Search Results

Search found 16643 results on 666 pages for 'stackoverflow answer'.

Page 166/666 | < Previous Page | 162 163 164 165 166 167 168 169 170 171 172 173  | Next Page >

  • What is the difference between running a Windows service vs. running through shell?

    - by Zack
    I am trying to troubleshoot an issue on a Windows 2008 server where running attempting to connect to a "Timberline Data Source" ODBC driver crashes if the call is in a "service" context, but succeeds if the call is initiated manually in a Remote Desktop session. I have set the service to run as my user. I'm wondering if, all else being equal (user, machine, etc), are there any fundamental security/environment differences between running a process as a service vs manually? --- Implementation Details --- In case it is helpful for anyone, I had a system that started as an attempt to connect to a Timberline Database using ODBC and a Python CGI script called via IIS 7. The script itself works fine, however, as soon as I attempt to perform the ODBC connect function, the script crashes without throwing an exception. The script was able to connect fine when executed via command line. The same thing happened when using a C#/.net service, attempting to run via Apache, Windows Scheduler or even a 3rd party scheduling tool. With the last option (the 3rd party scheduling tool, pycron) I set the service up log in as my user and had the same issue (I confirmed via Task Manager that the process running user was, in fact, me). It just doesn't make sense to me why a service, which should be running as my user, appears to still be operating in a different security context or environment. Also, if it's important, the Timberline database is referenced by computer name on the network ("\\timberline-server\Timberline Office\Accounts\AT" or something to that effect) I also realized that, as Joel pointed out, the server DOES have a mapped drive ("Y:" which is mapped to "\\timberline-server\Timberline Office") The DSN is set up at the "System DSN" level which, according to the ODBC Administration Tool, means that the DSN is available to users and services Since I'm not allowed to answer this question yet, I'll post the solution that I arrived on: As Joel Coel mentioned, there actually was a mapped drive scenario. I didn't realize this because the DSN specified a path using UNC. However, it seems as though the actual Timberline Driver referred to a mapped drive. Since services don't start with the mapped drive, I was forced to add the drive mapping code into my service. Since it was written in python, I used code from a Stackoverflow answer that was able to map the drive on the fly.

    Read the article

  • Mesh Remote Desktop crashes 64 bit Windows 7 VM (8 GB)

    - by Andrew J. Brehm
    I have a Windows 7 VirtualBox VM (64 bit, 8 GB) on a Snow Leopard host (64 bit, 24 GB). It works fine until I connect via Microsoft Mesh. When I connect via Mesh remote desktop, the VM crashes about one or two minutes after the connection has been established. It doesn't answer to pings (from the host and from other machines in the network) and no RDC connections (from other Windows machines in the network where Mesh works) are possible. Any ideas?

    Read the article

  • (Why) are IEC C5/C6 connectors a necessity? Why not use C13/C14?

    - by Mike
    That's a question I was asking myself the first time I saw such a weird C5 plug. That was a while ago, but I came across it again and haven't found an answer yet. The only thing I could find out is that C5 is with 2.5A and C13 with 10A. But I guess it would technically be no problem building an AC adapter (e.g. for laptops) in which you plug the far more common C13 connector. http://en.wikipedia.org/wiki/IEC_connector

    Read the article

  • Wireless N extend G range?

    - by Sam
    I've searched all over the internet for an answer to this and I can't find one. If I purchase a wireless N router, with greater range than my current G router will the range of the wireless G signal go as far as the wireless N signal? I say this because Wireless N routers are supposed to be compatible with wireless G devices. Is the wireless G a lesser signal coming out of the router? Sorry if I confused you, I am a little confused myself.

    Read the article

  • Can I stop SharePoint from prompting during file edit?

    - by uSlackr
    We use a SharePoint 2007 site internally with Office 2010. Whenever I open a Word document to edit it, I get a prompt saying: Some files can harm your computer. If the file information below looks suspicious, or you do not fully trust the source, do not open the file. I've been unable to find a reliable answer around the web. Some suggested using the Windows File Types dialog to remove the prompt on download option, but this dialog is not available in Windows 7.

    Read the article

  • "Upgrading" SQL Server 2008 180-day Evaluation to Licenced Standard Edition

    - by alsan
    Hello, I run into the same issue as someone who posted this question on experts-exchange.com (couldn't read the answer though as I don't have an account there): {Quote Begin} I noticed that the 180-day Evaluation version of SQL Server 2008 is the Enterprise version. Is there going to be any problem "upgrading" the Evaluation Enterprise version to a licensed STANDARD version (and how much additional stuff is going to be left inactive on my disk and, more importantly, in my registry, etc. if I do so)? {Quote End} Any advice is appreciated.

    Read the article

  • Learn to use both sides of the keyboard

    - by brewerja
    I'd like to force myself to use the correct (right side or left side) Shift, Ctrl, and Alt keys depending on what letter I'm typing. For instance I'd like to use the right Shift key when typing 'A' and the left Shift key when typing 'P'. I find myself using only the left side a lot and I'm looking for a way to set the mappings on my machine so that it only responds to correct pairings. I'm running Fedora, but any Linux distro support would be an acceptable answer.

    Read the article

  • Firefox, reload without cache check

    - by pmoleri
    It looks like a popular question but it's just the opposite. When I visit a site in Firefox 15 I have two different behaviours when: Pressing enter in the address bar Pressing F5 or the refresh button If I look in the network console I can see that F5 does a lot more requests, most of them about cached resources and with a 304-Not Modified answer. Is there's any shortcut to make a quick refresh? Just like pressing enter on the address bar.

