Search Results

Search found 5964 results on 239 pages for 'tips and tweaks'.

Page 163/239 | < Previous Page | 159 160 161 162 163 164 165 166 167 168 169 170  | Next Page >

  • Tool to launch a script driven by modem activity

    - by Will M
    Can anyone suggest a software tool (preferably under Windows XP or later) that would launch an application or script in response to a phone call being received on a landline phone line connected to a data modem on the same PC? or, better, in response to a sequence of touch-tones being played over such a phone line. This would allow, for example, using the telephone to manipulate firewall settings so as to create another layer of security in connection with remote internet access to that computer. I seem to recall seeing tools to do this sort of thing in the days before broadband internet access, when there was more attention to various tips and tricks for the dial-up modem, but a few attempts at Google hasn't turned anything up.

    Read the article

  • Mysql Encryption and Key managment

    - by microchasm
    I am developing a local intranet system in PHP/MySQL to manage our client data. It seems that the best practice would be to encrypt the sensitive data on the MYSQL server as it is being entered. I am not clear, though, on what would be the best way to do this while still having the data readily accessible. It seems like a tough question to answer: where is the key(s) stored? How to best protect the key? If the key is stored on each users' machine, how to protect it if the machine is exploited? If the key is exploited, how to change the key? If the key is to be stored in the db, how to protect it there? How would users access it? If anyone could point me in the right direction, or give some tips I'd be very grateful. Thanks.

    Read the article

  • Can not find the source of Grant permission on a folder

    - by Konrads
    I have a security mystery :) Effective permissions tab shows that a few sampled users (IT ops) have any and all rights (all boxes are ticked). The permissions show that Local Administrators group has full access and some business users have too of which the sampled users are not members of. Local Administrators group has some AD IT Ops related groups of which the sampled users, again, appear not be members. The sampled users are not members of Domain Administrators either. I've tried tracing backwards (from permissions to user) and forwards (user to permission) and could not find anything. At this point, there are two options: I've missed something and they are members of some groups. There's another way of getting full permissions. Effective Permissions are horribly wrong. Is there a way to retrieve the decision logic of Effective Permissions? Any hints, tips, ideas?

    Read the article

  • Planning office network [closed]

    - by gakhov
    I'm planning to setup my office network from scratch and want to ask professional opinions or tips. My office is connected to Internet with Cable connection (100Mb/s). The devices i would like to connect are VoIP Phone (RJ-11), TV (WiFi/LAN), 3 laptops (WiFi), a few smartphones (WiFi), iPad (WiFi), Kindle (WiFi) and, probably, MediaServer (WiFi/LAN). As you can see, the most load will be on WiFi connections (probably, even if TV supports WiFi it's better to connect it by LAN?). So, i need help to choose the best routers combination (or even one?) to support stable connections for all these devices and minimize the total number of routers/adapters. Any thoughts? Thank you!

    Read the article

  • How to export an image from Photoshop to PDF while preserving the exact size?

    - by romkyns
    There used to be a PDF export option in Photoshop, but it's gone in CS4. What replaced it is Bridge, however no matter what I do, Bridge ends up resizing my image. The physical dimensions (cm/inches) in the final PDF are not what they are in Photoshop. Any tips on exporting an image without messing up its size? (Clarification: I want the final PDF to contain a page of the size I specify, with a white background, and my image positioned somewhere on this page such that the image width/height in cm is exactly the same in the PDF as it was in Photoshop.)

    Read the article

  • gmetric data submitted doesn't follow dmax value

    - by 580farm
    I have a custom script that is querying a metric port for an application that I'm running and submitting parsed values to ganglia via gmetric. The script runs every minute, so I submit the data to ganglia using the following gmetric options: /usr/sbin/gmetric -g ec2 -s positive -t uint32 -d 600 -n "$NAME" -v $VALUE -x 60 But for some reason there are still gaps in the graphing data: Is there something in my formatting that is preventing the dmax/ttl of the last metric received from being honored? Is there anyone who does custom metric collection that has run into this problem before that can shed some insight or provide some tips as to how to best correct this?

    Read the article

  • I'm trying to set up a LAMP server so it's totally anonymous, any suggestions?

