Search Results

Search found 26808 results on 1073 pages for 'storing information'.

Page 371/1073 | < Previous Page | 367 368 369 370 371 372 373 374 375 376 377 378  | Next Page >

  • Free application which reports that computers are running

    - by Darqer
    I'm searching for an application which reports that the computer is running. I imagine it in the form of two piece software. the first part, some kind of dashboard with list of active IPs, is on the server and awaits for information from remote hosts, the second part will be on clients and it will be reporting that client is working. Do you know something like this, I'm searching for free application that is lightweight and does not require installation.

    Read the article

  • seaudit report detail

    - by user1014130
    I've just started using selinux in the last 6 months and am getting to grips with it. However, using sealert on a new CENTOS 6 server, Im not getting the level of detail I was with CENTOS 5. To illustrate: Running sealert -a /var/log/audit/audit.log On CENTOS 5 I get: Summary: SELinux is preventing postdrop (postfix_postdrop_t) "getattr" to /var/log/httpd/error_log (httpd_log_t). Detailed Description: SELinux denied access requested by postdrop. It is not expected that this access is required by postdrop and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: Sometimes labeling problems can cause SELinux denials. You could try to restore the default system file context for /var/log/httpd/error_log, restorecon -v '/var/log/httpd/error_log' If this does not work, there is currently no automatic way to allow this access. Instead, you can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Additional Information: Source Context root:system_r:postfix_postdrop_t Target Context system_u:object_r:httpd_log_t Target Objects /var/log/httpd/error_log [ file ] Source postdrop Source Path /usr/sbin/postdrop Port Host Source RPM Packages postfix-2.3.3-2.1.el5_2 Target RPM Packages Policy RPM selinux-policy-2.4.6-279.el5_5.1 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name catchall_file Host Name server109-228-26-144.live-servers.net Platform Linux server109-228-26-144.live-servers.net 2.6.18-194.8.1.el5 #1 SMP Thu Jul 1 19:04:48 EDT 2010 x86_64 x86_64 Alert Count 1 First Seen Wed Jun 13 11:43:55 2012 Last Seen Wed Jun 13 11:43:55 2012 but on CENTOS 6 I just get: Summary: SELinux is preventing postdrop (postfix_postdrop_t) "getattr" to /var/log/httpd/error_log (httpd_log_t). Detailed Description: SELinux denied access requested by postdrop. It is not expected that this access is required by postdrop and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: Sometimes labeling problems can cause SELinux denials. You could try to restore the default system file context for /var/log/httpd/error_log, restorecon -v '/var/log/httpd/error_log' If this does not work, there is currently no automatic way to allow this access. Instead, you can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Im running exactly the same command. Does anyone have any idea why Im not getting the "Additional information" that I do with CENTOS 5? Thanks in advance Dylan

    Read the article

  • Discover all websites that point to an IP address

    - by crn
    Our company owns over 60 domains and a few external IP addresses (several domains share an external IP address). How do I discover all the domains that use a particular IP address (e.g. 69.x.x.7) without going through the DNS information on each domain? The particular webserver is running Windows 2003 and IIS6. Thanks, in advance, for your help!

    Read the article

  • CPU cores and workers / maxservers

    - by user80666
    I'm trying to optimize my apache and nginx installations and have been looking for information on how to setup correct number or min/max servers and connections in Apache and worker processes in Nginx. I was wondering whether or not Apache and Nginx take advantage of multy core processors and how to set configuration in Apache and Nginx? For example, lets say I have a 4 core processor, should I set workers to 4 in nginx? what should I set spare server in apache to?

