Search Results

Search found 22122 results on 885 pages for 'uses feature'.

Page 173/885 | < Previous Page | 169 170 171 172 173 174 175 176 177 178 179 180  | Next Page >

  • Server on blacklist

    - by Cudos
    I have a Debian Wheezy server with several websites with separate domains. Some of these websites uses Wordpress and in turn uses PHP's mail function to send mail. I installed "sendmail" to be able for the server to send mail from PHP. We use Google Apps for our customers, so no need to setup a regular mail server. Now the server is blacklisted at www.spamhaus.org and get this message: This IP address is HELO'ing as "localhost.localdomain" which violates the relevant standards (specifically: RFC5321). I have tried to follow the instructions on these websites with no luck: http://www.cardiothink.com/downloads/README.spamhaus-and-blocked-email.html http://centosbeginer.wordpress.com/2011/07/12/how-to-remove-ip-in-cbl-spamhaus/ Can you please help me figure out how to configure the server? File: /etc/hosts # nameserver config # IPv4 127.0.0.1 somedomain.dk xxx.xxx.xxx.xxx server.somedomain.dk bigby # # IPv6 ::1 ip6-localhost ip6-loopback xxxx::0 ip6-localnet xxxx::0 ip6-mcastprefix xxxx::1 ip6-allnodes xxxx::2 ip6-allrouters xxxx::3 ip6-allhosts xxxx:xxx:xxx:xxxx::2 Debian-76-wheezy-64-minimal File: /etc/hostname bigby somedomain.dk is a made up domain. In reality another domain name I have on this server along with other domains. bigby is also a made up name. It is also something else in reality.

    Read the article

  • Why is "start in" needed for Windows scheduled tasks?

    - by GomoX
    We develop a web application that can be deployed on Windows or Linux. The Linux implementation uses cron, and the Windows one uses scheduled tasks to run a single PHP script that processes all scheduled tasks for our system. The task is scheduled using schtasks during the install process, like: This has always worked both under W2003 and W2008. A week ago a customer reported that scheduled tasks were not running. He is running on Windows 2008. We checked over and over and finally solved the issue by entering the folder that contains the .vbs script as the "start in" folder for the scheduled task. This said, there is no way to set up the "start in..." value from schtasks without using an XML definition of the tasks. XML definitions don't work in Windows 2003, so I would have to add windows version detection to the installer, additional testing, etc (I'd like to avoid this if at all possible). The only atypical thing I noticed about the install is that the system is installed in D:\ as opposed to the default C:\Program Files (x86)\, but I don't see how this would matter. All the paths are absolute in all the scripts. Can anyone suggest a reasonable solution for this?

    Read the article

  • How to use process monitor to view or log a windows login?

    - by leeand00
    We're having some issues with Windows 7 Roaming profiles and I was reading here that the login process can be monitored using process monitor. "There are a couple of ways to configure Process Monitor to record logon operations: one is to use Sysinternals PsExec to launch it in the session 0 so that it survives the logoff and subsequent logon and another is to use the boot logging feature to capture activity from early in the boot, including the logon." How does one do either of these options using process monitor to find out what is happening during a user login?

    Read the article

  • How to run a restricted set of programs with Administrator privileges without giving up Admin acces (Win7 Pro)

    - by frLich
    I have a shared system, running Windows7 X64, restricted to a 'standard user' with no password. Not everyone who has access to the system has the administrator password. This works rather well, except for some applications - specially the unlock-applications for encrypted hard drives/USB flash drives. The specific ones either require Administrator access (eg. Seagate Blackarmor) or simply fail without it -- since these programs are sending raw commands to a device, this is to be expected. I would like to be able to add the hashes of these particular programs to a whitelist, and have them run as administrator without needing any prompts. Since these are by definition on removable media, I can't simply use a filename or even a path. One of the users who shares the system can be considered 'crafty', so anything which temporarily grants administrator rights to an user account is certain to cause problems. What i'd like to be able to do: 1) Create an admin account that can only run programs from a whitelist (or, failing that, from a directory) I can't find a good way to do this: As far as I can tell, SRP applies equally to ALL users? Even if I put a "Deny" token on all directories on the system, such that new directories would inherit it, it could still potentially run things from the mounted USB devices. I also don't know whether it's possible to create a new directory that DOESN'T inherit from the parent, that would lake the deny token, and provide admin access. 2) Find a lightweight service that will run these programs in its local context Windows7 seems to block cross-privilege level communication by default, and I haven't found such for windows 7. One example seems to be "sudo" (http://pages.cpsc.ucalgary.ca/~nfriess/sudo/) but because it uses a WLNOTIFY hook, it won't work under Vista nor Windows7 Non-Solutions: - RunAs: Requires administrator password! (but everyone calls it "sudo" anyway) - SuRun: From Google: "Surun uses its own Windows service that adds the user to the group of administrators during program start and removes him automatically from that group again"

    Read the article

  • Why is the Active Directory security setting for "Write Personal Information" automatically reset?

