Search Results

Search found 29588 results on 1184 pages for 'really'.

Page 232/1184 | < Previous Page | 228 229 230 231 232 233 234 235 236 237 238 239  | Next Page >

  • How can I run a macro in OpenOffice for each record?

    - by Georg
    I'm trying to insert a different picture for every created letter. I can only use text mail merge fields, images aren't really supported as far as I can see. Now I'm trying to add this functionality using a macro. Is there an event that is triggered each time before the page is frozen and the next record gets processed?

    Read the article

  • Drawing lattices online

    - by lavabo
    This isn't really a programming question but... Is there any way to draw online a lattice for a material, like a compound? i.e. a 3D gridlike pattern? I know there are some applications for drawing mathematical lattices, but the notation to me is unfamiliar - are there simply programs or applets or something for drawing lattices like in a compound?

    Read the article

  • How to configure an isa server to allow a OPENvpn client to connect to an outside server?

    - by rmarimon
    I'm trying to configure an ISA server (not really my area of expertise) to allow an openvpn client (in the lan) access to an outside openvpn server (in the wan). The openvpn configuration I'm using has worked everywhere. In fact if I take the client outside the lan where the isa server is located, it works perfectly. Inside the isa server lan nothing. The question is what configuration do I need to put on the isa server to allow openvpn traffic to go through?

    Read the article

  • Linux ubuntu wubi

    - by Jamaica Bob
    I would like to install linux ubuntu next to my primary windows 7 OS. I found that wubi ubuntu installer which helps you with simple installation/uninstallation of ubuntu. But the wiki says that wubi uses a virtual disk. Is that similar to virtually running the OS? I really dont want my primary system to slow down because of that. Should i rather go with the classical dual boot? If WUBI, whats the recommended install size? Thanks

    Read the article

  • Using google apps mail with my existing gmail account

    - by Barney White
    Please help!, Here is my situation: I've been doing business using my current gmail address ([email protected]) and really wanted my mail address to read [email protected], so i looked into google apps. It says you can set up custom emails with your domain name, achieving the above goal, but how do i configure these addresses to run through my CURRENT gmail account? I have everything pretty well set up, and it would be very time consuming to effectively start again...Any help would be greatly appreciated. Many thanks. Barney

    Read the article

  • Remove c:/windows/syswow64/msxml4.dll

    - by Rolf
    A program has installed c:/windows/syswow64/msxml4.dll on my hard drive. Sadly this is an old version (4.30.2100.0) with a security problem therefore I really wants to remove the file and the program that installed it. MSXML4 is not in the list of programs that I can uninstall under "Programs and features". Is there a way to find the program that installed it in windows 8.1? Hope some of you can help.

    Read the article

  • Virtual PC with Multi Monitors

    - by user41013
    Hi I have recently intalled Virtual PC and was wondering if it possible to make use of both of my monitors with it. I have managed to get a pseudo multi screen effect by connecting using Remote Desktop connection, but this isn't really what i wanted. Is this possible? Thanks

    Read the article

  • Virtual PC with Multi Monitors

    - by user34710
    Hi I have recently intalled Virtual PC and was wondering if it possible to make use of both of my monitors with it. I have managed to get a pseudo multi screen effect by connecting using Remote Desktop connection, but this isn't really what i wanted. Is this possible? Thanks

    Read the article

  • Any Free/Opensource billing+timetracking software?

    - by Ian
    I'm looking for a free or even better opensource alternative to many billing sites like GetHarvest.com, Freshbooks.com, Cannybar, The Invoice Machine and stuff like that. Is there any free or open source system that does that? I've looked into SimpleInvoices but it's not really what I'm looking for. Does anyone know of any alternative? Thanks

    Read the article

  • batch file infinite loop when parsing file

    - by Bart
    Okay, this should be a really simple task but its proving to be more complicated than I think it should be. I'm clearly doing something wrong, and would like someone else's input. What I would like to do is parse through a file containing paths to directories and set permissions on those directories. An example line of the input file. There are several lines, all formatted the same way, with a different path to a directory. E:\stuff\Things\something else (X)\ (The file in question is generated under Cygwin using find to list all directories with "(X)" in the name. The file is then passed through unix2win to make it windows compatible. I've also tried manually creating the input file from within windows to rule out the file's creation method as the problem.) Here's where I'm stuck... I wrote the following quick and dirty batch file in Windows XP and it worked without any issues at all, but it will not work in server 2k8. Batch file code to run through the file and set permissions: FOR /F "tokens=*" %%A IN (dirlist.txt) DO echo y| cacls "%%A" /T /C /G "Domain Admins":f "Some Group":f "some-security-group":f What this is SUPPOSED to do (and does in XP) is loop through the specified file (dirlist.txt) and run cacls.exe on each directory it pulls from the file. The "echo y|" is in there to automagically confirm when cacls helpfully asks "are you sure?" for every directory in the list. Unfortunately, however, what it DOES is fall into an infinite loop. I've tried surrounding everything after "DO" with quotes, which prevents the endless loop but confuses cacls so it throws an error. Interestingly, I've tried running the code from after "DO" manually (obviously replacing the variable with the full path, copied straight from the file) at a command prompt and it runs as expected. I don't think it's the file or the loop, as adding quotes to the command to be executed prevents the loop from continuing past where it's supposed to... I really have no idea at this point. Any help would be appreciated. I have a feeling it's going to be something increadibly stupid... but I'm pulling my hair out so I thought I'd ask.

