Search Results

Search found 47615 results on 1905 pages for 'make it useful keep it simple'.

Page 481/1905 | < Previous Page | 477 478 479 480 481 482 483 484 485 486 487 488  | Next Page >

  • How to give user read/write access to folders?

    - by Will
    I'm running a certain script that is using a non-root user to do the following... mkdir: cannot create directory `/srv/www/example.com/releases' *** [err :: 12.23.45.789] : Permission denied How would I allow user xyz to have permanent permissions to do so and still keep this web server secure? Also is it possible to make it recursive for all subfolders? I know its probably chmod something but I'm not that linux savy, thanks.

    Read the article

  • Use Windows 7 default icons with Notepad++

    - by CFP
    I do like Notepad++, but I hate its icon. I'm very happy with Windows 7 icons for txt/ini/... files, and would like to keep them. How can I associate Notepad++ with all supported filetypes without changing icons? With Notepad2, the problem did not occur.

    Read the article

  • Get changes to local config files with apt

    - by tstenner
    When I'm updating a package and a new configuration file is shipped, I'm asked whether I want to keep my version, install the new one or view the differences. As I have to document an older server, I'd like to start by explaining what I did (and why), how can I get a list of changes to local config files?

    Read the article

  • Is it okay to resend to hard bounced emails after X days. What is X?

    - by V. Hsu
    If I see an email returned due to a hard bounce, after how many days is it acceptable to resend to that email address. It is possible for emails to be reactivated or for temporary outages, so it doesn't make sense to keep an email in my hard bounce email list forever. I've already seen cases where I receive emails from addresses that were put in my hard bounce email list months ago. Any recommendations? Are there specific recommendations from ISPs?

    Read the article

  • How to install TortoiseHG on Ubuntu

    - by Webnet
    I just downloaded and installed the latest Ubuntu and it doesn't look like I'm used to. I don't see any Mercurial developer tools in the Ubuntu Software Center. I got on http://tortoisehg.bitbucket.org/download/index.html and it looks like it can be done, but I'm not entirely sure how. I've done some Googling but the results I keep running into are on older versions of Ubuntu. Any ideas on how I can make this happen?

    Read the article

  • Gentoo/mdadm: Remove 1 disk from RAID 0 array

    - by Tim
    The server has a 7-disk RAID 0 array, and sdf is starting to die. Is there a way to remove sdf while keeping the array intact? # df -h Filesystem Size Used Avail Use% Mounted on /dev/md1 14T 6.6T 7.0T 49% /var [...] # cat /proc/mdstat Personalities : [raid0] md1 : active raid0 sda4[0] sdf1[5] sdd1[3] sdb1[1] sde1[4] sdg1[6] sdc1[2] 14482788352 blocks 512k chunks Looking to keep downtime to a minimum.

    Read the article

  • window 7 hardware reserved ram

    - by alex
    Hi, I have Windows 7 64bit, 8gb ram and 1152mb is hardware reserved which leaves me with 7039mb of physical memory available as I can see on the task manager. What is the advantage or disadvantage of keeping it this way? If I disable it from the MSCONFIG, the hardware reserved comes down to 1mb. Well, which way I should keep it for best performance in all meanings considering that nowdays, 8gb is still a lot. Could someone explain the easy way please?

    Read the article

  • Issue with "Games Folder" having stuck icons

    - by Leafy
    I have a Win7-64 with Home Premium. Recently I installed Torchlight via Steam on my PC and tried to keep the shortcut in my Games Folder. Instead, it make a blank icon (as in, default application icon) which doesn't launch the game and un-removable. Can anyone tell me how to get rid of the icon?

    Read the article

  • not able to log on to balcberry gmail even after change of psswd and Captcha unlock

    - by user34895
    I have custom domain with gmail, and successfully configured gmail account to receive mail in blackberry. However, after deleting the account, I am not able to configure again, and it keep on repeating same problem: invalid email account. I have changed the password, and also did unlocking of captsha many times, but it just dont connect with blackberry account. Can I get some advise?

    Read the article

  • Add send/receive to Outlook systray icon?

    - by Hannele
    Is it possible to add a send/receive action to the Outlook 2007 system tray right-click context menu? It's a little annoying to have to open the whole interface just to run this simple action manually. I have searched for an answer, but could only find two other unanswered questions. If there's no particular answer as of yet, would it make more sense to explore making a plug-in like this one to keep running in the systray when closed, or to look for a registry hack, or something else entirely?

    Read the article

  • Set Windows 7 Lock Screen Background

    - by helpsplz
    I've googled this a bit, but have yet to find anything. I have 2 monitors. when I lock my screen via win+L, it turns 1 of them to the background color selected in background options, and the other one is the win 7 login screen. I would like to keep my current wallpaper as the background and on the two monitors if possible when the pc is locked.

    Read the article

  • How can I manage hostnames across multiple servers? [closed]

    - by Dan
    In a lot of documentation I've seen recently, servers are referred to by internal hostnames, such as production-1, production-2, db-1. I realize I can associate these names in the hosts file on the server, but this would obviously mean maintaining a host file for multiple servers, which for anything greater than 2 or 3 would get unwieldy. Is there some simple way people manage common hostnames across multiple servers and keep them in sync, without having to edit multiple files every time?

    Read the article

  • Is a VPN a good method for protecting data in an untrusted network? [closed]

    - by john
    I will be connecting my laptop in an untrusted network. If I setup OpenVpn on a server and use a vpn client on the laptop to connect through it, is it enough? Can someone perform a MITM attack or otherwise eavesdrop on my traffic? If someone on the local network port-scans my laptop, will the open ports be accessible to him while I use the VPN tunnel? Is there anything else I should keep in mind?

    Read the article

< Previous Page | 477 478 479 480 481 482 483 484 485 486 487 488  | Next Page >