    - by Holistic Developer
    In my Small Business Server 2003 environment, I would like to be able to have users manage their own delegate permissions for their Exchange mailboxes. By default, the Outlook delegate feature will not work unless I go to the user object in Active Directory and grant Allow on "Write Personal Information" to SELF. This will work temporarily, but something seems to reset this value shortly afterword. What would cause this automatic reset?

    Read the article

  • How can I configure desktop notification display time in Google Chrome?

    - by netvope
    Recently Gmail introduced an HTML5-based desktop notification feature for Google Chrome users (see this). It's very useful, however, the notifications disappear too quickly (in about 5 seconds) and I couldn't find a way to change the display time. Ideally, I would like the notification to stay for a few minutes if there is no user activity (or about 15 seconds if there is user activity). Is that possible?

    Read the article

  • Small Business Server 2011 and Remote access to documents

    - by Tim Long
    Assume I'm working away from the office; its a hotel computer Windows 7, Office 2010 and fast - so the best possible conditions. Using Companyweb - Every time I open a document, I have to go through the logon process - seems odd to have to do that. Is this a 'by design' feature or is something wrong with my configuration? When I do open the documents, are they being stored somewhere locally and should I be looking to delete on this computer - or are they in a temporary file?

    Read the article

  • Potential impact of large broadcast domains

    - by john
    I recently switched jobs. By the time I left my last job our network was three years old and had been planned very well (in my opinion). Our address range was split down into a bunch of VLANs with the largest subnet a /22 range. It was textbook. The company I now work for has built up their network over about 20 years. It's quite large, reaches multiple sites, and has an eclectic mix of devices. This organisation only uses VLANs for very specific things. I only know of one usage of VLANs so far and that is the SAN which also crosses a site boundary. I'm not a network engineer, I'm a support technician. But occasionally I have to do some network traces for debugging problems and I'm astounded by the quantity of broadcast traffic I see. The largest network is a straight Class B network, so it uses a /16 mask. Of course if that were filled with devices the network would likely grind to a halt. I think there are probably 2000+ physical and virtual devices currently using that subnet, but it (mostly) seems to work. This practise seems to go against everything I've been taught. My question is: In your opinion and  From my perspective - What measurement of which metric would tell me that there is too much broadcast traffic bouncing about the network? And what are the tell-tale signs that you are perhaps treading on thin ice? The way I see it, there are more and more devices being added and that can only mean more broadcast traffic, so there must be a threshold. Would things just get slower and slower, or would the effects be more subtle than that?

    Read the article

  • windows 8 recovery partition

    - by Rafik Takieddin
    Recently I have bought a second hand HP Notebook from a friend. The PC still has the recovery partition not backed up yet. However, I'm thinking of resetting Windows using the new Windows 8 resetting feature. Windows warned me that all files will be deleted. Is it okay to reset Windows then backup the recovery partition in order to have a fresh backup or this can lead to losing the recovery partition and, with it, my genuine copy of Windows 8?

    Read the article

  • What's a lightweight alternative to Word / Writer? [closed]

    - by vemv
    I'm looking for a desktop, cross-OS, Word/Writer-like program (this is, that lets the user format the content, as opposed to source code editors) without all the feature bloat + performance overhead I'd get with an office suite. Ideally, most of its features would be focused on: the text editing itself - clever replaces, indentation control, etc, and separating the content from its presentation, à la HTML/CSS. Which programs match these features?

    Read the article

  • How can I get "Calculated Columns" to work in excel?

    - by Shawn Persels
    Using Excel 2010, I want a single formula to apply to all cells in a column. I see documentation for a feature called "Calculated Columns". That is exactly what I want, but when I follow the instructions I only end up creating a formulate in a single cell - not the whole column. I don't want to use "Fill" or "Copy" because the number or rows in the sheet changes periodically and maintaining the formulas would be very tedious.

