Search Results

Search found 90601 results on 3625 pages for 'user friendly'.

Page 435/3625 | < Previous Page | 431 432 433 434 435 436 437 438 439 440 441 442  | Next Page >

  • My gmail password hacked in Firefox?

    - by ellockie
    While writing a message using Firefox suddenly my gmail login details, including password, were pasted into the body of my message at the current cursor position and in the browser's find field (whole password and a bit of email address in the latter). I don't store my passwords in the browser nor in any of it's addons, although I keep it in one of Chrome's extensions. I don't use whole email address to login, only the user name, so it's very strange and worrying. I must admit I clicked some suspicious link the same day (by checking the root of the domain first), but I quickly closed that page and after that I haven't used that password. Both Avira and Spybot didn't detect anything. What was it and what can I do to make sure my browser is safe?

    Read the article

  • Google SketchUp network licensing issue

    - by Larry G. Wapnitsky
    We have 10 licenses for Google SketchUp in my local office. We store the license file on a network drive that is accessible to all users. We've been finding that, at most, only 3 or 4 people can run it at one time before the license shows up as "expired" on another user's system. I've verified with Google that we have 10 licenses, and have downloaded updated license files from them. The only thing that I can think of is that sometimes SketchUp crashes. Could this be utilizing a license somehow without giving it up? Google has not been able to answer this question.

    Read the article

  • Minimal Linux distribution with sshd and apt

    - by Sergey Mikhanov
    When I signed up for my Debian Linux VPS hosting and first logged on and invoked ps, there was the only user process running: sshd. As I can see, this was minimal Linux with only two things installed and configured: sshd and apt (plus all dependencies, of course). I want to build (or use existing) similar Linux distro, any advice on how to build (or pick) one? Googling "minimum linux", or "linux with sshd only" usually brings up Debian's netinstall, which is not what I want. Thanks in advance.

    Read the article

  • Cannot use `su` or `sudo` after set up key-based access to SSH

    - by OrangeTux
    I'm following this tuturial to setup key-based access to the SSH I created a user. I add copy the key to the client via ssh-copy-id <username>@<host> Becasuse ssh <username>@<host> still prompts for a password I run ssh-add on the local machine. The terminal doens't prompt for a password, I can login without using a password. But I cannot run su anymore. Every input for the password results in Authentication failure. I tried it again. But before coping the key, I added to the sudoer file. Copied key, ssh-add. But now I cannot login to my SSH shell att all? How can I setup a key-based SSH access with the possibiluty to use su or sudo?

    Read the article

  • Why doesn't the network drive not automatically connect?

    - by Sheldon
    I've set up samba on my Ubuntu desktop. It appears to be something to do with the server. With all user accounts on Ubuntu(except the default one I use all the time) windows isn't able to/doesn't automatically map the network drive. In other words: I am only able to to automatically map the network drive on windows with only one of the accounts created on Ubuntu. Edit: I am able to connect using other accounts, I'm just not able to automatically map using those credentials. Details: Windows 7, Ubuntu 12.10

    Read the article

  • Why do mapped drives only reappear after logging out and back in, and not after a reboot?

    - by razumny
    I work in a corporate environment, where we use mostly Windows 7 Professional computers, though some legacy applications are still being run on Windows XP. We have security in place on the network not to allow access to network resources to computers that are not members of Active Directory. When logging in, our users get their home folder and a common network drive mapped to H: and F:, respectively. Sometimes, this does not happen, and the drives are not mapped. The solution is to have the user log off, and back in to Windows. If they reboot, the drives remain unmapped. Does anyone know why this may be?

    Read the article

  • How can I make my browser(s) finish AJAX requests instead of stopping them when I switch to another page?