    - by flexterra
    I'm going to set up a web service which will use the LAMP stack. One of the most important features of the site is that it should be anonymous. We thought that a cool thing will be if the server didn't made any logs that could potentially identify a user. I'm working on a web app for a news organization. They want a site to allow people to sumbit news leads and tips (text / files) to journalists. We think if we can provide good anonymity people will be more inclined to provide information. We will also teach how to use stuff like TOR as an extra precaution for whistleblowers Is this even possible? Any suggestions of obscure things we should look into?

    Read the article

  • Hooking domain to home server with port

    - by user1071461
    Alright, I'm asking two things here. First of all, if i purchase a domain let's say myhomeserver.com, am I able to make the default port go through a different port instead of the default port 80? (that is without having to do myhomeserver.com:5000 for example). Also this should be without blocking other ports (so no stealth forwarding to myhomeserver.com:5000 i think) Secondly, How could I go about hooking a domain to a windows 2008 server? I've seen it on linux but no clue how to do it on windows if it's even possible. I know I'm asking a lot here, just some tips are appereciated. Also, yes I know, using a home server is horrible for security and preformance and whatnot, I understand this already, thanks ^^

    Read the article

  • Debugging COM+ applications

    - by cc0
    I have a number of separate COM+ applications that I have to figure out; The COM+ applications respond to a number of scheduled tasks, and I need to know which COM components within which applications are being used when I execute each of these tasks. It is easy to figure out what (if anything) goes wrong in the event log, but as I am working on testing each components compatibility with the others; I need to know which ones I have actually tested by executing the scheduled tasks. Does anyone have some useful tips here? I've been looking into the sysinternals tools, and specifically processmonitor, but I have not found a way to make it monitor the COM+ applications yet. (I initially started this question here, but realized it's probably more suited for serverfault)

    Read the article

  • better options for screen?

    - by lonestar21
    OK. So I love screen. It has saved my bacon a few times when machines crash or get disconnected from the network. However, there are enough reasons keep keep me from using screen for everything, which include: Pain in the butt scrolling. Why can't I just interact as though this is a normal bash shell? My keyboard shortcuts are gone. I have a number of things customized in my bash environment, is there a way to get them to work in screen as well? Are there any tools our tips that I can use to make my screen-using experience as high quality as my bash using experience?

    Read the article

  • Map keys in Vim

    - by efficiencyIsBliss
    I want to map e to mean end of line. I tried the following mapping in my vimrc: map $ e $ is the default end of line command. However, this doesn't work. I'm wondering what the problem is. Also, I want to map Alt+right/left arrow to navigate words. So, for example, Alt+right arrow would take me to end of word. This command is currently mapped to e. Any tips on how I would go about doing this? Thanks!

    Read the article

  • Running two Magentos installations, one of which has 3 stores set up as multi-store. Which server?

    - by Pedro Peixoto
    I want to run 4 Magento stores in 2 different installations. 1 is a standalonne installation with 3 languages. The other is a multi-store with 3 different online stores in different domains. At the moment we have a VPS with 1GB memory, would that be enough? I ask because I've finished the standalone store and already put it online, and the server is already running on 62% memory. The ideal would be that this is enough as my company wouldn't like to move to a Dedicated Server (as it involves costs). I'm sure I can try to optimize Magento to run on lower memory (I'm expecting visits averaging 2000/day on all sites), if I could have some tips on the best way to do that Id appreciate it too.

    Read the article

  • howt setup remote access into computer behind 2 routers?

    - by Steve Wasiura
    I can setup remote access to a pc behind a single router/firewall by using NAT and Port Forwarding, simples! But there is a customer that shares an internet connection with another office, and they are behind a second router firewall. I drawed a picture with my crayons but I can't attach it because I'm a new account on SF. see it here: http://i.imgur.com/b3FDx.png So how would I setup remote access to the pc that is beind the second firewall? It must be something about static routes, i.e. if I hit the wan ip on port 4905 I want it to forward it to 10.0.0.30 by going through 192.168.1.10 so a route statement like for all requests to 10.0.0.30, use 192.168.1.10 ? and ass u me router 2 has a static gateway ip of 192.168.1.10 and need a standard NAT on router 2 to point port 4905 to 10.0.0.30 is this the right way, any tips? both routers are netgear consumer equipment. thanks

