Search Results

Search found 23127 results on 926 pages for 'based'.

Page 294/926 | < Previous Page | 290 291 292 293 294 295 296 297 298 299 300 301  | Next Page >

  • Is the /etc/inittab file read top down?

    - by PeanutsMonkey
    When the init process is executed when the kernel has loaded, does it read the /etc/inittab file in a top down approach i.e. it executes each line as it appears in the file. If so and based on my reading and understanding, does this mean that it enters the documented run level and then launch sysinit process or vice versa? For example the common examples I have seen are id:3:initdefault: # System initialization. si::sysinit:/etc/rc.d/rc.sysinit

    Read the article

  • Best filesystem choices for NFS storing VMware disk images

    - by mlambie
    Currently we use an iSCSI SAN as storage for several VMware ESXi servers. I am investigating the use of an NFS target on a Linux server for additional virtual machines. I am also open to the idea of using an alternative operating system (like OpenSolaris) if it will provide significant advantages. What Linux-based filesystem favours very large contiguous files (like VMware's disk images)? Alternatively, how have people found ZFS on OpenSolaris for this kind of workload?

    Read the article

  • Routing protocols, distance vector vs link state

    - by Artem Barger
    I'm trying to figure out the differences(pros/cons) between two routing protocols approach and I would be great-full for any help, advice and explanation. As far I can say that it seems like distance vector is more static and more local based routing, since it doesn't know the network state whereas link state is more aware of current states therefore it seems more natural to use it over distance-vector, but I have a feeling like I'm missing something. And I would be glad to here about more aspects and different issues I have to consider while choosing one of them.

    Read the article

  • trigger a DNS change in Active directory

    - by Paddy Carroll
    Can I get solar winds to change a DNS alias in Active directory based upon a specific set of events or conditions? I have a collection of applications that use hostnames in combination with database names in order to resolve database connections, problem is that they haven't considered how a failover would work in practice so I want the product to provoke a change in DNS to point the apps at the right place if we get into a failure situation. Can it be done?

    Read the article

  • Which Twitter app do you use?

    - by Jeff Fritz
    It seems like everyone is writing their own Twitter front-end application nowadays. So I must ask: What is your preferred Twitter front-end management application? Please discuss: Form Factor: Desktop, Mobile, Web based OS Support: Windows, Mac, Linux, iPhone, BlackBerry, etc Killer Feature that made you convert Please try to format your responses using the bullet points above. This way, we can all easily compare features. Please list 1 app per response

    Read the article

  • How do I troubleshoot computer dumps?

    - by KronoS
    Once I have a dump of a computer crash/freeze, what are some tools and steps to take in order to troubleshoot crash based off of the dump itself? I am looking for tools to isolate what processes or issues are causing the crash, and also good techniques in troubleshoot the actual dump itself. Once I've determined what the "troublesome" process has been, what do I do to troubleshoot the issue? For example if I determine process foo.exe or bar.dll etc, is the problematic file how do I determine what can be done?

    Read the article

  • Automated incremental backups from Plesk on Centos to Amazon S3

    - by ChrisS
    Hi, I've done a far bit of research on this via Google and there seems to be quite a few ways of possibly doing this. I'm looking to incrementally backup new and updated files in two directories on my Plesk run Centos 5.2 server: /backups and /var/www/vhosts (preferable only httdocs within each vhost) Has anyone got some great feedback from using the various solutions - seems to be various Java, Perl and Ruby based solutions out there. Many thanks, Chris

    Read the article

  • Restart browser on error

    - by billfredtom
    Is there a way to restart a browser (Internet Explorer, Firefox, etc) automatically upon receiving an error such as a DNS error or Page not found? Background: It is for a web based signage application that has intermittent network drop outs, therefore if there's no internet, and the sign tries to go to the next page, an error occurs on browser, and we get one big ugly sign. We need a way to either restart the browser, or customise displayed error messages to use javascript to try redirection to the live sign again.

    Read the article

  • Online Windows Server monitoring

    - by Khash
    To check a website's availability there is Pingdom (and many others). I'm looking for a similar service (online/web-based, easy to use with notifications) that monitors servers a bit more in detail. Things like Disk Space, Windows Services running, etc.... I am happy to install an agent on the box to facilitate that, but don't want to run the monitoring server as well.

    Read the article

  • Exposing server uptime a potential security vulnerability?

    - by Edward Mazur
    I run a browser-based game and as part of a page with a bunch of game statistics, I have the server uptime listed. It's currently at 177 days and so someone mentioned to me that I shouldn't do this because a long uptime indicates the kernel is old and therefore missing security updates. This certainly sounds logical, but I searched around and couldn't find any evidence to support it. So I'm just wondering, is this indeed something I should not have exposed?

    Read the article

  • Including existing ISA server into domain

    - by user23419
    Is there any problem or pitfall including ISA server into domain after ISA was installed and configured and worked for a while? All the rules at the moment are based upon IP addresses, All Users. Addendum 1 ISA is an edge firewall, so it is connected to one Internal network (this is where domain is) and to the Internet provider (External Network). Addendum 2 I'm absolutely sure ISA should be a member of the domain.

