Search Results

Search found 73376 results on 2936 pages for 'set based'.

Page 236/2936 | < Previous Page | 232 233 234 235 236 237 238 239 240 241 242 243  | Next Page >

  • How to reference a cell in a external excel file based on a variable?

    - by Totty
    Hy I have a Excel File (a) and a cell into it that is equal to another cell in another file (b); The of the (b) excel file is "2010 something"; Now The cell (c) is ='[2010 something.xls]test'!$K$224 What I want is to make a variable that mantains the year and will be stored into a cell Then the cell (c) will change its reference based on the year; So in 2011 instead of looking for the 2010 something.xls will be looking for the 2011 something.xls How to do it? thanks

    Read the article

  • Minimalistic flatfile-based "wall" PHP app with authentication and RSS?

    - by Nicolas Raoul
    I am looking for an open-source minimalistic "message board" PHP software. Not a forum, more something like one simple facebook wall. The only thing a user can do is post a new message. With RSS, and able to run on flat files (no database) with Apache+PHP Authentication based on a configuration file, no management UI needed. For now I use this software, but it lacks RSS: http://nrw.free.fr/data/projects/pano/demo/index.php?pano=ifc Anyone knows a software that matches my description? Thanks! Usage: communication between my family's 5 members living on different continents.

    Read the article

  • How to set file associations and explorer options in one go?

    - by jokoon
    This has been itching me for quite a long time. When I come on a new computer with any version of Windows, I need to: un-hide file extensions set explorer default view to list instead of icons set the file extensions like h c cpp so they don't open Visual C++ (which can take up to 20 seconds!) each time I double click on them, opening them with something like Notepad++ instead. Isn't there some program to quickly set thoses options to something I want, like some standalone exe, or some generic registry file I can execute when I come on a new machine? I'm a developer and I can't believe I'm wasting so much time on those &*$%@# things.

    Read the article

  • How *NAT* was Implemented in Home Based Routers ? [closed]

    - by Sumit Arora
    Different Types of Home-Based Routers Exist, and those routers provide NAT Feature as well e.g; and most of them are Port Restricted. Q-1 : What kind of Base Softwares Manufactures use to develop NAT Functionality ? Q-2 : Is that Technology Proprietary ? Or some Open-Source used to develop that e.g; Firehol ? Q-3 : I am looking for a software which works exactly like a NAT,and by doing very basic configuration it should work either Symmetric NAT, Port Restricted NAT or Address Restricted NAT ? So that I can test some of my Network Application which are dependent on NAT via this way on same PC ? e.g; I can test my developed ICE Algorithms

    Read the article

  • DFS: Error creating domain-based namespace "The namespace cannot be queried. The RPC server is unavailable."

    - by Scolytus
    I try to create a domain-based namespace but when I hit "next" on the "choose type wizard page" I get the message: The namespace cannot be queried. The RPC server is unavailable. I found one article regarding this problem, and indeed the DNS resolution of the DomainDNSName was flawed. But although I fixed this DNS issue, I still get this message. A stand-alone namespace can be created. Any ideas how to solve this problem? Is it possible that this is related to the fact that I'm using a single-lable domain name?

    Read the article

  • How to calculate required switch speed based on network usage?

    - by tobefound
    I have a 48 port HP Procurve Switch 2610 (J9088A) that can handle 13.0 million PPS (packets per second) and features wire speed switching capacity at 17.6Gbps. First off, what does that REALLY mean? Where do I start when trying to figure out if my office (with 70 employees) will be well setup with this switch? How to calculate through-put based on a user average load of X MB per day? 90% of the folks will only be sending email, access random websites, etc... the other 10% will be conducting heavier tasks like moving image files (10 MB) across network shares, constant external FTP streams through the switch to a server etc... Is this switch good enough?

    Read the article

  • What happens when router has been set to incorrect time?

