Search Results

Search found 38034 results on 1522 pages for 'possible'.

Page 363/1522 | < Previous Page | 359 360 361 362 363 364 365 366 367 368 369 370  | Next Page >

  • PCI-e v2.0 video card in a PCI-e v1.0 slot? [closed]

    - by Kevin
    Possible Duplicate: Will a PCI-E V2.0 Graphics Card work with a PCI-E V1.0 Motherboard? Will a PCI-e 2.0 card work in a PCI-e 1.0 motherboard? Currently I've got an older ASUS M2N-E motherboard, and I would like get a newer video card (GTX 280 or similar) which will last me a while after I upgrade my motherboard at some point in the future. I currently have a 6600 GT which has served me well for a long time, but it's time to upgrade.

    Read the article

  • How to make a 100% UNIQUE dvd? [closed]

    - by sajawikio
    Is it possible to make a DVD which would be next to impossible to replicate exactly even with special equipment? To be clear, not in the sense of making the data itself resistant to piracy - nothing like that. More like as an analogy to antiques - a reproduction of a furniture would be able to be spotted to a trained eye, that it is not the original. Is it possible to do this for a dvd? Like, say a dvd is copied, even by someone who is trying to use even special equipment and is hypothetically dying to copy the dvd exactly for whatever reason - even such copied dvd would be detectable that it is not exactly the original dvd somehow (as if it were a reproduction of an original antique, but not the original), and would be almost or even preferably impossible to actually copy 100% exact the dvd ever again. Just some ideas below on the sort of thing i might go about doing to do this, but really am not sure how or what programs, media, hardware, etc. would do the trick Not sure what would do the trick -- but for instance do there exist any blank dvd's that already come pre-recorded with some sort of serial number or bar code, or other metadata, or an encrypted hash, or something like that? Maybe any blank dvd will do but i should get a special software to extract hardcoded metadata? If so which software? Or special hardware even maybe? Such dvd which the "secret" can be: Well, to know what the "secret" is and if it is present on the disk, it probably should be readable by some software or maybe a particular hardware (i guess preferably only if some sort of key is known and input into the software, even better, only then such secret data on disk can be read, otherwise nothing shows up and it looks like just a regular disk with no secret on it), and Would be impossible to actually replicate, especially not with regular burning hardware and preferably not at all. Other idea: Is there any special software that can direct the write head of laser to physically "mar" the dvd in such a way that, when played in dvd player, makes a particular visual pattern or something like that, also say the mar itself shows up as faint scratch on disk, but would be impossible for someone to do themselves exactly? EDIT: Also to clarify suppose the dvd contains video and music that should be playable on dvd players, maybe a menu too (i.e not a dvd containing software), and also to clarify the question is about how to make dvd 100% unique, not how to make the actual content of dvd protected from "piracy".

    Read the article

  • How to setup Windows Server 2008 R2 Server Core

    - by Robert Koritnik
    I'm an MSDN subscriber. I would like to install Windows Server 2008 R2 Server Core, but when I insert MSDN #4629 DVD there're only full versions of Windows Server 2008 R2. How am I supposed to install Server Core then? Any suggestions? Is it possible to covert it back to server core when a GUI version's already installed?

    Read the article

  • Change the on-screen keyboard key size?

    - by stukelly
    Is it possible to change the key size on the on-screen keyboard included with Windows XP? I find it really difficult to use on a touch screen, when there is no keyboard available. I know you can the change the font size, but this does not change the key size.

    Read the article

  • Tomcat - Spring Framework - MySQL, Load balancing design

    - by Mat Banik
    Lets say I have Spring Framework App that is running on Tomcat and uses MySQL database: What would be the best solution in this instance that would allow for sociability (price/performance/integration time)? More precisely: What would be on the Web Load balancer box, and who should be the tomcat web server clustered? What would be on the Database Load balancer box and how should be the database servers clustered? And if at all possible specific technical integration links would be of great help.

