Search Results

Search found 111248 results on 4450 pages for 'end user computing'.

Page 488/4450 | < Previous Page | 484 485 486 487 488 489 490 491 492 493 494 495  | Next Page >

  • Specifying Multiplicity in a Visio Database (ERD) Diagram

    - by Nitrodist
    Is there a way to manually edit the cardinality/multiplicity symbols on the end of a database ERD made in Visio? The category I'm using is in Visio 2003 under Database -> Database Model Diagram I want to be able to go from something like this: To this: The second graphic was done by manually adding the numbers, but I would prefer to just do it in Visio. Is there any way of accomplishing this?

    Read the article

  • Why is the VGA Cable attached to new monitors

    - by ahsteele
    When opening a new monitor I am amazed that the VGA cable is always attached. Even with new high end monitors that include Display Port and DVI cables the old VGA cable is always attached while the others are just left in the box. What is the reasoning behind attaching a cable in the first place and why the VGA cable in particular?

    Read the article

  • Update MS Windows XP via batch script

    - by oshirowanen
    Is it possible to update WXP using a batch script? Basically, I would like to run a batch script, which installs all important updates in the background accepting any dialog boxes which need user interaction. EDIT 1: I know I can enable the "Automatically download and install" option to do this, but I have about 100 computers to do, so it would be nice if it can be done via a batch file. That way, I can use the software we already have to run a batch file on all computers with a single click.

    Read the article

  • Upload Picture File Paths to Database Without Creating Multiple Records and Giving The Files Random Names

    - by user1830990
    I want to be able upload pictures to a folder and their filepaths to a MySQL database without creating multiple records. For example instead of: id PicturePath size 1 file1.jpg 90832 2 file2.jpg 84593 I want to do: id PicturePath1 PicturePath2 PicturePath3 1 file1.jpg file3.jpg file5.jpg And also as it uploads, it should change the name of the original file e.g. if User uploads DSC0009.jpg it should upload into the file upload folder and MySQL Database as: someRandomFileName8087935.jpg

    Read the article

  • how to install Wimax Dongle over Ubuntu?

    - by Mosh
    i have Asus Wimax Dongle and it has an Independence software from the Asus company requires user name and password and its running will over windows 7 now i've tried ubuntu 10.10 but nothing happens when i plug the dongle into usb. in windows if you plugs it for the first time, an application wizard begins and you can find a virtual cd in my computer but i cant find it in Ubuntu now i would install it over ubuntu, how? toast for all

    Read the article

  • Keep remoting into wrong account. Windows 7

    - by Paul
    I have a home theatre PC running with two users accounts on windows 7. The default account logs into locally. The account 'Paul' is present but is denied local log in so the default auto logs in locally. I am trying to remote into account Paul using RDC however it tries to log into the default account and I am presented with an an option to boot the present user off so I can log in. How do I specify which account I want to log into?

    Read the article

  • Chrome Equivalent of %s address bar trick in Firefox

    - by notbrain
    I was curious if there was an equivalent technique in Chrome to do address bar param string replacement like you can do in Firefox. If you create a bookmark and put a %s in the bookmark URL/address part, and set a keyword for the bookmark, you can do things like URL: http://php.net/%s Keyword: php Type in browser: php fopen End up at: http://php.net/fopen Is this making its way into Chrome or is there a way to do it?

    Read the article

  • Remove password from an Excel Document

    - by Ben Confino
    I'm providing internal support and one of our users has managed to put a password on an excel file by accident, I've done the proper checks to make sure that the user should have access to the document and now want to know what the recommendation for removing a password from an Excel document. For what its worth, the password appears after Excel opens but before you can see any data in excel.

    Read the article

  • NFS4 / ZFS: revert ACL to clean/inherited state

    - by Keiichi
    My problem is identical to this Windows question, but pertains NFS4 (Linux) and the underlying ZFS (OpenIndiana) we are using. We have this ZFS shared via NFS4 and CIFS for Linux and Windows users respectively. It would be nice for both user groups to benefit from ACLs, but the one missing puzzle piece goes thusly: Each user has a home, where he sets a top-level, inherited ACL. He can later on refine permissions for the contained files/folders iteratively. Over time, sometimes permissions need to be generalized again to avoid increasing pollution of ACL entries. You can tweak the ACL of every single file if need be to obtain the wanted permissions, but that defeats the purpose of inherited ACLs. So, how can an ACL be completely cleared like in the question linked above? I have found nothing about what a blank, inherited ACL should look like. This usecase simply does not seem to exist. In fact, the solaris chmod manpage clearly states A- Removes all ACEs for current ACL on file and replaces current ACL with new ACL that represents only the current mode of the file. I.e. we get three new ACL entries filled with stuff representing the permission bits, which is rather useless for cleaning up. If I try to manually remove every ACE, on the last one I get chmod A0- <file> chmod: ERROR: Can't remove all ACL entries from a file Which by the way makes me think: and why not? In fact, I really want the whole file-specific ACL gone. The same holds for linux, which enumerates ACEs starting with 1(!), and verbalizes its woes less diligently nfs4_setacl -x 1 <file> Failed setxattr operation: Unknown error 524 So, what is the idea behind ACLs under Solaris/NFS? Can they never be cleaned up? Why does the recursion option for the ACL setting commands pollute all children instead of setting a single ACL and making the children inherit? Is this really the intention of the designers? I can clean up the ACLs using a windows client perfectly well, but am I supposed to tell the linux users they have to switch OS just to consolidate permissions?