    - by iamrohitbanga
    I have a D-Link router for my home Wi-Fi network. Everyday at least once the internet suddenly goes down. I am simply not able to connect to the Wi-Fi network. If I just restart the router, it starts working. To debug the issue I logged into the admin panel and noticed the time was set to something in 2002. I have set it to the correct time. Will wait to see if that fixes the problem. In the meanwhile I want to know what can go bad when the router has been set to show an incorrect time? What are the kinds of problems expected? My Wi-Fi was working just fine most of the time, but sometimes it lost the connection. Could this be linked to the incorrect time setting?

    Read the article

  • Is there a good way to wrap an existing Python based web application to require a login?

    - by Jonathan B
    I'm in the process of installing an open-source Python based web application to an internal server here at work. The existing code is open - it doesn't require a login to view it - but one of the requirements is that users have to be approved before they can see anything. Is there a good way (using Apache configuration files for example, but any method would be great) to wrap the application so that any access requires a login? I would like to avoid modifying the open-source code (a maintenance nightmare every time a new release comes out). Any thoughts or suggestions?

    Read the article

  • How to set the network profile of Windows 7 via group policy?

    - by Ricket
    We are deploying client computers and in testing noticed that the first time the user logs into the computer, it asks them if the location is a home, work, or public location. We are worried that some users in our workplace might misread it (or not read it at all) and click Public, thus likely denying our access to the computer and messing up security settings and such. Can we set our network to be a "Work Network" location via group policy or some other mechanism of our Windows Domain so that the user is not prompted when connected to our network? Also these are laptops, so we don't want every network they connect to be set as work network, and we have several access points (wired and three wireless) which our users often switch between so I'm not yet sure if it reprompts with each access point but I have the feeling it will, and I would like all of these to be set to the Work profile type.

    Read the article

  • how to clone a physical "individual partition" vmdk into a "local" (file-based) vmdk?

    - by BJH
    Hello. I have a physical disk with a small (60GB) partition containing my guest OS. The physical disk also contains a large (240GB) block of unpartitioned space. My vmdk is defined as a physical "individual partition". I want to convert the source physical "individual partition" vmdk into a local (file-based) vmdk. The command - vmware-vdiskmanager -r sourcevmdk targetvmdk -t 2 creates a 300GB vmdk that includes both the desired 60GB "individual partition" and the 240GB of useless unpartitioned space ! How can I create a local vmdk with just the individual partition?

    Read the article

  • Is it possible to set up rule in Outlook 2010 based on message class?

    - by BFDatabaseAdmin
    I recieve all the undeliverable reports for mailings sent from my company. Moving and cataloguing them can take a while, and it would be handy if I could create a rule that did that for me. The most robust way of doing this would seem to be to run a rule based on the Undeliverable message class. However, I can't see message class as an option anywhere in the advanced rules wizard, and Googling it is no help. EDIT: I already have a rule that searches for "Undeliverable" in the subject header of emails received and moves them, but this only affects traditional emails (i.e. those with a message class of "Message") and ignores actual undeliverable reports. Am I missing something obvious, or can this not be done?

    Read the article

  • How to register a new domain name on a windows based domain controller?

    - by JL
    Is there an easy and quick way I can create a new subdomain on a windows based domain controller. My primary domain controller is also my primary DNS server on my network. I want to create a subdomain and have its ip directed to that of my IIS server. Thanks in advance... Sorry if my terminology is somewhat lacking... My domain is companyName.com What I want to do is create auditingResults.companyName.com... and have it route to 192.168.1.3 for example..... where on 1.3 I will have an IIS server presetup. Please feel free to leave comments to correct my terminology if required....

    Read the article

  • Windows updates behind a physical firewall with only IP based rules and generic outbound connections are turned off

    - by user125245
    I have some boxes that I do not want to allow any in or outbound traffic to the internet Except for windows updates. However the fire wall in place (Cisco ASA) apparently only supports ip based rules. As best I can tell access to Microsoft updates via anything other then the half dozen URL masks the Microsoft lists as needed does not appear possible. I have kicked around building a full WSUS that I would then manually copy the update files to so that no direct Microsoft access is needed but this sounds very top heavy for the very few boxes involved. I have also kicked around manual updates all around but am not certain how to be conveniently and confidently sure that the correct updates are being applied in the correct order. Any ideas from any direction would be appreciated. I want this as simple / cost effective as possible but have very little flexibility on the only absolutely required internet access policy.

