Search Results

Search found 27029 results on 1082 pages for 'standard input'.

Page 366/1082 | < Previous Page | 362 363 364 365 366 367 368 369 370 371 372 373  | Next Page >

  • Rack layout tools

    - by Luke
    I'm wondering if there's any tools (preferably offline) that would allow me to layout all of the new equipment that will be going into several standard racks. Currently I'm using Excel to map out all of the slots columns for the data but I suspect that there is some better method of doing this. Suggestions? Edit: Dell has an online tool, but doesn't seem very good at actually saving the data that you're working on (and obviously it's geared towards Dell hardware).

    Read the article

  • Can two Identical devices be present on the same bus in any PCI Topology

    - by vaibbhav
    As per the PCI standard, devices are identified on the basis of Vendor Id, Device Id and the bus no. All devices of same type have identical vendor id and device id. If I put two such devices on the same bus say bus 0. How will the PCI Software Subsystem distinguish between the two? If such a case is not possible in PCI, then can such thing be possible through PCI Express Switch?

    Read the article

  • Funny/clever/creative HTTP error pages

    - by David
    I'm sure many of us have seen or heard of amusing ways to express the standard HTTP errors, like "404 Lost in Cyberspace" instead of "404 File Not Found". What are some of the funniest/cleverest/most creative error pages or error messages you've seen, or can think of? (Somewhat similar to this question on StackOverflow) I know this isn't a specific question with a single answer but it is relevant to site admins who want to keep their visitors happy (or terrified, if you prefer ;-) I'll certainly be looking for inspiration for my own website's error pages.

    Read the article

  • Is there such a thing as a game made using a spreadsheet?

    - by andygrunt
    Many computer games (especially the 'Tycoon' type games, Civilization etc) are essentially spreadsheets under the hood, displaying the results of their calculations with a veneer of pretty graphics. But, I've often wondered if anyone's actually created a game using a spreadsheet (using the standard formulas and functions available in a spready) but never actually come across one. So, can anyone point me to a spreadsheet game? - the more complex, the better.

    Read the article

  • Can two Identical devices be present on the same bus in any PCI Topology

    - by vaibbhav
    As per the PCI standard, devices are identified on the basis of Vendor Id, Device Id and the bus no. All devices of same type have identical vendor id and device id. If I put two such devices on the same bus say bus 0. How will the PCI Software Subsystem distinguish between the two? If such a case is not possible in PCI, then can such thing be possible through PCI Express Switch?

    Read the article

  • Ruby: Widely Distributed?

    - by Yar
    While I know it's not part of the Posix standard, but how widely distributed is Ruby on Linux, Unix and other *nix's? I ask because I loathe sh and use Ruby whenever I can on Ubuntu and OSX, but I don't want to get too locked in to 'strange' solutions.

    Read the article

  • sbs 2001 essentials rdp cert install package

    - by Crash893
    Im using Microsoft SBS 2011 esentials to allow some of my users to remote into there work machines when they try they get and error that says that the rd gateway can not be trusted I looked up the error on google and confirmed that i need to install the ssl cert on the local machine but the instructions given are for sbs 2011 standard (website here ) but the path given is not in sbs essentials so where can i find the " Install Certificate Package.zip " file in essentials?

    Read the article

  • Logging Redirect Location in Apache

    - by matthew
    Using the standard "Combined" log format, when Apache returns a 301 response it logs it in the access log, which is good, but it only logs the response code. It doesn't log the location to which the client is being directed. What argument do I need to add to the CustomLog format in order to get it to log this information? It wasn't obvious to me from the documentation.

    Read the article

  • how do you monitor your lamp server?

    - by ajsie
    i wonder how one can monitor a lamp server (ubuntu) on production. are there any standard tools for this to watch the server performance/load in realtime via the browser? how mysql, linux, apache etc are doing... what is best practice regarding this? any tutorials would be great. thanks!

    Read the article

  • No video output and no status light on HP Proliant Microserver

    - by tombull89
    I have an issue with a "N40L" HP Proliant Microserver. When the server is powered on the power light turns green but the machine's status light (the HP logo on the front) stays off and there is no video output through th onboard VGA. The system fan kicks in and if connected to a network the link light shows activity. I have no extra boards (iLO card, graphics card) only 4GB PNY non-standard stick of RAM.