    Read the article

  • Show full process name in top

    - by Ben K.
    I'm running a rails stack on ubuntu. When I ps -AF, I get a descriptive process name set by the apache module like 00:00:43 Rails: /var/www... which is really helpful in diagnosing load issues. But when I top, the same process show up simply as ruby Is there any way to get the ps -AF process name in top?

    Read the article

  • Domain: Netlogon event sequence

    - by Bob
    I'm getting really confused, reading tutorials from SAMBA howto, which is hell of a mess. Could you write step-by-step, what events happen upon NetLogon? Or in particular, I can't get these things: I really can't get the mechanism of action of LDAP and its role. Should I think of Active Directory LDS as of its superset? What're the other roles of AD and why this term is nearly a synonym of term "domain"? What's the role of LDAP in the remote login sequence? Does it store roaming user profiles? Does it store anything else? How it is called (are there any upper-level or lower-level services that use it in the course of NetLogon)? How do I join a domain. On the client machine I just use the Domain Controller admin credentials, but how do I prepare the Domain Controller for a new machine to join it. What's that deal of Machine trust accounts? How it is used? Suppose, I've just configured a machine to join a domain, created its machine trust, added its data to the domain controller. How would that machine find WINS server to query it for Domain Controller NetBIOS name? Does any computer name, ending with <1C type, correspond to domain controller? In what cases Kerberos and LM/NTLM are used for authentication? Where are password hashes stored in, say, Windows2000 domain controller? Right in the registry? What is SAM - is it a service, responsible for authentication and sending/storing those passwords and accompanying information, such as groups policies etc.? Who calls it? Does it use Active Directory? What's the role of NetBIOS except by name service? Can you exemplify a scenario of its usage as a "datagram distribution service for connectionless communication" or "session service for connection-oriented communication"? (quoted taken from http://en.wikipedia.org/wiki/NetBIOS_Frames_protocol description of NetBIOS roles) Thanks and sorry for many questions.

    Read the article

  • can i find the web hosting company from an ip address ?

    - by ufk
    Hiya. i really hope this question suites serverfault, if not my apologies! I have an ip address, is there a way to find the web hosting service that this ip address belongs to ? I tried using whois and traceroute but no luck so far. the case is that my friend bought a domain and storage several years ago and he can't remember where he bought the storage from. thanks!

    Read the article

  • How safe is the quicken encryption of files?

    - by jmvidal
    Quicken has a password-protection option where you type in a password and your file is encrypted. How good is this encryption and how does it depend on the length or complexity of my password? A google search reveals a lot of "quicken password recovery" programs, like this one, which make me feel like the password is just for keeping the really dumb criminals away, not the ones with large computers.

    Read the article

  • Conferences to go to 2011 Edition

    - by Zypher
    It's that time of year to start thinking about what conferences we want to beg,plead,borrow and steal to get to go to this year. We all like a good conference, but are generally limited in the funds available to go to them - if we are provided any - so we need to be at least a little picky. What are the conferences that you are really excited about this year, and what tracks do you think will be the most beneficial to a sysadmin?

    Read the article

  • Cassandra on heterogeneous servers

    - by happy-coding
    I am currently running 4 cassandra nodes with the following hardware in a Apache Cassandra cluster: AMD Athlon 64 X2 6000+ 8G RAM 750G hard disk It shows not such a good writing performance and a really bad read performance with sometimes also timeouts. I was wondering if it makes sense to add 2 nodes with a different hardware (8 CPUs and more RAM) to improve this. Or does a cassandra cluster works best with the same hardware in every node? Thanks & best regards

    Read the article

  • What are the popular file indexing engines on Linux?

    - by netvope
    It would be nice if you can share your experience on the pros and cons of each of them. Personally I only know Google Desktop and Beagle, and I haven't really used them. I mainly store my files on Windows (and use its integrated indexed search) but I'm trying to see if I can switch over to Linux. Also, can any one of the search indexer run without X? Does any of them provide an API for search queries?

    Read the article

  • Gmail Alternative

    - by Shishant
    Hello, I am looking to move from gmail to another email service provider because I am concern with privacy and I dont trust google after watching few videos on youtube. Is there any desktop or web based alternative that does this things: Threaded messaging like in gmail? In mail translation (If threaded messaging is really good then I can opt it out) Thank You.

    Read the article

  • Why is GPU used for mining bitcoins?

    - by starcorn
    Something that I have not really grasped is the idea of bitcoins. Especially since everybody can mine for it using a powerful GPU. I wonder why is GPU used for this purpose? Is the work done by GPU used by some huge organization or is it just wasted resource that goes into simulated mining? I mean for example SETI uses your GPU for the purpose of finding aliens, but what I can see of bitmining it seems for no actual purpose than wasted resource.

    Read the article

  • Script shutdown a computer with gpo

    - by user31568
    Hello everybody I have windows server 2003 domain and windows xp workstation. it is necessary that at 6.00 pm on computer was displayed a window (Do you really want to shutdown a computer and Yes/no button).If user click Yes or ?xpired 5 minutes computer shutdown, else user click No than appears after an hour window will display again.

    Read the article

< Previous Page | 228 229 230 231 232 233 234 235 236 237 238 239  | Next Page >