Search Results

Search found 11331 results on 454 pages for 'resource monitor'.

Page 203/454 | < Previous Page | 199 200 201 202 203 204 205 206 207 208 209 210  | Next Page >

  • Identify Deprecated Rules on Checkpoint Firewall

    - by Basa
    I've been asked to find the deprecated rules among the thousands of rules in our Checkpoint firewall. I could do it by writing a perl program to analyze the log and lists of objects & rules, but i wanted to know if anybody knows of an easier way before reinventing the wheel. I have access to SmartView Monitor et SmartView Tracker and i wanted to know if anybody knew of a way to achieve my goal with those tools.

    Read the article

  • Windows 7 freezing after returning from idle.

    - by myname
    If i return to my windows 7 x64 computer after it has been idle for a couple of minutes it will respond for 3 seconds and after that everything freezes for around 5-30 seconds and then the computer starts working normally again. The freezing time varies and some times it even get stuck there forever requiring a hard reboot. This is very annoying as you can imagine, it's almost as slow as resuming from hibernation every time you left it idle enough to turn off the monitor.

    Read the article

  • Looking for Hard Drive Health Monitoring software

    - by RandyMorris
    I am aware that the current standard method of drive redundancy and backups would be a better solution, but I would be interested if there was a software that could be installed on workstation computers that could monitor hard drive health and give a warning if the drive looks like a failure is imminent. I have tried hdd health but it does not give me very useful information. I am not interested in drive space, just want a heads up before a drive failure. Anyone know anything like this?

    Read the article

  • Unix bidirectional pipe on commandline

    - by John W
    I've been able to use this linux command to connect Netcat to a serial port: nc -l 80 <> /dev/ttyS0 I would like to be able to log this transaction. My backup plan is to use Wireshark to monitor the netcat stream, but ideally I'd like to do something like this: cat /dev/ttyS0 | tee upstream.bin | nc -l 80| tee downstream.bin | /dev/ttyS0 This tries to open ttyS0 twice and therefore throws a permissions error. Does anyone know a smarter way to do this?

    Read the article

  • run a 2nd computer as an extra processor

    - by MMK
    I have a laptop with a busted l.c.d., but otherwise works fine with an external monitor. I was wondering if it is possible to connect it to my main pc as an extra processor(main pc is getting old, it's only single core processor) and if so how? I currently have them connected with a network cable so that I can access the laptop's hard drive but would like to use it to give my pc a bit more power. Both my pc and my laptop have 2 gb ram and are running windows vista sp2

    Read the article

  • Enabling Squid delay pool eats up the entire memory

    - by Supratik
    I am using "squid-3.1.8-1.el5" in my CentOS 5 32 bit system. In normal condition Squid uses 85m - 90m, but when I enable the delay pool parameters the memory usage suddenly rise up 2GB. The memory keeps on increasing until the system is out of resource. The following are my delay pool settings: delay_pools 1 delay_class 1 1 delay_access 1 allow all delay_parameters 1 192000/192000 Is there anything I am missing here or is it a bug with Squid ?

    Read the article

  • Disable the "smoke" in SmokePing for multihost

    - by Tuinslak
    Hey, I'm running SmokePing to monitor the latency to several machines. I have been playing around with the multihost feature, allowing me to draw stats of multiple machines in one graph. However, on the details page, smoke is being drawn as well, resulting in this: Is there a way to disable this? As it makes the graph pretty much unreadable. Smoke is enabled for the stats per server, so it's duplicated data here.

    Read the article

  • Running Virtualbox as a Transparent Bridge

    - by Goats
    I am setting up Untangle in a Sun VirtualBox VM. I plan on using this machine as a transparent bridge to filter and monitor traffic on my network. I'm not sure how to configure the network adapters for the virtual machine under the Virtualbox's "Devices" menu so that it will function as a transparent bridge. I guess what I'm asking is, should both adapter 1 & 2 be set as Bridged adapters or what? Any help is greatly appreciated.