    Read the article

  • is it possible to synchronize the states of TCP proxies in real time (for real-high-availability of SLB)?

    - by Song
    Consider that there are two server load balancers working in the tcp proxy mode (e.g., for L7 load balancing). Is it possible to synchronize their states in real time so that they can be a backup for each other? in case that one is down, the other still has all necessary states to uninterruptedly support all existing TCP connections. I understand that this is hard, but I am wondering whether any free/commercial LB already supports this feature. Thank you!

    Read the article

  • Naming PCs on a mixed hosts home network.

    - by Chris Becke
    I have a home network comprising an Apple iMacs and a Windows 7 PCs - using the internet connection sharing feature on the Windows 7 PC to share the internet connection with the iMac. I have configured the hostnames on each pc so, running hostname on the Windows 7 box says "windows7" and on the iMac says "apple", but, if I try and "ping apple" from Windows 7 or "ping Windows7" from the iMac they can't resolve. what do I need to do to get this 'simple' level on connectivity working?

    Read the article

  • How to create a link to a different part of a sheet ?

    - by ldigas
    Is there an excel feature that enables you to create a link to a different part of a sheet so you don't have to scroll down ... wherever, to get there ? I have about 2000 tables in one sheet, and some "table of contents" listing all the tables. I'd like to create a link from the table of contents to the appropriate table (it's all within the same sheet). Is something like that possible ?

    Read the article

  • Translate tool or extension for Google Chrome

    - by Stan
    OS: windows XP SP3 For: Google Chrome Is there translate tool/extension that can translate word or look up dictionary? Desired feature: - a keyboard shortcut to toggle translation, so it might be mouse over the word or select the word and press for example F2 key to pop the translation. - (optional) the translation should shows in a bubble window Thanks.

    Read the article

  • VPN says connected but cannot ping tunnel ip

    - by Owl
    I have a VPN set up on a Symantec Gateway 320 and the status of the VPN is connected but the feature it provides is not working which means it is not actually connected..The only way to test it other than trying to use it in the program that utilizes it is to ping the remote subnet IP we use. mask numbers match, no settings have been changed it just stopped working.

    Read the article

  • Does the Acer Ferrari One support hardware assisted virtualization?

    - by cmeerw
    Does anyone know if the Acer Ferrari One supports hardware assisted virtualization (it should easy to find out by running Microsoft's Hardware-Assisted Virtualization Detection Tool on that machine). There is lot's of speculation around the web, but I haven't found a definitive answer yet (and would like to confirm that this feature will be working before buying one).

    Read the article

  • Old network login passed to IIS

    - by 300 baud
    Let me start by saying that I am not a server guy - I am a developer. But I develop and manage an ASP.NET application that uses Windows authentication. I've run into the problem I am about to describe before, and I would just like to understand how to remedy it since I am the one who always gets the original support request. A user, let's call her JaneDoe, has just gotten married and her login has been changed to JaneJones. We have an application that uses Windows authentication to store the user's login name to a table and then redirects the user to another non-Windows authenticated site with a GUID which points to the table entry we just made. When the user reaches the second site, we read in the login name from the database using the GUID that was passed. Then, we look up the login name in another database where we track application permissions. The problem is that the user is logging into her workstation as JaneJones, but the Windows authenticated site is still receiving a login name of JaneDoe. Is this a domain controller issue? Is it a workstation issue? What's the best way to resolve this?

    Read the article

  • Multiline select in notepad++

    - by capnhud
    In sublime text if I perform a find for an occurrence of a particular word not only is this occurrence found but it also selected and has the cursor at the end of each occurrence so that pushing the right arrow key the cursor will move the cursor to the beginning of each occurrence simultaneously so that I can perform whatever operation I wish on all the selections. Does notepad++ have something similar to this feature? I know that I can multi-line select by Ctrl+ mouse click, but I just wanting to know of an automated so to speak way of doing this in notepad++

    Read the article

  • Do I need a SMTP server for my domain to receive email?

    - by ashkanr
    my domain has a domain extension that since my country is not supported by Google Apps I can't use that lovely GApps services for that domain. I need free email service of GApps the most, so I decided to give a go to "Send mail as" feature of a regular Gmail account and add my domain emails to that personal Gmail. I have a question: Do I need a SMTP server for my domain to receive email from others? Thanks in advance :)

    Read the article

< Previous Page | 169 170 171 172 173 174 175 176 177 178 179 180  | Next Page >