Search Results

Search found 20429 results on 818 pages for 'software restriction'.

Page 405/818 | < Previous Page | 401 402 403 404 405 406 407 408 409 410 411 412  | Next Page >

  • Windows Media Center HDMI Capture Cards

    - by RSolberg
    I'm working on a new software application that utilizes windows media center to play recorded TV shows in the center of the screen. We can get this to work with standard coax or RCA input TV Tuner/Capture cards. My question is this... Are there any TV tuner / capture cards out there that allow you to use Windows Media Center with an HDMI input of some kind?

    Read the article

  • How I can determine the sector size on an external hard drive?

    - by sigint
    Hard drives are transitioning from 512 byte to 4096 byte sector sizes, and it looks like Windows XP won't support these newer drives without additional software (such as WDalign from Western Digital) My question is: how does this affect external hard drives? I'll be buying a 1TB USB external drive, and it'll be plugged into a mix of Windows 7 and XP machines. Is there an easy way to tell what the sector size on an external hard drive is?

    Read the article

  • Dell Studio 17 with two headphone outs

    - by eych
    Got a Studio 17 with two headphone out jacks. It also has Soundblaster X-Fi Hi Def Audio Software enabled. Would it be possible to use one of the headphone outs as a monitor and the other as a master out with the Soundblaster sofware (for djing), or do you think the two jacks are just one output split into two?

    Read the article

  • Virtual Microphone and skype

    - by Dario
    I need to have at least one microphone on Windows to make Skype calls, but i have a VPS with Windows 2003 server with no audio device. I googled a lot and finally i found something called "Virtual Audio Cable", a tool to install virtual audio drivers ( http://software.muzychenko.net/eng/vac.html ). I tried many times but i couldn't get this driver work, so i'm asking if someone know a similar solution, i mean a virtual microphone or a way to make skype working without any microphone. Thanks all!

    Read the article

  • How do I reset an USB device without unplugging it in Linux?

    - by Grumbel
    Every now and then there might come a need to reset a USB device, is there a way to perform the reset in software without unplugging the device itself and the pluggin it back in? More specifically I have a webcam which gets confused when playing to much with the settings in guvcapture and then needs a reset to get back on track.

    Read the article

  • SYSTEM hive of the register is causing computer to BSOD on boot

    - by FernandoSBS
    After some work on my computer, perhaps some updates installs, it didn't boot anymore. BSOD on windows logo loading. After some research I've found out that if I replace the SYSTEM hive of the register with the last backup it boots ok, but of course goes back to an old stage of machine setup. So my question is: where does register stores hardware and/or updates/software that loads in the machine boot, so that I can check which program is producing that BSOD and disable it? System is Win 7 64 bits SP1

    Read the article

  • What do I need to use Smart card for windows login (no domain, just regular single local machine)

    - by Muhammad Nour
    I have a reader from ACS "ACR83" and a brand new card from the same place ACO3-32 as a development kit and I need to use both of them to login into my laptop locally I am not a part of domain, I am using Windows xp SP3 what should I do to enable smart card login do I need third party software to do this without domain or should it be a domain environment to be able to do such a thing this is the first time dealing with smart card, so I hope some one will help me Doing this

    Read the article

  • Cheap hackable portable mp3 player

    - by monov
    I want something that will: play mp3s fit in my pocket have a 3.5mm audio jack let me write software for it cost $50 max I guess a cheap mobile phone could satisfy that too. Don't care much for brand names. Any ideas?

    Read the article

  • Sprint MMS: APN, WAP, and MMSC?

    - by colithium
    I am attempting to use some third party software to send an MMS Message through an attached Sprint mobile phone. The problem is, I cannot find Sprint's specific configuration anywhere. Example configuration for many providers can be found here. Specifically, I need: APN (Access Point Name) WAP (Wireless Application Protocol) Gateway Provider MMSC (MMS Store and Forward Server) Potentially a Login/Password if Used Note: I already have a request into ActiveXperts, no response yet.

    Read the article

  • How can I replicate incoming imap mail to another folder?

