Search Results

Search found 44026 results on 1762 pages for 'raid question'.

Page 489/1762 | < Previous Page | 485 486 487 488 489 490 491 492 493 494 495 496  | Next Page >

  • a couple of questions about proxy server,vpn & how they works

    - by Q8Y
    I have a couple of questions that are related to security. Correct me if i'm wrong :) If I want to request something (ex: visiting www.google.com): my computer will request that then it will to the ISP then to my ISP proxy server that will take the request and act as a middle man in this situation ask for the site (www.google.com) and retrieve it then the proxy will send it back to me. I know that its being done like that. So, my question is that, in this situation my ISP knows everything and what I did request, and the proxy server is set by default (when I ask for an internet subscription). So, if I use here another proxy (lets assume that is a highly anonymous and my ISP can't detect my IP address from it), would I visit my ISP and then from my ISP it will redirect me to the new proxy server that I provide? Will it know that there is someone using another proxy? Or will it go to another network rather than my ISP? Because I didn't get the view clearly. This question is related to the first one. When I use a VPN, I know that VPN provides for me a tunneling, encryption and much more features that a proxy can't. So my data is travelling securely and my ISP can't know what I'm doing. But my questions are: From where is the tunneling started? Does it start after I visit the ISP network (since they are the one that are responsible for forwarding my data and requests)? If so, then not all my connection is tunneled in this way, there is a part that is not being tunneled. Since, every time I need to do anything I have to go to my ISP and ask to do that. Correct me if I misunderstand this. I know that VPN can let my computer be virtually in another place and access its resources (ex: be like in my office while I'm in my home. This is done via VPN). If I use a VPN service provider so that I can access the internet securely and without being monitored by my ISP. In this case, where is my encrypted data saved? Is it saved in my ISP or in the VPN service provider? If I use a VPN, does anyone on the internet know what I'm doing or who I am? Even the VPN service provider? Can they know me? I think they should know the person that is asking for this VPN service, am I right?

    Read the article

  • How to restore Google "Cached" links?

    - by Steven Penny
    On Google search, "Cached" links are available, which take you to a version of the page saved on Google servers. These links are quite useful if the source page is temporarily down or otherwise. Back in July 2011 Google moved these links inside of an "Instant Preview" box. Many people from this thread and others either simply cannot find the new links or prefer the old location. Edit To be clear, the question is how to restore the links to the old location.

    Read the article

  • Ghost/Acronis/Clonezilla Live Image Creation (Without Rebooting)

    - by user39621
    I know Ghost and Clonezilla aren't able to build images of a system while the system is running(Without Rebooting). Haven't Checked on Acronis though, but i don't simpatize with private solutions. Question: Is there a software solution which is able to build a "Live" image? Would appreciate anwsers, since I'm one step away from building a Clonezilla test enviroment and this will just help on my decision. Thank you.

    Read the article

  • Oracle 10 g - Unable to free up space in tablespace

    - by Bruno Rothgiesser
    The tablespace in Oracle 10g is almost 100% used. Size (MB) = 571,768.0 Used (MB) = 571,534.0 I just deleted (and committed) thousands of records in a table that belongs to a schema associated with that tablespace. Surprisingly, no space was freed up according to the Tablespaces page on Enterprise Manager. Question: is there anything that I need to do to force Oracle to release the space corresponding to the deleted records?

