Search Results

Search found 39440 results on 1578 pages for 'possible homework'.

Page 466/1578 | < Previous Page | 462 463 464 465 466 467 468 469 470 471 472 473  | Next Page >

  • Do browsers change URLs of saved bookmarks in response to 301 redirection?

    - by elliot100
    HTTP status code 301 is used to indicate that content has moved permanently, and that the returned URL should be used to access the requested content in future. RFC 2616 says Clients with link editing capabilities ought to automatically re-link references to the request-URI to one or more of the new references returned by the server, where possible. Do any browsers actually implement this and change a bookmark's URL?

    Read the article

  • cPanel Redundacy

    - by bogha
    hi, what information should i know to do the following: we will have 2 servers, each one will have a cPanel WHM installed and 2 will have DNS, we want to insure that redundancy is achieved on both servers, means the servers should work as active/standby unit. 2 cPanel active/standby 2 DNS active/standby also does this have any impact on the mySQL database, do we have to buy another server to use it as the mySQL database or it's possible to sync all the cPanel information from one server to another. thank you.

    Read the article

  • Difference between Content Protection and DRM

    - by BlueGene
    In this recent post about criticism regarding built-in DRM in Intels SandyBridge processors, Intel denies that there's any DRM in Sandybridge processors but goes on to say that Intel created Intel insider, an extra layer of content protection. Think of it as an armoured truck carrying the movie from the Internet to your display, it keeps the data safe from pirates, but still lets you enjoy your legally acquired movie in the best possible quality I'm confused now. So far I was thinking DRM is content protection. Can someone shed light on this?

    Read the article

  • Resetting root password on Fedora Core 3 - serial cable access only

    - by Sensible Eddie
    A little background: We have an old rackmount server running a customised version of Fedora, manufactured by a company called Navaho. The server is a TeamCAT, running some proprietary rubbish called Freedom2. We have to keep it going - the alternative is extraordinarily expensive, and the business is not likely to be running much longer to justify changing things. Through one means or another, it has fallen upon me to try and resolve our lack of root access. The previous admin has fallen under the proverbial bus, and nobody has any clue. We have no access to the root account for this server. ssh is running on the server, and there is one account admin that we can login with, however it has no permission to do anything (ironic...) The only other way into the server is with a null-modem serial cable. This works... up to a point. I can see the BIOS, I can see the post BIOS screen, and then I see "Starting grub", followed by another screen with about four lines of Linux information, but then it stops at that point. The server continues booting, and all services come online after around two minutes, but the serial terminal displays no more information. I understand it is possible to put Linux into "single user mode" to reset a root password, but I have no idea how to do this beyond trying to interrupt it at the grub stage listed above. When I have tried it just froze. It was almost like grub had appeared (since the server did not continue booting) but I couldn't see it on the serial terminal. Which made me think maybe the grub screen has some different serial settings? I don't know... it's the first time I've ever used serial for access! A friend of mine suggested trying to use a Fedora boot CD. We could boot from USB, so something along this approach is possible but again we still can only see what's going on with the serial terminal, so it might not be achievable. Does anyone have any suggestions for things I can try? I appreciate this is a bit of a long shot, but any assistance would be invaluable. *UPDATE 1 - 28/8/12 * - we will be making some attempts on this today and will post further details later!

    Read the article

  • Firefox: Stop never-ending popup alerts

    - by cbp
    It is possible for javascript to get stuck in a loop of opening up alerts. For example: for(var i=0;;i++) alert('This will never stop'); Is there a way to gracefully stop this in firefox, without having to kill the whole process?

    Read the article

  • How to enable 'playback follows cursor' / 'skip silence' in itunes?

    - by xor_eq
    foobar has got two pretty simple, yet very useful features (at least for me) that iTunes seems to be lacking: Playback follows cursor - Playback continues at the selected track Skip silence - Those 25 minute songs, containing 20 minutes of silence and then some final brainfart that's called "hidden track"... this feature just skips the silence, plays the final bit and continues with the next song Is it possible somehow to enable those features in iTunes?

    Read the article

  • Mac:Upgrade from 10.5.8 to Snow leopard 10.6?

    - by user187532
    Hi, I would like to upgrade my mac from 10.5.8 to Snow leopard 10.6. I searched around the google but didn't get any clear info from Apple sites. Is it possible? Are there any steps to follow this from Apple sites? Is there any possibility to do it without wiping the existing software and files? Thank you. I appreciate your helps.

    Read the article

  • Can i access Mac system remotely?

    - by TEJPAL
    i have a macbook and i have 6 windows desktop system. i want to access the macbook parallel same time 7 user. like 6 user accessing machbook on window system remotely, and one user using Mac at same time. how it is possible. Thank you in adv. to reply for my question.