    Read the article

  • How to set up Nginx as a caching reverse proxy?

    - by Continuation
    I heard recently that Nginx has added caching to its reverse proxy feature. I looked around but couldn't find much info about it. I want to set up Nginx as a caching reverse proxy in front of Apache/Django: to have Nginx proxy requests for some (but not all) dynamic pages to Apache, then cache the generated pages and serve subsequent requests for those pages from cache. Ideally I'd want to invalidate cache in 2 ways: Set an expiration date on the cached item To explicitly invalidate the cached item. E.g. if my Django backend has updated certain data, I'd want to tell Nginx to invalidate the cache of the affected pages Is it possible to set Nginx to do that? How?

    Read the article

  • What''s the "earliest" place one can set an environment variable during Linux boot process?

    - by amn
    I know I can set a variable in a shell startup file, but the thing is, I am trying to set up a POSIX-compatible environment, and a POSIX shell does not parse any startup files other than the one specified by the environment variable ENV. This presents a problem - currently my login starts the shell as bash, which I will try to replace with sh so Bash runs as POSIX shell - however then it will not parse the default startup files and I need ENV set to specify these. Which means as far as I understand that I need to specify ENV before login starts the shell, correct? Now, how would I do that? I hope my question is clear, if not I will gladly redact it.

    Read the article

  • How to set up Nginx as a caching reverse proxy?

    - by Continuation
    I heard recently that Nginx has added caching to its reverse proxy feature. I looked around but couldn't find much info about it. I want to set up Nginx as a caching reverse proxy in front of Apache/Django: to have Nginx proxy requests for some (but not all) dynamic pages to Apache, then cache the generated pages and serve subsequent requests for those pages from cache. Ideally I'd want to invalidate cache in 2 ways: Set an expiration date on the cached item To explicitly invalidate the cached item. E.g. if my Django backend has updated certain data, I'd want to tell Nginx to invalidate the cache of the affected pages Is it possible to set Nginx to do that? How?

    Read the article

  • How can I set a network connection as metered?

    - by Sam
    I would like to set a network connection as metered. I can't find how to do this; it seems to have changed in the upgrade from Windows 8 to 8.1. I tried following the steps in the official metered connection FAQ. However, when I open the connection, there is no Data Usage heading nor a Set as a metered connection option. I tried this on two different computers, both running Windows 8.1. I also tried doing this for both wireless and ethernet adaptors. Here's what the connection screen looks like. I've cropped the empty space from the image. How can I set the connection to metered?

    Read the article

  • How do I set up my home server to go directly to a port other than 80

    - by Kevin
    I'm using dyndns, a lynksis wt54g router, and tomcat 7 with spring to set up a web server. This is my first time to attempt this. I'm sure this is a very common question, but I don't know enough to find the answer after quite a bit searching. Dyndns is successfully forwarding to my ip. The main problem is, the router admin login is coming up when my url is used. I'm hosting my site on port 8080. I have port forwarding set up for port 8080 but my request times out when I attempt to use my url like this www.myurl1234.com:8080. I don't want users to have to type the port anyway. I also tried changing the management port to 82 and hosting on port 80, but I still get the router admin login when I use my url. Where am I going wrong? Can I set it up so that www.myurl1234.com goes straight to port 8080?

    Read the article

  • Excel - Dynamic reference based on the row I paste into?

    - by michaelmichael
    I have a simple, oft-used formula that I paste into spreadsheets I receive. It looks like this: =IF(AND(D8="COMPLETE",E8=""),A8,"") It looks in D8 for the word "COMPLETE" and checks that E8 is blank. If both conditions are fulfilled it grabs the contents of A8. It works fine. The only problem with this is that I don't always paste it into row 8. Every spreadsheet is different. I usually end up spending a few seconds making the formula fit the current spreadsheet I'm working on by dragging the cell references to the appropriate row. Hence, my question: Is there a way to make an absolute row reference based on whatever row I paste into? For example, if I paste the above formula into a cell in row 25, the formula would automatically look like this: =IF(AND(D25="COMPLETE", E25=""), A25, "")

    Read the article

  • How do I set my main monitor to a higher resolution?

