Search Results

Search found 42453 results on 1699 pages for 'question'.

Page 413/1699 | < Previous Page | 409 410 411 412 413 414 415 416 417 418 419 420  | Next Page >

  • cPanel equivalent- free please

    - by RN
    I have a shared hosting where I got used to using cPanel for managing my domains and stuff Now I am moving to a (unix based) VPS hosting, and the plan that I have chosen comes without cPanel. Since I have the root access, I should be able to install virtually anything I desire So my question is Can you suggest some open source\free solution which will give me the same features as cPanel?

    Read the article

  • Amazon EC2 tools for Debian?

    - by Jonik
    What is the recommended way of getting command-line Amazon EC2 tools on Debian? So, basically the same as this question, but for EC2 instead of S3. Ubuntu has ec2-ami-tools and ec2-api-tools, but I couldn't find equivalent packages for Debian. A blog post titled "Install EC2 AMI & API tools in Debian" talks about installing Amazon's packages outside package management, but that seems a little clumsy.

    Read the article

  • Apache LimitExcept not behaving as expected

    - by Farseeker
    I have the following directive in my Apache httpd.conf: <LimitExcept OPTIONS PROPFIND REPORT> deny from all </LimitExcept> OPTIONS and PROPFIND work as expected, but REPORT returns 400: Bad Request. Removing the LimitExcept alltogether and everything works as expected. Any ideas on why this might be? (This is the implementation of my question here).

    Read the article

  • Ubuntu 9.10 Technika H16WC-01 Webcam

    - by user32976
    I know this is a lame cheap web camera, thus making it all the harder for me to find information about it. Ubuntu seems to recognise it, putting it in as /dev/video0 Skype is able to see that the web cam is there, but can not get any picture data. Flash doesn't even pick up that the web cam exists. I feel foolish asking such a lame question... but any help will be cool beans!

    Read the article

  • How are virtual machine integration packages implemented? [duplicate]

    - by gparyani
    This question already has an answer here: What happen if I install VirtualBox Guest Additions on a host? 1 answer If I install a virtual machine additions package on a virtual machine, (e.g. Virtual Machine Additions for Microsoft Virtual PC 2007, Integration Components on Windows Virtual PC, and Guest Additions on Oracle VM VirtualBox), what happens in the backend on the virtual machine when I enable integration features like mouse pointer integration, window resizing, and folder sharing? In other words, how is it internally implemented?

    Read the article

  • How to configure an isa server to allow a OPENvpn client to connect to an outside server?

    - by rmarimon
    I'm trying to configure an ISA server (not really my area of expertise) to allow an openvpn client (in the lan) access to an outside openvpn server (in the wan). The openvpn configuration I'm using has worked everywhere. In fact if I take the client outside the lan where the isa server is located, it works perfectly. Inside the isa server lan nothing. The question is what configuration do I need to put on the isa server to allow openvpn traffic to go through?

    Read the article

  • Do you know of any alternative to "Google App Engine"?

    - by brilliant
    On their presentation of "Google App Engine" Google team members boldly said: "You write a code and we will run it for you". Then the "Google App Engine" was launched and it still does its job quite successfully - "Google App Engine" runs millions of applications of different sizes belonging to different users completely free!!! Now, here is the question: Do You know of any alternative to GAE? Have You ever even heard of any such service out there that would run Your Python code for free?

    Read the article

  • Change windows hostname from command line

    - by Joe
    This question is related to http://stackoverflow.com/questions/54989/change-windows-hostname-from-command-line, but I'm in a different situation. The netdom tool will not work on a computer not joined to a domain. I've tried setting the hostname from the registry, but I was wondering if there was another way from the command-line.

    Read the article

  • Windows 8 Native App in Asp.net MVC?

    - by xiao
    I was not sure if this should be here or stackoverflow. I am looking at developing some windows 8 apps. I come from a web background and was really intrigued that you make them with html and javascript. I started to think though why can't you use asp.net mvc to build a windows 8 application. My question is can you somehow use asp.net mvc to build a native windows 8 application or are you suck with javascript and html?

    Read the article

  • SQL Server 2008 intellisense not working

    - by Ardman
    Am not sure which site this is supposed to be posted on, but after installing SSMS Tools, my intellisense is no longer working. Please see this question: http://stackoverflow.com/questions/2816861/sql-server-2008-intellisense-no-longer-working

    Read the article

  • Can I install a clean copy of windows 8 using an upgrade licence key?