    Read the article

  • Can i access Mac system remotely?

    - by TEJPAL
    i have a macbook and i have 6 windows desktop system. i want to access the macbook parallel same time 7 user. like 6 user accessing machbook on window system remotely, and one user using Mac at same time. how it is possible. Thank you in adv. to reply for my question.

    Read the article

  • How does badBIOS jumps airgaps?

    - by Ash
    I was reading this article from Ars on badBIOS and came across this line which states the malware, has the ability to use high-frequency transmissions passed between computer speakers and microphones to bridge airgaps. and wondered if this attack vector was possible ? Not only me , but all other readers were wondering if this had any logical explanation.Can a computer transmit packets via high-frequency sounds broadcast over speakers ?

    Read the article

  • On Linux, can I get 3D acceleration with a Nvidia card w/o X?

    - by anon
    I like Linux. I like OpenGL. I don't like X. On Linux, is there anyway to get 3D acceleration from my Nvidia card without X? Ideally, I'd have the kernel boot, get to a console, then somehow get into a "graphics mode", where my entire monitor is just a single OpenGL screen ... and I draw stuff to it with OpenGL. Without X. Is this possible? Thanks!

    Read the article

  • Can "tar" backup incrementally?

    - by Somebody still uses you MS-DOS
    I have my home folder with a few GB. Is it possible to run tar on it, create a home.tar.gz, and then for changed files, it creates home1.tar.gz only with modified files from previous tar (thus being an incremental backup)? I would like to check the resulting checksum files and export them as well like home.md5, home1.md5, etc. (I know this could be another process, but interesting as well).

    Read the article

  • Multiple Screens, Multiple OS

    - by Cenoc
    Hey, Around two days ago I saw someone working on a computer and alt-tabing to different OSs. Basically he had 3 "screens", one with Fedora, one with Windows XP, one with Mac OSX. How is that possible? I dont think it was a virtual machine.... sounds friggin awesome though.

    Read the article

  • Where to purchase an unlocked HTC Incredible or EVO 4G

    - by Eric
    Hello, Is it possible to buy an HTC EVO 4G (preferably), or the Droid Incredible (second choice) from a vendor whereby the phone is unlocked without a cellular plan? I just want to get a phone to test my Android app on over the built-in WiFi (for now). Please advise. Finally, does anyone know of a phone coming out in the next couple of weeks that is faster (hardware-wise) than the EVO 4G? Thank You! Eric

    Read the article

  • Remove OS, but keep documents

    - by Rvervuurt
    Yesterday I installed an SSD in my MacBook and kept my original HDD with a "data doubler" (replaces the DVD-drive with a hard-drive bay). That means I have my OS (and applications) on both my SSD and HDD. Is it possible to get rid of the OS on the HDD? I think that removing everything but the ~/users-folder from the HDD should solve this problem, right? If not, what is the best solution to achieve this?

    Read the article

  • Can I prevent Oracle users from creating public synonyms but allow private ones?

    - by ninesided
    I've had a few issues where users have mistakenly created public synonyms which have led to people thinking some objects are in one schema when they're actually in another schema. Everyone knows they should be using private synonyms, but occasionally they forget or they make a mistake and someone gets burned. Is it possible to GRANT users the permission to create private synonyms but disallow public ones?

    Read the article

  • SFTP logging: is there a way?

    - by Darryl Hein
    I'm wondering if there is a way to log commands received by the server. It can be all SSH commands, as long as it includes information on commands related to file transfer. I'm having issues with an SFTP client and the creator is asking for logs, but I am unable to find any existing logs. I'm looking to log on both or either CentOS or OS X (although I suspect if it's possible, it'd be similar on both).

    Read the article

  • Is there a way to password protect a windows application on Windows 7 without changing the exe?

    - by M Anthony
    I want to password-protect a few applications (not just files/folders) on Windows 7, such that, there is no change to the protected application's .exe file itself. Since the .exe files can't be changed, "Empathy" and "Protect Exe" can't be used as they change the .exe file. I tried using WinGuard Pro and LockThis! also but they don't work for Microsoft Outlook and some other apps (that I need). Is it possible at all? Please help.

    Read the article

  • Save image of running Windows 8 to run from Ubuntu

    - by Noel Evans
    I have a brand new Windows 8 PC. I'd like to hold on to the licensed copy in case I need to run a Windows app at some time in the future but want to wipe the machine completely, installing Ubuntu with no dual-boot. Is it possible to save an image of Windows 8 which can then be run (on the same laptop) from Linux as a virtual machine? If so, what applications (ideally free) should I use to make the image and then run it from Ubuntu?

    Read the article

< Previous Page | 462 463 464 465 466 467 468 469 470 471 472 473  | Next Page >