    Read the article

  • Tomcat's time problem when app inserts records in DB

    - by xain
    Hi, I have an apache 2 web server working with a tomcat 6 servlet container running on ununtu 9.1, integrated via mod_proxy. I have the following time mismatch problem: When apache log to its access-log file, the date/time is correct. When a grails app running on tomcat inserts date-related information in the DB, the time is three hours ahead Any tips on how to fix tomcat's datetime problem ? Thanks

    Read the article

  • High CPU usage - symptoms moving from server to server after bouncing

    - by grt3kl
    First off, I apologize if I didn't include enough information to properly troubleshoot this issue. This sort of thing isn't my specialty, so it is a learning process. If there's something I need to provide, please let me know and I'll be happy to do what I can. The images associated with my question are at the bottom of this post. We are dealing with a clustered environment of four WebLogic 9.2 Java application servers. The cluster utilizes a round-robin load algorithm. Other details include: Java(TM) 2 Runtime Environment, Standard Edition (build 1.5.0_12-b04) BEA JRockit(R) (build R27.4.0-90_CR352234-91983-1.5.0_12-20071115-1605-linux-x86_64, compiled mode) Basically, I started looking at the servers' performance because our customers are seeing lots of lag at various times of the day. Our servers should easily handle the loads they are given, so it's not clear what's going on. Using HP Performance Manager, I generated some graphs that indicate that the CPU usage is completely out of whack. It seems that, at any given point, one or more of the servers has a CPU utilization of over 50%. I know this isn't particularly high, but I would say it is a red flag based on the CPU utilization of the other servers in the WebLogic cluster. Interesting things to note: The high CPU utilization was occurring only on server02 for several weeks. The server crashed (extremely rare; we are not sure if it's related to this) and upon starting it back up, the CPU utilization was normal on all 4 servers. We restarted all 4 managed servers and the application server (on server01) yesterday, on 2/28. As you can see, server03 and server04 picked up the behavior that was seen on server02 before. The CPU utilization is a Java process owned by the application user (appown). The number of transactions is consistent across all servers. It doesn't seem like any one server is actually handling more than another. If anyone has any ideas or can at least point me in the right direction, that would be great. Again, please let me know if there is any additional information I should post. Thanks!

    Read the article

  • migrating innodb ib* files to different server and distribution.

    - by 3molo
    One of our customers had a break in on an old centos 4.4 machine, so I booted a debian live cd and copied the whole /var/lib/mysql. I then, on a new debian, copied the desired database and ibdata+iblogfiles, and removed the "autoextend" bits from my.cnf - restarted mysql. But I get 'Incorrect information in file'. Paths are the same as the old centos server, and permissions and ownership is correct. What am I missing?

    Read the article

  • Windows Advanced Firewall (Command Line Interface)

    - by Bradford Fisher
    I'm wondering where to find detailed information regarding the Microsoft Advanced Windows Firewall command line settings. For instance, from reading a couple technet articles I've learned that I can run the following: netsh advfirewall firewall set rule group=”File and Printer Sharing” new enable=Yes The bit about 'group="File and Printer Sharing"' is the part I'm having trouble finding documentation for. Any help would be greatly appreciated. And, if possible, I'd rather a pointer to the docs than a simple listing of group names.

    Read the article

  • Looking for good program for cataloging DVD, Video files, ebook

    - by Stecy
    I'm looking for a windows program for cataloging my DVD, video files, ebook, etc... The program must have some retrieval of information from the internet and from the files themselves. Also, one MUST HAVE requirement is that if a file/ebook changes location, I need to be able to change it in the software. Even better if the program allows bulk updating... Update Order of preference is: open-source, freeware, shareware, commercial.

    Read the article

  • Can NULL RRs still be used or should be generally avoided?

    - by Mose
    I'm searching for a way for a placeholder in my bind zone files. I found some information on the NULL RR which would be perfect, but wikipedia states it's obsolete by RFC 883. I read through this RFC but could not find any reference for this statement. Is the NULL RR obsolete or not? Is it acceptable to use it as placeholder? At the moment I use this: somename IN TXT "placeholder"

    Read the article

  • What is the fastest way to type an en dash in Windows 7?

    - by Geoff Olynyk
    Simple question: What's the quickest way to get an en dash (–, Unicode U+2013 EN DASH) in Windows? Note that this question is for all programs, not just Microsoft Word. Even better if it can be copied to the clipboard as a pure Unicode character, with no formatting information (typeface, etc.) so that when I paste it into Word or Excel or other rich text editors, it doesn't carry its format with it.

