Search Results

Search found 95133 results on 3806 pages for 'switch user'.

Page 390/3806 | < Previous Page | 386 387 388 389 390 391 392 393 394 395 396 397  | Next Page >

  • How to use dedicated video card instead of onboard?

    - by Mathias Lykkegaard Lorenzen
    Hi there! I tried running DxDiag (DirectX diagnostics), and I noticed that my graphics card is set to the onboard one that comes with the Core i5 processor (some Intel HD stuff). On my computer, I also have a dedicated graphics card (an Nvidia 310). No serious gaming stuff, I know - just for programming. However, I would still love to know how to switch to that dedicated graphics card instead. My laptop is an MSI CX720.

    Read the article

  • Multiple workstation setups using virtualization - best solution

    - by Vazgen
    I'm looking to set up a server for my small startup. I have a few employees and would like to use my computer at home to provide them all with workstations. Each workstation should have the same collection of software installed but each user's workstation should be completely separate from the others. I need each user to be able to remotely log in to their workstation (using TeamViewer or something like it) and I want to be able to monitor their workflow from my screen. I suppose I need a virtualization solution. Can anybody recommend one with easy set up, I'm not a server administrator.

    Read the article

  • Create a dependent drop down list in a single cell in Excel

    - by Larry Anderson
    I am trying to create a dependent drop down list for a High School. The User will select cell A1, Click on Hallway 3(for example), then the user will click on cell A1 again and then select the Room #, 325 (for example). The final result should be that cell A1 shows 325. I can create the first drop down list, but the second part is where I am having great trouble. I am using Excel 2010. Any help would be appreciated. Thanks

    Read the article

  • Is visiting HTTPS websites on a public hotspot secure?

    - by Calmarius
    It's often said that HTTPS SSL/TLS connections are encrypted and said to be secure because the communication between the server and me is encrypted (also provides server authentication) so if someone sniffs my packets, they will need zillions of years to decrypt if using brute force in theory. Let's assume I'm on a public wifi and there is a malicious user on the same wifi who sniffs every packet. Now let's assume I'm trying to access my gmail account using this wifi. My browser does a SSL/TLS handshake with the server and gets the keys to use for encryption and decryption. If that malicious user sniffed all my incoming and outgoing packets. Can he calculate the same keys and read my encrypted traffic too or even send encrypted messages to the server in my name?

    Read the article

  • how i can deal with Uiactionsheet and three20 ?

    - by rain
    i am follow this tutorial http://iosstuff.wordpress.com/2011/0...e20-framework/ I know about displaying a single photo by clicking on one from the thumbnail viewer is provided to you for free by Three20. In addition, the library also provides all of the native functions such as pinch-to-zoom, swiping to navigate and tapping to hide/show the navigation arrows and back button. I want to add a button that if clicked by the user, would display a UIActionSheet with options for sharing the photo by mail or MMS and the user would choose one of them. I see a lot of tutorials about this but I need to do this by my self. so plz help me

    Read the article

  • EXT4 external hard drive for use with multiple systems

    - by EXTdumb
    I recently bought a external hard drive to store some data on. I use Linux but I am not a power user. If I format the drive to EXT4, is it possible for the permissions to ever screw up and I lost access to my data? I will be plugging the drive into several different linux based computers at work and I frequently hop distros on my main home machine. I need to make sure I don't lose any data because I overlooked something. I am not familiar with EXT 3 or 4. So far I have done this : Formatted drive to EXT4 ran gksudo thunar and changed the permissions to my user account and all settings to read/write Wrote all the files I need to the drive I really appreciate any help.