    Read the article

  • dissabling touchpad buttons on a laptop

    - by doug
    Hi there Does anyone knows how to disable the left click button on a laptop touchpad? It stays pressed all the time, and I'll like to disable it and use the right click as a left click. Does anyone knows if that is possible? Or at least to disable both of them. Thank you

    Read the article

  • How Do I Know the Memory Used by Apps

    - by user176890
    Is it possible to know the memory used by any apps running on my linux server? I'm using the following command to know how much memory used by php-fpm. ps -ylC php5-fpm --sort:rss | awk '!/RSS/ { s+=$8 } END { printf "%s\n", "Total memory used by PHP-FPM child processes: "; printf "%dM\n", s/1024 }' Given the command above, I want to know the memory used by all apps with an example output below: PHP-FPM: 2.3gb MySQL: 5gb nginx: 200mb dovecot: 100mb memcached: 573mb

    Read the article

  • network endpoint accessible via hostname only, not address?

    - by Dustin Getz
    someone told me that this piece of network hardware (NAS) has a security setting such that it can only be accessed by hostname, not by IP address. I don't understand, as I thought DNS resolved the hostname to an address on the connecting client's side, then at protocol level always used the raw address, so how can this 'security' measure be possible?

    Read the article

  • How do I accept all Networks with the same ssid with wicd?

    - by rubo77
    We have a Mesh network here in my town, where every node creates the same client wlan with the SSID "kiel.freifunk.net". In wicd I can connect to those networks, but I have to choose which of them. In network-manager it was more handy: there was shown only one network with that SSID and if I moved through the room with my laptop, it automatically connects to the nearest network with that SSID name (I think that's called "roaming") Is it possible to achieve this with wicd also?

    Read the article

  • Launch only the command if the previous one worked inside SSH, SHELL

    - by Namari
    I've got a SHELL script which is using a pipe to separate my 2 commands: ssh -oBatchMode=yes user@hostname "mysql -u yop -pyop -c yop | echo test" The problem is even if my connection to mysql doesn't work, it send the echo test. I would like to forbid my script to send any command if the previous command doesn't work. I search with a if condition but it seems it not possible with it :( Does anyone have an idea ? Thanks, Namari

    Read the article

  • OS X home, end, page up, page down movement keys and cursor focus

    - by Gerald Kaszuba
    When using the home, end, page up and page down movement keys in a text editor, the cursor stays in the same spot, even though the window has moved elsewhere. I know that you can use the option modifier to move the cursor along, but is there a way to move the cursor where your window has moved to (without using the mouse)? Another alternative would be to make these movement keys always behave as if the option modifier key is already pressed. Is this possible?

    Read the article

  • vmware on Hyper-v

    - by optician
    I'm wondering if it will be possible to install vmware server on a hyper-v image? Currently I get an error when trying to install. Setup cannot continue becuase microsofts hyper-v is being used. Please disable it, reboot and start the VMWare Server installation again.

    Read the article

  • Avoid "Has left the conversation" with Adium, GTalk/AIM?

    - by Yar
    I'd like to be able to close a chat window without the other person receiving a message that I've "left the conversation." Is this possible with Adium/GTalk and Adium/AIM? Note: One of these combinations might not show a "has left the conversation" ever. I can't find anybody around to test this right now :)

    Read the article

  • How can I move the Windows 8 on-screen keyboard?

    - by Vladimir Sinenko
    From the first look, it seems that the onscreen keyboard in Windows 8 cannot be moved from its default position at the bottom of the screen: However, sometimes it obstructs the input field and should be repositioned (see iOS 5's screenshots for examples) So the question is, can it actually move? If it can, how can I do that? If it cannot, is it possible to use the keyboard to fill an input field that is underneath it?

    Read the article

  • SFTP File Restrictions.

    - by The Rook
    Is it possible to use SFTP on Linux and restrict a user account to ONE directory such that no other directory listing can be obtained? Yes, I must use SFTP, FTP is only used by people that love getting hacked. For instance I want someone to modify files in /var/www/code/ but I don't want them to be able modify anything else. I don't even want them to see the contents /tmp/. (I will accept a "quick and dirty" solution, as long as it is secure.)

    Read the article

  • insert newline in perl -e statement

    - by lydonchandra
    Hi If I do this in bash perl -e '$x; $y' How can I insert a new line between the character ; and $y? I don't want to re-type the whole line, I just want to move my cursor to the position and then insert a newline ? Is this possible? Many thanks

    Read the article

< Previous Page | 359 360 361 362 363 364 365 366 367 368 369 370  | Next Page >