Search Results

Search found 35444 results on 1418 pages for 'lock down computer'.

Page 427/1418 | < Previous Page | 423 424 425 426 427 428 429 430 431 432 433 434  | Next Page >

  • Marvell TOPDOG (TM) PCI-Express 802.11n Wireless (EC85)

    - by Jareb
    I was running Windows Vista, but hard drive got wipe out and couldn't reinstall it, so I install Ubuntu. My problem is that I cannot get wireless internet. I have search and search, but nothing help or it was too old and the forms got removed. I'm new at Linux. My computer is Gateway M-6752, running a (I believe) Marvell TOPDOG (TM) PCI-Express 802.11n Wireless (EC85), driver. How do I get my wireless working?

    Read the article

  • Can't connect to or search Wi-Fi

    - by Mark
    I just installed the latest version of Ubuntu; I think it was 13 or something. Anyway, I got it running, and now I've been trying to connect to my Wi-Fi AP. No matter where I go I don't see an option for Wi-Fi. I looked on the computer and found some commands to use in a terminal to run a scan for Wi-Fi networks, but all of them returned the error: interface doesn't support scanning What are step-by-step directions to make this work?

    Read the article

  • Find out monitor make / model

    - by thefragileomen
    My friend has recently bought a second-hand vehicle with an in-car computer and it's wired up to a touchscreen monitor on the dashboard (very impressive!). Now, I've helped him install Ubuntu on it today but we can't establish the make and model of the connected touchscreen monitor to try and source the drivers to make the touchscreen function work. Are there any Linux commands to work out the make / model of an attached monitor? I've tried Google which pointed me towards the /etc/X11 directory but have had no joy with that.

    Read the article

  • Troubleshoot Database Concurrency in SQL Server with sp_locks

    sp_locks is a useful tool which can help a DBA in detecting and troubleshooting blocking and concurrency scenarios. This article demonstrates a worked example of using sp_locks to troubleshoot a database concurrency issue. Free trial of SQL Backup™“SQL Backup was able to cut down my backup time significantly AND achieved a 90% compression at the same time!” Joe Cheng. Download a free trial now.

    Read the article

  • Why when I log in my two screens shows the same image automatically?

    - by forellana
    When I log in on my computer, first my two monitors shows their own part of a larger desktop, then automatically changes to the same image on both screens, but I don't want to happen this, Is there any configuration to avoid this? About my hardware: 00:02.0 VGA compatible controller: Intel Corporation Mobile 4 Series Chipset Integrated Graphics Controller (rev 09) 00:02.1 Display controller: Intel Corporation Mobile 4 Series Chipset Integrated Graphics Controller (rev 09)

    Read the article

  • How do I remove only shopping searches?

    - by Amanda
    I have a brand new 13.10 install and I want all this shopping spyware nonsense gone. Searching for "Ubuntu shopping spyware nonsense" led me to apt-get remove unity-lens-shopping but I don't actually see a unity-lens-shopping package. How do I remove shopping searches in 13.10? Update: Is there any way to distinguish the scopes that search remote servers (Ebay, Amazon, AskUbuntu) from the ones that search my local computer? Or do I have to go through them all?

    Read the article

  • SEO For Ecommerce Sites

    Ecommerce is a fancy name for just about any business that can be conducted via the internet or other computer systems. The global internet explosion has changed the face of the ecommerce industry for good, increasing both potential profits and the ferocity of competition across virtually every consumer market.

    Read the article

  • Do you know your DNS server?

    - by John Paul Cook
    If you don’t know your DNS server is valid, you need to find out before July 9. The FBI found rogue DNS servers and replaced them with clean, safe DNS servers to protect the public. These safe, clean servers will be turned off on July 9, 2012. If your computer was compromised to use the rogue servers, it will stop resolving DNS queries on July 9 when the clean servers are turned off. The FBI has provided full technical details at http://www.fbi.gov/news/stories/2011/november/malware_110911/DNS-changer-malware.pdf...(read more)

    Read the article

  • Software Agent construction guidelines

    - by lsoto
    I'm currently studying a Master in Computer Science and I am interested in working with Software Agents and C#. I have found so much information regarding theoretical aspects but just a few articles focused on practical programming aspects such as architecture, design or implementation. Could anybody suggest any good source that I could explore? I wouldn't like to "reinvent the wheel" but to contribute with something better to the current state of the art.

