody can instruct me on how to install the software on a web server. I know how to install normal php scripts etc, but I've never installed a software such as a python or rails script before. I'm not very good with commands but I know how to run them. If that makes sense. Thanks!

    Read the article

  • Hidden features of Ubuntu

    - by Tom Brito
    That I know: In command line, use TAB to autocomplete the commands. You need just to select a text to copy it, and use mouse middle button to paste. Which other "untold" secrets Ubuntu hides? obs. I don't know which of the items I told are for any Linux or Ubuntu specific.

    Read the article

  • How to implement a secure authentication over HTTP?

    - by Zagorax
    I know that we have HTTPS, but I would like to know if there's an algorithm/approach/strategy that grants a reasonable security level without using SSL. I have read many solution on the internet. Most of them are based on adding some time metadata to the hashes, but it needs that both server and client has the time set equal. Moreover, it seems to me that none of this solution could prevent a man in the middle attack.

    Read the article

  • What are your favorite open source tools? (that is not very famous)

    - by sucuri
    I believe every system administrator is used to open source by now. From Apache to Firefox or Linux, everyone uses it at least a little bit. However, most open source developers are not good in marketing, so I know that there are hundreds of very good tools out there that very few people know. To fill this gap, share your favorite open source tool that you use on your day by day that is not very famous. *I will post mine in the comments.

    Read the article

  • What does 'd' do in oh-my-zsh?

    - by ovatsug25
    I just downloaded oh-my-zsh and found out that 'd' has been taken over by some command I do not know. Does anybody know what the output from this is? 0 ~/Desktop/Dropbox/project_Sites/rails_app/app/views/static_pages 1 ~/Desktop/Dropbox/project_Sites/rails_app/app/views 2 ~/Desktop/Dropbox/project_Sites/rails_app 3 ~/Desktop/Dropbox/project_Sites 4 ~/Desktop/Dropbox 5 ~ 6 ~/.oh-my-zsh 7 ~/.oh-my-zsh/plugins 8 ~/.oh-my-zsh/plugins/rails 9 ~/.oh-my-zsh/lib

    Read the article

  • Is there a filesystem firewall?

    - by Jenko
    Ever since firewalls appeared on the scene, it became hard for rogue programs to access the internet. But you and I know that running applications get unrestricted access to the filesystem. They can read your files and send them to poppa. (programs such as web browsers and IM clients, which are allowed thru the internet firewall) Any way to know which programs are accessing your files? or limit their access to a specific partition?

    Read the article

  • How to show the "Home" folder for SSRS 2008 in SQL Management Studio

    - by kd7iwp
    I just installed SSRS 2008 on a development server and when I connect to it with SQL Management Studio I do not have all of the items in Object Explorer that I had with our SSRS 2005 installation. For example, we are missing the "Home" folder which lists all the reports. When we browse to our /ReportServer URL we can view and run our reports, so I know they are on the server. Does anyone know if this is a permissions issue or something else?

    Read the article

  • How to use dedicated video card instead of onboard?

    - by Mathias Lykkegaard Lorenzen
    I tried running DxDiag (DirectX diagnostics), and I noticed that my graphics card is set to the onboard one that comes with the Core i5 processor (some Intel HD stuff). On my computer, I also have a dedicated graphics card (an Nvidia 310). No serious gaming stuff, I know - just for programming. However, I would still love to know how to switch to that dedicated graphics card instead. My laptop is an MSI CX720.

    Read the article

  • Install xenserver on iscsi target

    - by Ghassen Telmoudi
    Is is know that Xen Server is based on CentOS, and it is fact that CentOS can be installed on an ISCSI target flawlessly, but I wanted to install Xen server on an ISCSI target I couldn't find a way. I already tried the latest version of xen server 6.2, and there is no obvious way who to do the installation without a local disk. Does anybody have an idea about the subject, or did someone know how to do it? Please share your experience about this subject.

