Search Results

Search found 8914 results on 357 pages for 'pocket pc'.

Page 152/357 | < Previous Page | 148 149 150 151 152 153 154 155 156 157 158 159  | Next Page >

  • RAID 5 configuration and future expansion

    - by Alexis Hirst
    hi, I am building a PC to act as a file server among other things, and I was wondering whether it is a good idea to create 2 partitions on the RAID 5 array, one for OS one for data, or to have a separate disk for OS and use array for data. Also, one day i may want to add another disk to the array, so would there be any issues if I had the OS partition on the RAID5 array when it came to resizing the data partition?

    Read the article

  • How do you use 4GB of RAM?

    - by Xeoncross
    I have a Quad Core Intel PC with 4GB of RAM - I've been using it over a year to run web server stress tests (ab.exe -n 5000 -c 500), encode HD video, play games, open hundreds of tabs in multiple browsers (simultaneously), worked on multi-layered +8000px art in photoshop and just about every other thing you can think of. As of yet I've never passed 2.3GB of RAM usage. How in the world do you use all 4GB? Is there any use for it?

    Read the article

  • Does VMware_ThinApp_4.0.3_169725.msi contain Trojan.Win32.Vapsup in it? [closed]

    - by Joe
    Today I ran a full system scan using Online Armor++. It detected Trojans in the installer. I have had this installer on the computer for many months and I do not remember if I ever installed it on this PC or not. For some reason I unpacked the installer with 7zip though. I was probably going to attempt to make it portable. Anyway so I had the installer in a folder, and another folder next to it with all of the installers files unpacked. The VMwareVS.cab file that was extracted from the installer, also had its files extracted into another folder. This was all done many months ago. OA++ did not detect the installer itself as as Trojan VMwareVS.cab, but it did detect 4 of the files that I had unpacked as Trojans. Here are the details of what the scan detected on my PC today. Note: I uploaded these files to VirusTotal....the Ikarus and A-squared engines(the engines from Online Armor++) are not detecting anything. But some of the other engines are detecting the same Trojan that OA++ detected(Trojan.Win32.Vapsup). C:\Downloads\VMware_ThinApp_4.0.3_169725.msi [This file was not detected by the Virus Scan as infected] CRC-32: 50189335 MD5: 9e32e3272d2637fb6e0759a604879e6f SHA-1: 19ef5a6d586ddcc5b9222ba57b0f14159655f3f8 C:\Downloads\VMware_ThinApp_4.0.3_169725\VMwareVS.cab [This file was not detected by the Virus Scan as infected] CRC-32: d3a9694a MD5: ddc278a8fe0a25486277d9800e6af85a SHA-1: 456b731c8b6fdb7a1d7bcff3d1fbe9df58ccc73a Online Armor++ Virus Scan Results: Detected Trojan.Win32.Vapsup.vee!A2 C:\Downloads\VMware_ThinApp_4.0.3_169725\Binary.ThinstallProcess CRC-32: 4888b13c MD5: 4884cb4622278c0835b9a5dcd2ae0473 SHA-1: ed879ae65147805dd69e1355c17df814b9d434ce Detected Trojan.Win32.Vapsup.vef!A2 C:\Downloads\VMware_ThinApp_4.0.3_169725\VMwareVS\AppSync.exe CRC-32: fd20b378 MD5: cbdcdd590f7ffc52b6ce68fa11f2bda4 SHA-1: aebf685e02d6693df9eaa92c67dc5746792b5ecf Detected Trojan.Win32.Vapsup.veg!A2 C:\Downloads\VMware_ThinApp_4.0.3_169725\VMwareVS\logging.dll CRC-32: 8adee5d5 MD5: 56ff9b83f58ba8eacb6e939aa4759bf0 SHA-1: b52fa38765a25fe6a2c4f60d76545a4dd64904eb Detected Trojan.Win32.Vapsup.vek!A2 C:\Downloads\VMware_ThinApp_4.0.3_169725\VMwareVS\thinreg.exe CRC-32: 423c5652 MD5: c436feff8d9096e7475c84a6bca6096c SHA-1: 685b84af796132ce144aacd6ff23379e17ddf1a7 Are these files indeed infected by this Trojan, or is it just a false positive? Does anybody have the same version of the original installer, who could find out if the Checksums of the installer and unpacked files match? Should I be worried about whether this Trojan has spread and infected my machine? Thanks in advance for any help!

    Read the article

  • Which keymap to use for wired mac keyboard in Gentoo Linux?

