Search Results

Search found 17130 results on 686 pages for 'computer lab'.

Page 316/686 | < Previous Page | 312 313 314 315 316 317 318 319 320 321 322 323  | Next Page >

  • Windows 7 x64 cannot kill Skype

    - by NullOrEmpty
    Skype got stuck, and Windows was unable to kill the process even when the UI had disappeared. I had to restart the computer to get Skype again working. Running as administrator: C:\Windows\system32>tasklist | find "Skype" Skype.exe 2708 Console 1 92,328 K C:\Windows\system32>taskkill.exe /pid 2708 /F /T SUCCESS: The process with PID 2708 has been terminated. C:\Windows\system32>tasklist | find "Skype" Skype.exe 2708 Console 1 92,328 K How can this be even possible? Cheers.

    Read the article

  • convert full-disk RAID5 array to partition-based array?

    - by Delan Azabani
    I have a RAID 5 array, md0, with three full-disk (non-partitioned) members, sdb, sdc, and sdd. My computer will hang during the AHCI BIOS if AHCI is enabled instead of IDE, if these drives are plugged in. I believe it may be because I'm using the whole disk, and the AHCI BIOS expects an MBR to be on the drive (I don't know why it would care). Is there a way to convert the array to use members sdb1, sdc1 and sdd1, partitioned MBR with 0xFD RAID partitions?

    Read the article

  • To control decibels in speakers by Ubuntu

    - by Masi
    I need to load the module pcspkr to Linux kernel often by sudo modprobe pcspkr. It sometimes happens that something goes totally wrong such that I cannot stand the amount of decibels in my speakers. I would like to control the amount of decibels in my speakers and to have a visual speaker in my top panel which indicates the amount of decibels in my computer at each given time How can you solve at least one of the problems?

    Read the article

  • Removing old computers on a domain

    - by Ryaner
    The Windows Domain I manage has hundreds of computer names which I don't recognise and I'd like to remove old ones which aren't in use before trying to track down the misnamed ones. Is there someway to see when the last time a machine logged onto the network? Either via dhcpd or a user login event or something else.

    Read the article

  • software that list previously installed programs

    - by Nrew
    Is there a software that can detect and list previously installed programs on a computer? Or any method you know which I can use so that I could see what programs were previously installed assuming that those programs were only uninstalled using the add/remove programs in control panel. Or if you know a method which will also detect and list previously installed programs which are uninstalled using advanced uninstaller like revo.

    Read the article

  • Synchronize the same set of files to 2 different locations with 2 different programs for 2 different purposes

    - by Hedgetrimmer
    Because of stupid questionable IT policies at my not-to-be-named place of occupation, I have been (and will be, for the forseeable future) carrying on an external hard drive a unison-synchronized copy of all of my documents and code, including code which resides in some of my "dotfiles" and other code which resides in ~/bin (things I've made are there because ~/bin is in my $PATH) along with some cruft generated (and to be generated) by conscript and its related "giter8" templating system for Scala project boilerplates. Despite this, I do use a symlinking program to store all of my important dotfiles in a subdirectory. Thanks to that somewhat complicated setup, I have resorted to making a directory full of symlinks to every directory (or file, as is the case with stuff under ~/bin) that I want synchronized, and then follow = True is in my unison profile. It happens to be that this collection of odds and ends—plus an automatically-generated text file containing every package installed on my system—is everything under ~ that needs to be backed up to a remote (rsync-over-ssh) host with client-side encryption and signing from GPG. I already believe that duplicity is the most appropriate program to do that. What isn't as clear-cut is how to make duplicity use the exact same set of files when it runs a backup; it would be simple if duplicity would follow symlinks, but it does not and the manpage lists no option for enabling any such behavior. Comparing unison's file selection algorithm to duplicity's, I don't think I can write a program that could compute a ruleset for one program given one for the other. For the record, I would rather not keep the symlinks manually synchronized with duplicity file-selection rules, as they can change thanks to the above-mentioned complications regarding ~/bin. I don't think running duplicity on the external hard disk is such a good idea either; I usually keep that hard disk unmounted and unplugged in case of a power failure or other physical problem with the computer, plus I'm not sure about duplicity's performance given that: the hard disk is NTFS-formatted in order to be useable at my Windows-imprisoned place of occupation. despite being a USB 3.0 disk, my computer has no USB 3.0 ports so it acts as a USB 2.0 disk. How can I have duplicity (or is there a better program that I have overlooked?) back up the exact same set of files that is bidirectionally synchronized with my external hard disk?