    Read the article

  • How to get cells to default to zero or calculate additonal fees, based on selection from a drop-down list

    - by User300479
    I am building a Pay Rate Calculator worksheet with a Flat/Base pay rate & numerous Overtime pay rates. I would like to be able to have the "Overtime" pay rate cells to change depending on my selection from my drop-down list. My list selections are "Flat Rate" and "Compounding". 1) If I select "Flat Rate" how can I make all the "Overtime" cell rates and totals default to zero or calculate to zero, to show the user there is no overtime rates to be applied to this job and to use the one rate to pay? 2)And if I select "Compounding" the Overtime rate cells are updated to add/include additional fees, to show the user Overtime rates apply to the job and penalties have automatically been calculated on top for them. Please explain like I'm a 2 year old - learning as I go. Many thanks :)

    Read the article

  • Word 2007 "Out of Memory or Disk Space" Error on launch

    - by Adam
    Word 2007 is installed on a Vista Home Premium machine and whenever it starts up it opens what appears to be a dynamic installer to do something and then throws up the "Out of Memory or Disk Space" error. Word 2007 never completes starting up. Reinstalling Word hasn't helped and if I can avoid reinstalling Windows until Windows 7 is released and get Word working in the mean time, that would be ideal. I've been looking around for a solution, once of which seemed to point to a problem with the user account. I created a second user on the machine and Word still had the same problem. The other solution that seems possible is a corrupted normal.dot/normal.dotm file. However, even in the location it should be, I can't seem to find it. Am I going in the right direction with this? Is there another solution I haven't come across that will fix this? If it is possible that renaming normal.dot/normal.dotm how can I find it?

    Read the article

  • How to specify or add directory to Python.h search path during setup.py build/install

    - by ca2longoria
    I'm running Linux, and have downloaded a python module I must install without access to any but my particular /home/user directory (I have no root privileges nor the option to pursue them). This of course requires the Python source. This I've downloaded and have laying around in said user directory. While asking the admin to copy the proper files into /usr/include/python2.7 is the easiest way to go about this, I am hoping for a more general and portable solution to this kind of problem. Changing only data in the module source (MANIFEST.in, README.txt, setup.py, etc.), how might I add an arbitrary directory to the search path for Python.h and friends? (Without a solution, "python setup.py build" will continue returning with the "Python.h: No such file or directory" error) Thank you very much. (Additionally, is it acceptable to post this both here and on StackOverflow?)

    Read the article

  • Emacs / Wanderlust / OSX -- Any ideas what could cause Emacs to acquire focus when using Wanderlust?

    - by lawlist
    I'm using Wanderlust with Emacs on OSX 10.6.8 (Snow Leopard) and frequently switch to a different application while Wanderlust is prefetching e-mails and organizing the summary buffers. At several stages during this process, Emacs acquires focus and steels me away from whatever I was doing in another application. I don't think Wanderlust has any built-in applescripts and I haven't added any, so I have no idea what could be causing Emacs to demand focus. Any ideas how to leave Emacs in the background while updating Wanderlust?

    Read the article

  • What can an effective workflow for changing input methods be on Mac OS X?

    - by Martin Josefsson
    I switch between three languages input methods frequently, sometimes in the same typing session. The default shortcut on a Macintosh seems to be to set keyboard shortcuts for previous/next language (I hit opt-cmd-space to go to previous language) and if you're more than bi-lingual you have to cycle until you find the one for you. The ideal would be something like hitting fn-e for English, fn-j for Japanese and fn-g for German, but anything better than the current state would be a great improvement.

    Read the article

  • Can't type text into table cell when form is protected in Word 2002

    - by Gus
    I created several tables in an Word 2002 document to act as a form for users to fill out. In some cells I added check boxes and dropdown lists for people to select options from. When I click on the Protect form button the check boxes and dropdowns become active; however, I can't type anything in the other cells. If I click in an empty cell it automatically moves to the next checkbox. When I unprotect the form then I can type in the empty cells but then checkboxes and dropdowns become useless. I know that the user can double click on the checkbox and then manually select to have it checked, but they can't do this with the dropdowns. What do I have to do to allow the user to type in responses to the tables cells and also select answers from checkboxes and dropdowns? Thanks!

    Read the article

  • How to set a theme for Windows XP to use before a use logs in?

    - by Ivan
    If Windows XP "welcome screen" is disabled (manually or by joining a domain) an ordinary window is used to log-in (like it was in Windows 2000). This window is styled with default Windows XP "Luna" theme (blue window title, etc). All theme customizations (including turning them off at all to use plain Win2000/98 window style) are normally applied after a user logs-in. How can I alter this? I'd like either to turn off visual styles at all or to apply "Zune" styling to BEFORE a user logs in (and it'd be good to use the same settings as default for new users created).

