Search Results

Search found 39440 results on 1578 pages for 'possible homework'.

Page 452/1578 | < Previous Page | 448 449 450 451 452 453 454 455 456 457 458 459  | Next Page >

  • How Do I Automatically Update My Database Nightly

    - by Russ
    Currently, every day before I start work, I complete the following procedure: ssh to the production server gzip our daily database dump file scp the gzipped dump file over to my computer gunzip the dump file dropdb mydatabase createdb mydatabase psql mydatabase < dump.sql Is it possible (I'm sure it is) to automate this process on Mac OSX? This way it is done by the time I get to work in the morning. If so, what is the quickest and easiest way?

    Read the article

  • Git: push via ssh to a root owned repository with ssh root logins disabled

    - by anthonysomerset
    is that even possible? Summary, i'm running puppet master on a server and ideally we want root logins via ssh disabled, we want to force all access via sudo if root access required however we have puppet installed using a git repo to manage the manifests, this repo is currently owned by root and currently i only know of 2 solutions (less ideal) allow root access via key auth only - if so, what can i lock it down to to only allow the git push commands? own the repo in /etc/puppet as a different owner - will puppet work reliably with this?

    Read the article

  • Simulating proxy in VMware

    - by BloodPhilia
    I'm currently testing out a new proxy system that I'd like to try out on my own computer. Because I do not have an additional PC available, I though I'd do it with VMware. Here's what I'd like to do: The physical computer is to make an internet connection using the VMware proxy and not the router. Is this (1) possible and (2) if so, how am I to accomplish this? Thanks!

    Read the article

  • Which Version Control Systems support LDAP/AD users and groups

    - by Jason Irwin
    Does anyone know which of the big players (if any) support LDAP/AD users and groups for authentication AND database permissions? Specifically, I'm wondering if SVN, GIT, Mercurial etc. will allow users to login/connect based on AD permissions and also allow granular permissions to be applied to folders within the VC database based on groups within AD. So far my research has not shown this to be possible....

    Read the article

  • Sending computer audio output to multiple devices

    - by barfoon
    I'm looking to take an audio signal from a computer (1/8"), or multiple computers if possible, and send its output to some sort of switch/audio box that would allow me to choose between different receiving devices - say between headphones and a receiver. I don't want to split the signal, and I don't want to send the signal to both at once, I want to be able to choose where the signal goes. Is there a box that will do this?

    Read the article

  • Question about RewriteRule and HTTP_HOST server variable

    - by SeancoJr
    In evaluating a rewrite rule that redirects to a specific URL and say the rewrite condition is met, would it be possible to use HTTP_HOST as part of the URL to be redirected to? Example in question: RewriteRule .*\.(jpg|jpe?g|gif|png|bmp)$ http://%{HTTP_HOST}/no-leech.jpg [R,NC] The motive behind this question is a desire to create a single htaccess file that would match against an addon domain (on a shared hosting account) and an infinite amount of subdomains below it to prevent hotlinking of images.

    Read the article

  • Simulation in Java/C for AI design

    - by abhishekgupta92
    I want to conduct a contest, in which contestants are required to code in java/c and design AI or gameplay. The game should have a visual simulation so that the players could enjoy their designs (AI or gameplay) graphically as well. A possible example can be soccer, in which contestant have to design the ai of the players and decided upon the team-play. Also, they play over the network in such a game against some other player. How can i go about it?

    Read the article

  • RPM with RHEL: install 2 version of same package / different arch

    - by Nicolas Tourneur
    I think the title is pretty self explanatory :) Is it possible, under RHEL (v 5) to install 2 instances of the same packages with 32 bit support for one and 64 bits support for the other one? Obviously, the running host has a 64 bit kernel and has the compatibility libraries required. (in this case, we would need a 64 bits JDK and a 32 bits one). If yes, are there any special rpm flag to use (change of installation directory for instance)? Thanks in advance,

    Read the article

  • How do I Implement VLAN Rate Limiting or QOS for a Cisco 2960?

    - by evolvd
    I have a 2960 that I need to limit the uplink port to 50Mbps for 3 vlans and 350Mbps for another vlan. Would the following config achieve that or is this even possible for the 2960? class-map match-any VLAN50-51-52 match vlan 50-52 class-map match-any VLAN53 match vlan 53 policy-map 50MB_RATE_LIMIT class VLAN50-51-52 police 50000000 5000000 exceed-action drop class VLAN53 police 350000000 35000000 exceed-action drop ! interface GigabitEthernet0/23 service-policy output 50MB_RATE_LIMIT service-policy input 50MB_RATE_LIMIT

    Read the article

  • How can I recover my ext4 ubuntu partition from my windows parition?

    - by officespace
    I dual boot windows and ubuntu 10.04. I accidentally did an rm -r * in my home directory and deleted a bunch of files and folders that I need to recover. How can I recover these files from my windows xp partition? If there's isn't a way to do this from windows, what's the best way to do it in ubuntu? I'd prefer a graphical interface if that's possible. I appreciate the help.

    Read the article

  • Adding FreeBSD user upon first login

    - by Halik
    Is it possible, to achieve the proposed behavior on my FreeBSD 8.2 server: New user ssh's into my server. He supplies as 'Login:' his student index number and a new, locked account is created with random password that is sent to his [email protected] mail as authentication method. After he logs in with this password, account is fully created and activated/unlocked and the user is asked/forced to change the pass for a new one.

    Read the article

  • How can I set up a load balancer to direct all Search Engine Bot traffic to one server?

    - by Ryan
    We have a simple load balancer set up on Rackspace to 3 web server nodes. After reviewing our traffic and expenses, the largest bandwidth hog is Google Bot. Since on Rackspace we pay for bandwidth by the byte, we'd like to direct all traffic from GoogleBot to another host (MediaTemple) with unlimited bandwidth. We think this would cut our hosting bill several thousand dollars a month. Is this possible? Advisable?

    Read the article

  • How to set WINS through GPO?

    - by Robert
    I'm looking to set our WINS servers via GPO, is that possible? We have 2 SSID which our clients can connect to (one which connects to a DHCP we control, the other to a different DHCP we don't - each with their own WINS). We do a lot of mapping via DFS so that's why we need our wins servers. Help?

    Read the article

  • How to crack a password protected zip file.

    - by Shadow Frunchak
    I recently downloaded a piece of software that came in a .ZIP archive, but the .EXE software inside of the archive had a password on it. The website that I would have gotten the password from closed a while ago. Because the executable is password protected it cannot be extracted. I'm on Windows 7 Home Premium, and I use winrar for my archives. So, I guess my question is is it possible to crack a password for a file within an archive without extracting it?

    Read the article

< Previous Page | 448 449 450 451 452 453 454 455 456 457 458 459  | Next Page >