    - by Tom Wijsman
    I usually need to deal with things on a page right before switching to yet another page, this ranges from "liking / upvoting a comment or post" up to "an important action" and doesn't always come with feedback on whether the action actually proceeded. This is a huge problem! I assume the action to proceed once I start the particular AJAX request, but because I switch to another page it didn't actually happen because the AJAX request got aborted. This has left me several times with coming back to the page and seeing my action didn't take place at all; to give you an idea how bad this is, this even happened once when commenting on Super User! Is there a way to tell my browser to not drop these AJAX connections but simply let them finish?

    Read the article

  • How to enable the flash player plugin in IE8?

    - by Nik Reiman
    I updated to IE8 the other day on my Vista laptop, mostly because Windows Update kept bugging me about it. As a Chrome user, I don't really care so much about IE8, but I do have to use it occaisionally to test website compatibility. At any rate, flash seems to be completely deactivated, and I don't see a place to re-enable it anywhere in the preferences. I've done a bit of googling on the issue, but only found information about how to disable flash, not how to actually enable it. I have the flash 10 debug player installed, and it works fine with Chrome and Firefox. What could be the matter?

    Read the article

  • Exploring other windows 8 machine's root

    - by moswald
    (Note, this is without a domain.) I used to be able to type start \\other_machine\c$ in PowerShell and explorer would pop up with a login dialog. Then I'd type other_machine\moswald and my password (the account is a local admin, of course) and I'm in. Now both machines have Windows 8 installed, and this no longer works (the dialog re-prompts with an "Access is denied" displayed). I've verified (through whoami) that the user is named other_machine\moswald, and I'm positive I'm typing the correct password. So what gives? (edited to include specific result)

    Read the article

  • Changing Word mail merge data source locations in bulk?

    - by Daft Viking
    I've just moved a number of Word mail merge files, and a number of Excel spreadsheets that are the data sources for the mail merges, from a Windows XP computer to a Windows 7 computer, and now all the paths for the merge sources are incorrect (used to be c:\documents and settings\user\my documents.... now c:\users\documents....). While I can correct the path of the data source in each file individually, I was hoping that there would be some way of updating the files in bulk, as there are a relatively large number of them. Word 2007 is what is being used, but the documents are all in the previous DOC format (not DOCX).

    Read the article

  • Automate Windows 8.1 Enterprise upgrade [migrated]

    - by Ben M.
    I have been trying to find the necessary command line switches for automating the upgrade for my Windows 8 clients to Windows 8.1. I have the ISO extracted and I've run setup.exe /? but that doesn't tell me enough. I can't find any relevant information from search engines. Can anyone point me to some documentation or information on how to automate the upgrade so that it keeps user data, programs, etc? I know how to do it when running the installer manually, but I obviously do not wish to do that with 100+ machines.

    Read the article

  • Ubuntu/Linux version recommendation for HP dv6 3122TX?

    - by sanjayav
    I purchased a HP dv6 3122TX recently and after installing Ubuntu 10.10 64 bit I ran into multiple issues like, The wireless driver is not supported by Uubntu. (1) [The driver is RaLink RT3090 ] The ethernet stopped working sometimes for no reason [The driver is Realtek RTL8111/8168B ] "Corrupted low memory at ..." issue which is described as a kernel bug in Ubuntu support forums. (It started to take me to a terminal instead of the GUI and couldn't start x server after that) As I'm not an expert Ubuntu user I got fed up of all these issue and got back to Windows 7. But I need an Ubuntu installation up and running for my development work. What are your suggestions about a reasonable Ubuntu version that I should try? Or a different Linux variation? Should I stick to a 32-bit version? It'd be great anyone can give some advice on this issue.

    Read the article

  • How do I log file system read/writes by filename in Linux?