    Read the article

  • Performing task on remote window server 2003 machine

    - by Vaibhav Jain
    I have to perform various task such as restarting process, monitor process state check disk space, log monitoring on Window server 2003 machine. For this i am using remote desktop access which is very slow. Is there any alternate (Tool or Framework) for windows server where i can execute my script on my machine and the required task will be performed on the remote machine in somewhat interactive manner (like putty in linux)

    Read the article

  • Desktop icons change size and are aligned to the left after restart

    - by jQuerybeast
    I am trying to keep the icons size and position to the place where I've shutdown my computer. That is: Keep desktop icons to the right and at a small size. When I restart my computer, the get a medium size and are all aligned to the left. Note: Align icons on grid UNCHECKED Auto arrange icons UNCHECKED When I create a new account I dont have this problem Cleared registry with CCleaner Uninstalled all Intel Graphics Accelerator Windows updated I use only 1 monitor

    Read the article

  • Why is iTunes using so much data?

    - by George
    I've been told by my ISP I'm using too much bandwidth so after using Activity Monitor to see that I'm using ~2GB a day I've used the nettop command line utility to work out where. Turns out it's iTunes. I don't use it for downloading/streaming music (other than podcasts of which I definitely don't have 2GB of new ones a day) or movies. What is iTunes doing? This is on a late 2009 MacBook running Lion 10.7.5 with iTunes version 10.7

    Read the article

  • Looking for spam mails.

    - by apalsson
    I am looking for a bundle of spam mails to use with my experiments with Bayesian spam filtering. Is there any resource for this or does anyone have a bundle to share with me? Something around 4-6gb zip:ed would be a nice start. Feel free to filter out your own email-address, though this is for personal use and it won't be shared with anyone. Thanks.

    Read the article

  • VirtualBox without X server

    - by nccc
    I want to run a guest operating system under a Linux host with VirtualBox, but I don't want to run from within X. I don't want a headless configuration, I don't want to run VirtualBox in the background, I don't want any remote protocols. I just want the guest OS to take control of my console (keyboard, mouse and monitor) and render to the framebuffer directly, not from within an X window. Is this possible?

    Read the article

  • Can a PCI Graphics card, and AGP be used together?

    - by Everyone
    The question pretty much says it all. I use an old 845GBV board ( to-date reliant upon the integrated graphics processor ). All slots on the board are unused. Lately I've been thinking in terms changing it to a dual monitor so that I can use one console for documentation/help/sample code/whatever, the other one to play with code. Assuming this board can handle a PCI GPU, can an AGP4x board coexist with a PCI GPU?

    Read the article

  • sudoers entries

    - by Pochi
    Is there a way to have a sudoers entry that allows executing of only a particular command, without any extra arguments? I can't seem to find a resource that describes how command matching works with sudoers. Say I want to grant sudo for /path/to/executable arg. Does an entry like the following: user ALL=(ALL) /path/to/executable arg strictly allow sudo access to a command exactly matching that? That is, it doesn't grant user sudo privileges for /path/to/executable arg arg2?

    Read the article

  • Why does xvid encoding lag/lock up windows 7?

    - by acidzombie24
    It seems to encode just fine so you can see the results http://www.sendspace.com/file/msku4q If you look at the mouse cursor you'll see firefox locks up once i click it. Calculator seems fine but when i try to move it, it locks up. The resource monitor and task manager are up so you can see if the CPU is being used up. It isnt as you can see <30% was used.

    Read the article

  • Netgear NV+ resize volume for snapshots

    - by kurresmack
    Hey! I have a Netgear NV+ that I want to setup snapshots on. As I do not have any space allocated for ths I just wanted to check what will happend to my data if I allocate space for snapshots? I could not find any resource for this on google which makes me to belive that no data is affected but just wanted to make sure that there is no foramt!

    Read the article

< Previous Page | 199 200 201 202 203 204 205 206 207 208 209 210  | Next Page >