    Read the article

  • Program for Synchronizing folders across multiple computers automatically

    - by Mcad001
    I work in a company of about 20 people, I need to share some files with all of them in a folder(s) (files are constantly changed by me).., so they need to get the latest changed file automatically (pushed to their computer) What's the best program/system for this task? I need to be able to administrate their read/write access to the folder on a user level. Windows Live Mesh seemed to be perfect for me, but unfortunatly there's a limit of only 9 people in that system.

    Read the article

  • How do I access admin shares on windows 2008 r2?

    - by Jim Geurts
    I am not able to access admin file shares on a Windows 2008 R2 box, if I'm logged in as a user who is part of the Administrators group. The only way I can access those shares is if I use the built in Administrator account. How can I configure the server to allow any administrator to access the file system via admin shares? Btw, this works with Windows 2003. By admin shares, I refer to: \192.168.1.4\c$ or \192.168.1.4\e$

    Read the article

  • Print ssh and su chain

    - by user1824885
    Is there a way to show the complete ssh and su chain in bash? For example. In Server A as user aa: su - ab ssh ba@B su - bb Thus, I would like a command that prints something like this: 1 bash aa in A 2 su ab in A 3 ssh ba in B 4 su bb in B I tried pstree but it does not print the users and only works with the processes of the last ssh'ed server: $ pstree | grep -C 5 pstree serversshd---sshd---sshd---bash---su---bash-+-grep | `-pstree Thanks and regards.

    Read the article

  • Open application with lowered privileges

    - by GP89
    I have a mac installer which runs as root with pre and post install bash scripts. At the end of the post install script I launch the application which inherits and opens as root. Is there a way I can lower the permissions back down to the user that ran the installer and then open the app? Or a more hackish way I can set the app to open in some scheduler from the script, which then gets opened by the scheduler which would have the users permissions

    Read the article

  • Cron ignoring an update to crontab

    - by GJ
    I've commented out a line in the crontab on a debian server, which I guess was there by default yet was causing me to get error emails every hour: # m h dom mon dow user command 17 * * * * root cd / && run-parts --report /etc/cron.hourly However, the error emails keep coming in as if it hasn't been commented out. The error emails: Subject: Cron <root@(none)> root cd / && run-parts --report /etc/cron.hourly (failed) /bin/sh: root: not found Any ideas?

    Read the article

  • Active Directory VBS Script for Auditing a Presentation

    - by Steven Maxon
    Can anyone help me with this VBS script? Thanks in advance. User logs in to a XP computer and a PowerPoint presentations or web page starts They read through the presentation and then click a links that says: “Click here to complete presentation”. When they click the link it will send their username and time/date stamp to a text file on a server. The next time they log in they will not get the PowerPoint or web page presentation.

    Read the article

  • Changing Administrator password Windows Home Server

    - by Brettski
    Is there a problem using Computer Management Local User and Groups Users to change the Administrator password in Windows Home Server? Is there a chance it will cause any issues with the system? I ask as the system warns against using server tools to change settings. I have access to the system with my account, but the Administrator password isn't working,forgotten whatever and needs to be changed.

    Read the article

  • Are there disagvantages to using Outlook's Chached Exchange Mode?

    - by Rax Olgud
    Since I found out about Outlook's "Cached Exchange Mode" I've been using it, and I also set it up on every PC I come across. I think it's a great feature that improves the efficiency of of every Outlook user, and I don't understand why it's not ON by default. My question is - are there any disadvantages to using Cached Exchange Mode? (Besides the obvious fact that it consumes a bit more space, which I don't see as a big issue nowadays)

    Read the article

  • Program to set time on local computer using GPS data

    - by dmkerr
    I have a laptop running Windows XP that does not connect to the Internet and I would like to use a USB GPS receiver as a time source to set the clock. Generally, the laptop will not have access to the open sky so getting a strong, multi-satellite connection is not likely. Ideally, I would like to be able to have the program detect the GPS receiver and set the clock without intervention from the user. Is what I'm seeking even feasible?

    Read the article

  • Windows 64bit Sandboxing software alternatives

    - by Pacifika
    As you might know sandboxing software doesn't work in 64bit Windows due to patchguard. What are the alternatives for a person looking to test untrusted / temporary software? Edit: @Nick I'd prefer an alternative to VMs as I'm not happy with the extended startup time, the extra login sequences and the memory overhead that accompanies booting a VM solution to test something out ocassionally as a home user. Also it's another system that needs to be kept secure and up to date.

    Read the article

< Previous Page | 484 485 486 487 488 489 490 491 492 493 494 495  | Next Page >