    Read the article

  • Network drives don't get mapped and desktop redirection stops working when domain user becomes a member of the Local Administrator group on their PC

    - by Kim Jong-Un
    We have a Small Business Server 2003 domain controller with Windows 7 workstations joined to the domain. I noticed recently that, if I make a user a local administrator on his computer, his redirected desktop and mapped network drives do not connect at login (error on login that network drives inaccessible and desktop is blank). However, it is still possible for this user to browse to his home directory where his redirected folders are located- so he still has access to that location. Does anyone have any theories as to what is going on here?

    Read the article

  • Use same url externally as internally

    - by Nifle
    If I have a web server on my home network I can connect to it from work with http://my.external.ip/whatever/ (assuming NAT and forwarding). Naturally I have a bookmark in my browser that points to http://my.external.ip/whatever/ however when I use that bookmark on my home computer (also behind NAT) the link does not work because my firewall blocks it. (firewall is a old'ish Dlink) What is the best way to fix this issue?

    Read the article

  • Local admin password recovery: Windows Vista

    - by Jim Dennis
    I am faced with an unsettling situation. A friend of my father's has rather suddenly become a widower. Naturally they've taken care of the bank accounts and all the normal mundane things that people have been doing for a century or so. However, she was the computer user of the household. He was aware that they had some online banking stuff and bill paying stuff ... and that she spent lots of time on FaceBook and stuff like that. However, he doesn't know what her local passwords were (actually only vaguely aware that her couple of desktop and couple of laptop system even had passwords). He's never heard of "admin" passwords so that's no good either. In the past I've used KNOPPIX and the old LinuxCare "bootable business card" to recover NT passwords. I've never done this with MS Windows Vista. So, I'm looking for the best advice on how to do this. Naturally I do have physical access to the systems (the two laptops are charging across the room from me; and her old desktop systems are, naturally, still back at his place). Getting it right is much more important than fast or easy (I don't want to mess up those filesystems and possibly lose some photos or other stuff that he or his kids or grandkids will want). (BTW: if anyone things this is some social engineering hack to play upon the sympathies of the community to get the information I'm asking for ... think about it for a minute. I know about IRC and the "warez" boards. I know I can find this stuff out there if I dig enough. I'm just asking here because it'll hopefully be faster and, secondarily to raise awareness. As more of us put more of our lives online ... as we get older and as places like FaceBook continue to widen the appeal of computing to a broader segment of older people ... we are, as computer nerds, going to see a lot more of this. Survivors will needs us to be careful, sensitive and ethically responsible as they try to recover those bits of legacy during their bereavement. I can now tell you, first hand, it sucks!)

    Read the article

  • which is the recommended way to install sshd in cygwin on windows 7 enterprise

    - by anjanb
    What is the recommended procedure to install sshd on Windows 7 Enterprise ? I have already installed cygwin and openssh on this computer. i'm open to non-cygwin sshd as long as there won't be any compatibility issues with cygwin related programs. UPDATE I want setup/config information as well. Currently, I get an error if I try to connect to localhost. $ ssh localhost ssh: connect to host localhost port 22: Connection refused

    Read the article

  • Word Opening Text Files by default as RTL, should be LTR

    - by wonea
    I've noticed recently that Microsoft Word 2007 on Windows XP is opening by default straight text files as RTL instead of LTR. These are English written files, and contain no Unicode or characters other than ASCII. I work in three or four languages on the computer so have the language bar open, this problem happens when the language is selected to EN (United Kingdom). Is there a setting I'm missing somewhere, perhaps in Word itself?