    Read the article

  • Problem with Win7 connecting to Internet

    - by Lucas
    Hello, I have had Windows 7 for about a year now and for the first four months it worked perfectly. But for the last 8 months it has been horrible. It will connect to the Internet for about 5 minutes and then just lose connection. It will reconnect in about 5 minues but then it just keeps disconnecting. I ran a virus scan about 2 weeks ago and I found a Trojan on my PC which I removed and dealt with. It was fine after that but now for these last couple days it has been just as bad as before. I think a virus is causing this but I will read any suggestions and tips to help me solve this problem. Thank you. PC DETAILS: OS: WIndows 7 Home Premium 64-Bit- System Model: Aspire M5802- Processor: Intel Core 2 Quad CPU- Memory: 8192MB RAM- Graphics Card: NVIDIA GeForce GT 220

    Read the article

  • Set up a "relay" service

    - by trikks
    Hi! I'm trying to create a 'left client' server < 'right client' setup but need some advice and tips. Let's say that I have a server-daemon on the left side, like a vnc-server that connects to the middle server. On the right side I've got a client that want to connect to the left server-daemon, but it has to be done through the middle server. I assume this should be done with some tunneling service. The server environment is a fully featured Debian Linux or Mac OS X Server host. Any idéas? Thanks / Trikks

    Read the article

  • Configuring MPI on 2 nodes

    - by Wysek
    I'm trying to create really simple "cluster" from 2 multicore computers using openmpi. My problem is that I can't find any tutorials on that matter. I don't want to use torque because it's not necessary in my case nevertheless all tutorials give configuration details either about torque or mpd (which doesn't exist in openmpi implementation). Could you give me some tips or links to appropriate manuals? Steps I've already completed: - openmpi installation - network configuration (computers see each other) - ssh password-less login to second computer I tried using machinefiles without further configuration and with just 2 IPs in it. But jobs don't seem to start at all after initialization part. (MPI seems to work because I'm able to scatter jobs on multiple cores of both computers without communication between them).

    Read the article

  • Windows 2003 Server Suddenly Drops Connections to everything but PING and port 80 (webserver)

    - by Urda
    Hi, I'm running a Windows 2003 Dedicated server, and the box has been rock solid for more than 2 years now. Just recently, I have had an issue where after a certain ammount of time the server will just stop accepting connections on all ports except 80, and still responds to pings. If you surf to a static HTML page on the box, you can display it. If you pull up a PHP file that has an outside database connection, it fails. RDP refuses to connect, and LogMeIn reports that "The connection was reset" The only fix at this time is to have the provider physically reboot my box to correct the issue. The event log doesn't seem to be leaving helpful messages, and I am at a lost to what is causing this error since I have not installed any new software in months on it. Any tips or help would be appreciated to tracking down this issue. I don't mind updating the question as responses come in, I just do not know where to start troubleshooting because it seems random at this time.

    Read the article

  • How to know if a file has 'access' monitor in linux

    - by J L
    I'm a noob and have some questions about viewing who accessed a file. I found there are ways to see if a file was accessed (not modified/changed) through audit subsystem and inotify. However, from what I have read online, according to here: http://www.cyberciti.biz/tips/linux-audit-files-to-see-who-made-changes-to-a-file.html it says to 'watch/monitor' file, I have to set a watch by using command like: # auditctl -w /etc/passwd -p war -k password-file So if I create a new file or directory, do I have to use audit/inotify command to 'set' watch first to 'watch' who accessed the new file? Also is there a way to know if a directory is being 'watched' through audit subsystem or inotify? How/where can I check the log of a file?

    Read the article

  • jquery accordion - keeps hiding parent element?

    - by PopRocks4344
    Well, I fixed my original question by including after the closing tags, but now, those links won't open? So, basically, in the html below, I'm trying so that only the services section slides open, but I want the h3 tags to open those links... <div id="sp-accordion"> <h3><a href="/?page_id=3">Home</a></h3><div></div> <h3><a href="/?page_id=2">About Us</a></h3><div></div> <h3><a href="#"> Services</a></h3> <div> <p><a href="/?page_id=16">S1</a></p> <p><a href="/?page_id=14">S2</a></p> <p><a href="/?page_id=20">S3</a></p> </div> <h3><a href="/?page_id=9">Contact Us</a></h3><div></div> <h3><a href="/?page_id=5">Tips</a></h3><div></div> <h3><a href="/?page_id=108">Jobs</a></h3><div></div> <h3><a href="/?page_id=131">Newsletter</a></h3><div></div> </div> The accordion works, insomuch that when you click on the h3 tag, the container slides open, however, when it slides open, it hides the h3 before it. So, in the html below, when I click on "Services" the div beneath it slides open, but the About Us h3 disappears... This is the html: <div id="sp-accordion"> <h3><a href="/?page_id=3">Home</a></h3> <h3><a href="/?page_id=2">About Us</a></h3> <h3><a href="#"> Services</a></h3> <div> <p><a href="/?page_id=16">S1</a></p> <p><a href="/?page_id=14">S2</a></p> <p><a href="/?page_id=20">S3</a></p> </div> <h3><a href="/?page_id=9">Contact Us</a></h3> <h3><a href="/?page_id=5">Tips</a></h3> <h3><a href="/?page_id=108">Jobs</a></h3> <h3><a href="/?page_id=131">Newsletter</a></h3> </div> I'm using jquery ui, so the jquery is just this: $(document).ready(function() { $("#sp-accordion").accordion({autoHeight:false}); });