    - by Casey
    I'm looking for a simple method that will log file system operations. It should display the name of the file being accessed or modified. I'm familiar with powertop, and it appears this works to an extent, in so much that it show the user files that were written to. Is there any other utilities that support this feature. Some of my findings: powertop: best for write access logging, but more focused on CPU activity iotop: shows real time disk access by process, but not file name lsof: shows the open files per process, but not real time file access iostat: shows the real time I/O performance of disk/arrays but does not indicate file or process

    Read the article

  • search nfs network volume from mac client

    - by user1440190
    Asked: how does a Mac OSX SL or Lion user search the cluster for a particular file (foo.txt) "From the cluster, you would need to run some form of recursive lookup for the file desired. As an example, using 'find'. RAM-1# find /ifs |grep test.txt /ifs/Elements/avid2test.txt /ifs/Elements/test.txt I would suggest contacting Apple support regarding their recommendation for searching for files on remote file systems from the Mac client itself" OK that's great, but I don't want users using CLI !!! Anyone know a good method (non-CLI)? Spotlight is not an option. BTW cluster is roughly 80TB

    Read the article

  • How do I configure SSH on OS X?

    - by cwd
    I'm trying to SSH from one Mac running OS X 10.6 to another. Seems to work fine via a password, but I can't get it to use a RSA key instead. Where is the ssh configuration file on OS X and what is the command to reload SSH? Update What I'm asking is how to configured advanced options. For example, on Ubuntu there is a ssh config file at /etc/ssh/sshd_config and if you do something like change the port or disable password authentication for a particular user (PasswordAuthentication no) you need to run /etc/init.d/ssh reload to reload the config. I didn't see that file on OS X, so was just wondering where it was. I am aware of the ~/.ssh ~/.ssh/authorized_keys and `~/.ssh/config

    Read the article

  • which command run in cron returns nothing

    - by Zárate
    Hi there, I've written a little utility in haXe + Neko that needs to execute some GIT commands. To avoid hardcoding the path to the GIT executable I'd like to use the which command to find out where it is. Everything works as expected when running manually from the console, but not when the the app runs on a cron job. I'm aware of the restricted environment (here or here) when you run a script using cron, but still surprised this doesn't work: /usr/bin/which git >> /home/user/git.txt The text file is created but the content is empty. Again, when run from the console it works as expected. Any ideas? I'm running OS X Leopard, if that helps. Thanks : ) Juan

    Read the article

  • Relevant Knowledge spyware

    - by Usman Masood
    I am an advanced user, using Windows 7 with Avast! antivirus running. Today I started browsing and faced some weird popup. Upon investigation I found that "Relevant Knowledge" was running in my system. I was able to uninstall it using the Programs Manager and deleted the file's entries in the registry, but I am a little troubled due to the fact that Avast! was not able to detect it; and secondly, how it came into my system. Also, what further prevention measures should I take?

    Read the article

  • Files and folders disappeared from my desktop

    - by Rob
    Suddenly all files, folders and icons that were on my desktop have disappeared. tried making "show hidden files", no luck. tried using recovery software, but it did not find any of this files, so I assume they were not deletes. c:/Users/<myname>/Desktop does look empty from the Explorer, as well as from cmd. installed MalwareBytes, it did find and remove some malware, but it didn't seem to help. used RogueKiller and it did find some suspicious registry called "HideDesktopIcons". ¤¤¤ Registry Entries : 4 ¤¤¤ [HJ DESK] HKCU\[...]\ClassicStartMenu : {59031A47-3F72-44A7-89C5-5595FE6B30EE} (1) -> REPLACED (0) [HJ DESK] HKCU\[...]\NewStartPanel : {59031A47-3F72-44A7-89C5-5595FE6B30EE} (1) -> REPLACED (0) [HJ DESK] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0) [HJ DESK] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0) I deleted this registry, rebooted, it only unhid My Computer and User icons, but my desktop stuff is still missing — any ideas what should I do next?

    Read the article

  • What is the difference between Skip and Don't Copy buttons in Copy File dialog?

    - by Vadim
    This is a silly question. In Windows 7/Vista when a user trying to copy multiple file, it looks like he has five options: Copy and Replace Don't Copy Copy, but keep both files Skip Cancel the operation. It looks to me that option 2 (Don't Copy) is the same as 4 (Skip). However, it's kind of strange for Microsoft to put two buttons that perform the same action. I probably miss something. Could you please tell me what I'm missing?

