Search Results

Search found 108378 results on 4336 pages for 'oracle user experience'.

Page 1436/4336 | < Previous Page | 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443  | Next Page >

  • Is Zscalar's HTTPS Everywhere for IE affiliated with EFF?

    - by noloader
    The Electronic Frontier Foundation has a tool called HTTPS Everywhere for Firefox, Chrome and Opera. But they don't list Internet Explorer. There is a company called Zscalar that provides HTTPS Everywhere for Internet Explorer. I can't determine if the EFF approves of Zscalar's IE extension, or if the company hijacked the EFF tool's name. The only mention of Zscalar on the EFF website is the HTTPS Everywhere Atlas. The closest I can find from Zscalar are link backs on the Zscalar website and a Zscalar PDF that points back to the EFF website. The EFF tool is free, open source and can be audited, but I don't see similar governance for Zscalar's tool. For example, I don't see mention of source code at HTTPS Everywhere for Internet Explorer. And it looks like there's a "Free Trial" for HTTPS Everywhere for Internet Explorer (see the link on the right). Is Zscalar's HTTPS Everywhere for IE affiliated with EFF?

    Read the article

  • Google OpenID changes?!?!?

    - by Andrea
    I'm trying to implement OpenId login for a web application. Whenever new user who logs in via OpenId I create a new user on the sustem, and among the data I store their openid URL, so that next time they login with that user. I'm testing this with my Gmail OpenID, and the problem is that everytime I do this, Google sends a different openid URL, that is, https://www.google.com/accounts/o8/id?id=SomethingThatChangesFromTimeToTime Of course I'm then not able to tell wheter this is or not a new user. I'm a bit puzzled: shouldn't the openid identifier always remain the same?

    Read the article

  • Drupal using views with CCK custom fields

    - by jackbot
    I've got a Drupal site which uses a custom field for a certain type of node (person_id) which corresponds to a particular user. I want to create a view so that when logged in, a user can see a list of nodes 'tagged' with their person_id. I've got the view working fine, with a url of my-library/username but replacing username with a different username shows a list of all nodes tagged with that user. What I want to do is stop users changing the URL and seeing other users' tagged nodes. How can I do this? Is there somewhere where I can dictate that the only valid argument for this page is the one that corresponds with the current logged in user's username?

    Read the article

  • Java : method to to print relative pathname?

    - by HH
    I am hesitant just to look at some env.vars and try to replace things with regexes. So is there a ready method to print relative pathnames system-independently? $ echo ~ /u/user $ pwd /u/user/OH/one/src $ echo "Like relative pathnames ~/OH/one/src, not /u/user/OH/one/src."

    Read the article

  • How to search and locate (annotate) in MKMapView?

    - by chaitanya
    Hi, In my application I have to search five nearest locations of "medical services" using the user current location and annotate those locations on my MKMapView. Can any one tell me how to search with a particular keyword (eg. medical services, garages) by using user current locations and annotate onto the map and when the user taps on the annotations it should show the complete address of the locations which is annotated. Can anyone help me in this?

    Read the article

  • Hard drives (SATA/ATA) corrupting

    - by JC Denton
    Hello All, 2 years ago I bought relatives a new computer for christmas and installed Ubuntu on it. Ever since then it has been experiencing problems with the hard drives. The hard drive supplied with the machine was a SATA drive. When it appeared it was having problems (files and folders with invalid encoding started appearing) I replaced the SATA drive with the drive of their previous computer. I replaced it (The replacement) later on, the drive being rather old and thus becoming more prone to the risk of failure. The replacement drive is a IDE drive but the same problems started to appear (files and folders showing up in nautilus with invalid encoding). I fear the files and folders that are showing are existing FS entries, starting to corrupt. As it's happening to both the IDE and SATA drive it's unlikely to be the drives themselves or the IDE/SATA controller, I believe. Any ideas as to what could be causing the (assumed) corruption? EDIT: You're right about the paragraphs. They were there in edit mode but I'm still getting to grips with the whitespace format codes. The system is a "Primo Pro" AMD Phenom II X4 Quad Core 920 2.80GHz SILENT DDR2, ordered from overclockers.co.uk and nothing has been added to it except for the replacement of the SATA drive with an AMD drive. It would seem unlikely for a barebones system to be underpowered.

    Read the article

  • Mac OS X bug: Desktop & Screen Saver: image alignment preference is ignored.

    - by Aaron F.
    I have my desktop background set to rotate through a folder of images. Even though I have the alignment drop-down list set to "Center", the images still render as "Fill to Screen". When I change the list value to something else, then back to "Center", OR I manually click on a different image to display, well, that image is rendered as "Center". But all images that follow (via the "Change picture every x minutes" checkbox) are rendered as Fill to Screen. Any fix to this bug?

    Read the article

  • Disable Windows Notifications from regedit in window OS

    - by user33372
    Kindly give me the full path of regedit from where I can disable the windows notification. For example if I disable the ctrl+alt+del from regedit, after disabling window send me the notification that Task manager have been disable by your administrator. I don't need these type of notification. Kindly guide me.

    Read the article

  • How do FTP servers handle rename to an existing file?

    - by Kristian
    How do FTP servers normaly handle rename to a file that aready exist? That is, will the existing to-file be overwritten or will I get an error? Is there some specification about how FTP servers should handle this, or is it OS or implementation dependent? vsftpd on Linux seems to overwrite, with FileZilla on Vista I get 550 file exists...

