Search Results

Search found 24018 results on 961 pages for 'platform specific'.

Page 349/961 | < Previous Page | 345 346 347 348 349 350 351 352 353 354 355 356  | Next Page >

  • How to reduce Windows XP computer boot time?

    - by Suma
    Are there any specific known steps which I could take to make my computer with Windows XP Professional booting faster? I am interested in speeding up following stages in particular: loading the OS (Windows logo, up to the moment login screen appears) log in user (from the moment you type your user name and password up to the moment all memory resident programs and services are loaded and the computer is really ready to use)

    Read the article

  • Can My Personal GMail Query A Remote LDAP Server?

    - by Maarx
    I have a personal GMail account, from which I frequently send e-mail to a great many various users of a specific business. The corporation has been kind enough to provide me with the credentials to access their LDAP server, with which I would like my GMail web client to be able to auto-complete partial addresses or names for which that LDAP server has an entry. Is there any way I can get a personal GMail account (or it's corresponding entire Google account) account to incorporate an LDAP server into it's Contacts?

    Read the article

  • Puppet, secret fatcs

    - by black_rez
    I manage servers with a puppet master and I use Foreman for visualisation. Because of specific regulation, the only access I have is the puppet agent for configuration and some informations can't be visualized by foreman and the master can't store this information. For example, the puppet agent need to get a secret variable (a password store in a file). How I can get it without know this variable? Also I need to keep reports because I want to know what happen on the server.

    Read the article

  • Is it okay to resend to hard bounced emails after X days. What is X?

    - by V. Hsu
    If I see an email returned due to a hard bounce, after how many days is it acceptable to resend to that email address. It is possible for emails to be reactivated or for temporary outages, so it doesn't make sense to keep an email in my hard bounce email list forever. I've already seen cases where I receive emails from addresses that were put in my hard bounce email list months ago. Any recommendations? Are there specific recommendations from ISPs?

    Read the article

  • Routing between same networks

    - by osmandfj
    I have two different sites: NetA has a subnet 192.168.2.0/24 NetB has 192.168.1.0/24. The two sites connect each other via IPsec VPN with fortigate devices. I need to move a server with IP address 192.168.2.240 from NetA to NetB and I cannot change its IP address due to some specific reasons. My question is; if I move that server from NetA to NetB, is it possible to reach that server from NetA?

    Read the article

  • Fail to set a new location of _viminfo on Windows

    - by Elderry
    I am trying to move _viminfo out of my home folder to make it simpler. So I added this to my _vimrc: set viminfo+=n~\\AppBackup\\Vim\\_viminfo However it's useless, Vim still create _viminfo in my home folder. Then I manually input the command above. This time it works fine, so I am sure the command itself is valid. How should I solve this problem for now? To be more specific, I am using GVim 7.4 on Windows 8.1.

    Read the article

  • OpenLDAP memberOf overlay - changing memberOf attribute name

    - by wrschneider99
    I set up the memberOf overlay for OpenLDAP - how do I change the memberOf attribute name? I want to change it to "isMemberOf". I tried changing this attribute in the configuration olcMemberOfMemberOfAD: isMemberOf but ldapadd failed: ldap_add: Other (e.g., implementation specific) error (80) additional info: unable to find memberof attribute="isMemberOf": attribute type undefined (17) Any ideas?

    Read the article

  • Limiting user access to local Gitorious repository

    - by thanos
    I have installed and configured in private server a local git repository using Gitorious. The problem I am facing is that when I set up a new Gitorious project and limit read access permissions to specific users, the repositories inside the project are not visible any more. This happens even though the access permissions of those repositories grant access to these users. Any idea on how to solve this problem? Thanks a lot in advance!

    Read the article

  • How do I remove the selected tag filter when searching for Unanswered questions on Superuser?

    - by orangechicken
    I've been looking for unanswered questions trying to build some reputation here. Once I select a tag filter in the sidebar, I'm shown all of the questions with that tag. Choosing more tags makes the filter more specific and choosing one of the tags from the set I've already chosen replaces the whole set with that one tag. But, how do I remove that lone tag so that I can return to the full list of Unanswered questions?

    Read the article

  • Mac OS X - detect file system read

    - by quano
    I want to know what files a specific application is trying to access on my disk. I know that you can use fs_usage, but this outputs events from all applications. I know that you can target a single application, but only one that is already running. I want to detect all readfile-events an application is trying to do, ever since it is started. I don't want to miss out on any event. How do you achieve this?