    Read the article

  • What are the different ways of remotely connecting to your computer?

    - by Rogue
    I'll be leaving for uni soon and would like to know the different methods of connecting remotely to my home pc. I know about VPN but are there any other ways? Also how secure is each of this method as I wouldn't want snoopers on my home-pc especially when I'm away. Also can i set up a remote connection to start and shut down my computer My operating system is windows, but if linux is more secure i would be willing to switch.

    Read the article

  • Firefox/Chrome disable search opening in a new tab

    - by TheBlackBenzKid
    When you select some text with Firefox and Chrome for that matter you can right click the highlight text and search some query (highlight the text above and right click) Search Google for "some query" How can I stop it from opening in the new tab. I cannot find it in about:config or chrome://plugins I don't want it opened in the SAME tab. I want it opened in a NEW tab but I DON'T want Firefox/Chrome to automatically switch to the new tab once opened..

    Read the article

  • Can I fine-tune my screen brightness? (Ubuntu Studio, Thinkpad T420s)

    - by Dan S
    I am in a similar situation as question Can I fine-tune my screen brightness? . For me, Thinkpad T420s and Ubuntu Studio 11.10. The brightness keys work fine but the increments are too large. I have the /sys/class/backlight/acpi_video0 and I can see the value of actual_brightness changing as I use the brightness keys - it changes between values 0,3,6,9,12,15. None of the listed answers for fine control works here, as follows: As the root user I can echo integers to brightness in the above folder. As an ordinary user I cannot. I do not have /usr/sbin/gnome-power-backlight-helper (because I'm using xfce perhaps?), and not sure what package it's from or if installing such a package would make sense since it's not what's currently managing the backlight. How can it be done, please?

    Read the article

  • What does *:* in netstat output stands for?

    - by chello
    While executing the command /usr/sbin/lsof -l -i -P -n under root user, I am getting this output. COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME ... httpd 9164 70 3u IPv4 0x2f70270 0t0 TCP 127.0.0.1:9010 (LISTEN) httpd 9164 70 4u IPv6 0x25af4bc 0t0 TCP *:80 (LISTEN) httpd 9164 70 5u IPv4 0x3149e64 0t0 TCP *:* (CLOSED) httpd 9180 70 3u IPv4 0x2f70270 0t0 TCP 127.0.0.1:9010 (LISTEN) httpd 9180 70 4u IPv6 0x25af4bc 0t0 TCP *:80 (LISTEN) httpd 9180 70 5u IPv4 0x3149e64 0t0 TCP *:* (CLOSED) Please let me know what does *:* stands for? I am interested to know both the ipaddress and port fields. Also what does (CLOSED) mean here?

    Read the article

  • Is there any way to enable remote desktop with a password without setting a password on the os?

    - by Coder
    I'm running Windows 7 and would like to use remote desktop to connect to my home computer. As such i want to enable password security for remote desktop, but I do not want to have to enter a password to log into my computer if i'm physically at my computer. Is there any way to do this? I am an administrator user and I want to have the same icons and configuration regardless of if i log in remotely or locally but i want only the remote connection to require a password. I read about being able to do something similar by adding another user account, but is there any way to do it so that the same icons and settings take affect regardless of how i log in? Thanks.

    Read the article

  • Web-based IMAP client with support for multiple mailboxes

    - by Nils
    I would like to switch from desktop-based e-mail software (Thunderbird) to a web-based solution that I run on my own web server. I have already tried out Roundcube and while it does work reasonably well so far there is one great feature from Thunderbird that seems to be missing - it doesn't allow me to have a unified mailbox for multiple IMAP accounts. Can anybody recommend a web-based IMAP client that has this feature?

    Read the article

  • Where the does sender's name in an e-mail come from and how can I change what name I send?

    - by ChimneyImp
    At work, we use Google Apps to host our e-mail and Outlook to access it. I have a user who recently changed their name. I changed their e-mail address and their account name, but when they send e-mail their old name still appears, no matter whether they send it using Outlook or the gmail web client. For example, e-mail from them in the Gmail web client reads Oldname [email protected] instead of Newname [email protected]. I'm trying to make the user's new name show up when they send an e-mail. Where is the sender's name stored? Is it a part of the e-mail specification, stored in some header somewhere, or is it stored in the e-mail client? If it's possible, how do you change the sender's name in Gmail?