    Read the article

  • Can I show a table of one custom variable against another?

    - by Simon
    We have a number of custom variables set up in google analytics. We'd like to show a table of event occurrences broken down by two custom variables, e.g. if variable one can be A, B, or C and variable two can be J, K or L: Events | A | B | C | -------+-----+-----+-----+ J | 345 | 65 | 12 | K | 234 | 43 | 7 | L | 123 | 21 | 4 | -------+-----+-----+-----+ How do I get the information in that format?

    Read the article

  • Get Back into SQL Server After You've Locked Yourself Out

    Someone, while locking down the SQL Server, removed the permissions by which the DBAs came in and administered the server. As a result, we cannot get back into SQL Server. How can we restore our access to SQL Server? Check out this tip to find out. The Future of SQL Server Monitoring "Being web-based, SQL Monitor enables you to check on your servers from almost any location" Jonathan Allen.Try SQL Monitor now.

    Read the article

  • Moms on Mobile: Are They Way Ahead of You?

    - by Mike Stiles
    You may have no idea how much and how fast moms are embracing mobile. Of all the demographics that can be targeted by marketers, moms have always been at or near the top of the list. And why not? They’re running households, they’re all over town, they’re making buying decisions, and they’re influencing family and friends. They, out of necessity, become masters of efficiency and time management. So when a technology tool, like mobile, comes along that assists with that efficiency and time management, we would obviously expect them to take advantage of it. So if it’s obvious, why are so many big, sophisticated brands left choking on the dust of moms who have zoomed past them in the adoption of mobile, and social on mobile? Let’s break down some hard truths as presented by a Mojiava report: -Moms spend 6.1 hours per day on average on their smartphones – more than magazines, TV or radio. -46% took action after seeing a mobile ad. -51% self-identify as “addicted” to their smartphone. -Households with an income of $25K-$50K have about the same mobile penetration among moms as those with incomes of $50K-$75K. So mobile is regarded as a necessity for middle-class moms. -Even moms without smartphones spend 2.5 hours on average per day on some connected mobile device. -Of moms with such devices, 9.8% have an iPad, 9.5% a Kindle and 5.7% an iPod Touch. -Of tablet-owning moms, 97% bought something using their tablet in the last month. -31% spend over 10 hours per week on their tablet, but less than 2 hours per week on their PCs. -62% of connected moms use shopping apps. -46% want to get info on their mobile while in a store. -Half of connected moms use social on their mobile. And they’re engaged. 81% are brand fans, 86% post updates, and 84% comment. If women and moms are one of your primary targets and you find yourself with no strong social channels where content is driving engagement and relationship-building, with sites not optimized for mobile, or with no tablet or smartphone apps, you have been solidly left behind by your customers and prospects. And their adoption of mobile and social on mobile is only exponentially speeding up, not slowing down. How much sense does it make when your customer is ready to act on your mobile ad, wants to user your iPad app to buy something from you, wants to be your fan on Facebook, wants to get messages and deals from you while they’re in your store…but you’re completely absent? I’ll help you cheat on the test by giving you the answer…no sense at all. Catch up to momma.

    Read the article

  • Radeon 4350 Driver - Spectacular Graphics Made Easy

    If you are looking for a software program to put the fun back into the games that you play on your computer, then this article has the right solution waiting for you. With the Radeon 4350 driver high... [Author: Sunny Makkar - Computers and Internet - March 20, 2010]

    Read the article

  • How to blacklist a PCI device so a system can boot?

