Search Results

Search found 35444 results on 1418 pages for 'lock down computer'.

Page 527/1418 | < Previous Page | 523 524 525 526 527 528 529 530 531 532 533 534  | Next Page >

  • How do I prevent windows opening on one of my desktops?

    - by frankster
    I have 2 monitors and a tv screen connected to my computer. The tv is angled so I can watch it in bed but is facing away from my desk (and usually switched off). Sometimes applications open on the monitor and I have to fiddle around with the "Move" menu option to bring them back to one of the screens I can see. I don't want to disable the tv as I will just have to reenable it when I want to watch something on it, so how can I prevent applications opening on the tv?

    Read the article

  • Windows 8 Installation doesn't detect my SATA Maxtor 6V250F0 HDD

    - by dosaki
    I've been using Ubuntu on a desktop computer I have in my house and I'd like to try to install Windows 8 and replace the Ubuntu system. In the installation wizard of Windows 8 I get stuck in the point where I have to specify the HDD to install the OS to. The problem is that I cannot see any hard disk drive to select. I believe this may be related to drivers but I don't know where to get them. Can anyone help me with this?

    Read the article

  • Amavisd start error

    - by Kristian
    I can't start amavis. It gives an error: Starting amavisd: Error in config file "/etc/amavis/conf.d/05-domain_id": Insecure directory in $ENV{PATH} while running with -T switch at /etc/amavis/conf.d/05-domain_id line 7. On line 7 is: chomp($mydomain = `head -n 1 /etc/mailname`); This problem occured after restaring my computer. I don't know much about amavis, so any help is appreciated. Regards, Kristian

    Read the article

  • Node app crashes after a while on micro EC2 instance even with supervisor

    - by Justin Meltzer
    I'm using supervisor to start my node.js application on a micro EC2 instance. However, the app only stays running for some time until it eventually shuts down. Not exactly sure how long the app stays running but I'm guessing for about a few hours or so. Sometimes less. My question is where on the remote server should I be looking in order to debug this kind of issue? I'm running an Amazon Linux AMI.

    Read the article

  • Can't Delete file Macbook Pro (Stuck in Trash)

    - by chris
    I dunno when I deleted this file (its an avi), its been in the trash for awhile. Today I went to empty the trash and this one file can't claims to be in use. But I have restarted, shut down my mac several times, I've also used my media player several times since last using that file. So I guess Im trying to find out how to find whats using the file or at least making it appear as such. So I can go about deleting it finally.

    Read the article

  • primary master drive fail

    - by Kelly
    I purchased a new hard drive for my desktop and when I try to boot up the computer with a Windows disc in the drive, it will go through a bunch of screens and ask me which partition I would like to install windows into, but after it goes through the formatting step and reboots, I get a message saying Primary Master Drive Fails. How do I fix this?

    Read the article

  • Mouse and Keyboard Stop Working on Startup

    - by BoundforPNG
    I have a Dell Optiplex 330 and have recently done a Windows XP repair. After it was finished I was able to use the computer just fine. Now I take it back to it's original location and plug in the OEM mouse and keyboard and they both work until Windows XP loads. As soon as windows loads the lights go out on both the keyboard and mouse.

    Read the article

  • How do you manage private queue permissions on a windows server 2008 cluster?

    - by David
    On windows server 2003 there was an option to allow a resource to interact with the desktop, this allowed you to run computer management mmc snap-in on the virtual name of the cluster, allowing you to manage permissions of the private message queues on the cluster. Windows Server 2008 failover clustering has removed that checkbox, so applications can no longer interact with the desktop. My question is then how does one go about managing private queue permissions on the clustered (the virtual name) server?

    Read the article

  • SQL Server Log File Size Management

    - by Rob
    I have all my databases in full recovery and have the log backups happening every 15 minutes so my log files are usually pretty small. question is if there is a nightly operation that causes lots of transactions to happen and causes my log files to grow, should i shrink them back down afterward? Does having a gigantic log file negatively affect the database performance? Disk space isn't an issue at this time.

    Read the article

  • Unable to view USB stick/drive contents

    - by Harshit Sachdeva
    So, I plug-in my USB stick, copy a file from the hard drive to the USB stick, and safely remove the USB stick. I then plug out the USB stick. When I plug the USB stick back into the computer again, the previous contents of the USB stick are all gone. It shows an empty drive. I am using Windows XP SP 2 with an 8 GB USB stick from Transcend.

    Read the article

  • Unable to view USB stick/drive contents

    - by Harshit Sachdeva
    So, I plug-in my USB stick, copy a file from the hard drive to the USB stick, and safely remove the USB stick. I then plug out the USB stick. When I plug the USB stick back into the computer again, the previous contents of the USB stick are all gone. It shows an empty drive. I am using Windows XP SP 2 with an 8 GB USB stick from Transcend.

