Search Results

Search found 17688 results on 708 pages for 'protect computer'.

Page 337/708 | < Previous Page | 333 334 335 336 337 338 339 340 341 342 343 344  | Next Page >

  • Setting up Konico Minolta 1400w printer on windows vista 32bit

    - by Josh
    One of my neighbors asked me to help them setup this old printer on their computer (thier other printer is broken) so after fighting with it for about an hour but to no avail. Every time I try to install it, windows just recognizes it a as "print to file printer" as in it will only print to an output file. It's kinda urgent so speedy help would be appreciated.

    Read the article

  • Sudden increase in available hard drive space

    - by Faken
    I was copying large files over to my computer for video editing and keeping an eye on available hard drive space I knew I should have had just enough space to put everything. However, as I was getting close to filling up my hard drive, the available free space suddenly jumped by about 30GB. Any idea what happened?

    Read the article

  • Proper upgrade path for Windows 7 to Windows 8 when the directory setup is non-standard

    - by Joey
    I have both a HDD and a SSD in my computer and after installing Windows I moved things around a little to ensure that the OS is on the SSD but my user profile resides on the SSD (with a few exceptions). I used junction points heavily for that. Windows and most applications are fine with that and it works well. Now I wonder whether I can in-place upgrade this to Windows 8 while retaining that exact setup or whether there is anything I can do to ease the upgrade process.

    Read the article

  • "Discovering items".... yawn

    - by Kez
    I have a rather annoying issue with my Windows 7 computer whereby it seems to take ages to delete, move or copy folders, even when they are empty. The problem is intermittent, to make matters worse. It just says "Discovering items..." for anything up to a couple of minutes before eventually doing what its told. Any suggestions on where to look to stop this happening? I have tried disabling antivirus realtime scanning to rule that out as the root cause.

    Read the article

  • Is it possible to copy recordings off of a DVR box hard drive?

    - by bdr9
    My cable TV company gives me a Cisco Explorer 8640HDC DVR box that can record shows from TV. I know that it contains a hard drive to save the shows on. What format and file system are used to store the videos on the hard drive? I have looked at the documentation for this DVR box and there is no technical information about the manner in which recordings are stored. Is it possible to connect the hard drive to a computer and extract the recordings from it?

    Read the article

  • How to disable my netbook's touchpad when a usb mouse is connected.

    - by overmann
    This is the first computer I have ever bought and I couldn't bring it home without a mouse of its own. I'm trying to disable the touchpad but the only option I find is by uninstalling the drivers, which I think is a bit drastic, the buttons for activation and deactivation are disabled (I'm using windows 7 starter). Do you have any idea of how to disable the touch pad when an external mouse is hooked up?

    Read the article

  • Codec Pack that can easily be deployed via group policy

    - by testguy
    We have a teacher that has a project for doing some basic film editing with windows movie maker. We loaded the avi file onto the computer and Windows is trying to install a codec but can't. I assume I need to install some type of codec pack. I'm looking for suggestions on a codec pack that I can easily deploy through a Win2003 server to WinXP clients. Ideally, this codec pack shouldn't break anything else and be easily removed if need be.

    Read the article

  • AD logon script, how to...

    - by allenskd
    I'm a student, I have this assignment where I need to know how to disable the user from changing the background to a client computer, thing is that I've been looking around to know what language does the logon script use, any site with handy information, tried googling but I really can't find anything useful, don't know if I'm googling the right terms All I've found for now is a lot of tutorials about mapping network drives and so on

    Read the article

  • Active Directory Permission Diag Tool

    - by Skit
    I'm trying to identify potential permission issues on areas of our AD tree. What I have in mind is something like SysInternals FileMon to monitor object access in Active Directory in real time. For example: Adding a computer to the domain. Is there anything like that in the wild? Is there a better way?

    Read the article

  • Windows XP Activation failed, now what?

    - by user26379
    I have a computer with (presumably unlicensed) Windows XP. The activation (over the internet) failed, and I now I cannot get into Windows. After calling Microsoft, it seems like I will have to reinstall everything and install a freshly bought operating system. What are my options here? Is it worth trying the millions of keys and key generators out there? EDIT: I have no way of contacting the manufacturer (it's a no-name box, definitely not Dell, HP or IBM).

    Read the article

  • How do I automate a backup of new MobileMe calendar data

    - by ridogi
    The new MobileMe iCal data lives in the cloud, and the data on your computer is actually a cache. This support article http://support.apple.com/kb/HT4226 from Apple explains how to backup calendar data by exporting to an .ics file. I would like to automate that process via AppleScript, Automator or any other method (paid software is fine). The sticking point with AppleScript is selecting the calendar on the left hand column. In Automator I don't think the available actions support this level of automation.