    - by Mr. Alien
    Ok so question says it all, I want to buy Windows 8 but don't want to shell out 3.5k for buying a new disc, my friend is already having it. So what I want to know is can I buy an upgrade license which is around 1.99k, and install a clean Windows 8 OS(I want a complete clean install, no upgrading) on my system using my friends Windows 8 disc with my upgrade license or I need to buy a completely new retail copy?

    Read the article

  • Preventing 'Reply-All' to Exchange Distribution Groups

    - by Larold
    This is another question in a short series regarding a challenging Exchange project my co-workers have been asked to implement. (I'm helping even though I'm primarily a Unix guy because I volunteered to learn powershell and implement as much of the project in code as I could.) Background: We have been asked to create many distribution groups, say about 500+. These groups will contain two types of members. (Apologies if I get these terms wrong.) One type will be internal AD users, and the other type will be external users that I create Mail Contact entries for. We have been asked to make it so that a "Reply All" is not possible to any messages sent to these groups. I don't believe that is 100% possible to enforce for the following reasons. My question is - is my following reasoning sound? If not, please feel free to educate me on if / how things can properly be implemeneted. Thanks! My reasoning on why it's impossible to prevent 100% of potential reply-all actions: An interal AD user could put the DL in their To: field. They then click the '+' to expand the group. The group contains two external mail contacts. The message is sent to everyone, including those external contacts. External user #1 decides to reply-all, and his mail goes to, at least, external user #2, which wouldn't even involve our Exchange mail relays. An internal AD user could place the DL in their Outlook To: field, then click the '+' button to expand the DL. They then fire off an email to everyone that was in the group. (But the individual addresses are listed in the 'To:' field.) Because we now have a message sent to multiple recipients in the To: field, the addresses have been "exposed", and anyone is free to reply-all, and the messages just get sent to everyone in the To: field. Even if we try to set a Reply-To: field for all of these DLs, external mail clients are not obligated to abide by it, or force users to abide by it. Are my two points above valid? (I admit, they are somewhat similar.) Am I correct to tell our leadership "It is not possible to prevent 100% of the cases where someone will want to Reply-All to these groups UNLESS we train the users sending emails to these groups that the Bcc: field is to be used at all times." I am dying for any insight or parts of the equation I'm not seeing clearly. Thank you!!!

    Read the article

  • Does using a tiling window manager make a terminal multiplexer obsolete?

    - by Jan Westerdiep
    Since about half a year I have been enjoying a terminal multiplexer (tmux, to whomever it may concern), and have grown to like it. I would like to try a tiling WM as opposed to a stacked one some time in the future but cannot wrap my head around this simple question: Why would one use the splits in a multiplexer within a tiling WM? Is there an upside, besides of course the single instance you'd be running?

    Read the article

  • Is ECC mandatory in SSD technology?

    - by Alexander Shcheblikin
    While shopping for an SSD I have noticed that some manufacturers promote their "Pro" models as the ones sporting ECC data protection. Those manufacturers do not mention ECC in their budget models descriptions. However, Wikipedia article on flash memory states that "NAND relies on ECC to compensate for bits that may spontaneously fail during normal device operation." So the question is does any SSD device use ECC behind the scenes for its normal operation and is that ECC "feature" just a marketing ploy?

    Read the article

  • Determine the Ports reserved and what service reserved them in Windows XP/2003

    - by bogha
    hi, this question is always rise. How can i know what ports are currently reserved in windows XP/2003 and what service had reserved them. for example when i want to install Apache, default port will be 80, but sometimes the Server will have IIS installed on the same port. so i want to know the way to check the ports and what services had reserved them and also if there is a way to re assign those ports to different services. thank you

    Read the article

  • Trusted Sites via GPO: <*.> gets left off

    - by HannesFostie
    As stated in the question title: one of our end users has to make use of a web application which requires her to add the website to trusted sites. By default, this is disabled, but after my colleague added the sites to the GPO pushing these in such form: *.domain.com it shows up as domain.com in her trusted sites. Has anyone encountered or even fixed this issue?

