Search Results

Search found 20283 results on 812 pages for 'security context'.

Page 412/812 | < Previous Page | 408 409 410 411 412 413 414 415 416 417 418 419  | Next Page >

  • pidgin: how to make it log logins/logouts of an ICQ buddy if the conversation tab is still open

    - by Hans
    Hello, when pidgin was called gaim and you had opened a tab with am ICQ buddy, all his logins and logouts were logged during the time you had that tab open. It didnt' even matter if your buddy was online before you opened the tab with him. In pidgin 2.6.6, I this behavior can no longer be observed and I cannot find an option in the preferences or buddy context menu to enable it. How do I restore that behavior from gaim time? Thanks!

    Read the article

  • Would SSL prevent replay tampering by the authenticated user

    - by Coder 42
    In the context of a game (HTML5/Flash/Silverlight) which sends data to an online service to record progress (e.g. player killed an orc), would communicating with the service over SSL implicitly prevent the player from recording and replaying the message? I know SSL includes a nonce, but does it remain constant for the duration of the connection or does it change after each request/response cycle?

    Read the article

  • Linux (redhat) how to change password to previous password

    - by ring bearer
    Is there a way to change password to value same as the previous password? I know this is a security flaw, but would like to know however. when I try this: [mrbean@wwwserver ~]$ passwd Changing password for user mrbean. Changing password for mrbean (current) UNIX password: New UNIX password: -- here i typed same password BAD PASSWORD: is too similar to the old one.

    Read the article

  • How to remove folder from Explorer's jump list

    - by m.floryan
    I'm using Windows 7 and Windows Explorer some folders were added to the taskbar jump list (under the Frequent section) that no longer exist. When I try to remove those folders from the jump list (using context menu's "Remove from this list" option) nothing happens and the folders are still shown. When I try to access those non-existing folders windows prompts that selected item is not available and asks whether I want to remove it from the list. Regardless if I select "Yes" or "No" the folder still remains in the list.

    Read the article

  • Keyboard shortcut for creating a new folder or file? (Windows)

    - by BenA
    Does anybody know if there's a keyboard shortcut equivilant to the right click - New context menu in explorer? Given that I suspect that there isn't, does anybody know of an explorer extension that offers something similar? It would be great to have a key combination that yielded an intellisense style dropdown (or similar) of the available file types!

    Read the article

  • How to provide wireless internet in a small business?

    - by ColinYounger
    My wife has a small business that she wants to offer a free WiFi hotspot in. She suggested opening up our private 'net connection to the customers - T&Cs of our internet provider and thoughts of random people viewing kiddy porn floated through my mind. So, first action will be to get a separate internet connection. But I have no experience of setting up a public WiFi connection. What considerations should I make with regards to: WAP Security Access logging?

    Read the article

  • How to provide wireless internet in a small business?

    - by ColinYounger
    My wife has a small business that she wants to offer a free WiFi hotspot in. She suggested opening up our private 'net connection to the customers - T&Cs of our internet provider and thoughts of random people viewing kiddy porn floated through my mind. So, first action will be to get a separate internet connection. But I have no experience of setting up a public WiFi connection. What considerations should I make with regards to: WAP Security Access logging?

    Read the article

  • I can't delete a directory inside a junctioned directory

    - by Fredy Muñoz
    So this is the deal. A couple of days ago I moved my profile folder C:\Documents and Settings\fmunoz to a different drive D:\fmunoz. Today, I created a directory in my desktop using the point-and-click method: Right-click on an empty space in the desktop Select New Select Folder Leave the default name New Folder and press Enter I tried to delete the folder using the point-and-click method: Right-click the New Folder directory Select Delete After five seconds, I got the following message: --------------------------- Error Deleting File or Folder --------------------------- Cannot delete New Folder: Access is denied. Make sure the disk is not full or write-protected and that the file is not currently in use. --------------------------- Initially I thought that there must be some sort of indexing services locking the directory so I got a list of open files using the TuneUp Process Manager tool but the New Folder directory wasn't there. I double-clicked My Computer, navigated to the desktop directory C:\Documents and Settings\fmunoz\Destkop, tried to delete the New Folder directory using the same point-and-click method described above and got exactly the same message at the same amount of time. In the same window, I navigated to the actual location of the desktop directory D:\fmunoz\Desktop, tried to delete the New Folder directory and this time it worked. I thought that this behavior was due to some special treatment that Windows gives to the desktop or the profile directories so I tried doing the same thing with a different set of directories: Created a folder D:\dummy Created a junction C:\dummy pointing to D:\dummy Created a New Folder directory in C:\dummy Tried to delete New Folder from C:\dummy. Didn't work. Tried to delete New Folder from D:\dummy. It worked. I tried creating the folder in the actual directory rather than the junction directory: Created a New Folder directory in D:\dummy Tried to delete New Folder from C:\dummy. Didn't work. Tried to delete New Folder from D:\dummy. It worked. I also tried using the Delete button instead of using the Delete option of the context menu but it didn't work. When using the Shift+Delete sequence, it works. It also works by using the rd command in the console, but in both cases the deleted directory doesn't goes to the Recycle Bin, which is my intention when using the Delete context menu option or the Delete button.