    Read the article

  • Disable Acer eRecovery system

    - by Joel Coehoorn
    The meat of this question is that I'm looking for a way to either require a password before using a recovery partition or "break" the recovery partition (specifically, Acer eRecovery) in a way that I can later "unbreak" only by booting normally into windows first. Here's the full details: I have a set of new Acer Veriton n260g machines in a computer lab. A lot work went into setting up this lab to work well - for example, Office 2007 and other programs needed by the students were installed, all windows updates are applied, and a default desktop is setup. All in all it's several hours work to fully set up one machine. Unfortunately, I don't currently have the ability to easily image these machines, and even if I did I would want to avoid downtime even while an image is restored. Therefore, I've taken steps to lock them down — namely DeepFreeze and a bios password to prevent booting from anywhere but the frozen hard drive. DeepFreeze is an amazing product — as long as you boot from the frozen hard drive, there is no way to actually make permanent changes to that hard drive. Anything you do is wiped after the machine restarts. It lets me give students the leeway to do what they want on lab computers without worrying about them breaking something. The problem is that even with the bios locked and set to only boot from the hard drive, these Acers still have a simple way to choose a different boot source: shut them down and put a paper click in a little hole at the top while you turn it on again. This puts them into the "Acer eRecovery" mode. This by itself is no big deal — you can still power cycle with no impact. But if you then click through the menu to reset the machine (we're now past the point of curiosity and on to intent) it will wipe the hard drive and restore it to the original state. Of course, a few students have already figured this out and reset a couple machines. That's unfortunate, but inevitable. I don't want to destroy the ability to do this entirely (which I could by repartitioning the drives to remove the recovery partition) but I would like a way to require a password first, or "break" the recovery system in a way that I can "unbreak" only if I first un-freeze the hard drive in DeepFreeze. Any ideas?

    Read the article

  • How to strip outgoing mail headers in postfix?

    - by Yegor
    I have a mail server running on my box. I have webmail access, as well as ability to send mail thru a client. When I send mail thru a web interface (roundcube) it attaches its own headers, so the sender is kept anonymous. When sending mail thru Outlook, or Thunderbird, it attaches its own header, which lists the IP address, computer name, etc. Is there a way to ahve postfix strip these outgoing headers, and replace them with the standard "web mail" header that I get with roundcube?

    Read the article

  • Windows 8: Different Themes or Different Wallpaper Slideshows for Multiple Monitors

    - by Robith Nuriel Haq
    I know I can assign different wallpaper for each monitor that is connected to my computer in Windows 8(by right clicking and selecting "set for monitor 1,2,etc"), but I don't know how to assign different wallpaper slideshow or different theme for each monitor. Can anyone tell me how to do that? It is quite interesting to see different wallpapers on different monitors, but seeing static wallpaper on each of those monitors is no fun. thanks

    Read the article

  • With modern PC systems, what less-than-optimal designs have we inherited?

    - by Rob Kam
    What have been less than optimal design choices, that are now (almost) immutable features of the modern PC system, and what constraints led to these choices? There have been a great many of these. For example the qwerty keyboard is widespread although the Dvorak keyboard might be a better choice. I guess this is something to do with the teletypes that were used as early computer keyboards, which had originally been modified from typewriters.

    Read the article

  • Which program do you recommend for monitoring the list of installed programs in Windows?

    - by Nickolai Leschov
    I am in charge of a computer network in a small company (20..30 computers). Recently the need arose to control what kinds of programs our company is using i.e. to collect information that is available when one opens "Add or Remove Programs" in Windows. I would like to have a program that will collect this kind of information over the network of Windows machines. What is your recommendation?

    Read the article

  • Netbook without Windows?

    - by drewk
    I have been looking around for a netbook without Windows and with Ubuntu preinstalled. Almost all I have seen have Windows. The main issue is making sure that the computer ships with the right Ubuntu drivers and, hopefully, saving a little without having to pay for Windows. So far, I cannot find one.

    Read the article

  • Tor and blacklisting

    - by Likso
    I'm studying Tor and its capability to provide anonymity and bypass censorship, especially when used by people of repressive countries. I'm wondering about one thing. The nodes that are part of the "Onion Network" are limited and they're public. So, in an oppressive regime, couldn't be possible that someone with a blacklist just put a firewall blocking in this way TOR traffic? (and tracking down who's using it?)

    Read the article

  • Cisco ASA 5505 VPN setup

    - by Guillaume
    Hello, I'm trying to setup a site to site VPN, with a Cisco ASA 5505 at one end. The documentation tells me to use the Ipsec VPN wizard but under the wizards drop down menu there's nothing VPN related there. I have a 'base' license, is that the issue? or am I being stupid? The versions I have are: Cisco Asa 5505 with ASA 8.2(1) and ASDM 6.2(1), the firewall was already setup when I got it (I'm leasing a dedicated server). Thanks for your help

    Read the article

< Previous Page | 523 524 525 526 527 528 529 530 531 532 533 534  | Next Page >