Search Results

Search found 44026 results on 1762 pages for 'raid question'.

Page 479/1762 | < Previous Page | 475 476 477 478 479 480 481 482 483 484 485 486  | Next Page >

  • What single piece of software do you most admire, and why?

    - by Burton
    As a developer, I too often find fault with the software that I use day to day. Unintuitive interfaces, etc. But there are those rare exceptions. Regardless of whether the software in question is a programmers' tool, tell me about software you have used: What has inspired admiration? What software made you re-remember simplicity? (or whatever gauge of awesomeness works for you). Only one piece of software per post, please.

    Read the article

  • Best way to connect a desktop computer to a 3g network

    - by dbyrne
    A friend of mine is moving to a building with no Internet connectivity. Ethernet and wifi are out of the question. What is the best way for him to get his desktop connected? The most obvious solution is for him to get an unlimited 3G data plan. What is the best way for him to set this up? I am assuming he should get something like Verizon's MiFi 3G access point, but does this have an ethernet jack?

    Read the article

  • Using dd command and running out of space while cloning drive to img

    - by Alan Kuras
    I have a problem with drive cloning. Im using dd on damaged disk with bad sectors trying to make an image from it. Im booting computer with Live Linux CD . Damaged disk: sda 146GB (NTFS) External drive: sdb 300GB (NTFS) After running the command below im running out of space on disk sdb. dd if=/dev/sda of=/dev/sdb/hdd.img bs=4096 conv=noerror,sync The question is why im running out of space on disk sdb ?

    Read the article

  • Crop display size in linux

    - by TomSW
    My laptop has a slightly damaged lcd - it has a black strip on the right that reduces the working resolution from 1400x1050 to about 1375x1050 - thus hiding part of the right edge of the desktop, windows, or the mouse pointer should it be unwise enough to stray there. Is there a way in linux to crop the monitor output so as to keep the screen inside the working area of the monitor? edit: this is the same question as Limit video output to a section of a display and leave the rest blank

    Read the article

  • Is there a way to get docky to launch a new instance?

    - by Matt Briggs
    So i'm really loving the whole gnome-do/docky thing. My question is that on other docks, you can hold down a modifier key to launch a new instance rather then switching to an already opened instance of an app. So lets say I have chrome on the win7 dock first click launches chrome other clicks will focus the opened window shift click will open a new instance of chrome ctrl-shift-click will launch a new instance as admin is there anything similar in docky?

    Read the article

  • debian/ubuntu locales and language settings

    - by AndreasT
    This self-answered question solves the following issues: locale: Cannot set LC_CTYPE to default locale: No such file or directory locale: Cannot set LC_MESSAGES to default locale: No such file or directory locale: Cannot set LC_ALL to default locale: No such file or directory and some other locale related problems.

    Read the article

  • How to get wireless working (properly) with Sitecom Wireless USB micro adapter 300N on Windows 7?

    - by Timo
    The question says it all, but more detail follows ;) I've got a new computer that runs Windows 7 64-bits (Home Edition) and I'd like to connect it to my wireless home network (Sitecom wireless gigabit router 300N wl-352 v1 002) with a Sitecom wireless USB micro adaptapter 300 wl-352 V2 001. After installing the router (i.e. connected to the modem and power) and ensuring that wireless is indeed enabled, I've installed the driver of the USB adapter on the new computer described above. After the installation (drivers and utility on CD) completes successfull I rebooted my computer and inserted the USB adapter. After discovering the right network and connecting to it using the network key, a connection is succesfully made. (Using the Sitecom 300N USB Wireless LAN utility). In the LAN utility I can see that the signal strength is approximately 50% and connection quality is approximately 80%. Judging from these numbers I assumed that all was fine and started to use the connection (reading news on nu.nl, a dutch news site), but noticed that the connection was lost several times in a very short time span, but each time the connections was resumed, resulting in the 50/80 percent numbers described above. However, the website was not loaded completely and often a timeout would be reported. When inspecting the drivers through Device Management (Windows' Apparaatbeheer in dutch) there were no errors/warnings; everything seemed to be in order. In an attempt to solve this, I downloaded the latest drivers for the USB adapter, but the problems remained. Finally I tried to connect the computer with a Siemens Gigaset USB Adapter 108. This process was a troublesome since I had to download a driver (from the site above) and tell Windows (7) to use the Windows Vista driver when installing the new hardware, since there is (was) no Windows 7 driver available. This resulted in a usable connection, although not very stable when reconfiguring the router. Which took the form of selecting a different wireless channel on the router, even using the Sitecom utility mentioned above to check if there were other networks communicating on that channel (and thus picking a channel that was not used by other networks). Again no result when changing back to the Sitecom USB adapter. Note that this means (I think) that I could use the internet connection with the Siemens adapter, meaning the problem was not in the router. So: How to get wireless working (properly) with Sitecom Wireless USB micro adapter 300N on Windows 7? PS Sorry, but should be able to post one link, while I had links in place for the USB adapter, router and the siemens adapter in place as well, but I'm not (yet) allowed to post these... (The site says I can post one link, but only when no links are present will it allow me to post the question...)