    - by Reda Lazri
    I installed Ubuntu 10.10 on someone's computer which it had a 'Connexant Fusion 878A' PCI card installed, the card is problematic, I had to unplug it just to use the Live CD. Now my question is how to know which module to blacklist, so he can use the card in Windows and override it when he boots into Ubuntu. There's a twist, I can't plug it and lsmod it because it won't let the system boot up even in 'Recovery Mode'. Kernel: 2.6.35-22

    Read the article

  • jQuery - how to check/uncheck a checkbox

    - by Renso
    $('#PrimaryContacts').unbind().change(function() {         if ($('#PrimaryContacts option:selected').val() == 0) {             $('#filterPrimaryContact').removeAttr('checked').trigger('click');         }         else {             $('#filterPrimaryContact').trigger('click');         }     }); Also, in the example above, triggering the checkbox does not change the checkbox value. As depicted above, based on a dropdown box changing and no contact being selected from the drop down box, automatically uncheck the checkbox and trigger it in invoke any event handlers on the checkbox.

    Read the article

  • 10 Security Tips for the Holidays&amp;#133;And Beyond

    While you&#146;re focused on the year-end sales numbers, don&#146;t let your guard down when it comes to security, because a bad computer or network virus is a not-so-nice gift that keeps on giving long past the holidays. These 10 tips will help you keep your festive cheer.

    Read the article

  • Where to buy a domain for my local server [closed]

    - by Pradyut Bhattacharya
    I have made a website and hosted in my local computer using a static ip Where can i buy a domain name such as www.something.com such that it can redirect to my static IP. So that if i m using a page like a http://localhost/index.jsp it can be accessed by http://www.something.com/index.jsp Does it matter if i run the server locally or should I buy a managed web hosting server from a big company if the traffic is low on my site?

    Read the article

  • How do you know when you are tired of programming in your life?

    - by medusa
    Have you ever felt that you have had enough of programming and you want to do something else in your life which hopefully doesn't include staying in front of the computer all day? Also, while thinking these you realize it's time to stop thinking and continue your code. I am going through these thoughts for some time now, do you ever feel like this and what do you do to get yourself concentrated and happy with your work?

    Read the article

  • Week in Geek: Google Strengthens Encryption on Gmail and Other Services

    - by Asian Angel
    This week’s edition of WIG is filled with news link goodness such as Google’s work on strengthening encryption for its services, Mozilla’s progress on silent updates, AT&T’s thwarting of a hacking attack on mobile accounts, a giveaway contest for LastPass Pro subscriptions, and more. How to See What Web Sites Your Computer is Secretly Connecting To HTG Explains: When Do You Need to Update Your Drivers? How to Make the Kindle Fire Silk Browser *Actually* Fast!

    Read the article

  • Types in Lisp and Scheme

    - by user2054900
    I see now that Racket has types. At first glance it seems to be almost identical to Haskell typing. But is Lisp's CLOS covering some of the space Haskell types cover? Creating a very strict Haskell type and an object in any OO language seems vaguely similar. It's just that I've drunk some of the Haskell kool-aid and I'm totally paranoid that if I go down the Lisp road, I'll be screwed due to dynamic typing.

    Read the article

  • How do I transition from physics and math to programming?

    - by inovaovao
    I'm a physics PhD with little actual programming experience. I've always liked programming and played around with BASIC, Pascal as a teen, but the extent of my experience writing complex programs comes from an introductory course in computer science. Now I've decided that I'm more interested in programming than in physics and started to learn Java. Coming from a physics or math-heavy background, what would be the best strategy to maximize my value in the field?

    Read the article

  • "BAD ARCHIVE MIRROR" error while installing ubuntu server 12.04

    - by Hirdesh - Technonimal
    I downloaded the server version of Ubuntu from Ubuntu's official site. Created a Bootable USB from the ISO file I downloaded. I connected through Internet using DHCP in the installation process. While I was installing it on my Desktop Computer (pentium D 1 GB RAM) I have this error "Bad Archive Mirror". I also found 2-3 questions with same problem on forum but I didn't get solution of my problem from them.

    Read the article

  • Project: Building An All-Text Linux Workstation

    <b>LinuxCommand.org:</b> "Over the next few weeks, I will show you how to take an old, slow computer and make it into a text-only Linux workstation with surprising capabilities, including document production, email, instant messaging, audio playback, USENET news, calendaring, and, yes, even web browsing."

    Read the article

< Previous Page | 423 424 425 426 427 428 429 430 431 432 433 434  | Next Page >