    Read the article

  • What are the specific uses of these hardware? [closed]

    - by vincentbelkin
    So I'm trying to learn more about databases and information systems. However I need more explanation on the specific purpose of these hardware. I'm not sure if they are servers or what. HP AlphaServer ES47 Tower Tru64 Unix Intel-Based B, Proliant ML350GA Two Intel-Based A Proliant ML570T03 Intel-Based X236 Intel Quad Core Xeon Category B X3500 Poweredge 1400 SC Btw I'm just a college student who wants to know more about these hardware

    Read the article

  • Secure linux distro that sends traffic through Tor

    - by gravestone
    I'm looking for a live Linux distro that is secure and preserves my anonymity online. For what I need, Tor seems to do the job – but such software requires configuration that someone who is not knowledgeable in how it works might find difficult. I was looking at 'Lightweight portable security' but it does not specify whether it sends all traffic through Tor. Does anyone know more information about it and/or any other such live Linux distro?

    Read the article

  • How to disable auto recover?

    - by user70010
    I've tried disabling "Save AutoRecover information" option, but to no avail. The window "Excel has recovered the following files" still pops up at the start. Any other ideas? UPD Auto-recover window is shown each start after I terminate Excel during my debug session. All file entries Excel shows in the auto-recover window are dated by year 1601. I checked Excel auto-recover folder, and there is no any real file there.

    Read the article

  • How can I match an AWS account number to a key and secret

    - by iwein
    My client gave me a key and a secret to manage his EC2 things, but to make one of my AMI's available to run I have to fill in the Account Number. Is it possible to deduce the account number from the key and the secret? Obviously I also asked the client for this information, but since it's weekend and I'm not fond of waiting I wanted to see if I could figure it out myself. Have you done this before?

    Read the article

  • Google Chrome: How do I get my status bar back?

    - by d03boy
    This silly design of the status bar popping up and disappearing is really bothering me. I used to have a few good extensions on my status bar in Firefox (Pagerank, AdBlock, etc) and now they all have to be placed in strange locations on the toolbars near the top without easily displaying any relevant information. Is there a way I can get the status bar back and use it similarly to FF?

    Read the article

  • Creating software raid on spare internal drives with Fedora

    - by Wizzard
    Hi there, I got two internal 80GB drives which are blank and just sitting in the case. I have tried googling for the steps or some info but I can only find out how to setup raid when I am first installing Fedora - not for doing when already setup. These are two new (old) drives, that are blank, the system is not on them so should really just be as simple as formating and then binding them to a raid - but can't find any information. Any clues?

    Read the article

  • Is it possible to copy recordings off of a DVR box hard drive?

    - by bdr9
    My cable TV company gives me a Cisco Explorer 8640HDC DVR box that can record shows from TV. I know that it contains a hard drive to save the shows on. What format and file system are used to store the videos on the hard drive? I have looked at the documentation for this DVR box and there is no technical information about the manner in which recordings are stored. Is it possible to connect the hard drive to a computer and extract the recordings from it?

    Read the article

  • Hard Drive Physical Disc Swap

    - by Sev
    Is it possible, and if so, what would it take to do a hard drive disc swap? If a HD has a damaged PCB board, but the actual disc inside the drive where all the information is stored is not damaged, is it possible to take that disc and put it in another hard drive whose PCB board is not damaged? (as long as both are the same type, SATA to SATA, etc.) Can this be done at home? Any special requirements?

    Read the article

  • Outlook 2007 - Cannot start Outlook - Cannot open the Outlook window.

    - by deanpcmad
    I went to open Outlook 2007 on my Windows 7 32bit machine and it came up with this error: Cannot start Microsoft Office Outlook. Cannot open the Outlook window. The set of folders cannot be opened. The information store could not be opened. I have deleted and created a new profile in Control Panel Mail but it still doesn't want to work properly but it still comes up with this message. Thanks in advance.

    Read the article

  • AD logon script, how to...

    - by allenskd
    I'm a student, I have this assignment where I need to know how to disable the user from changing the background to a client computer, thing is that I've been looking around to know what language does the logon script use, any site with handy information, tried googling but I really can't find anything useful, don't know if I'm googling the right terms All I've found for now is a lot of tutorials about mapping network drives and so on

    Read the article

< Previous Page | 367 368 369 370 371 372 373 374 375 376 377 378  | Next Page >