    Read the article

  • I want to buy a second hand laptop, how to get the real technical specifications of a used laptop?

    - by Steven
    I want to buy a second hand laptop. I need to examine a laptop's configuration before I make a decision to buy it. I know the information the information about the components of a laptop can be intentionally fabricated.So the information I go through my computer/properties/hardware/device manager to see may not be reliable. So how can I get the real technical specifications of a second hand laptop?

    Read the article

  • Can the OS X unlock panel trigger a login hook similar to loginwindow?

    - by Allen
    I'd like to automatically run a shell script every time I authenticate onto my computer. However, all the info I can find about loginhook and Global LoginItems applies only when authenticating to "loginwindow," and not to the "unlock panel." The unlock panel prompts for a password when waking up from sleep or from a locked screen. Is there any way to trigger script execution after successfully unlocking the screen?

    Read the article

  • Ubuntu Deluge checking downloads at start-up slow

    - by solomongaby
    I am downloading a very large torrent (~60GB) and when deluge clients starts up it takes a lot of time to check the parts downloaded during witch it uses a lot the hardisk that leads to a very slow computer. Is there a way to skip this checking ? or make it be less aggressive on the hardrive ?

    Read the article

  • How to route traffic from one subnet through a specific SOCKS proxy in other subnet?

    - by Yegor Razumovsky
    Here is my network map: Internet | | Router (192.168.1.1) | | (192.168.1.100) (wireless) MacBook ( mac os x / windows 7 / ubuntu. It doesn't matter ) (192.168.2.1) (wired) | | TargetComputer (192.168.2.2) I want to route all traffic from TargetComputer 192.168.2.2 through socks proxy running on my macbook. On target computer i can only change IP settings ( ip address, subnetmask, gateway, dns ).

    Read the article

  • SNMP HOSTMIB.MIB not loading?

    - by user11860
    Forgive me if the answer is something glaringly obvious but I just can't seem to get access to any OIDs under the HOST branch in SNMP. I've used an SNMP browser to inspect a few of my systems and none of them show a HOST branch under ISO.ORG.DOD.INTERNET.MGMT.MIB-2. Any thoughts as to why? I'm looking to monitor a few computer's hardware resources via SNMP and unfortuantely all such OIDs live under the missing HOST branch, Any thoughts?

    Read the article

  • ubuntu: starting program with sudo on boot

    - by The.Anti.9
    I am trying to start xampp when the ubuntu starts on ubuntu 9.10. I tried going to system-preferences-startup applications adding it there, but it didn't work. I surmised it was because it needs to be started as root. I know you can make a startup script some how, but I'm not sure how to do it. How can I make it start xampp when the computer boots, even without logging in? FYI, the command for starting it is sudo /opt/lampp/lampp start

    Read the article

  • Word in office 2007 and Windows 7 ultimate cant navigate to folders

    - by Nick White
    In word 2007 I click office button top left I click open, I get the open box, in the top address bar, I if I click on the down arrow far right (previous Locations) the drop down menu is empty just a box with nothing in it. To go anywhere from here I have to navigate via the left had pane, on all other windows systems this dropdown has enabled me to go to any location on my computer. I'm wondering if because all my word documents are on my D drive that windows 7 doesn't like it.

    Read the article

  • Caveats of running software inside the Users directory

    - by kotekzot
    I have some applications that I'd like to stay with my user forever. I've invested a lot of time in customizing them, and doing it from the start would be rather annoying. To that end, I'm thinking about moving them inside my Users folder, as it is the most redundantly-backed up directory on my computer. Are there any concerns associated with running software inside the Users directory, save for updating absolute paths? File permissions and security come to mind.

    Read the article

  • Tunneling traffic through a proxy using SSH - what does the proxy server see?

    - by nilu
    If I am accessing information (in a browser or via bittorent) through an SSH tunnel, what info will then be possible to obtain on the SSH/proxy server itself? As far as I have understood, the information between the proxy server and my computer is encrypted, but is it not possible for the SSH server admin to obtain info about the traffic? The SSH session requires my credentials, so my guess would be that the server admin would be able to obtain any information about my network usage.

    Read the article

  • Free Data Recovery Software

    - by Morais
    I lost some of my very important files from my computer. I tried the windows vista recovery from a restore point but could not get the files. Can some one please suggest some free data recovery tools. This is very urgent.

    Read the article

< Previous Page | 333 334 335 336 337 338 339 340 341 342 343 344  | Next Page >