    Read the article

  • All internet requests in Windows time out

    - by Brandon
    So, I've run into a very strange problem with my home wireless network. Previously, at seemingly random times, the router seemed to disconnect all wireless hosts and cause all of the wired hosts to have a "limited connection" according to windows. In order to fix this, I had to unplug all of the wired hosts from the router, unplug the modem from the router, and power cycle the router. This seemed to solve the problem for a while until the exact same thing happened a day later and I had to go through the same process again. That's where I noticed something weird happening. There was one wireless host (a Windows Vista laptop) that seemed to be causing the router to disconnect the other hosts whenever it connected. When this happened, only that laptop was able to use the wireless from the router. When this happened, I disconnected it from the wireless (by disabling the wireless adapter) then reconnected it (by re-enabling it) and now it, like the other hosts, couldn't connect. I've never really seen anything this strange happen on our network before. So, I restored the router to factory settings and the problem seems to have vanished except one crucial problem. There's another host (a Windows 7 laptop) that was perfectly able to connect before all of the router issues and even in between the crashing and power-cycling events but now says its connected and says it's able to reach the Internet, but all requests time out. In any browser I've tried, the tab says connecting to [site]... for a solid minute and then tells me the request timed out. When I try to ping google.com in cmd it also says request timed out. In frustration, I booted into a dual-boot Ubuntu installation on the Windows 7 host and the connection works fine, to my surprise, as ubuntu is where I am now typing this rather long question. I haven't looked through the event log in windows but will post anything I find in an edit I haven't tried connecting (in Windows 7) to any other wireless network, since The fact that it works in Ubuntu suggests its Windows and not the router but I didn't change any wireless settings in windows before it being able to reach the Internet and not. Does anyone have any clue what could have happened. I opened to buying another router as this one is almost a year old :) but I would like to know whats going on here. Thanks in Advance! P.S. Sorry for how long my question is, I'm a little anxious (:

    Read the article

  • how to spoof compelte browser identity

    - by Greenleader
    I found question on how to spoof user agent. I dont' want to spoof only user agent. I want to spoof everything from user agent, to Accept headers to http headers and also the information javascript can tell about browser - screen resolution and depth, class cpu, platform, device name, etc. Do you know of a way to achieve this in any browser out there ? I don't want 10 plugins to achieve this. I'd like unified way.

    Read the article

  • Add constant value to numeric XML attribute

    - by Dave Jarvis
    Background Add a constant value to numbers matched with a regular expression, using vim (gvim). Problem The following regular expression will match width="32": /width="\([0-9]\{2\}\)" Question How do you replace the numeric value of the width attribute with the results from a mathematical expression that uses the attribute's value? For example, I would like to perform the following global replacement: :%s/width="\([0-9]\{2\}\)"/width="\1+10"/g That would produce width="42" for width="32" and width="105" for width="95". Thank you!

    Read the article

  • Real performance gain from faster IDE or SATA hard drive?

    - by raw_noob
    How much of a real-world performance gain would you expect from: replacing a 5400rpm IDE HD with a 7200rpm IDE HD? replacing a 5400rpm IDE HD with a SATA-150? It's assumed that the drive in question is both the system drive and the only drive. A modest AMD Sempron-based home computer with adequate DDR memory running Windows XP Home SP3. Thanks for looking.

    Read the article

  • Custom url rewrite stop working after 20 seconds?

    - by 101224863727594634919
    Hi all I have a simple question about using of custom URL rewrite module - http://weblogs.asp.net/scottgu/archive/2007/02/26/tip-trick-url-rewriting-with-asp-net.aspx. After period of time redirects stop working. When I trace non working requests I found that -URL_CACHE_ACCESS_END PhysicalPath URLInfoFromCache true URLInfoAddedToCache false ErrorCode 0 ErrorCode The operation completed successfully. (0x0) Is there any option to disable URL cache access for website. Thanks in advance.

    Read the article

  • Tape vs SSDs backups regarding long-term storage reliability

    - by user66131
    My question is very specifically about solid state drives, not regular hard drives. I would like to put in place a grandfather-father-son backup scheme, with the SSDs being used for the grandfather and father portions, and the yearly grandfather would be locked in a safe offsite for maybe 5-10 years. Can I expect that after this period of time the data would be preserved as well as it would be on a tape?

    Read the article

  • Protecting Backups from Viruses

    - by Frank Thornton
    Currently we are using ReadyNAS RN102 by NETGEAR to hold all our images from all our machines. My question is can viruses expand from the machines and infect the NAS drive and the backups? We are using AOMEI Backupper. EDIT: Basically, I want to keep my clean backups clean. I keep Daily, Weekly, Monthly achievable backups, my worry is a virus might attempt or try to infect these backups making using them worthless.

