Search Results

Search found 28747 results on 1150 pages for 'switch case'.

Page 338/1150 | < Previous Page | 334 335 336 337 338 339 340 341 342 343 344 345  | Next Page >

  • How do I override apt-get removing dependent packages?

    - by iainH
    I want to replace postfix with exim4 on my Ubuntu test server to reflect the setup I have on my production server, but apt-get and aptitude (quite understandably) insist on removing several packages that depend upon having a mail stack. However, in this case I am prepared to override apt-get's undoubted good sense as exim should fulfil all the requirements of the dependent packages, providing mail and sendmail functionality for my applications. I don't want to remove the dependent packages as there is months of effort invested and, although backed up, will be a pain to reconstruct properly.

    Read the article

  • Find the php script thats sending mails

    - by adam
    Hi, Is there any way for me to find the php script that is sending emails. I have apache+php ( no mod_suphp neither suexec ) in a "standard" install, and i want to find out witch php script is sending emails, when i check the logs i just see the uid of the user that's sending the emails ( in my case apache ) but i want to find out the script that's originated the email. Is it possible or i must install suexec or mod_suphp to keep trac of that ? Thks for the help.

    Read the article

  • How to limit a process to a single CPU core?

    - by Jonathan
    How do you limit a single process program run in a Windows environment to run only on a single CPU on a multi-core machine? Is it the same between a windowed program and a command line program? UPDATE: Reason for doing this: benchmarking various programming languages aspects I need something that would work from the very start of the process, therefore @akseli's answer, although great for other cases, doesn't solve my case

    Read the article

  • 10 Million records = wiped MySQL DB?

    - by Josh K
    So I was trying to load some test data and it appears to have killed my entire database. This is one case where it's great to have backups! They were all plain insert queries, probably about a 900 MB file. What could have gone wrong?

    Read the article

  • How should I interpret site analytics with 11 pageviews in an 3 second visit?

    - by Juank
    I'm using google analytics and recently i've noticed some weird trends going on. I have a lot of visits that last mere seconds but mark several page views... more than a normal human can see in that range of time. A specific case is that the only visitor from Ireland i've had until now recorded 11 pageviews in a 3 second visit. Are these crawlers? Shouldn't google analytics filter those out?

    Read the article

  • MySQL for SQL Server DBAs

    - by SQL3D
    I've been tasked with taking over the administration of a MySQL installation (running on Red Hat Linux) that will become fairly critical to our business in the near future. I was wondering if anyone could recommend some resources in regards to administering MySQL for DBAs already experienced with other relational database (SQL Server and some Oracle in my case). Specifically I'm looking for information around disaster recovery as well as high availability to start with, but I do want to get well rounded with the entire system. Thanks in advance, Dan

    Read the article

  • Safely reboot prior to recovering data

    - by ELO
    What is the safest (without additional writing to the disk) way to power down computer whose deleted files you want to recover in order to boot from rescue medium? In case of a desktop computer, plugging off the power cord looks like the most direct solution, but are there possible side-effects, apart from losing unsaved data? More problematic seems the laptop, with removing the battery being the equivalent, but is it a good idea overall?

    Read the article

  • Slideshow from excel file listing the caption, sound file and image file?

    - by Slabo
    Hello, I have excel files with the following header: Caption Sound: Location of sound file Image: Location of image file How can I make a slideshow from this? Each slide should show image, caption, and play sound automatically according to the excel list. I don't care what software I use, if I can get the job done. Total slides ~10,000. In case interested,this is review material for English second language students. Any help appreciated, Thanks

    Read the article

  • Computer not turning off after windows shuts down printer driver

    - by Confused
    The power is not shutting off my computer after windows shuts down. Windows shuts down and I hear my computer case "click" but the power and fans all stay on. This seemed to start after I installed the canon pixma printer driver and software from their website. I have uninstalled the printer software from "uninstall program" and deleted the printer from printers. I have even stopped spool service and deleted printer following this post, the printer drivers did uninstall. How to completely remove printer from Windows 7

    Read the article

  • Can you recommend a good replacement for Windows Sound Recorder?

    - by andygrunt
    Can anyone recommend a good, free replacement for Windows 'Sound Recorder'? Requirements: Very quick to load and run Allows saving to a compact sound format (e.g. MP3) Allows long recordings (1+ Hours) Free Runs on Windows XP Would be nice but probably not essential: Saves along the way (in case of crashes) Allows simple edits (trim start and end and maybe remove chunks in the middle) Before anyone suggests it, I'm aware of (and have used) Audacity but I'm really after something as simple and lightweight as possible.

    Read the article

  • Limiting nproc in an upstart job

    - by Kevin Schmid
    What exactly does the stanza limit nproc 20 20 in an Upstart job do? I've read the documentation here (http://upstart.ubuntu.com/wiki/Stanzas#limit), and it seems like it would limit nproc for any process related to the job. However, I don't see this effect when I've added this to my job's conf file - in this specific case, I've confirmed that my test job's single process was able to fork more than 20 child processes. Any advice? Thanks.

    Read the article

  • Locked out of windows 7 pc

    - by Fasih Khatib
    This is a question on behalf of my friend. His kid brother installed a password on his windows 7 home premium desktop and now he forgot. How does he get in? Since the data is backed up into a flash drive, i suggested nuking using DBAN and reinstalling OS. To complicate matters further, his CD drive doesn't work. In that case, what options does he have available to recover his password? Can DBAN be run from a bootable pendrive?