    - by vy32
    I am using Apple's Mobile Me and am looking for a program that I can leave running on a Unix server somewhere that will monitor the IMAP INBOX and automatically copy all incoming messages to another mailbox (call it Archive). I've tried implementing this myself in python with imaplib2 and the IDLE command and have found that my connection keeps getting disconnected. Is there any off-the-shelf open source software that I can use to do this?

    Read the article

  • How do I profile the startup process in OS X 10.5?

    - by Alex Mcp
    When I bought my MBP 2.2 GHZ in 2007, it got from dead to an active dock in about 18 seconds, and now it takes about 1:30 to get a fully responsive home screen. I want to find a way to profile the various things it does when it starts up so I can begin tuning it a bit. Any good software or other recommendations for this process?

    Read the article

  • AWS EC2 - How to specify an IAM role for an instance being launched via awscli

    - by Skaperen
    I am using the "aws ec2 run-instances" command (from the awscli package) to launch an instance in AWS EC2. I want to set an IAM role on the instance I am launching. The IAM role is configured and I can use it successfully when launching an instance from the AWS web UI. But when I try to do this using that command, and the "--iam-instance-profile" option, it failed. Doing "aws ec2 run-instances help" shows Arn= and Name= subfields for the value. When I try to look up the Arn using "aws iam list-instance-profiles" it gives this error message: A client error (AccessDenied) occurred: User: arn:aws:sts::xxxxxxxxxxxx:assumed-role/shell/i-15c2766d is not authorized to perform: iam:ListInstanceProfiles on resource: arn:aws:iam::xxxxxxxxxxxx:instance-profile/ (where xxxxxxxxxxxx is my AWS 12-digit account number) I looked up the Arn string via the web UI and used that via "--iam-instance-profile Arn=arn:aws:iam::xxxxxxxxxxxx:instance-profile/shell" on the run-instances command, and that failed with: A client error (UnauthorizedOperation) occurred: You are not authorized to perform this operation. If I leave off the "--iam-instance-profile" option entirely, the instance will launch but it will not have the IAM role setting I need. So the permission seems to have something to do with using "--iam-instance-profile" or accessing IAM data. I repeated several times in case of AWS glitches (they happen sometimes) and no success. I suspected that perhaps there is a restriction that an instance with an IAM role is not allowed to launch an instance with a more powerful IAM role. But in this case, the instance I am doing the command in has the same IAM role that I am trying to use. named "shell" (though I also tried using another one, no luck). Is setting an IAM role not even permitted from an instance (via its IAM role credentials)? Is there some higher IAM role permission needed to use IAM roles, than is needed for just launching a plain instance? Is "--iam-instance-profile" the appropriate way to specify an IAM role? Do I need to use a subset of the Arn string, or format it in some other way? Is it possible to set up an IAM role that can do any IAM role accesses (maybe a "Super Root IAM" ... making up this name)? FYI, everything involves Linux running on the instances. Also, I am running all this from an instance because I could not get these tools installed on my desktop. That and I do not want to put my IAM user credentials on any AWS storage as advised by AWS here. after answered: I did not mention the launching instance permission of "PowerUserAccess" (vs. "AdministratorAccess") because I did not realize additional access was needed at the time the question was asked. I assumed that the IAM role was "information" attached to the launch. But it really is more than that. It is a granting of permission.

    Read the article

  • I can't get the Samsung PC Studio to work on Vista or Windows 7

    - by Mike Farrington
    Has anyone got a solution to this problem have asked Samsung but no reply yet! The software installs OK and the drivers, it sees the Tocco Lite when connected but will not actually connect! error message can't change mode or can't connect as "no response from the device because it is in the initializing stage. Try again after the initialization has completed" but it never does. Please Help!!! Mike

    Read the article

  • Download Virus/Malware Purposefully

    - by Matt Hanson
    Where can I download a virus, work, trojan, etc. for analysis? Yes, I'm actually hunting for malware, rather than keeping it at bay and hiding behind antivirus software and firewalls. I plan to analyze it in a lab for a project, but don't know where to even begin finding one.

    Read the article

  • Which ports to open on host firewall so that network printing and scanning works?