    Read the article

  • IE 8 has stopped working

    - by kurresmack
    Hey, I know that question has been asked many times but I have tried all the solutions that I've seen but with no further success. When I open internet explorer it simply stops working directly, reopens the tab 3 times and then stops. I have uninstalled flash player. Reset IE. Tried to close as many processes I can. Ran spybot S&D. Started IE without addonds

    Read the article

  • How to install Uniconverter (command-line app) on Mac OS 10.7.2 (Lion)?

    - by RecentlyAFish
    Uniconverter is a command-line tool that shares code with the sK1 Project. it's used to convert from one type of vector graphic file to another like this: uniconverter before.eps after.svg I'm looking for a step by step solution to install this tool on my laptop. A similar question posted on the Uniconverter Forum back in August is still unanswered. I read about Uniconverter in an answer posted by Neil but don't grok how to send him a message directly for more details.

    Read the article

  • Why would an iPod Touch and PS3 respond to netdiscover as 0.0.0.0?

    - by Iszi
    Only slightly related to this question, because it was discovered in the same scan: Can someone explain how this happened? When running netdiscover on my home network, my iPod Touch (identified by DHCP-reserved IP address and MAC address) responded to both its own IP address on our 10.x.x.x subnet and to 0.0.0.0 also. Why would this have happened? EDIT: After letting netdiscover run awhile longer, it seems one of the PS3s on the network is also answering to 0.0.0.0 - why is this?

    Read the article

  • Generating/managing config files for hosted application

    - by mfinni
    I asked a question about config management, and haven't seen a reply. It's possible my question was too vague, so let's get down to brass tacks. Here's the process we follow when onboarding a new customer instance into our hosted application : how would you manage this? I'm leaning towards a Perl script to populate templates to generate shell scripts, config files, XML config files, etc. Looking briefly at CFengine and Chef, it seems like they're not going to reduce the amount of work, because I'd still have to manually specify all of the changes/edits within the tool. Doesn't seem to be much of a gain over touching the config files directly. We add a stanza to the main config file for the core (3rd-party) application. This stanza has values that defines the instance (customer) name the TCP listener port for this instance (not one currently used) the DB2 database name (serial numeric identifier, already exists, they get prestaged for us by the DBAs) three sub-config files, by name - they need to be created from 3 templates and be named after the instance The sub-config files define: The filepath for the DB2 volumes The filepath for the storage of objects The filepath for just one of the DB2 volumes (yes, redundant to the first item. We run some application commands, start the instance We do some LDAP thingies (make an OU for the instance, etc.) We add a stanza to the config file for our security listener that acts as a passthrough to LDAP instance name LDAP OU TCP port for instance DB2 database name We restart the security listener (off-hours), change the main config file from item 1, stop and restart the instance. It is now authenticating via LDAP. We add the stop and start commands for this instance to the HA failover scripts. We import an XML config file into the instance that defines things for the actual application for the customer - user names, groups, permissions, and business rules. The XML is supplied by the implementation team. Now, we configure the dataloading application We add a stanza to the existing top-level config file that points to a new customer-level config file. The new customer-level config file includes: the instance (customer) name the DB2 database name arbitrary number of sub-config files, by name Each of the sub-config files defines: filepaths to the directories for ingestion, feedback, backup, and failure those filepaths have a common path to a customer-specific folder, and then one folder for each sub-config file Each of those filepaths needs to be created We need to add this customer instance to our monitoring scripts that confirm the proper processes are running and can be logged into. Of course, those monitoring config files include the instance name, the TCP port, the DB2 database name, etc. There's also a reporting application that needs to be configured for the new instance. You get the idea. There's also XML that is loaded into WAS by the middleware team. We give them the values for them to plug into the XML - they could very easily hand us the template and we could give them back completed XML.

    Read the article

  • Can I have nginx put stuff on memcached?