    Read the article

  • Is there a way to get Postfix to both forward an e-mail *and* reject it via recipient_address_rejected

    - by Mac
    In postfix, I'd like a way to deal with e-mail accounts that are no longer active by having postfix send the standard "Recipient address rejected" type message, but still forwarding the e-mail to another user. Thus, if someone sends an e-mail to [email protected], it will bounce the message back to the sender for future reference, but the mail will still get forwarded to [email protected] to deal with. .vacation and / or .forward files let me down because they will either reply or forward, but not both. Any tips?

    Read the article

  • My servers been hacked EMERGENCY

    - by Grant unwin
    I'm on my way into work at 9.30 pm on a Sunday because our server has been compromised somehow and was resulting in a DOS attack on our provider. The servers access to the Internet has been shut down which means over 5-600 of our clients sites are now down. Now this could be an FTP hack, or some weakness in code somewhere I'm not sure till j get there. Does anyone have any tips on how I can track this down quickly. Were in for a whole lot of litigation if I dont get the server back up asap. Any help appreciated.

    Read the article

  • Sharing files between centOS on virtualbox and windows 7 as the host

    - by Wasswa Samuel
    I have centOS 5.5 installed on virtual box it has no GUI so every thing is command based. I want to make a folder in centOS which i can share with my windows 7 host OS such that i can send files to and fro seamlessly. I am new to linux and i managed to install samba. I looked up some tips on net but i ended up getting confused and none of them worked. Can someone explain to me how i can do this in a straight forward way from how i can configure samba to how i can mount the folder such that it can be seen on the host operating system. I am completely lost.please help.

    Read the article

  • Windows Firewall 2008 Server - Allow only given IP in, block all others

    - by chumad
    I've got a Windows 2008 Server. It has the built-in windows firewall on it. I've played around with the Advanced settings where I can setup inbound/outbound rules, but it doesn't appear that I can create a rule that would say "Block All incoming traffic except traffic coming from this IP address" I created a rule that Blocks All, but there's no way that I've found to create a rule that will "override" the block rule and allow 1 or more IP's to get in. I accomplished this on a Win2k box using IPSEC, but it seems that IPSEC is now built-in to windows firewall. Any tips?

    Read the article

  • MDT Image Hierarchy

    - by Antix
    Just a quick question, I couldn't find this out by looking around and have not had the time to run a test myself: Is it possible to create image hierarchies in MDT? Take this example where we have three images. - Image 1: Base OS - Image 2: Company Wide Applications (built off Image 1) - Image 3: Specific Role Applications (built off Image 2) Now just say we change the version of an application in Image 2. The next time we build Image 3, will this take the new version of the application since it's basing its image off Image 2? Also, If we add a program to Image 1, leave Image 2 unchanged and re-build Image 3, would this include the new program? I'm trying to plan out a way of creating images such that if a change is required for an image that is on basically every machine (think, Image 1) then we only have to change it in one location. Has anyone actually done something like this and has any tips?

    Read the article

  • Computer to act as keyboard

    - by Joe
    Title explains it. Imagine this example, Host computer connects to a Client computer via male/male usb connection. Client computer acknowledges this connection as a new device, in this case a keyboard. The host computer can now send key events to the client computer and the client computer would process them as a normal keyboard event. I did a whole lot of searching in the internet and really have drove down many dead ends. Any tips would be appreciated. Note* this is a physical connection. The client computer should not have to install any software for this to function (The host will completely spoof as a keyboard).

    Read the article

< Previous Page | 159 160 161 162 163 164 165 166 167 168 169 170  | Next Page >