    Read the article

  • Is Jabber the same thing as XMPP?

    - by Atomiton
    I find conflcting information on this subject. Are they the same thing? I've read that Jabber is "based" on XMPP. For example: The chat client "Pidgin" has a box for XMPP but seemingly not for Jabber. Yet, it seems to support it. What's the difference between XMPP and Jabber?

    Read the article

  • Is there a program that can colourize the output of any linux command?

    - by BeeBand
    Or would I have to write my own? What's the best language for building a tool of this kind? I'm kind of new to linux, but I'm guessing that you could pass the output of a program to a particular script and have it display it in various colours, based on some regular expressions (constructed from some kind of config file perhaps). Or has it been done already...?

    Read the article

  • Voice on 4G Technologies such as LTE and WiMAX?

    - by Vaibhav Bajpai
    I understand that LTE and WiMAX are IP-based technologies that do NOT have a voice component unlike the current 3G technologies. So is it like, voice calls in 4G would be completely driven on top of IP? Wouldn't this break backward compatibility with existing 3G technologies? Is this why 4G is taking it took long to take ubiquitous availability?

    Read the article

  • What commands are being sent to an exe?

    - by JL
    I have an application that calls a console based application when I open a file. I would like to somehow "spy" on this console application so that when it gets called I would like to see what command line parameters are being passed to this console app. Is this possible?

    Read the article

  • Windows 2003 :: Performance Monitoring :: Simple/Stupid Tutorial

    - by BSI Support
    I have a half dozen front-end servers all running IIS 6.0-based/hosted applications. (primary .NET 2.0 web apps.) Basically, I'd like to take some basic performance data from each one, through such into a spreadsheet, and compare. CPU load, RAM load, whatever... If anyone can point out a very simple/stupid "here's how you do that" type of tutorial, that would be wonderful.

    Read the article

  • Easy management of multiple connections

    - by pistacchio
    Hi, on a Windows 7 machine I need to switch back and forth two connections: the LAN connection (that works behind a proxy) and a wireless connection via a USB modem. This requires every time to activate / deactivate two connections in the manager and switch on / off the LAN settings. I don't think there is some way to keep two connections alive and specify which one to use based on the program, but my question is: is there a simple little utility that makes switching the connection one-click easy and fast? Thanks

    Read the article

  • GUI FTP client for Mac?

    - by George2
    I am using a MacBook Pro running Mac OS X 10.5. I am new to this development environment, and previously worked on Windows. Could anyone recommend an easy to use GUI based and free FTP client for my platform? Thanks in advance.

    Read the article

  • cPanel equivalent- free please

    - by RN
    I have a shared hosting where I got used to using cPanel for managing my domains and stuff Now I am moving to a (unix based) VPS hosting, and the plan that I have chosen comes without cPanel. Since I have the root access, I should be able to install virtually anything I desire So my question is Can you suggest some open source\free solution which will give me the same features as cPanel?

    Read the article

  • linksys WRT350N dd-wrt: how can i give upload priority to slingbox ?

    - by ufk
    Hi. i have the router WRT350N by Linksys I've installed dd-wrt v2.4 sp1 on it how can i configure it to give upload priority to slingbox ? The Slingbox is a TV streaming device that enables users to remotely view their home's cable. it seems that slingbox streams to amazon ec2 servers and from there to the client so i can't really give priority based on ip-address.

    Read the article

  • how to create a 802.11n wireless network between laptops and asus n-13 wireless adapter ?

    - by xpugur
    I have a asus usb n-13 wireless adapter and 3 laptops in a home we try to create a network witn 802.11n standards but failed each time laptops have intel 5100 agn. We try to create network with wpa-2 personal encryption that also fails(couldn't connect) but with wep encryption connects but with 802.11g standard... so do you know how to create a 802.11N based network? ... thank you...

    Read the article

  • how to create a 802.11n wireless network between laptops and asus n-13 wireless adapter ?

    - by xpugur
    I have a asus usb n-13 wireless adapter and 3 laptops in a home we try to create a network witn 802.11n standards but failed each time laptops have intel 5100 agn. We try to create network with wpa-2 personal encryption that also fails(couldn't connect) but with wep encryption connects but with 802.11g standard... so do you know how to create a 802.11N based network? ... thank you...

    Read the article

  • Rename/Move file only if destination does not exist

    - by mikeY
    I would like to know if there is any way a file can be moved only if the destination does not exist - in other words, move only if it does not lead to overwriting. mv --update seemed first to be the solution, however, if the timestamp of the source path is newer than the destination, move will overwrite it and all attempts to circumvent this by modifying the timestamp before the move will fail. I need this behaviour to implement a simple file based lock where existence of a 'lock' file indicates that the lock is acquired.

    Read the article

< Previous Page | 290 291 292 293 294 295 296 297 298 299 300 301  | Next Page >