    Read the article

  • Why use hosts file?

    - by dK3
    My company has a staging site and we access it by a url like this: www.example.com Until today I did not realise that I had a line in my hosts file which said: 192.0.2.0 www.example.com (the ip is fake here) now when I try to access this site through ip , I cannot get access.. why is this the case? We even own the domain we are using so I do not see the reason why we are using a hosts file and more over, why I cannot access the site through simple IP (by the way, we are using an internal IP)

    Read the article

  • Need help recovering a corrupt SQL database

    - by user570079
    I have a very special case that I have been working on for several days. I have a very large SQL Server 2008 database (about 2 TB) that contains 500 filegroups to support very large partitioned tables. Recently we had a catastophic failure on one of the drive and lost several filegroups and the database became in-accessible. We have been doing filegroup backups on a daily basis, but due to other issues, we lost our most recent backup of the log and the primary filegroup. We have all the data backed up but the primary filegroup backup is old. There have been no schema changes since the primary filegroup backup, but the lsn's are now all out of sync and we cannot recover the data. I have tried everything I could think of (and have tried just about every trick and hack I could google) but I still end up at the same point where I get messages saying that the files for filegroup x do not match the primary filegroup. I am now at the point of trying to edit the system tables (we have a separate temporary environment to do this so we are not worried about corrupting any production databases). I have tried updated sys.sysdbreg, sys.sysbrickfiles, and sys.sysprufiles to try to trick SQL into thinking all the files are online, but a "Select * From OPENROWSET(TABLE DBPROP, 5)" shows a different database state from what I see in sys.sysdbreg. I am now thinking I need to somehow edit the headers of the actual data files to try to line up the lsn's with the primary. I appreciate any help anyone can give me here, but please do not respond with things like "you are not supposed to do edit mdf, ndf files...." or "see msdn article....", etc. This is an advanced emergency case and I need a real hack so we can just get to the data in this corrupt database and export to a fresh new database. I know there is a way to do this, but not knowing what the DBPROP system functions does (i.e. does it look at system tables or does it actually open the file) is keeping me from trying to figure out how to fool SQL into allowing me to read these files. Thanks for any help.

    Read the article

  • How can I trick ssh to connect using different configurations based on current location?

    - by Sorin Sbarnea
    Here is the following use case: wanting to ssh server1 in 3 scenarios: server1 is on current network, go for it server1 is not on current network and you need to use a gateway (gw1) to access it, not a big problem as you can use ~/.ssh/config to define tunnelling for this you are on a network that does not allow you to access the first gw1, so you'll use gw2 for that. Desired outcome: be able to use the same command and be able to connect to the server.

    Read the article

  • Subversion hard disk full

    - by user37914
    Our SVN server hd was full. Deleted a load of unwanted data on there, and all appeared to be well. However, new check-ins are now failing. Can't move '/repos/db/txn-protorevs/1000-vr.rev' to '/repos/db/revs/1/1001': Permission denied 1000-vr.rev does not exist. There are two other files in there: 9-9.rev and 9-9.rev-lock Edit: I have checked file permissions just in case, and all is as it should be.

    Read the article

  • SQL Server on VMWare - is transaction log corruption possible?

    - by demp
    Scenario: SQL Server 2005 or 2008, Windows 2008 OS. Running in a VM hosted on VMWare ESX server. Is there any known issue with VMWare when it caches pass-through write request and it never reaches the disk, while SQL Server "thinks" that write actually happened? This may lead to transaction log corruption in case of power failure or VM reboot. Just overheard the conversation but couldn't find it in relation to ESX.

    Read the article

  • BIOS says 8GB RAM installed but only 6GB is available

    - by Hiroshi
    my machine is a Dell Studio XPS 9100 with 8GB of RAM installed. When I open the BIOS setup and enter the System Info, it shows that my machine got 8GB of RAM installed but only 6GB is available (yes this is from the BIOS only). In Windows 7 (64bit Pro) it shows only 6GB of RAM are available. But if I run CPU-Z then it can detect all 8GB RAM. The machine came pre-configured and I have never opened the case before.

    Read the article

  • Url rewrite rule

    - by vvr
    How to redirect a page form show.php?id=(15charstring) to show/(15charstring) I tried like this it is doing reverse means it is redirecting /show/(15chars) to show.php?id=(15chars) RewriteEngine on RewriteRule ^/show/([a-zA-Z0-9]{15})$ http://site.com/show.php?id=$1 Second case is i have to redirect to another page if he added &m=true to the url show.php?id=(15chars)&m=true html/show.php?id=(15chars).

    Read the article

  • How to discover which name/address connections from one network to another uses?

    - by Jader Dias
    In MySQL you have to authorized a user based on the name of the origin network. From my network to a remote one all connections appear as sent from mail.mycompany.com. But connections to another remote network it appears with a different origin. How to discover which name/ip it is using? I tried tcpdump and netstat in the destination but it is difficult to find my connection among billions of others. In my case the destination is a Windows Server 2003

    Read the article

< Previous Page | 334 335 336 337 338 339 340 341 342 343 344 345  | Next Page >