Search Results

Search found 24207 results on 969 pages for 'anonymous users'.

Page 418/969 | < Previous Page | 414 415 416 417 418 419 420 421 422 423 424 425  | Next Page >

  • Exchange not delivering the mail

    - by wolfvilleian
    I'm having an issue where my Exchange Edge Transport server receives mail (found in logs) and then it vanishes, never ending up in the users mailbox, I have a edge subscription setup between it and the main Exchange server, how can I go about tracing the message to figure out what is broken? I also have found records of the message in the logs on the main Exchange server. Thanks a ton for any help Edit: If I change port 25 on my main router to point to the main exchange server as opposed to the Edge Transport, email comes through fine form external domains and delivered in the correct mailbox

    Read the article

  • Administrator can run a application but produces error while a administrator previllaged user can run without error

    - by tough
    I have an application which can run as admin prevailed user without error but while administrator runs it it produces error. The input string was not in correct format-application error. I tried to figure it out but not possible, since most of the people are looking for admin privilege to run it, me looking why can't a admin run the program without errors? The program is related to mssql-2008 r2. The SQL log-in settings are same for both the users.

    Read the article

  • Local service accounts

    - by Jeremy
    Normally we create service accounts in Active Directory, and if we install things like SQL Server, etc, we set the software services we set them to use those service accounts. The service accounts don't have the ability to be used to log into a workstation interactively. For Proof of concepts, we're installing SQL Server and other software on Virtual windows 7 workstations that aren't part of a domain, so we are creating local accounts that will be used by windows services. Is it possible to stop those users from appearing as options on the login screen?

    Read the article

  • Test Amazon Ec2 instance Small

    - by user102130
    I have some questions about amazon ec2 and especially on small instance. I want to host my new website (the beta version) on this kind of instance, but before i want to know about how many simultaneous users can be connected on one small instance. You can see the caracteristics of a small one here : http://aws.amazon.com/ec2/instance-types/ My website is a kind of social network in PHP. Is someone had already test this type of instance ?

    Read the article

  • Backup system, two locations. Recommendations?

    - by Ragnar123
    Hi there, I have two servers running Ubuntu 10.10, placed at two different locations. One is production, and one development. I wondered, if any of you had experience with backing up, best practices and alike. I think a smart solution would be to backup the data on the production server to the development server. Also, I have looked into visualization, but it seems like an overkill, assuming the servers only server about 8 users in a small company.

    Read the article

  • Google Docs revision/access control

    - by brainjam
    I've worked on shared Google Docs with family members, but don't really know how or whether Google prevents two users from modifying the same document at the same time .. and clobbering one another's work. How does Google Docs handle this .. is a document 'locked' whenever somebody opens it for revisions? I haven't been able to see an answer for this in their documentation/help.

    Read the article

  • How to sync an Android phone with anything other than Google?

    - by Francisco Canedo
    As I understand, the Android phone can only sync with Google (GMail, Google Calendar, etc.) out of the box. I can imagine corporate users having a problem with their data residing on Google's servers — despite their "do no evil" credo. Is there any Android application that lets you sync with the desktop (either Linux or Windows) or corporate server applications (think Exchange)?

    Read the article

  • How can I prepare a TortoiseSVN installer to use the serf HTTP library instead of neon?

    - by Sam Johnson
    I'm going to be distributing instructions on how to access our new Subversion repository with TortoiseSVN. Because it's hosted on Windows, and we have some large files in the repository, we have to use the Serf HTTP library instead of neon. This is normally specified by manually editing the Subversion "servers" file on the client machine and adding the line http-library=serf Is there a way I can customize the TortoiseSVN installer to do this automatically? I'm just trying to get it up and running as easy as possible for our new SVN users.

    Read the article

  • Build a server in KVM linux

    - by Lai Yu-Hsuan
    I owned a linux server. Now there are several users want to build web services on it, but they require different enviroments. For convenience I give a KVM virtual machine root permission to each user. But obviously the linux server has only one IP. How can I deliver the external requests to corresponding virtual machine? (I expect it's somewhat complicated. If so I want at least some docs/websites I can start reading.)

    Read the article

  • How do you configure Tomcat to allow dynamically added hosts?

    - by Shaun F
    Is there a way to setup apache and tomcat so that I can have d1.webapp.com d2.webapp.com d3.webapp.com etc. All hosted by the same tomcat instance without having to add aliases to the HOSTS element in the tomcat config file? I will be allowing new users to have thier own domain when they sign up and it will be a subdomain of the web app. I don't want to keep updating the hosts file for aliases and restarting tomcat though each time a new user signs up?

    Read the article

  • Determine creator of mail item in Exchange 2003 public folder

    - by John Gardeniers
    We have several users using a shared account and when messages in that account's in box have been processed they are drag and dropped into a public folder. Is there a way to determine who dropped a mail item in an Exchange 2003 public folder, so that we can have some accountability? I suspect this can't be done natively in Exchange, so if there is a scripted solution to this I'd be very interested.

    Read the article

  • AD group authentication to view wordpress posts?

    - by Mahriman
    I'm trying to set up a wordpress site using active directory authentication. One question that has come up is the ability to limit category/post/blog reading to specific AD groups. I've never seen this done and I haven't been able to find any plugins that seem to promise this functionality. It would seem that the best option is to just give a bunch of users a role with the read_private_posts capability, but I'm not sure this will do the trick.