    Read the article

  • Outlook 2010 search stopped working with Exchange 2007

    - by Steve Hiner
    The quick search feature in Outlook 2010 used to work fine. We switched the computers over from a workgroup so that they are on the domain with our new server. We then copied all the email from the old PST file into the new Exchange based folders. Since we did that 3 of the 4 computers can't search email using Outlook's awesome search boxes. One of them works perfectly fine. Any idea what might have happened? There are only 5 users on the network and it's a pretty burly server for such a small network, I can't imagine the server is still indexing their mail. Is the quick search something that has to be turned on or might it be related to the permissions change from a non-domain user to a standard domain user?

    Read the article

  • How to prevent dual booted OSes from damaging each other?

    - by user1252434
    For better compatibility and performance in games I'm thinking about installing Windows additionally to Linux. I have security concerns about this, though. Note: "Windows" in the remaining text includes not only the OS but also any software running on it. Regardless of whether it comes included or is additionally installed, whether it is started intentionally or unintentionally (virus, malware). Is there an easy way to achieve the following requirements: Windows MUST NOT be able to kill my linux partition or my data disk neither single files (virus infection) nor overwriting the whole disk Windows MUST NOT be able to read data disk (- extra protection against spyware) Linux may or may not have access to the windows partition both Linux and Windows should have full access to the graphics card this rules out desktop VM solutions for gaming I want the manufacturer's windows graphics card driver Regarding Windows to be unable to destroy my linux install: this is not just the usual paranoia, that has happened to me in the past. So I don't accept "no ext4 driver" as an argument. Once bitten, twice shy. And even if destruction targeted at specific (linux) files is nearly impossible, there should be no way to shred the whole partition. I may accept the risk of malware breaking out of a barrier (e.g. VM) around the whole windows box, though. Currently I have a system disk (SSD) and a data disk (HDD), both SATA. I expect I have to add another disk. If i don't: even better. My CPU is a Intel Core i5, with VT-x and VT-d available, though untested. Ideas I've had so far: deactivate or hide other HDs until reboot at low level possible? can the boot loader (grub) do this for me? tiny VM layer: load windows in a VM that provides access to almost all hardware, except the HDs any ready made software solution for this? Preferably free. as I said: the main problem seems to be to provide full access to the graphics card hardware switch to cut power to disks commercial products expensive and lots of warnings against cheap home built solutions preferably all three hard disks with one switch (one push) mobile racks - won't wear of daily swapping be a problem?

    Read the article

  • how to setup a ssh acount with no terminal but port forwarding?

    - by admalledd
    I am trying to set up a new user account I can give to friends so they can SSH into my forward computer, and only allow forwarding of certain ports. I do not want my friends to have a shell, or be able to change what ports to where they are allowed to forward. example session: joe(friend) connects using PuTTY (that I have pre-set, he isn't good with computers) to example.com(my Internet facing computer) forwarding ports 8080,1990,25565 to him(with what ever end ports he wants, preferably they stay the same numbers) example ssh command to do similar (but he can still change the ports on my computer!) ssh -N [email protected] -p443 -L8080:192.168.1.2:8080 -L1990:127.0.0.1:1990 -L25565:127.0.0.1:25565 then, same story with other friend smith(same ports, same user even) except he is using linux, so cant use putty. is it possible to also leave default SSH functinality for all other users but this one? I found this when I was searching google, but alas, I did not quite understand what was being suggested, and I don't think they covered restricting port forwarding

    Read the article

  • Is it safe to remove sysvinit package in Debian sid?

    - by ???
    Currently, I have some packages my own using upstart, they are working with the stable branch of Debian. I'm going to switch to sid/unstable, and then the warning comes: WARNING: The following essential packages will be removed. This should NOT be done unless you know exactly what you are doing sysvinit Is it safe to remove sysvinit? P.S. It's a clean base system setup by # debootstrap --variant=buildd sid /sid-root

    Read the article

< Previous Page | 386 387 388 389 390 391 392 393 394 395 396 397  | Next Page >