    - by adamo
    It is my understanding that nginx can query memcached for data that it serves, but you have to place them there using some other (homegrown) program. So the question is, can I have nginx fetch data from the backend and place them into memcached for future use for certain locations? Sort of not having to place all files from /images in it "by hand" but having them (mem)cached after being fetched for the first time? Any backend other than memcached would suffice also.

    Read the article

  • Blocking HTTP clients which request certain URLs repeatedly

    - by Guido Domenici
    I run a website on Windows Server 2008 R2. Looking through the IIS logs, I have noticed that there are some IP addresses repeatedly requesting certain URLs (such as for example /mysql/phpmyadmin/main.php, /phpadmin/main.php) which do not exist, as the site is entirely served off of ASP.NET. They are obviously fishing for known vulnerabilities. My question is, are there any firewall or other tools (Windows built-in or commercial) that allow me to block those IP addresses which request certain URLs multiple times?

    Read the article

  • Can't login as root but I can SU while logged with another user

    - by Rhyuk
    What I was doing before this happened?: I was tinkering trying to setup X server so I can open an app's GUI remotely so I installed "X Window System", "xclock" and uncommented "# ForwardX11 yes" from my "/etc/ssh/ssh_config". (never got it working but thats a whole other question) Since that moment I'm not able to login as root from Putty (I get Access Denied). I can login as another user and I can "su" successfully so I know the password is right. How can have direct access with root again?

    Read the article

  • Start multiple instances of Firefox

    - by Vi
    How can I have multiple independent instances of Mozilla Firefox 3.5 on the same X server, but started from different user accounts (consequently, different profiles)? Limited success was only with Xephyr :1, DISPLAY=:1 /usr/local/bin/firefox, but Xephyr has no Cygwin/X's "rootless" mode so it's not comfortable (see other question). The idea is to have one Firefox instance for various "Serious Business" things and the other for regular browsing with dozens of add-ons securely isolated.

    Read the article

  • Internet Speed for Webserver

    - by René
    That should be kind of dumb question in comparison to all other questions here. What minimum upload and download is required for a small home webserver with one webpage? Or is there a schema that shows me the required upload and download speed for a number of visitors? We talk about a Windows Server, but not really sure this is relevant. That's just for a practice project.

    Read the article

  • Playing HD video accelerated by GPU? (Linux)

    - by data_jepp
    I know that this laptop (Asus UL30A) does support playing HD material with the help of the GPU on windows. The question is how can I do this under linux? The CPU load as is implies that this is not activated. I assume that it's limited to a handful of codecs. But which player supports this, if its even supported at all?

    Read the article

  • Domain authentication used for kerberos based authentication of users on my server

    - by J G
    Suppose a user process has authenticated itself against domain's directory server via kerberos, and then attempts opens a network socket to my server application. My server application has a white-list of users from the domain directory server. How does my server app authenticate the user from the directory based on this socket opening attempt? (To keep things simple - let's say my server is written in Java, and the directory server is Active Directory) EDIT My question is about how the client asks for an authentication token.

    Read the article

  • How do I get the Windows 7 Firewall to prompt me whether to allow or deny a new connection?

    - by Epaga
    In Vista and before, new programs attempting an ingoing or outgoing connection would cause a Windows prompt whether to allow or deny the program as a rule. In Windows 7 I seem to have to manually enter rules. Is there any way to get Windows 7 to ask me on its own? Edit : The options MrStatic points to in his answer are already turned on. No prompts, hence my question. See this forum entry for another guy with the same problem

    Read the article

  • Why is my Mac contacting Romania?

    - by Jack
    I just used Onyx to clean out my caches and log files after which I did a reboot. Browsing the "All Messages" panel of the Console app I noticed this line: 10/27/13 3:38:03.000 PM kernel: 5.106.198.19 Since I did not recognize that IP I did a whois and to my surprise found out that it points to Eurolan Solutions in Romania. So my question is why is my Mac 10.7.5 contacting Romania and how can I stop this from happening? Many thanks

    Read the article

  • hardening a server: disallow password-login for sudoers and log unusual ips

    - by Fabian Zeindl
    Two question regarding sudo-login into an ubuntu-system (debian tips welcome as well): Is it possible to require sudoers on my box to only login with publickey-authentication? Is it possible to log which ip sudoers log in from and check that for "unusual activity" or take actions? I'm thinking about temporarily removing sudo-rights if sudoers don't log in from whitelisted IPs. Or is that too risky to be exploited?

    Read the article

< Previous Page | 475 476 477 478 479 480 481 482 483 484 485 486  | Next Page >