    - by Absolute0
    I just purchase the new wired mac keyboard: Running on Gentoo Linux it works mostly fine. The only problem i am having is the function keys and swapping the alt and command keys to resemble a regular pc keyboard. When I tried switching to the "mac-us" keymap in /etc/conf.d/keymaps I got garbage when typing (not even qwerty). Is there any specific keymap that I can use to get what I want?

    Read the article

  • Any game kills my sound

    - by LoopyWolf
    Every time I quit a game such as Braid, Fallout3, AVP all sound on the PC dies (Control Panel No Audio Devices) I installed a new sound card (SB Audigy) and updated to the latest drivers, and it still happens. It happens with steam games and without. Anybody know what's wrong and how I can fix it? I'm on Win XP SP 2

    Read the article

  • Does the speed of memory define its voltage?

    - by Zak
    What I'm asking here is, if I order PC3200 memory is it all going to be 1.8V, or will some be 2.5, some 1.8, etc... I don't mean variation within a specific part #, but rather across part numbers, is there a variation where some PC 3200 memory would be incompatible with others because it is 2.5 v 1.8V .

    Read the article

  • top does not run

    - by Horace Ho
    Sorry that I can't be very specific, only symtoms are provided: Monday morning a CentOS box, 1GB ram, Pentium 4 web server (thin, rails) does not response (too slow) to a browser of another PC ping it, ok ssh into it, ok a few minutes later, the web server is back to normal speed, serving web requests well ping it, ok ssh into it, ok however, top does not run what should I look at, about this 'top does not run' symptom? thx

    Read the article

  • automating remote software installation

    - by akshay
    I have a network consisting of n pcs(windows/linux).Now i want to automate installation on n pcs in netowrk.For example with one click of gtalk should get installed on n pc in network.Are there any softwares(paid/open src) that can be used to do this?One such software is IBM TPM but its dam expensive and complicated i guess.Are such software popular, cam asking this since i am planning to develop such software which is low priced.

    Read the article

  • Linux Media Player

    - by Bupesh
    I have a SYABAS-based NAS Multimedia Server, which is connected via LAN to a PC running embedded Linux. I can get a list of content on the NAS device, but when I press play, it does not play, but displays the text path of the media file itself. In short it does not play streamed content, whereas the same content I am able to play using Windows based Internet Explorer. I meed a media player to work with embedded linux....

    Read the article

  • Why do my windows disappear?

    - by Jon
    my windows that i open or bring up or i believe a number of other things i do often "disappear"(I believe usually move behind another window that i have open,or maybe becom3e minimized, or perhaps disappear entirely). My question is what determines on a pc windows 7 64-bit computer how long a window stays open, or what determines which window is up front? It is enormously frustrating to have a window i am trying to approach with my cursor or am already working in disappear. Somebody, please help. Jon

    Read the article

  • DNS Change replication time

    - by Lukes123
    We have just changed our DNS record to point to a new server running IIS. How long will it take until the address is changed to the new server? Some people can still see the old server and some can see the new. I have flushed the dns on my pc and it seems to be fine although it doesn't with another of my pcs. Thanks

    Read the article

  • Batch Conversion of PaperPort MAX Files

    - by Matthew
    I've got a library of MAX files from an old Visioneer Scanner that used ScanSoft PaperPort. I don't have the PC that I used to scan them anymore, and I don't have the CD for PaperPort. Does anyone know of a utility I can use to open and convert .MAX files to something more useful like a JPEG? (I'd prefer something that batch converts -- but if I can get a utility that will even allow one conversion, I could probably figure out how to use AutoHotkey or something like that to automate.) Thanks for your help

    Read the article

  • Windows 7 Goes to Sleep in conflict with Power Option Setting

    - by Decker
    My Del Dimension E521 running Windows 7 puts itself in sleep mode each night -- despite the fact that I have chosen a power option that specifies NEVER Each morning I find the monitor blank and I have to hit the power button on the PC at which point Windows "resumes". The system event log shows this: Source: Microsoft-Windows-Kernel-Power Date: 3/27/2010 3:21:10 AM Description: The system is entering sleep. Sleep Reason: System Idle My specific power options are: Turn off Display : 20 Minutes Put the computer to sleep : Never Is there some other setting coming into play here?

    Read the article

  • Are there disadvantages to using Outlook's Cached Exchange Mode?