    Read the article

  • how to create a 802.11n wireless network between laptops and asus n-13 wireless adapter ?

    - by xpugur
    I have a asus usb n-13 wireless adapter and 3 laptops in a home we try to create a network witn 802.11n standards but failed each time laptops have intel 5100 agn. We try to create network with wpa-2 personal encryption that also fails(couldn't connect) but with wep encryption connects but with 802.11g standard... so do you know how to create a 802.11N based network? ... thank you...

    Read the article

  • how to create a 802.11n wireless network between laptops and asus n-13 wireless adapter ?

    - by xpugur
    I have a asus usb n-13 wireless adapter and 3 laptops in a home we try to create a network witn 802.11n standards but failed each time laptops have intel 5100 agn. We try to create network with wpa-2 personal encryption that also fails(couldn't connect) but with wep encryption connects but with 802.11g standard... so do you know how to create a 802.11N based network? ... thank you...

    Read the article

  • Run Tomcat Service as Different User on Windows 7

    - by sdoca
    I have installed Tomcat6 using the 32-bit/64-bit Windows Service Installer download version. In the setup instructions, it is recommended that "For optimal security, the service should be run as a separate user, with reduced permissions". I created a new local/standard user (Tomcat) to run the service. The Tomcat service is listed in my list of Services and it's running under my user profile. However, I can't figure out how to set/change which user to start it as.

    Read the article

  • Using Windows Server 2008 R2 as File Server / Dropbox?

    - by tesmar
    Hi, I am new to Windows Server but have been given a copy of Standard R2. I want to use it on my old Desktop as a file server/ Time Machine like backup device. Is this possible? Is it possible to use it like Dropbox where I can sync a folder with it over the web (perhaps using DynDNS since I am on cable modem?) Sincerely, tesmar

    Read the article

  • Started openoffice as user1, can user2 access it?

    - by uswaretech
    I am starting openoffice in headless mode via Xvfb, User1[who started the sofice command] can access it, but user 2 cannot. According to this forum thread, this is standard behaviour. http://user.services.openoffice.org/en/forum/viewtopic.php?f=16&t=4767&start=0&hilit=jodconverter#p67725 How can I give other user access to sofice running on a port.

    Read the article

  • Email hosting on home's Windows server 2003

    - by klay
    Hi guys, I am new to Server management, I have a static Ip address and I bought recently a domain name, I configure the domain name to target my Ip address. I am running windows server 2003 standard. what are the steps to host my email adresses? Do I need to buy anything else, or what I have is enough (static ip address, domain name, win server 2003, exchange server 2003) ?? thanks Guys

    Read the article

  • HP StorageWorks P4500 G2 Manager Management

    - by MDMarra
    According to the documentation, a management group should have an odd number of managers greater than 1. I have a four node SAN consisting of P4500 G2s. I plan on having two clusters with two nodes each in this management group, i.e.: -Managent_Group1 -Cluster1 -Node1 -Node2 -Cluster2 -Node3 -Node4 Are there any issues running standard managers on Node1, Node2, and Node3? After reading the documentation, I'm still unclear about whether or not cluster membership matters in quorum consistency, or if they don't matter at all.

    Read the article

  • Small business: what should I know about computer security?

    - by geschema
    I run a small (1 man) consulting company in the field of embedded systems, working from home using a standard DSL internet access. My main development machine is a Windows XP PC, which is connected to the router with an ethernet cable. I also have a MacBook Pro laptop, which is connects to the network via WLAN (WPA-PSK). Besides enabling the Windows firewall, not using IE, having an up-to-date antivirus program and strong passwords, what do I need to know to keep my customers' data safe on these computers?

