Search Results

Search found 12047 results on 482 pages for 'general debugging tidbits'.

Page 170/482 | < Previous Page | 166 167 168 169 170 171 172 173 174 175 176 177  | Next Page >

  • How do I change permissions for Windows\Temp?

    - by user1413
    I am running Windows Vista Ultimate and I want to change the permissions in Windows\Temp. For example, I want to remove the read-only attribute in General. When I do this I get an error that reads, "You will need to provide administrator permission to change these attributes." When I click continue, it does something but the Read-only box is still partially checked. How do I take control of Windows\Temp?

    Read the article

  • Is a 2006 Mac Mini’s processor upgradeable to a Core 2 Duo?

    - by chiurox
    I have a Mac Mini with Core Solo 1.5GHz, 512mb RAM, 60gb HDD, etc... I know, it's very old but since it's lying around here, I wanted to bump it up for general usage and some experimental iPhone development. Also, Snow Leopard can't be installed as it doesn't have enough RAM. I browsed around but I'm not sure if this Mac Mini's motherboard accepts a Core2Duo (at least a 2.0GHz). If anyone could inform me which generation of Core2Duo it still accepts, I'd be grateful.

    Read the article

  • Which Processor should I buy: Intel Quad Core 2.5Ghz or Intel Core 2 Duo 2.9 Ghz?

    - by Kryten
    Hi, I am looking at buying a desktop and have narrowed down my choices to 2 machines with exactly the same specs, but different CPU's. Machine 1 CPU: Intel® Core™2 Quad Processor Q8300 (4M Cache, 2.50 GHz, 1333 MHz FSB) Machine 2 CPU: Intel® Core™2 Duo Processor E7500 (3M Cache, 2.93 GHz, 1066 MHz FSB) I plan on using the PC for the following: Music Playing Software Development Virtual Machine Running Gaming "General Work" Which CPU would better suit the job?

    Read the article

  • What causes "The INF file you selected does not support this method of installation." error?

    - by AndrejaKo
    This question is related to this one. Also, I think it's not duplicate of this question, since I'm not asking about specific device but a more general case. Where can I find information about driver .inf files and how windows checks if they are usable? I know that many people do modify .inf files so there must be some information on the Internet. Basically I have a bad .inf file and would like to see what's wrong with it and how to fix it if possible.

    Read the article

  • Limit YouTube to specific videos

    - by Neil Barnwell
    A friend of mine has a son who likes to watch YouTube, but she would like to limit his access with some sort of white-list. This is more strict than simple over-18 stuff. I've thought of a static webpage with embedded video players on, but I don't know how to limit general search access to YouTube.

    Read the article

  • Want to create an SQL function that removes table row duplicates [migrated]

    - by Hoser
    I'd be following the procedure outlined here (unless of course someone has a better way to do it), and I'm wondering if I could just have some help being pointed in the right direction on how to start. Basically I need help first on HOW to create functions, and general tips on making it adjustable for varying number of columns etc. This may be a very complicated task, as I have no previous experience making SQL functions, so please let me know if this is a difficult task for an SQL noobie working with MS SQL 2005.

    Read the article

  • Can I make Thunderbird load different email accounts one after the other instead of all at the same

    - by Martin
    I use Thunderbird 3 on Vista. I use it for 3 POP accounts. When I start work in the morning, all three accounts are checked at the same time, and all emails are being loaded simultaneously. I think Thunderbird is quite slow in general, and this behaviour makes it even worse. At least it makes me feel so. Can I tell Thunderbird to check the accounts and load the emails one after the other?

    Read the article

  • Looking for a web interaction layer for SmartList

    - by spot
    We run quite a few internal mailing lists with SmartList (procmail). I need to offer a web interaction ability (think Google Groups) to the mailing lists. Is there anything that will do this on top of SmartList? If not, is there anything that will do this in general on another linux mailing list manager?

    Read the article

  • Can I install a tool like Zimbra or Funambol on a server that is already managed by Syscp?

    - by bensch
    I have a server that is managed by Syscp. The question is, if there are unresolveable dependencies, or services, that are managed by syscp already? For example Zimbra is intended using postfix but syscp is managing that already. I guess, that will not be possible, but maybe without having the full functionality of Zimbra. I only need the calendar and contacts-support with CalDav. (besides: I am using debian sqeeze but this is interesting in general)

    Read the article

  • GPU Temperature comparisons between similar GPUs of the same line

    - by White Phoenix
    As a general rule of thumb, if there are two similar GPUs from the same line (i.e. an NVIDIA GTX 260 vs a NVIDIA GTX 280), will the less powerful or more powerful GPU run hotter? This is assuming all other factors stay the same - hardware configuration, cooling setup, ingame settings, etc. Or does this depend entirely upon the GPU itself? I do remember reading that the GTX 280 in this example was terribly inefficient with power and cooling.

    Read the article

  • Is there extensible structured file analyzer, like network analysis tools?

    - by ???
    There are many network analysis tools like Wireshark, Sniffer Pro, Omnipeak which can dump the packet data in structured manner. I'm just writing my own file analyzer for general purpose, which can dump JPEG, PNG, EXE, ELF, ASN.1 DER encoded files, etc. in tree style. There are so many file formats in the world that I can't handle them all. So I'm wondering if there's some software already there, with pluggable architecture and a large established file format repository?

    Read the article

  • Are there any known issues with Windows-8 installed on a VHD?