    Read the article

  • Replace IIS 403 with 404 for Directory Listing

    - by dahlbyk
    Is it possible to have IIS (6 or 7.5) return a 404 Not Found (instead of 403 Forbidden) when a disallowed directory listing is requested? A security scanning service I use thinks the 403 is revealing something "potentially sensitive", when in fact it's just not a valid URL. My workaround is to drop a default.aspx into each directory that returns an empty 404 page, but there has to be a better way...

    Read the article

  • What is the difference between running a Windows service vs. running through shell?

    - by Zack
    I am trying to troubleshoot an issue on a Windows 2008 server where running attempting to connect to a "Timberline Data Source" ODBC driver crashes if the call is in a "service" context, but succeeds if the call is initiated manually in a Remote Desktop session. I have set the service to run as my user. I'm wondering if, all else being equal (user, machine, etc), are there any fundamental security/environment differences between running a process as a service vs manually? --- Implementation Details --- In case it is helpful for anyone, I had a system that started as an attempt to connect to a Timberline Database using ODBC and a Python CGI script called via IIS 7. The script itself works fine, however, as soon as I attempt to perform the ODBC connect function, the script crashes without throwing an exception. The script was able to connect fine when executed via command line. The same thing happened when using a C#/.net service, attempting to run via Apache, Windows Scheduler or even a 3rd party scheduling tool. With the last option (the 3rd party scheduling tool, pycron) I set the service up log in as my user and had the same issue (I confirmed via Task Manager that the process running user was, in fact, me). It just doesn't make sense to me why a service, which should be running as my user, appears to still be operating in a different security context or environment. Also, if it's important, the Timberline database is referenced by computer name on the network ("\\timberline-server\Timberline Office\Accounts\AT" or something to that effect) I also realized that, as Joel pointed out, the server DOES have a mapped drive ("Y:" which is mapped to "\\timberline-server\Timberline Office") The DSN is set up at the "System DSN" level which, according to the ODBC Administration Tool, means that the DSN is available to users and services Since I'm not allowed to answer this question yet, I'll post the solution that I arrived on: As Joel Coel mentioned, there actually was a mapped drive scenario. I didn't realize this because the DSN specified a path using UNC. However, it seems as though the actual Timberline Driver referred to a mapped drive. Since services don't start with the mapped drive, I was forced to add the drive mapping code into my service. Since it was written in python, I used code from a Stackoverflow answer that was able to map the drive on the fly.

    Read the article

  • Windows 7 Homegroup with ess 4.0

    - by Noam Gal
    I am trying to setup a homegroup between two win7 computers, and apparently my Eset Security Service is blocking the traffic. When I disable the firewall on both computers the homegroup works fine. Is there a known fix/workaround for it?

    Read the article

  • Install Second Copy of Windows in a Partition, Block Access to other Partitions

    - by Mat
    I want to lend my computer to my flatmate so that he can play some games for which his computer is underpowered. Is it possible to install a second copy of Windows 7 into a separate partition and configure it such that it has no access to the other partitions and disks on the computer, the ones that I use in my main Windows install? I'm not concerned about security, just want to avoid him accidentially messing with my data somehow. Can I do that?

    Read the article

  • How to add tags to emails in Gmail

    - by martani_net
    I want a way to tag emails in Gmail so that I can remember their sources and context. I'm not talking about labels, imagine this scenario; I sent an email to more than 8 recipients, and then they answered me, each recipient is teaching a different course, and I want to tag each received email with its specific course. All the emails are under one label as you see in the following picture: Is there any way to tag email in Gmail, the same way we can tag posts on Google reader? Thank you

    Read the article

  • How can I recursively verify the permissions within a given subdirectory?