    Read the article

  • Page numbers in Word 2007

    - by ldigas
    I'm gonna skip the usual rant which normally follows upon mention of the words "Word 2007" I have a numbered section. Which has page numbers. Then, I insert a new section break at the end of the current section ... go to page numbers, format ..., and "start at ...", and the new section then has a new page numbering (starting with some other number). But, how do I after inserting a new section break, remove the page numbering in the new section ? If I go to remove page numbers option, Word removes the numbers from the new, but also from the old section (i.e. all of them). Help ... time is short ...

    Read the article

  • Unable to outside access service from inside LAN

    - by erotsppa
    I have a weird port forwarding problem. I tried to open my port 22 to the outside network. I was able to access it as long as I am not inside the LAN. I can access it from my office for example. But from within the LAN, I can access the port using the local ip, but I can't access the port using the external IP. It's as if the router is blocking the loopback. I've check all my router settings, turned off anything firewall/filtering related. Any ideas?

    Read the article

  • Installation of large programs in Mac OS X

    - by archagon
    A few newbie Mac OS X questions: Despite the fact that most applications can be installed by dragging them to the Applications directory, some software still requires the creation of a separate program folder. Where should I put this folder? Does it matter? Is the Applications directory special somehow, or is it just a convenient folder with a custom icon? If I move one of these program folders later on, will the program still work? Will shortcuts to files in the folder break? Is there something similar to a registry in Mac OS X?

    Read the article

  • Booting from a USB drive that was originally a boot drive

    - by daveh551
    When Win 7 went RTM, I upgraded my laptop from XP. But to protect myself against the possibility of having data inaccessible, I got a new disk and put it in the laptop, and took the old (XP) disk and put it in a USB enclosure. I have no trouble accessing the data on the USB drive under Windows 7. But I would like to be able to plug it in, tell the BIOS to boot from the USB drive, and be back on my old machine. The laptop is a Dell Precision M90, and it has a boot from USB option in its boot menu. But when I try to do that, it does read the drive, gets as far as putting up the Windows XP splash screen and starting the boot progress bar, and then reboots. What do I need to do to the old disk now running on USB to allow the machine to boot from it?

    Read the article

  • Computer wont POST after power outage

    - by aaron
    I had just turned my computer on and windows was loading when the power in my neighborhood went out. Normally, when I turn my computer on, the video card fan spins up, then slows down, POST and windows boots. Now, after the blackout, the video card fan spins fast and wont stop. Nothing is displayed on the monitor. The monitor does not detect that the video card is sending it signals, it just stays on standby. No POST or beep codes. This is what I have tried so far: My motherboard has 2 PCI express slots and I tried plugging the video card into both of them but that didn't fix anything. I have replaced the power supply, that didn't fix anything. I cleared the CMOS, that didn't fix anything. Does anyone have any idea of what could be wrong? Thanks!

    Read the article

  • E-Commerce website using blogging service

    - by Rohit
    I have been selling software products since last few years. I now want to sell them online. I have three ways in my mind: Using TypePad and integrating PayPal code in it. Get designed my own website. Buy a shopping cart online app. like Volusion etc. I am not selling all the products but only selected software products. I want to know which is the best solution in terms on cost, manageability and getting online response.

    Read the article

  • What all laptops can replace a compaq presario v2000's monitor ?

    - by Nishant
    I am planning to buy laptop for parts/repair from Ebay to replace by broken LCD of Compaq presario v2000 . I know the monitor is 14" WXGA and LTNW140-l01 model made by samsung . I have removed the LCD panel and I can see 2 cables , one power and other video signal Can I buy a 14.1" LAPTOP and fit to this ? 14.1 WXGA seems very common . Please can any one tell which all laptops can replace this monitor ? I know HP DV 1000 does ? Any advices would be great .

    Read the article

  • How do I find information about a particular trojan? "W32/Smalltroj.XVGT", as reported by Norman

    - by Lasse V. Karlsen
    I tried checking the Norman antivirus page, Virus-descriptions, but sadly it seems Norman has intentionally obfuscated their search results (I tried clicking on W, and it seems they just list viruses with a W somewhere in the description, instead of more typical, all viruses with a name starting with a W.) Is there a common virus-list somewhere, or is it as I suspect, every antivirus manufacturer is free to come up with their own identification tags for each virus? Several "vshost32.exe" files, related to Microsoft Visual Studio 2008, has been quarantined on our server today, probably related to a test-deployment of some internal software. Some developer machines that have grabbed that latest version of our program has also had the same files quarantined. Now, these files should not have been deployed in the first case, so I'll be looking into that, but whenever any developer now builds a program locally and attempts to debug, the same file is placed in the build output directory, and promptly quarantined. Does anyone have any clues as to how I can go about verifying this before I pointedly ask the antivirus software to go take a hike on this particular virus? Edit: I've copied one of the quarantined files manually to a machine over the network that doesn't have antivirus installed, and compared the file on that machine with a local copy (on that machine) of the vshost32.exe template file, and they're bit-for-bit identical. I guess this is a false positive. I still would like to know if it would be possible for me to verify this in any other way though, since next time such a trojan might be reported in a compiled file that we won't have a pristine copy of.

    Read the article

  • Multiple access points for the same SSID ?

    - by krosenvold
    I need to upgrade my existing wireless infrastructure and this time I want 2 access points to cover my house, since I get blind spots no matter what with a single AP, I have physical cabling to my central network available for both access points. But I would really like these two to interoperate seamlessly as a single SSID. How do I do this and what are the features the new AP's I'm buying need to support ? (Product recommendations are welcome ;)

    Read the article

< Previous Page | 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443  | Next Page >