    - by Roee Adler
    Since I found out about Outlook's "Cached Exchange Mode" I've been using it, and I also set it up on every PC I come across. I think it's a great feature that improves the efficiency of of every Outlook user, and I don't understand why it's not ON by default. My question is - are there any disadvantages to using Cached Exchange Mode? (Besides the obvious fact that it consumes a bit more space, which I don't see as a big issue nowadays)

    Read the article

  • Malware - Technical anlaysis

    - by nullptr
    Note: Please do not mod down or close. Im not a stupid PC user asking to fix my pc problem. I am intrigued and am having a deep technical look at whats going on. I have come across a Windows XP machine that is sending unwanted p2p traffic. I have done a 'netstat -b' command and explorer.exe is sending out the traffic. When I kill this process the traffic stops and obviously Windows Explorer dies. Here is the header of the stream from the Wireshark dump (x.x.x.x) is the machines IP. GNUTELLA CONNECT/0.6 Listen-IP: x.x.x.x:8059 Remote-IP: 76.164.224.103 User-Agent: LimeWire/5.3.6 X-Requeries: false X-Ultrapeer: True X-Degree: 32 X-Query-Routing: 0.1 X-Ultrapeer-Query-Routing: 0.1 X-Max-TTL: 3 X-Dynamic-Querying: 0.1 X-Locale-Pref: en GGEP: 0.5 Bye-Packet: 0.1 GNUTELLA/0.6 200 OK Pong-Caching: 0.1 X-Ultrapeer-Needed: false Accept-Encoding: deflate X-Requeries: false X-Locale-Pref: en X-Guess: 0.1 X-Max-TTL: 3 Vendor-Message: 0.2 X-Ultrapeer-Query-Routing: 0.1 X-Query-Routing: 0.1 Listen-IP: 76.164.224.103:15649 X-Ext-Probes: 0.1 Remote-IP: x.x.x.x GGEP: 0.5 X-Dynamic-Querying: 0.1 X-Degree: 32 User-Agent: LimeWire/4.18.7 X-Ultrapeer: True X-Try-Ultrapeers: 121.54.32.36:3279,173.19.233.80:3714,65.182.97.15:5807,115.147.231.81:9751,72.134.30.181:15810,71.59.97.180:24295,74.76.84.250:25497,96.234.62.221:32344,69.44.246.38:42254,98.199.75.23:51230 GNUTELLA/0.6 200 OK So it seems that the malware has hooked into explorer.exe and hidden its self quite well as a Norton Scan doesn't pick anything up. I have looked in Windows firewall and it shouldn't be letting this traffic through. I have had a look into the messages explorer.exe is sending in Spy++ and the only related ones I can see are socket connections etc... My question is what can I do to look into this deeper? What does malware achieve by sending p2p traffic? I know to fix the problem the easiest way is to reinstall Windows but I want to get to the bottom of it first, just out of interest. Edit: Had a look at Deoendency Walker and Process Explorer. Both great tools. Here is a image of the TCP connections for explorer.exe in Process Explorer http://img210.imageshack.us/img210/3563/61930284.gif

    Read the article

  • How can I take a photo from my camera phone remotely? [closed]

    - by kurt
    Is there any app where I could control the camera of my phone remotely(even bluetooth would do) I have a Nokia 5800 xpress music. The app could either be a stand alone app installed on the mobile phone than could click snaps at predefined intervals or if there is a app that I can install on my PC and then control my phone's camera via bluetooth or wifi or anything else. Is this possible?

    Read the article

  • Windows 7 - Sharing a connection through WiFi?

    - by RadiantHex
    Hi folks, I have a PC with Win7 and an iPod touch. Win7 is connected to the internet through a 3G dongle, I have set up an Ad Hoc wifi network and ticked "Allow other network users to connect through this computer's Internet connection". I have connected to both networks, but I'm getting "No Internet access" as access type for the Ad Hoc connection. Any ideas?

    Read the article

  • Sound Recording Application that Starts/Stops Automatically

    - by carrier
    I'm looking for a sound/voice recording application that I would just let run on my PC all the time. It would either start/stop based on whether there is "anything worth recording" or maybe just record constantly but discard silent segments. EDIT If you have OS specific suggestions, Windows would need to be supported. Of course, if your solution only works on other OSes I'd like to hear about them anyway.

    Read the article

  • Using Windows XP Mode Virtual Machine on a Domain

    - by DavidStein
    I've followed the instructions and installed and configured the Windows Virtual PC XP Mode. I've added it as a machine on the network and can log into it and use network resources. In the process I removed the saved credentials, which are just a default local login to the VM. I need to know how to set this so that the VM auto logs in with the domain account credentials used to log into the physical computer. Google hasn't helped me find the answer.

    Read the article

< Previous Page | 148 149 150 151 152 153 154 155 156 157 158 159  | Next Page >