Search Results

Search found 17771 results on 711 pages for 'dhcp option'.

Page 250/711 | < Previous Page | 246 247 248 249 250 251 252 253 254 255 256 257  | Next Page >

  • How do I set up an anonymous autoversioning mod_dav_svn server?

    - by Chris R
    I would like to create a DAV SVN server with autoversioning that has no access control of any kind. I experimented with several variations on this, but every one of them runs into this error in the end: "Anonymous lock creation is not allowed." So, as a fallback option I would like to configure my SVN Location to have default credentials. Is this possible? Is there a better way to do what I'm trying to do?

    Read the article

  • Bash or Zsh - which one and why?

    - by Andrew
    So, the question pretty much says it all. I'm on Snow Leopard, and I do a lot of web development, particularly in Rails 3 which makes heavy use of the console. I've seen some notable bloggers etc. mention Zsh as their preference over Bash, but I don't know what difference it would make. Could anyone give me a good comparison of what difference there is and what might make one prefer one option or the other? Thanks!

    Read the article

  • KeePass: use a key file or a regular password?

    - by RCIX
    I'm setting up a KeePass database and it offers the ability to use a key file, which it says is more secure because it can use a longer and more complex password but is easier to break because you only need the key file to open the database. I'll only be using the key file on 2 computers (one desktop and one laptop), wo which is the best option? Note that it's definitely more appealing to use the key file for me because i have a hard time remembering anything close to a random password.

    Read the article

  • Convert TIFF with Alpha Channel to PNG?

    - by Michael Stum
    I have a TIFF File that has a blue background and an Alpha Channel. I would like to save a PNG File which has the blue background transparent, using the Alpha Channel (because some pixels are not fully transparent) I use Photoshop CS5 Standard, but I haven't found an option there. I don't want to use the Magic Wand because it struggles with half-transparent pixels and because I do have a perfect Alpha Channel. Any ideas how this can be done?

    Read the article

  • Windows 7: Notification area settings are lost on restart

    - by Radio
    Recently noticed that my icons settings in notification area are getting reset on system restart. For example I specify Skype icon to always show icon and notification. After I restart Windows - it's hidden again. It's not just for one specific icon, it's for all of them. Checking box "Always shows icons and notifications" works, and all icons appear, but this is not an option. Please help. Thanks.

    Read the article

  • How to stop switchable graphics from switching to high-power GPU when charging the laptop?

    - by Saifallah
    I've an Acer laptop with Windows 7 64 bit and an ATI Radeon HD 6550M Graphics card. Whenever I connect the power to charge the battery it automatically switches to the high-power GPU (ATI) instead of the low-power (Intel) GPU. There's an option in the bios to stop such thing but it makes the GPU runs always on high-power and I can't switch to the low-power GPU. How can I prevent the switchable graphics from automatically using the high-power GPU when charging?

    Read the article

  • How to set Visio 2003 Trusted Locations

    - by Jon Fournier
    I see the option in Visio 2003 to only trust macros stored in trusted locations, but I can't find any way to set up what these trusted locations are. My problem is I have a template file that's not signed in the VBA project but the VBA project is locked (so I can't just sign it myself). So, there are only two ways I can stop the warning: lower my security settings so anything with macros will run (not a good idea) Tell Visio that the template is in a trusted location (if this is even possible)

    Read the article

  • Download Sun Studio via CLI

    - by ramesh.mimit
    Can anybody please guide me how to download the sun studio from CLI. I was using wget and lynx programs but not worked. As I have only SSH access to my server and I cant not download it on local machine and upload it on server, will be bad option for me as it will take hours to upload. Sun Studio download requires registration + authentication. I have both but not sure how to include those options while downloading via CLI.

    Read the article

  • Scanstate.exe Migration Error

    - by user1438147
    I'm trying to create a migration store on a server using Scanstate and this is the error I recieve: C:\USMTscanstate.exe \(Server_Name)\migration\mystore /f:migdocs.xml /f: migapp.xml /v:13 /f:scan.log Failed. An error occurred processing the command line. scanstate.exe \svdataitfl1\migration\mystore ##ERROR## -- /f:migdocs.xml /f migapp.xml /v:13 /f:scan.log Undefined or incomplete command line option ScanState return code: 11 I can't seem to find the answer to this...need some help.

    Read the article

  • How to get UAC to co-operate with synergy2

    - by Kimvais
    How do I get UAC to behave so that I can control the dimmed desktop and programs running under UAC grants with synergy client? (The kb and mouse are connected to a Linux machine, windows is running synergy client) Or is turning UAC off the only option?

    Read the article

  • Convert word to "JPEG-like" pdf file

    - by Chheang
    I've got a word document I'm trying to save to an uneditable, unselectable PDF file. Essentially, I'd like it to look like a JPEG, but in PDF format. I'm trying to avoid "printing to tiff, THEN printing to PDF." I'd prefer to go directly from Word to PDF. Additionally, I don't want to add a Password or anything. Does an option exist for this? Thanks!

    Read the article

  • Manage internet connection for a programm

    - by michel
    I'am using a Windows 7 pc with 2 networkcards one for public line and one for internal line behind proxy. is there a way or a software programm where i can manage wich programm(outlook, WM) use wich internet connection or networkcard use the option of interface metric is not where i was looking for. someone also suggest me Zonealarm. but i dislike this programm. thx

    Read the article

  • When running a shell script, how can you protect it from overwriting or truncating files?

    - by Joseph Garvin
    If while an application is running one of the shared libraries it uses is written to or truncated, then the application will crash. Moving the file or removing it wholesale with 'rm' will not cause a crash, because the OS (Solaris in this case but I assume this is true on Linux and other *nix as well) is smart enough to not delete the inode associated with the file while any process has it open. I have a shell script that performs installation of shared libraries. Sometimes, it may be used to reinstall versions of shared libraries that were already installed, without an uninstall first. Because applications may be using the already installed shared libraries, it's important the the script is smart enough to rm the files or move them out of the way (e.g. to a 'deleted' folder that cron could empty at a time when we know no applications will be running) before installing the new ones so that they're not overwritten or truncated. Unfortunately, recently an application crashed just after an install. Coincidence? It's difficult to tell. The real solution here is to switch over to a more robust installation method than an old gigantic shell script, but it'd be nice to have some extra protection until the switch is made. Is there any way to wrap a shell script to protect it from overwriting or truncating files (and ideally failing loudly), but still allowing them to be moved or rm'd? Standard UNIX file permissions won't do the trick because you can't distinguish moving/removing from overwriting/truncating. Aliases could work but I'm not sure what entirety of commands need to be aliased. I imagine something like truss/strace except before each action it checks against a filter whether to actually do it. I don't need a perfect solution that would work even against an intentionally malicious script. Ideas I have so far: Alias cp to GNU cp (not the default since I'm on Solaris) and use the --remove-destination option. Alias install to GNU install and use the --backup option. It might be smart enough to move the existing file to the backup file name rather than making a copy, thus preserving the inode. "set noclobber" in ~/.bashrc so that I/O redirection won't overwrite files

    Read the article

< Previous Page | 246 247 248 249 250 251 252 253 254 255 256 257  | Next Page >