    Read the article

  • Advanced call forwarding in Skype

    - by Ivan
    Hi all, I'd like to forward calls from a Skype account to another Skype account (both online), but so that it calls and then enters a number. E.g., I have two accounts: acc1 and acc2. I want all calls from acc1 to be forwarded to acc2, and when the call is established to enter "#123". Is that possible? Thanks. EDIT: The question is basically how to call a user and add the extension directly, before the call has been established (e.g., to call directly acc2:#123).

    Read the article

  • Where are Wireless Profiles stored in Ubuntu

    - by LonnieBest
    Where does Ubuntu store profiles that allow it to remember the credentials to private wireless networks that it has previously authenticate to and used? I just replaced my Uncle's hard drive with a new one and installed Ubuntu 10.04 on it (he had Ubuntu 9.10 on his old hard drive. He is at my house right now, and I want him to be able to access his private wireless network when he gets home. Usually, when I upgrade Ubuntu, I have his /home directory on another partition, so his wireless profile to his own network persists. However, right now, I'm trying to figure out which .folder I need to copy from his /home/user folder on the old hard drive, to the new hard drive, so that he will be able to have wireless Internet when he gets home. Does anyone know with certainty, exactly which folder I need to copy to the new hard drive to achieve this?

    Read the article

  • Excel Subtotal if adjacent column is not blank

    - by Head of Catering
    I'm trying to create a subtotal for a range that excludes rows that don't have a wholesale price. I have a range of products, prices and units that have subtotals by brand, although the brand subtotal is a sum and not a subtotal because the total needs to be displayed regardless of what the user chooses to filter. These subtotal rows do not have wholesale prices. Here is the sumif formula I'm using to calculate totals in the summary area above the range: =SUMIF(B5:B12, "", D5:D12) I need to have a subtotal formula that works the same way. Is there an equivalent to the sumif formula for subtotals? Or maybe a worksheet function I can use? I need to be able to do this without using VBA.

    Read the article

  • Which GUI Toolkit was used for TuneUp Utilities and Avast ?

    - by vettipayyan
    There are arguments supporting and discouraging the use of TuneUp Utilities . However , their User Interface is a really good one and i can't find out what gui toolkit they've used .... I wonder this for Avast too... I'm using PyQt for my image processing app and trying to improve the look and feel which is essential for it. But i can't find these type of custom styles etc... If you've suggestions tell me. It'll be helpful..

    Read the article

  • Portable Display doesn't work anymore

    - by RipCord
    My USB portable monitor will not work since I installed the hard drive onto an HP laptop. I have installed all the new hardware drivers and do not have any more device issues in device manager view. My old laptop was a lenovo. The new one is an HP. The system seems to recognize devices that I connect via, usb but the portable display still does not show anything on the screen. It is probably a conflict in the registry but I'm not sure how to find it and the Power User does not have the luxury of letting me troubleshoot for hours to isolate the problem.

    Read the article

  • Best Linux Distro for web services (Nginx & node.js) on laptop: Compaq 6710b?

    - by tomByrer
    I haven't used Linux in 5+ years, aside from d/l occasional system recovery CDs off DistroWatch, so I don't know the current landscape. Related postings on this forum are several years old & may not relate to my hardware (Compaq 6710b laptop, Core2Duo Centrino). Requirements: Use the Compaq 6710b laptop's WiFi out of the box enough frequently updated pre-made packages for web hosting & development (Nginx & node.js are biggest concerns, everyone has Apache & PHP, & I'm not crazy about building from source) prefer be easy enough to use, but outside help available (so a small user-base distro is only OK if the community is active & a major disto's packages are compatable) configuration easy to transfer to outside web hosts. You have actually installed/used recommended disto (don't have to be expert) TIA!

    Read the article

< Previous Page | 431 432 433 434 435 436 437 438 439 440 441 442  | Next Page >