    Read the article

  • Hard disk permission after bootcamp ??

    - by Sladiki
    Hi all, I have a question concerning hard disk permission after Using boot camp, i have a macbook pro 17 i7, 500gb, yesterday i installed window 7 ultimate in 80 gb (bootcamp) ntfs offcourse. I was testing my HD permission since i found that the start up is slow in mac side. I found there's alot of changes in permissions is that normal or i should to repair all this permission problems, need to mention that from Windows side i can see my mac drive which i don't want... Any idea... Regards, Sami

    Read the article

  • A feed scanner that reads data

    - by kylex
    I don't know if this is the right place to ask this question, but... I need a scanner (paper feed scanner) where depending on either a barcode, or number, or some identifier on the paper being scanned, creates a PDF file with a name based on that identifier. For example: If I scanned a page with the number 12345 on the top-left of the page, a PDF file named 12345.pdf would be created. Any suggestions at all would be greatly appreciated!

    Read the article

  • load balancing between physical and virtual machines

    - by fefe
    First of all sorry if my question would be not relevant, I'm quite beginner. In short: I have 2 physical machines - first(Windows Server 2007, Apache 2.2) on the second machine esxi installed to host virtual machines . I have been converted my physical machine(1) on esxi(2) and in the next step I would like to deploy a load balancer between the physical and virtual machine. Would be this workaround appropriate? If yes what are the steps to follow?

    Read the article

  • Need for page file with 12 GB RAM

    - by MartinStettner
    Hi, I recently got my new PC with 12 GB RAM (running Windows 7 64bit). The default installation suggests a 12 GB page file on the system drive (which I think is both inefficient and expensive on a SSD drive...) I'm wondering if I need any virtual memory at all, 12 GB being more than I had on my previous machine including the page file (I had 3GB RAM + 3GB pagefile). Thanks Martin EDIT As mokubai pointed out, the question is pretty much answered in Windows 7 pagefile size with large RAM and SSD

    Read the article

  • How do you close a VMWare Fusion VM Window without shutting it down or suspending it?

    - by Chris
    There are a few parts to this question. The first is: I'm running a virtual machine guest using vmrun and nogui, when I open the VMWare Fusion application, the window library opens but subsequently also opens any window of a running VM. Is there a way to prevent this? Secondly, but related: Once it does pop up or I have that separate VM Window open, is there a way to close the window such that it does not suspend or shutdown the vm i.e. convert it back to nogui mode?

    Read the article

  • How to add an explorer context menu for a file extension ?

    - by asksuperuser
    I inspired from my other question here http://superuser.com/questions/129755/how-to-get-open-command-window-here-while-clicking-on-exe-not-on-parent-folder and tried this Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Classes\.sln] [HKEY_CURRENT_USER\Software\Classes\.sln\shell] [HKEY_CURRENT_USER\Software\Classes\.sln\shell\countlines] @="countlines" [HKEY_CURRENT_USER\Software\Classes\.sln\shell\countlines\command] @="c:\\countlines\\countlines.exe" %1 but it doesn't work.

    Read the article

  • Placement of Variables in Puppet module

    - by Michael Duffy
    Hi guys; I've got a puppet module to setup several Gigaspaces PU's. Each of these have quite a few variables to be placed within the configuration file templates. We're also using several different environments so these variables are repeated several times to contain the values for each environment. My question is where the best place to store these variables would be? A class of their own, an external .pp I import, or something other?

    Read the article

  • User permission settings on DNS with windows 2003 server R2 standard edition

    - by Ghost Answer
    I have windows server 2003 r2 standard edition and some XP OS clients systems. I have created the DNS and profiles for all user. Now I want to authorized some users to installation of softwares, remove softwares and other such kind of things. How to I make such kind of policies for all different users on DNS. Please help me. May be this question can be same for another but I didn't get the solutions.

    Read the article

< Previous Page | 485 486 487 488 489 490 491 492 493 494 495 496  | Next Page >