    Read the article

  • Communication btwn active 3d glasses and source(s)?

    - by selfmade.exe
    I know that 3d active shutter glasses work with infared or radio (radio = only bluetooth?). I know that both of them are harmfull but, with either of them, does only one signal get send, to just syncronize glasses with monitor, or the trnasmitter and glasses communicate the whole tiime? An infared/bluetooth transimition for a second(s) is tottaly acceptable, no complain at all, unless the transimition is the whole time.

    Read the article

  • How can I set up a database (SQL?) for literary annotations?

    - by Jon
    I'm a literature student and I'd like to be able to annotate literary texts (originally stored in HTML or as text files) on a word-by-word or line-by-line basis. I hear databases like mySQL or SQLite would be good ways to do this sort of thing, but I don't really know where to start. I'm comfortable with the linux command-line, and have done some HTML/CSS work in the past, so I feel unintimidated by databases and things...I just don't know what to start doing.

    Read the article

  • Get WebDav uploading progress and status (Linux, davfs2)

    - by Hnatt
    I am using WebDAV on Linux box with davfs2 1.4.6. When I copy a file to a mounted WebDAV service, it is goes rather fast, just like a regular local drive operation. And it actually is, because the file is first copied to ~/.davf2/cache directory. But how do I know that uploading is finished and where do I see current progress? Is there a way to know that uploading failed due to lack of space or file size restrictions?

    Read the article

  • What are the A0xxxxxx.DLL files?

    - by Joel Coehoorn
    If you've ever watched a windows computer defrag a drive, you might have noticed that many of the files that are fragmented and need fixed have names like A0833773.DLL. If you know regular expressions, I could express the filename this way: A\d{7}[.]DLL Does anyone here know what those files are or what they're used for?

    Read the article

  • Distro List - can a member be blind copied?

    - by Jessie
    Is it possible to set up a distro list on an exchange server to send a blind copy to one of the recipients? For example: I'd like to have a distro go to Help, Support, and IT. However, I don't want the sender to know it goes to Help if they expand the distro in the To: field. I know this is most likely impossible, but I figured it wouldn't hurt to ask.

    Read the article

  • VM using a secondary graphic card

    - by Arthur
    Hi everyone, at the moment i have a dual monitor setup on my main PCIe gfx card. I know that on windows it is almost impossible to have a second card (eg no thrills PCI card) running without having an SLI motherboard because of a driver issue. Well this was my conclusion after many weeks of research. I was thinking...is it possible to use a VM in order to utilize the secondary card as the default video output to feed another monitor? let me know if you want me to clarify Thanks :)

    Read the article

  • Multicore system. How are the cores "sorted"

    - by asdrubael
    If I have a system with let's say two Quadcore CPUs and HyperThreading enabled, how do I know how the phsyical and virtual cores are sorted? For example if I force a process to run on "CPU 0" how to know which Core this really is? I remember a complex drawing about this, but didn't find anything useful.

    Read the article

  • question about IP address

    - by baddogai
    i know how IP basically works, and knows that an IP address composed of a network ID portion and a host ID portion, but when I type a IP address ,say "8.8.8.8" into the web browser, i DIDN'T supply any subnet mask information, so how does the browser know where the dividing line is between the network ID and host ID? since 8.8.8.8 may mean 8.8.8.8/8, 8.8.8.8/24 etc. In a nutshell, the IP address I supplied is ambiguous.

    Read the article

  • What are the different ways of remotely connecting to your computer?

    - by Rogue
    I'll be leaving for uni soon and would like to know the different methods of connecting remotely to my home pc. I know about VPN but are there any other ways? Also how secure is each of this method as I wouldn't want snoopers on my home-pc especially when I'm away. Also can i set up a remote connection to start and shut down my computer My operating system is windows, but if linux is more secure i would be willing to switch.

    Read the article

< Previous Page | 129 130 131 132 133 134 135 136 137 138 139 140  | Next Page >