    - by Richard
    I installed Windows 8 preview on a VHD image and it seemed to work until I actually started using it. I´m seeing terrible performance. Installing anything makes everything else "stutter" or freeze for up to a couple of seconds at a time. I looked up hard disk performance in the task manager and this is what I found: It doesn't seem right it has 2500ms response time while reading/writing at those speeds. Is this an issue with my drive, installation or VHDs in general?

    Read the article

  • Cant send email attachment from with Excel or Word 2003

    - by redknight
    I have a problem when I am trying to send the excel sheet or document I am working on as an email attachement. The message I am getting is General Mail Failure. Quit Microsoft Excel,restart the mail system.try again. I have checked, all possible solutions, but no luck. Any suggestions on how to solve this problem?

    Read the article

  • Apache mod_proxy dynamic filter

    - by jrhicks
    How can I configure Apache to ProxyBlock content based on something dynamic such as time-of-day or max-use. Basicly I'm curious about the scriptability of Apache. My web-stumbling leads me to believe I can combine mod-proxy and mod-perl in interesting ways to do dynamic filtering. But I'm pretty lost. What are some general instructions, tutorials, books, technologies to begin scripting Apache (or any suitable proxy).

    Read the article

  • Clean install vs disk image

    - by Thanos
    Once a year I am making a clean install on windows, in order to keep my system fast. After posting a question on making a bootable windows usb with exe programs where I was adviced to make a disk image, a new question rose. What is the difference in making a disk image and performing a clean install on windows? Which is better in terms of speed, general performance, value for time and transfering between different computers?

    Read the article

  • Executing a command in vim from a commandline

    - by TK
    I would like to run :helptags ~/.vim/doc in vim, but from command line. The purpose is to run the command occasionally with other commands to keep my tools up-to-date (probably in a cron job on my development machine. I looked around man vim, but cannot figure out what option I need to pass. I think this is a general question for vim, but I'm using Mac and Ubuntu for the development.

    Read the article

  • External WiFi Adapter for Eee PC 1000?

    - by Peter M
    I have an original Eee PC 1000 running the stock Xandros. I have run into problems where the internal WiFi card does not seem to have enough sensitivity to connect to a lot of access points. Although the computer will report APs in the area, unless the signal strength is over 80% (as reported by the Wireless networks application) I cannot seem get a connection. So is there a recommended USB WiFi adapter that is known to work with the Eee PC/Xandros system or in general with a Debian based system?

    Read the article

  • Is it possible upgrade to Windows 8 from Windows OEM?

    - by Drake
    In a Microsoft's post about Windows 8 upgrade it is written: We set out to make it as easy as possible for everyone to upgrade to Windows 8. Starting at general availability, if your PC is running Windows XP, Windows Vista, or Windows 7 you will qualify to download an upgrade to Windows 8 Pro for just $39.99 in 131 markets. I am now interested in understanding if this upgrade options are available also for Windows XP/Vista/7 OEM versions. Do you have any idea?

    Read the article

  • Building a video wall with devices

    - by machunter
    I am entertaining building a video wall made out of many android devices. But I have to say I have no clue about how to go about it? The fact that these are android devices is not very important I am curious about the general approach to doing video walls with many separated devices. At best the desktop of one machine should be displayed on all the devices. If not I would be also interested in just showing just a video on that wall.

    Read the article

  • Is the guideline: don't open email attachments or execute downloads or run plug-ins (Flash, Java) from untrusted sites enough to avert infection?

    - by therobyouknow
    I'd like to know if the following is enough to avert malware as I feel that the press and other advisory resources aren't always precisely clear on all the methods as to how PCs get infected. To my mind, the key step to getting infected is a conscious choice by the user to run an executable attachment from an email or download, but also viewing content that requires a plug-in (Flash, Java or something else). This conscious step breaks down into the following possibilities: don't open email attachments: certainly agree with this. But lets try to be clear: email comes in 2 parts -the text and the attachment. Just reading the email should not be risky, right? But opening (i.e. running) email attachments IS risky (malware can be present in the attachment) don't execute downloads (e.g. from sites linked from in suspect emails or otherwise): again certainly agree with this (malware can be present in the executable). Usually the user has to voluntary click to download, or at least click to run the executable. Question: has there ever been a case where a user has visited a site and a download has completed on its own and run on its own? don't run content requiring plug-ins: certainly agree: malware can be present in the executable. I vaguely recall cases with Flash but know of the Java-based vulnerabilities much better. Now, is the above enough? Note that I'm much more cautious than this. What I'm concerned about is that the media is not always very clear about how the malware infection occurs. They talk of "booby-trapped sites", "browser attacks" - HOW exactly? I'd presume the other threat would be malevolent use of Javascript to make an executable run on the user's machine. Would I be right and are there details I can read up on about this. Generally I like Javascript as a developer, please note. An accepted answer would fill in any holes I've missed here so we have a complete general view of what the threats are (even though the actual specific details of new threats vary, but the general vectors are known).

    Read the article

  • Network connection on Linux

    - by Kevin
    A general question about network connection on Linux : once a network connection goes into time_wait, is it still tied to the process ? Does it still use resources like say filehandle ? Reason I ask is because once it goes into time_wait, lsof does not report it anymore. I guess that means that the network connection is no longer tied to the process and hence does not count against filehandle limit. Would like to confirm though.

    Read the article

< Previous Page | 166 167 168 169 170 171 172 173 174 175 176 177  | Next Page >