    Read the article

  • Windows 7 immediately disconnects a USB drive

    - by Daniel Saner
    I am having a problem with Windows 7 x64 consistently disconnecting one specific USB mass storage drive immediately after it is connected. The drive in question is a Cowon C2 digital music player which works in standard mass storage controller mode (i.e. no device-specific drivers needed/available). When I connect the player, Windows plays the "USB connect" sound and the device appears (under its correct name) in the device manager, but it never appears as a drive. The player itself displays "USB Connected" for a split-second before reporting that it has been disconnected again. Since the player, by design, reboots after it has been disconnected, Windows plays the "USB disconnect" sound before restarting the whole cycle once the player has powered back on. I am connecting the player through an Intel X79 Chipset motherboard (Gigabyte GA-X79-UD3) to Windows 7 Pro 64-bit. The player used to work fine the first few times I connected it, showing up as an external drive; it only recently stopped working. It is not a problem with the player, since it works fine when connected to another computer, even such running the exact same operating system. It is also not a problem with the USB controller, since the issue is the same on both the Intel USB 2.0 and the Fresco Logic FL1009 USB 3.0 controller ports. I have also not had the problem with any other drive so far. Among the things I have tried so far: Disabling USB legacy mode in BIOS Disabling energy-saving power down for all USB controllers in Windows' device manager Removing and reinstalling Windows' USB mass storage driver Removing and reinstalling Intel and Fresco Logic USB controller driver Restoring the player to factory defaults None of these made a difference. Again, the player used to work fine on the exact same system just days ago; I didn't install any new hardware or drivers on it since then. I would be very grateful for any hints on what else to try. Edit: Here is another new hint; I found out that when I connect the drive before booting Windows, it is available in Windows Explorer as it should, and does not automatically disconnect. If I remove and reconnect it though, the infinite connect/disconnect-loop starts anew.

    Read the article

  • Tips for Domain Name Management?

    - by bofe
    Expired domain names = downtime for websites. Downtime = bad. How does your organization make sure domain names have been renewed? I believe ICANN requires registrars to give a notice at 60 days and 30 days, but these can easily get ignored -- especially with a large amount of domains. Does your solution work for a large amount of domain names? ( 100) Is it registrar specific?

    Read the article

  • Best program to conduct a presentation for investors

    - by the_drow
    Hello, I need a free program that follows those specific requirements: Can load Word/Powerpoint files and let the presenter control them Allows Voice/Video to be transmitted to all participants Is free (recommended but not required) or very cheap Is easy to install Anyone got recommendations for me?

    Read the article

  • speakers muted automatically for some reason

    - by Or A
    i have this weird problem that i'm not sure is specific to me, but more of a windows 7 or Lenovo laptop, so any help would be appreciable. the problem is as follows: Whenever i use skype, msn or any other thing that make noise, the speakers are muted automatically and i need to press the mute/unmute button to re-enable the sound. Does anyone know what can i do to disable windows 7 from doing it? Thanks.

    Read the article

  • Oracle error when logging into database

    - by Bryan
    When I try to log into my db with a specific user I get this message. Below is from the alert log. I can login as system just fine. Anyone know how to figure out what is causing this? Thanks in advance for the help. ----- Error Stack Dump ----- ORA-00604: error occurred at recursive SQL level 1 ORA-01438: value larger than specified precision allowed for this column ORA-06512: at line 2 Oracle 10g OEL 5.5

    Read the article

  • Wallpaper in Windows 7 locked down by domain group policy?

    - by Robert Dailey
    So I am in a situation where my wallpaper is locked to a specific image on my work computer via group policy. I can't change it via the Personalization settings since it is grayed out and says it has been set by the system administrator. Anyone know some local GPO and/or registry hackery I can do to override the domain's policy? I could probably get away with logging in under a local account for this, but I want that to be a last resort. Thanks in advance.

    Read the article

  • Thunderbird, Windows 7: How can I get a unique list of people who have sent me an email

    - by Parris
    Is there some command within Thunderbird or command line to will allow me to pipe a list of all email addresses I've received emails from to a file? I would like to do this for a specific email account and folder within Thunderbird as well, and not just all of my accounts. I have maybe 100 unique people who have sent me an email for some contest and it would be optimal not to have to type all of this stuff up by hand. Thanks!!!

    Read the article

  • What are possible security issues with an SSH daemon?

    - by Zhenya
    I'd like to be able to SSH to my Ubuntu 10.04 office PC from the outside. I am thus thinking to start up an SSH daemon on the PC. What are the security issues, possible glitches, specific configuration settings, etc. I should be aware of? In case it matters: this is essentially for my own use only, I don't think there will be other people using it; it's an Ubuntu 10.04 PC in a mostly Windows 7/Vista/XP environment.

    Read the article

  • securing hard drive when users boot from usb external

    - by eshriek
    I supervise the use of a 'community' desktop computer. I would like to allow the use of the desktop via an external drive to a specific individual. How do I secure the internal hard drive so that no access is possible while using the external drive? Primarily I want to avoid accidental modification of the hard drive. The desktop runs Vista. The external is Ubuntu.

    Read the article

  • What logs should I collect from a Windows server network?

    - by Cygnus X
    I'm setting up a log collection server for my Windows network (about 30 servers ranging from 2003 to 2008 R2, and about 300 vista/7 clients), and I was wondering which logs are good to collect and which ones are a waste of time. I'm going to collect the obvious ones (system, security, event, firewall, and role specific logs) but are there any others I should be worried about? I'm using Splunk if that helps answer the question.

    Read the article

< Previous Page | 345 346 347 348 349 350 351 352 353 354 355 356  | Next Page >