    Read the article

  • Preventing DDOS/SYN attacks (as far as possible)

    - by Godius
    Recently my CENTOS machine has been under many attacks. I run MRTG and the TCP connections graph shoots up like crazy when an attack is going on. It results in the machine becoming inaccessible. My MRTG graph: mrtg graph This is my current /etc/sysctl.conf config # Kernel sysctl configuration file for Red Hat Linux # # For binary values, 0 is disabled, 1 is enabled. See sysctl(8) and # sysctl.conf(5) for more details. # Controls IP packet forwarding net.ipv4.ip_forward = 0 # Controls source route verification net.ipv4.conf.default.rp_filter = 1 # Do not accept source routing net.ipv4.conf.default.accept_source_route = 0 # Controls the System Request debugging functionality of the kernel kernel.sysrq = 1 # Controls whether core dumps will append the PID to the core filename # Useful for debugging multi-threaded applications kernel.core_uses_pid = 1 # Controls the use of TCP syncookies net.ipv4.tcp_syncookies = 1 # Controls the maximum size of a message, in bytes kernel.msgmnb = 65536 # Controls the default maxmimum size of a mesage queue kernel.msgmax = 65536 # Controls the maximum shared segment size, in bytes kernel.shmmax = 68719476736 # Controls the maximum number of shared memory segments, in pages kernel.shmall = 4294967296 net.ipv4.conf.all.rp_filter = 1 net.ipv4.tcp_syncookies = 1 net.ipv4.icmp_echo_ignore_broadcasts = 1 net.ipv4.conf.all.accept_redirects = 0 net.ipv6.conf.all.accept_redirects = 0 net.ipv4.conf.all.send_redirects = 0 net.ipv4.conf.all.accept_source_route = 0 net.ipv4.conf.all.rp_filter = 1 net.ipv4.tcp_max_syn_backlog = 1280 Futher more in my Iptables file (/etc/sysconfig/iptables ) I only have this setup # Generated by iptables-save v1.3.5 on Mon Feb 14 07:07:31 2011 *filter :INPUT ACCEPT [1139630:287215872] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [1222418:555508541] Together with the settings above, there are about 800 IP's blocked via the iptables file by lines like: -A INPUT -s 82.77.119.47 -j DROP These have all been added by my hoster, when Ive emailed them in the past about attacks. Im no expert, but im not sure if this is ideal. My question is, what are some good things to add to the iptables file and possibly other files which would make it harder for the attackers to attack my machine without closing out any non-attacking users. Thanks in advance!

    Read the article

  • Need to run Domain Prep after adding new domain in Forest where OCS 2007R2 already deployed + active

    - by Cybersylum
    Hello, We have just added a new domain in our forest. We have had OCS 2007 R2 (standard) up and running in our forest for some time. However those domains were already present when we did all of the prep work (schema, forest, & domain) We will not be adding a new OCS Server in the new domain (just pointing users to the existing box). Do I need to run the domain prep again for the new domain? Thanks.

    Read the article

  • Mutual piping on linux

    - by user21919
    I would like the output of A to be input for B and at the same time the output of B to be the input for A, is that possible? I tried the naïve thing: creating named pipes for A (pipeA) and B (pipeB) and then: pipeB | A | pipeA & pipeA | B | pipeB & But that does not work (pipeB is empty and switching the order would not help either). Any help would be appreciated. Example: Command A could be compiled form of this C program: #include <stdio.h> int main() { printf("0\n"); int x = 0; while (scanf("%d", &x) != EOF) { printf("%d\n", x + 1); } return 0; } Command B could be compiled form of this C program: #include <stdio.h> int main() { int x = 0; while (scanf("%d", &x) != EOF) { printf("%d\n", x + x); } return 0; }

    Read the article

  • Allowing a private subnet EC2 access to the internet - Amazon AWS

    - by Xavier Hutchinson
    I have a VPC "VPC with Public and Private Subnets" created via the VPC wizard which should include NAT for the private subnet VPCs however it's not working. They are unable to browse the internet, resolve internet names and ping internet IPs. This is a stock standard conf, I am very sure of that so I am unsure why it's not working. Perhaps there was something additional I am supposed to do that I don't know about? Thank you, Xavier.

    Read the article

  • How long does a typical Windows 7 64bit installation take?

    - by Borek
    On a machine with Intel Core-i5 or i7 and a standard HDD, how long should an installation of Windows 7 64 bit roughly take? I'm after a rough estimate because my installation seems to be running quite slowly (previously, I've installed Win7 32bit on a laptop and it went much quicker but maybe there are differences between 32 and 64 bit editions).

    Read the article

< Previous Page | 362 363 364 365 366 367 368 369 370 371 372 373  | Next Page >