    Read the article

  • WINDOWS 7 SOFTWARE PROBLEM

    - by PHILIP KIRK
    I am running Windows 7 and have adjusted something which has caused all of my shortcuts and program icons to show the same program namely Adobe Reader and when I click on any of the icon or shortcuts they only open Adobe reader, I have reinstalled Windows 7 But this has made no change, I posted this question yesterday but apparently with not enough information I hope this is better and someone can help.

    Read the article

  • Unicorn: Sub-Url Generated Links Broken

    - by YellowJK
    I am currently trying to stand up an instance of redmine, however currently The generated links in my redmine instance are all broken. I am attempting to serve redmine from a sub-url i.e example.com/redmine I have searched, but I have not found any information on a prefix option (similar to mongrel) I currently have the assets and formatting working properly, from my previous question. Redmine served via Apache / Unicorn My current setup is apache / unicorn Thanks in adavanced

    Read the article

  • What to use for Shell Access?

    - by Aristotle
    I just purchased a virtual dedicated server-plan that comes with shell access. It's been a while since I've actually used shell access remotely, so I'm a bit behind the times. Years ago I used PuTTY, but I'm curious if there are any better options that I should consider for establishing that connection, and managing my server remotely. I figured this question would be most appropriately asked here since it is regarding tools.

    Read the article

  • ConfigServer Security and Firewall -- after setup, how much daily management required?

    - by Hope4You
    I'm looking at using ConfigServer Security and Firewall (CSF; iptables-based). After I configure it properly, how much daily ongoing management is required of me to keep my server secure? Am I going to be flooded with "alert" emails that I need to check? Or does the firewall automatically take care of most security threats for me? Note: I understand that there's more to server security than just a software firewall, but this question is specifically for CSF security management.

    Read the article

  • dnsmasq local network works for some but hostnames are not resolving for others

    - by prggmr
    I have set up a local network and it seems that some of us can use it properly while others can't. The problem seems to be that the local hostnames I setup don't get resolved for everyone. To overview how the network is setup: I am running an Ubuntu 10.01 server using dnsmasq, this server is setup to act as our primary DNS server, configured via our router. dnsmasq is configured using the options of domain-needed bogus-priv I use the /etc/hosts file to determain the hostnames 192.168.1.10 ra.xsi 192.168.1.10 test.xsi From my machine: If I dig the hostnames they resolve properly ; <<>> DiG 9.4.3-P1 <<>> ra.xsi ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61671 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;ra.xsi. IN A ;; ANSWER SECTION: ra.xsi. 0 IN A 192.168.1.10 ;; Query time: 9 msec ;; SERVER: 192.168.1.10#53(192.168.1.10) ;; WHEN: Wed Nov 9 12:28:34 2011 ;; MSG SIZE rcvd: 40 Ping also works: PING ra.xsi (192.168.1.10): 56 data bytes 64 bytes from 192.168.1.10: icmp_seq=0 ttl=64 time=0.834 ms 64 bytes from 192.168.1.10: icmp_seq=1 ttl=64 time=0.699 ms ^C --- ra.xsi ping statistics --- 2 packets transmitted, 2 packets received, 0% packet loss round-trip min/avg/max/stddev = 0.699/0.766/0.834/0.068 ms And login via SSH works using the hostname. For those that cannot connect using hostnames, if I dig from their machine it appears the name is being resolved, but they cannot ping, SSH or http access the hostname. ; <<>> DiG 9.6.0-APPLE-P2 <<>> ra ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12554 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;ra.xsi. IN A ;; ANSWER SECTION: ra.xsi. 0 IN A 192.168.1.10 ;; Query time: 8 msec ;; SERVER: 192.168.1.10#53(192.168.1.10) ;; WHEN: Wed Nov 9 12:05:50 2011 ;; MSG SIZE rcvd: 36 I've been banging my head at this and just can't seem to figure it out.

    Read the article

  • Mac Pro Boot Camp w/ RAID card

    - by churnd
    If I configure a Mac Pro with a RAID card and two 15k RPM drives, and leave the drives JBOD (no RAID configured), can I install Windows on the second drive? I guess the question really is, does Windows recognize the RAID card? I know it's probably just a rebadged LSI or Adaptec but wanted to see if anyone's actually done it...

    Read the article

< Previous Page | 409 410 411 412 413 414 415 416 417 418 419 420  | Next Page >