    Read the article

  • Outlook unable to print email

    - by Jason Taylor
    I have an installation of Outlook 2003 that won't print emails as of this morning. It can print calendars, and every other program can print fine. Outlook won't print the emails to any printer, not even a PDF creator. As soon as you hit "Print" nothing happens, there's no notification that the print job was sent or anything. The print server never receives a request to print from the computer.

    Read the article

  • Ubuntu (9.1) behind a ISA proxy

    - by Dan
    I have set up a Ubuntu PC on a next work that is behind a ISA Proxy. When I run the command sudo apt-get update I get several messages with this message: 502 Proxy Error (The ISA Sever denied the specified Uniform Resource Locator) The computer can see the internet and adding the proxy settings in the Network Preferences does not help. When I do a ifconfig Im on a 192 address which is not the usual subnet our PCs are on. Any ideas?

    Read the article

  • On Solaris, how do you mount a second zfs system disk for diagnostics?

    - by Matt Ball
    (Cross posted from Stack Overflow 1) I've got two hard disks in my computer, and have installed Solaris 10u8 on the first and Opensolaris 2010.3 (dev onnv_134) on the second. Both systems uses ZFS and were independently created with a zpool name of 'rpool'. While running Solaris 10u8 on the first disk, how do I mount the second ZFS hard disk (at /dev/dsk/c1d1s0) on an arbitrary mount point (like /a) for diagnostics?

    Read the article

  • Reading line for Ubuntu users

    - by Willy Levine
    Normally when I read a book I use a bookmark held horizontally under the current line I'm reading to help me keep my eyes on the right spot. When I read a PDF or other document on my computer I would like to be able to do the same thing, only with a line on the screen controlled by the up and down arrow keys. Any suggestions for an application which would do this? I'm a Ubuntu Linux user.

    Read the article

  • Sony VGN-NR260E "External Device Boot"

    - by user72158
    [A LITTLE BACKGROUND] On all modern Dell computers pushing the F12 on bios boot will allow for a screen that lets you choose what boot option you need. For example if I want to boot off of a USB flash drive to boot into a live Linux distribution in order to clean virus's on netbooks that do not have CD drives to boot from I would push F12 and choose USB device from the list of options. If this does not show up then I can always go to the F2 bios setup and choose flash drive to be the first option. When I restart the computer it will boot into the flash device. I understand that I can purchase an external USB CD drive and then boot from that. I do not want to use that option. The reason for using a flash device instead of a CD is: A: This USB flash device has several different boot OS's on it that are used. B: The antivirus disks are updated often and burning cd's and throwing away others is wasteful compared to simply updating a flash drive. There is nothing wrong with the flash drive. It works perfect on many other PC's. [PROBLEM] Booting this flashdrive has been working for years on hundreds of computers... I just have this ONE computer that I cannot figure out how to get it to boot on... I have a Sony Vaio that will not boot to this device. I've tried pushing every key combo I can think of (F12, Esc, Del, F10...) and none of these key combinations will bring up the boot menu. I chose F2 and went into the bios and changed the first boot device to USB flash device. This did not work either. There is an astrix next to the device and the note states: "This Drive is available when External Device Boot is Enable." [WHAT I NEED] I need to know How to enable External Device Boot on the Sony Vaio VGN-NR260E laptop. OR How to bring up the Boot Menu to allow me to boot off a flash device. Thanks for anyone that can help!

    Read the article

  • Hardening Word and Reader against exploits

    - by satuon
    I have recently heard a lot about exploits for PDF and DOC files on Windows, which when opened in Reader or Word would infect the computer. I'm assuming most of those exploits rely on some kind of active content, I've heard that Reader allows JavaScript for example. I already have antivirus, but I've heard they often don't catch those types of exploits, so I want to try a little proactive defense. Is there a way to harden Reader and Word by disabling plugins or options that are often used by exploits?

    Read the article

  • Why am I losing cached network passwords after a restart of Vista?