    - by George Pligor
    I have a multi-functional machine which is both a laser printer and a scanner (Samsung SC-4705ND) I am not able to make the scanner work with the (software) firewall installed in my computer turned on. Operating system is ubuntu 12.04 with regular firewall. if firewall is turned off then everything works as expected I run nmap to discover open services on the samsung machine and I opened all these ports: 80, 427, 515, 631, 5200, 9100, 10001 but with not luck.. How should I configure firewall?

    Read the article

  • PCI-DSS compliance for business with only swipe terminals [migrated]

    - by rowatt
    I support the IT infrastructure for a small retail business which is now required to undergo a PCI-DSS assessment. The payment service and terminal provider (Streamline) has asked that we use Trustwave to do the PCI-DSS certification. The problem I face is that if I answer all questions and follow Trustwave's requirements to the letter, we will have to invest significantly in networking equipment to segment LANs and /or do internal vulnerability scanning, while at the same time Streamline assures me that the terminals we have (Verifone VX670-B and MagIC3 X-8) are secure, don't store any credit card information and are PCI-DSS compliant so by implication we don't need to take any action to ensure their network security. I'm looking for any suggestions as to how we can most easily meet the networking requirements for PCI-DSS. Some background on our current network setup: single wired LAN, also with WiFi turned on (though if this creates any PCI-DSS complexities we can turn it off). single Netgear ADSL router. This is the only firewall we have in place, and the firewall is out the box configuration (i.e. no DMZ, SNMP etc). Passwords have been changed though :-) a few windows PCs and 2 windows based tills, none of which ever see any credit card information at all. two swipe terminals. Until a few months ago (before we were told we had to be PCI-DSS certified) these terminals did auth/capture over the phone. Streamline suggested we moved to their IP Broadband service, which instead uses an SSL encrypted channel over the internet to do auth/capture, so we now use that service. We don't do any ecommerce or receive payments over the internet. All transactions are either cardholder present, or MOTO with details given over phone and typed direct into terminal. We're based in the UK. As I currently understand it we have three options in order to get PCI-DSS certification. segment our network so the POS terminals are isolated from all PCs, and set up internal vulnerability scanning on that network. don't segment the network, and have to do more internal scanning and have more onerous management of PCs than I think we need (for example, though the tills are Windows based, they are fully managed so I have no control over software update policies, anti virus etc). All PCs have anti virus (MSE) and windows updates automatically applied, but we don't have any centralised go back to auth/capture over phone lines. I can't imagine we are the first merchant to be in this situation. I'm looking for any recommendations a simple, cost effective way to be PCI-DSS compliant - either by doing 1 or 2 above with (hopefully) simple and inexpensive equipment/software, or any other ways if there's a better way to do this. Or... should we just go back to the digital stone age and do auth/capture over the phone, which means we don't need to do anything on our network to be PCI-DSS certified?

    Read the article

  • autologin on webpage?

    - by blackjack
    hi i need to type in my username and pass to connect to internet through a captive portal provided by my isp is there a automatic way(any software/script) to type in info(in username and pass fields) and login without me typing and pressing that %$^& login button every time on my browser(chrome)?

    Read the article

  • Weird characters while merging text files

    - by Mirage
    When i open the text file in windows the text looks fine. But when i use text miler merger software then it shows some weird chinese characters for that files. but i reads ok the files after. how can i make all the files to same encoding so that they appear readable thanks

    Read the article

  • Ubuntu Equivalent of Unix Command cp -n

    - by Ted Karmel
    A software I need to install on my Ubuntu Hardy has a MAKE file which includes the command cp -n. However, I get an error stating the -n is an invalid option. The command will work on a Mac terminal but I need it to work on Ubuntu. Does anyone know the equivalent command for Ubuntu? Thanks.

    Read the article

  • Layman's book for understanding computer networks

    - by srid
    The good thing about books targeting a layman is that it is usually very engaging to read (not dry and boring like, say, school/university books). Charles Petzold's Code: The Hidden Language of Computer Hardware and Software does this for explaining the underlying hardware in computers. Is there a similar book for understanding computer networking?

    Read the article

< Previous Page | 401 402 403 404 405 406 407 408 409 410 411 412  | Next Page >