    Read the article

  • Apache - suExec - FastCGI - PHP = seciruty issue

    - by Jari V.
    I installed Apache with FastCGI (mod_fastcgi), suExec and PHP on my local development box. Working perfectly, expecting one thing. Let's say I have two users: user1 - /home/user1/public_html user2 - /home/user2/public_html I discovered a serious security hole in my configuration: I can include a file from user2 web root in user1 file. How to prevent? Any tips? php-cgi process is running under correct user.

    Read the article

  • NGINX basic auth only for POST

    - by hokkaido
    Hello, I'm settings up nginx to serve Mercurial repositories. It works when not using basic authentication at all, or when I use basic authentication all over. What I want to do is to just use basic auth on POST requests, so anyone have pull access, but only authenticated users can push. I tried the following, if ($request_method = POST) { auth_basic "Restricted"; auth_basic_user_file /path/to/userfile } However it complains about "auth_basic directive is not allowed here". How can I solve this?

    Read the article

  • How to exclude directories from Mozy custom backup sets using spotlight queries

    - by bromfiets
    I would like to create custom backup sets for Mozy which exclude certain directories. For example, I would like to backup my Itunes folder, but exclude all podcasts. I have created a backup set which searches in /Users/me/Music and used this query kMDItemPath == "*Podcasts*"wc to exclude all matching files. However, nothing matches. Queries which use the kMDItemFSName spotlight attribute work fine, but any query using kMDItemPath doesn't seem to work at all. What am I doing wrong?

    Read the article

  • Exclude certain files or directories from redirected folders

    - by jao
    We have a windows 2003 AD and are using Folder redirection to redirect the users My Documents to a share. Is there a way to save certain filetypes (*.mp3, *.avi) or folders (My Music, My Pictures) on the user's hard disk instead of saving on the netwerk share? I'm aware of the GPO setting 'Exclude directories in roaming profile' but I'm not sure if that will do what I want (we're using redirected folders)

    Read the article

  • SQl server 2008 permission and encryption

    - by Paranjai
    i have made columns in some of the tables encrypted in sql server 2008. Now as i am a db owner i have the access to encode and decode the data using the symmetric key and certificate. But some other users have only currently datareader and datawriter rights ,and when they execute any SP referring the logic which uses the key and certificate "User does has not right on the certificate to execute". What rights / exact permission should i grant them just to solve this problem

    Read the article

  • How to publish an intranet website on Vista 32 & IIS7

    - by user16011
    I am creating an intranet website on a Vista 32 machine with IIS7. On my machine it works great! However, when other users on our network try to connect to it they get an error saying "Oops! Internet Explorer could not connect to computername". Perhaps this is because the NTFS and/or IIS permissions are not set correctly. How do I set the permissions to publish a website on the intranet? Thanks in advance, Dan

    Read the article

  • Is ther an email client optimized for screen readers and accessiblity?

    - by Adolfo Fitoria
    Hi. I'm currently working on a project to help visually impaired people. We're planning to use Orca screen reader for gnome. Everything is doing great but there is a problem with email web clients the most popular ones(gmail, yahoo, hotmail) are not optimized for screen readers. Is there some kind of simple email client optimized for this? Need to be very simple and straight foward and support multiple users too.

    Read the article

  • Why is my SharePoint people search WorkEmail property blank?

    - by Nat
    I have an SSP setup for my site and I am trying to get the presence bubble working correctly. However, I cannot get the people search core results webpart to display the workemail. I have output the raw xml into my people search core results xslt and used the SharePoint Query Web Service Test Tool to try and find values for these properties, but they are appearing blank (including sipAddress and HighConfidenceDisplayProperty11). Note: The presence bubble does work when hard coded to users email address, so the problem is absolutely to do with the search results.

    Read the article

  • LDAP (slapd) ACL issue - can add but not modify entries

    - by Jonas
    I have an issue with the ACL configuration of an LDAP server (slapd). The following ACL entry is active as the first rule that applies: {0}to dn.subtree="ou=some,ou=where,ou=beneath,dc=the,dc=rain,dc=bow" attrs=entry,children by users write Now the strange thing that happens is that given that rule I can add an entry to the respective DN but if I want to modify it with the very same user, then I get 0x32 (LDAP_INSUFFICIENT_ACCESS) Can someone give me a hint what the problem could be?

    Read the article

  • What's a good(affordable) business router that can limit traffic to certain machines(ips/ports)?

    - by Ryan Detzel
    We are using the basic Verizon router but it sucks so we're looking for a new one that allows us to limit users and our hadoop cluster to certain limits. Our problem is one person can start downloading something and kill the network and every hour we download logs into our cluster but it floods the network unless we rate limit it. Ideally we want to be able to say: total: 35 mbps Hadoop Cluster (15 mbps) Phones (1 mbps) Office(25 people) (19mbps but no one machine can have more than 5mbps)

    Read the article

  • media storage social network (Host plan)

    - by Samir
    I'm wondering what the best way is to host media for a social network site. Let's say that I expect my social network to reach 500.000 users in 2 years time. I'm not sure how I can best setup my hosting plan in order to have a solid bases to store media files. Which hosting plan would you recommend me to start with and how can I enhance the plan?

    Read the article

< Previous Page | 414 415 416 417 418 419 420 421 422 423 424 425  | Next Page >