    - by Mike
    I'd like to verify that nothing within /foo/bar is chmod 777. Or, alternatively, I'd like to make sure that nothing within /foo/bar us owned by user1 or in group1. Is there any way I can recursively verify the permissions within a given subdirectory to make sure there aren't any security holes? Notice that I do not want to change all the permissions to something specific, nor do I want to change the owner to something specific, so a recursive chmod or chown won't do it... Thanks!

    Read the article

  • What are the most common dangerous domains that I should block?

    - by Dalia
    I am trying to configure my wireless router to block domains that are potentially dangerous to privacy, security, and bandwidth-hogs. Is there a list of domains that I can block at the router level? On a machine level, I have set the hosts file from www.mvps.org and that works on my machine. However, I want to implement something at the router level too - so that all computers in my household are somewhat protected.

    Read the article

  • Which user does PHP/IIS6 use to read/write files?

    - by Stung
    Hi, I've installed PHP5 (FastCGI) on IIS6 and is just wondering which windows user PHP uses to access the file system? With ASP.NET for example, the ASPNET account is used to access the file system. But how about PHP? I've read some post that suggest it uses the anonymous (i.e. IUSR) account. But isn't it a security breach if I give write access to the IUSR account? Thanks!

    Read the article

  • Vmware Player network adapters have no network or internet access in Windows 7 enterprise

    - by daffers
    As per the title. My VMWare player installation has setup the two network adaptor VMnet1 and VMnet8 and they are picked up as unidentified networks with no network access (i need this to activate my windows server installation on it). The option to change the network location is not available (this might be because of network policy on the domain despite having set this as configurable in the local security policy section). Is there anyway i can change how these networks are detected or alter the configuration of vmware to get around this?

    Read the article

  • Addig a second samba server to windows domain

    - by Eric
    Hi, I'm trying to add a second samba server (stand alone) to our windows domain, managed by a Samba server, but we've had some problems, we see the server and the shares, but cannot access the shares. We decided to start with minimal configuration. [global] netbios name = GINGER wins server = 192.168.0.2 workgroup = DOMAIN1 os level = 20 security = share passdb backend = tdbsam preferred master = no domain master = no [data] comment = Data path = /home/data guest only = Yes Again trying to access the share gives permissions error. Thanks,

    Read the article

  • Why internet is said to be untrusted network?

    - by Ant's
    From wikipedia : 2 In computer security, a DMZ (sometimes referred to as a perimeter networking) is a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet. Why it says larger untrusted network, usually the Internet. I see it many places that internet is said to be untrusted network. Are there any reason for it?

    Read the article

  • I am not able to open gmail and some other sites.

    - by pam
    Last day my system got hanged so I restarted and recovered windows to the the date of 1 day before. Now I am not able to open gmail, orkut and some other sites. When I try to open these sites I receive this message: This Connection is Untrusted www.google.com uses an invalid security certificate. The certificate is not trusted because it is self-signed. The certificate is only valid for 78-159-121-94.local (Error code: sec_error_untrusted_issuer)

    Read the article

  • How to add a startup/shutdown script to the GPO from the command line

    - by thomasjames
    I need to add startup and shutdown scripts from a CLI through a Powershell/Python/CMD script. Ideally, I would like to have the same functionality as gpedit.msc, but it is important that the tasks of adding and removing such scripts do not require user interaction and can be done entirely within the context of a script. Currently, the scripts here seem to be in the same category, but none of them explicitly address editing startup and shutdown scripts: http://msdn.microsoft.com/en-us/library/aa814151(v=vs.85).aspx Let me know if anyone has any ideas and thanks in advance.

    Read the article

  • Should /tmp be owned by root?

    - by cathy02
    Hello, I'm wondering if /tmp should be owned by root, or rather nobody? Now with safe mode there are some conflicts, but I am worried about security if I change it to be owned by nobody... Any advice will be very appreciated.

    Read the article

  • 'No volume found' on Windows 7 VM (VHD), can I get anything back?

    - by duka34
    The worst possible situation... Despite my vigilence doing backups, and trying to keep my PC secure, one of my VMs disk seems to be wiped out. Using the VHD tool from R1Soft (HyperV VHD Explorer), when I attach the VHD, it says no volumes found so it looks like something wiped out the VHD (which it still its original size). It seems that something has sneaked through whatever security I have/had and has wreaked havoc. Can I recover anything from this?

    Read the article

< Previous Page | 408 409 410 411 412 413 414 415 416 417 418 419  | Next Page >