    - by Sean
    My laptop monitor's native resolution is 1280x800 and it just isnt big enough for me. I tried to set the resolution higher, but my graphics card only showed options upto 1280x800, and I figured that was the max res my card would allow. I found a monitor out on the street a few days ago and its native resolution is 1024x768. I have been playing around with it a bit. I was looking under the resolutions for it, and I can set it upto 1400x1050, so apparently my card allows for more than 1280x800, so why can't I set my laptop monitor to higher?

    Read the article

  • How do I run a search query based on recipient in PowerShell for Exchange 2010?

    - by LucidLuniz
    I've tried to run the following commands but neither work and I'm not sure how I should setup the query. I tried to find a full list of available search strings but couldn't locate one online or using help. I did find the list here (http://technet.microsoft.com/en-us/library/bb232132.aspx#AQS) but it doesn't include the search queries I am looking for (based on the fact that it doesn't even list "Received:" which I know is an option because I use it all the time. Search-Mailbox -Identity -SearchQuery 'Received:' 'To:' -LogLevel Full –DeleteContent Search-Mailbox -Identity -SearchQuery 'Received:' 'Recipient:' -LogLevel Full –DeleteContent Thanks in advance!

    Read the article

  • Which browser is the most secure? (research and practically based)

    - by wag2639
    I was wondering which browser is the most secure today, Firefox, Internet Explorer, Chrome, or Safari on a Windows machine with the user running as a Power User/Administrator account. This is not a question about which browser is the best because its the most usable, but more of a question if asked for security, which browser is the most secure given an everyday user's experience (JavaScript, Flash, Ads, etc). Also, would the choice for most secure change if the user was running as a restricted user? To clarify, I'm looking for an answer that's based in research on potential and common exploits and how long it takes for critical problems to be patched.

    Read the article

  • Best cloud based IT Systems management services out there?

    - by Ryk
    Our startup organisation is growing fast in 2 different office locations. That brings new challenges and headaches. Our entire company is cloud based, and I am looking for a good product to manage our remote systems. Currently we do not have on-site AD servers, we are using the Windows Azure AD services, so cannot rely on group policies at this stage. I would like to be able to achieve the following: (they are all laptops) Remote Desktop Support Patch management Lock down software on machines (restrict them) Monitor and manage systems Other benefits would be good, but if I can achieve the ones listed above, it will go a long way. We have a combination of Windows 7 pro & Windows 8 & 8.1 machines. I am currently using Windows Intune, but it is really limited. Really just a glorified patch enforcer. Thank you in advance to your help.

    Read the article

  • Set one background to stretch across multi-monitor display?

    - by John Isaacks
    I have two monitors and my coworker has three. We were wondering if there was a way to set a single background image to stretch across all the monitors. Right now it's the same image but repeated, so it looks like the same image three times in a row. I would like it to be so that the three images/screens combine to show one image if that makes sense. If I can't set one image to stretch across the screens like that, is there a way to set a different background for each screen? Edit: I just wanted to clarify: I am not talking about one image stretching from his monitors to mine, just stretching across our own monitors.

    Read the article

  • Is it possible to redirect/bounce TCP traffic to an external destination, based on rules?

    - by xfx
    I'm not even sure if this is possible... Also, please forgive my ignorance on the subject. What I'm looking for is for "something" that would allow me to redirect all TCP traffic arriving to host A to host B, but based on some rules. Say host A (the intermediary) receives a request (say a simple HTTP request) from a host with domain X. In that case, it lets it pass through and it's handled by host A itself. Now, let's suppose that host A receives another HTTP request from a host with domain Y, but this time, due to some customizable rules, host A redirects all the traffic to host B, and host B is able to handle it as if came directly from domain Y. And, at this point, both host B and the host with domain Y are able to freely communicate (of course, thought host A). NOTE: All these hosts are on the Internet, not inside a LAN. Please, let me know if the explanation is not clear enough.

    Read the article

< Previous Page | 232 233 234 235 236 237 238 239 240 241 242 243  | Next Page >