    - by Nauman
    The passwords cached for Network shares on other computers and applications like MSN Live, MS Outlook, Sharepoint portal, Outlook Webmail, etc are lost when I reboot my computer, which runs on Vista. I always check the Remember password checkbox in applications/login dialogs where ever prompted. I cannot imagine of a third party program that may clean up this on system restart/shutdown. Any idea, as to what is going wrong?

    Read the article

  • Hooking up a multifunction printer via network and USB

    - by C-dizzle
    I have a Dell 2155CDN Multifunction printer that is hooked up through our network. But when using the scan feature, it is terribly slow, and I assume it has something to do with it scanning through the network port. Is it possible to leave the printer hooked up across the network, but also attach it to a computer via USB just for the scanner? Or would doing this confuse the printer not knowing which port to use for each feature?

    Read the article

  • Why are all google website suddenly giving untrusted certificate warnings in my Firefox v10?

    - by WilliamKF
    Today, I am suddenly getting the untrusted website error for all Google websites, but not for any other. Internet Explorer gives no such error. Reboot of this Windows 7 computer does not help. Is this some kind of virus infection that is hijacking DNS resolution away from Google to some spoofer? How can I resolve this issue and get Google websites working again normally? If I manually enter a Google IP Address, the page loads correctly.

    Read the article

  • PSU died, is hard drive fried? Are other components damaged?

    - by srand
    After discovering and replacing my dead PSU, I was able to boot back into Windows. Everything seems to be working fine, however, one hard drive is not. Windows 7 says that this SATA hard drive needs to be formatted before it can work. Can the data be recovered? Also, is there a way to check the integrity of the other components of my computer or assume they will work fine?

    Read the article

  • a couple of questions about proxy server,vpn & how they works

    - by Q8Y
    I have a couple of questions that are related to security. Correct me if i'm wrong :) If I want to request something (ex: visiting www.google.com): my computer will request that then it will to the ISP then to my ISP proxy server that will take the request and act as a middle man in this situation ask for the site (www.google.com) and retrieve it then the proxy will send it back to me. I know that its being done like that. So, my question is that, in this situation my ISP knows everything and what I did request, and the proxy server is set by default (when I ask for an internet subscription). So, if I use here another proxy (lets assume that is a highly anonymous and my ISP can't detect my IP address from it), would I visit my ISP and then from my ISP it will redirect me to the new proxy server that I provide? Will it know that there is someone using another proxy? Or will it go to another network rather than my ISP? Because I didn't get the view clearly. This question is related to the first one. When I use a VPN, I know that VPN provides for me a tunneling, encryption and much more features that a proxy can't. So my data is travelling securely and my ISP can't know what I'm doing. But my questions are: From where is the tunneling started? Does it start after I visit the ISP network (since they are the one that are responsible for forwarding my data and requests)? If so, then not all my connection is tunneled in this way, there is a part that is not being tunneled. Since, every time I need to do anything I have to go to my ISP and ask to do that. Correct me if I misunderstand this. I know that VPN can let my computer be virtually in another place and access its resources (ex: be like in my office while I'm in my home. This is done via VPN). If I use a VPN service provider so that I can access the internet securely and without being monitored by my ISP. In this case, where is my encrypted data saved? Is it saved in my ISP or in the VPN service provider? If I use a VPN, does anyone on the internet know what I'm doing or who I am? Even the VPN service provider? Can they know me? I think they should know the person that is asking for this VPN service, am I right?

    Read the article

  • How to use dedicated video card instead of onboard?

    - by Mathias Lykkegaard Lorenzen
    I tried running DxDiag (DirectX diagnostics), and I noticed that my graphics card is set to the onboard one that comes with the Core i5 processor (some Intel HD stuff). On my computer, I also have a dedicated graphics card (an Nvidia 310). No serious gaming stuff, I know - just for programming. However, I would still love to know how to switch to that dedicated graphics card instead. My laptop is an MSI CX720.

    Read the article

< Previous Page | 312 313 314 315 316 317 318 319 320 321 322 323  | Next Page >