    Read the article

  • WAMP - phpMyAdmin is loading a blank browser (Firefox)

    - by Michael
    I recently uninstalled an older version of WAMP then installed the latest version. The link to the localhost displays the WAMPSERVER home page successfully. However, the http://localhost/phpmyadmin/ returns only a blank browser - it displays nothing. localhost/sqlitemanager/ returns a Forbidden You don't have permission to access /sqlitemanager/ on this server. This seems to be a 403 forbidden error I've looked everywhere for an answer to this. Help please

    Read the article

  • What does a green colored file name mean? [duplicate]

    - by user178744
    This question already has an answer here: What do green folders mean in Windows 7 Explorer? 2 answers I downloaded a .zip file the other day and extracted it using 7zip from my desktop to my laptop over my home network, when it finished, its filename and the filename of its contents was green. What does this mean, can i revert it to normal, has anything been modified and is there a list somewhere of color codes for windows file names.. ? (I can recall seeing blue somewhere before).

    Read the article

  • Finding out with process binds a hotkey [duplicate]

    - by Christian
    This question already has an answer here: How can I determine which process owns a hotkey in Windows? 2 answers Somehow I have set a hotkey that start DoubleCommander whenever I press AltGr+s. Unfortunately I forgot which program is responsible for that behavior and therefore how to change it back. How do I find out which program is responsible to change it back?

    Read the article

  • Alternative Remote Desktop Software

    - by squillman
    What are good alternatives to the Windows builtin remote desktop client? I have tried Terminals and it is great but I've have run into numerous bugs with the latest release (currently 1.7e). Can anyone recommend an alternative similar to Terminals? EDIT (in response to Adam Gibbins' answer): One of the biggest things I'm looking for is session management and a tabbed environment similar to the Terminals interface.

    Read the article

  • How (in terms of which parameters) is a "professional-grade" broadband connection different from a "consumer" one?

    - by odemarken
    By "professional" I mean here: The kind you can get at a datacenter for your server The kind you can get at an office that would be good enough for hosting web and mail server with low to medium traffic. (Please ignore other aspects of "the self-hosting problem" and focus only on broadband connection quality). Another way to frame this question would be "what parameters should office broadband have to compare to a datacenter-provided one for the purposes of self-hosting". The knowledge I have gathered so far is in answer format below.

    Read the article

  • 403 error with codeignitor

    - by DJB
    When I type in the standard web address for my site, I get a 403 error. However, when I type in a more exact address, say pointing to an index.php file, everything shows up fine. I'm using Anodyne Productions' Nova (SMS 3) which uses codeignitor. All accompanying software (PHP/MySQL) is compatible. I'm not a very technical person, so I'm hoping that this is an easy fix. Thanks for taking the time to answer.

    Read the article

  • Apache: scope for environmental variables

    - by Anonymous
    While there's documentation available on Apache environmental variables, I can not find answer to one important question. Imagine I use rewrite rules to set environmental variable RewriteRule ... ... [E=something:1] What is the scope of "something" - global Apache server (this means "something" will be available for other request transactions), this request (means that "something" is only valid for THIS http request (and its related processing - but what's about internal redirects and other internal stuff - are they considered as THIS request, or another one?), and may be set differently within another (concurrent) request?

    Read the article

  • Path Length in Windows

    - by Dexter
    Is there any reason paths are still limited to ~250 characters in Windows? I'm not asking about a solution here (since there isn't one, other than \\?\ perhaps), but about why this is still an issue in 2012. Microsoft itself has failed to provide an explanation, so I'm hoping that maybe someone here, who has more insight into this than me, can provide an answer. Also, if \\?\ is supposed to be the "cure" to this, why aren't paths implicitly converted to the \\?\ notation by Microsoft's own programs?

    Read the article

  • Safari: how to re-open MULTIPLE previously closed tabs?

    - by courteous
    CMD + Z in Safari (6.0.1) will re-open the last closed tab. Is there any way to re-open multiple previously closed tabs (as in, say, Chrome)? A closely related question from 2011: Are there any extensions or tricks to reopen several closed tabs in Safari Update Safari is now at 6.0.2: having the ability to re-open multiple closed tabs would still very much improve usability (i.e. not having to go searching the History). Is the answer still "impossible"?

    Read the article

  • How to exempt rows from being hidden/filtered in Excel 2010?

    - by tarheel
    Consider a spreadsheet that starts looking like this: I want to be able to filter for Name 1 on the left column and have it look like this: Yes, I realize that the simple answer is to filter for Name 1 and Header, but I have other people using this spreadsheet that don't seem to get that. So, how can I make it foolproof for them and make it impossible to filter out the rows that have Header in the left column?

    Read the article

  • How can I tell who deleted a folder from a public share?

    - by wizard
    Like a lot of offices we have a few public shares for different teams to save their data. Today I helped someone restore some folders from a shadow copy that had been deleted sometime last week. While I had the shadow copies (and backups elsewhere), I couldn't answer the obvious first question. "Who deleted the files?" We're running Windows 2003 server, everyone has active directory accounts.

    Read the article

< Previous Page | 162 163 164 165 166 167 168 169 170 171 172 173  | Next Page >