Search Results

Search found 30819 results on 1233 pages for 'software security'.

Page 538/1233 | < Previous Page | 534 535 536 537 538 539 540 541 542 543 544 545  | Next Page >

  • Why Do You Need SSL Certificate

    SSL (Secure Sockets Layer) is an encrypting modus operandi that ensures the en route security of the personal details processed by the browser to the server. We all know that online shopping is prefe... [Author: Jack Melde - Computers and Internet - May 01, 2010]

    Read the article

  • No Audio Output Device is installed

    - by mabho
    Hi, this is an intermitent problem in my Sony Vaio model PCG-5K1L. I keep on getting a "No Audio Output Device is installed" when hovering my loudspeaker icon in Windows Vista. I have tried System Device Manager Sound Realtek High Definition Album Update Driver Software. The update process went through, but nothing happens. Still Vista does not seem to recognize my audio software. The strange part is that out of nothing my sound card can resume working to stop again hours later... If someone has any clues to solve this, please, help. Thanks a lot.

    Read the article

  • How to Completely delete my USB thumbstick?

    - by Roi
    I own a Kingston thumb-stick. I have installed a Google Chrome OS image to it so I could try it out. When it did so, it created 3 partitions (I backed everything and the software that installed Chrome OS delete my thumb-stick completely and created 3 partitions). Now I want to get it back to 1 partition but when I go to Disk Management, it will not let me "extend" the partition. I have tried different partitioning tools but they didn't recognize my thumb-stick anyway. I have also tried DiskPart to no avail. Is there any software that will completely format my thumb-stick so I would only have 1 partition?

    Read the article

  • Experience with Intel X25-M 160GB and Oracle

    - by derobert
    We're considering building an Oracle database with 12 Intel X25-M G2 160GB drives in software RAID10. It'd be running Linux. Database gets some very heavy write activity during the early morning data load, other than that it is mostly read-only (and the read load is fairly minimal). We're currently running on 11 150GB Velociraptors (also Linux software RAID10), and are hoping the X25-M will speed up the data load. We currently have redo on different disks than the rest of the data. I'm wondering a few things: Any experience with using X25-M drives for databases? The X25-E are unfortunately beyond our budget. Would it hurt to separate redo off to some magnetic (non-SSD) drives, say 2 (raid1) or 4 (raid10) Seagate Constellations?

    Read the article

  • sticky bit on NFS file system

    - by Kris_R
    I have a system where to the main server (homes, nfs, ntp, queue...) can log-in only root – all the other users use front-end host with NFS-mounted home directories (RW) and all other software directories (read-only). My problem is, that time to time, if root or normal user with sudo makes some administrative works on front-end some homes of normal users getting sticky bits (drwsr-sr-x). If it happens usually the user can't log-in (as long as permission for his home are not changed to drwxr-xr-x). The last time I saw it after compiling some new software (normal user configure;make) and installation from the same directory as root (su and make install or direct as normal user sudo make install). Can somebody explain me why it happens and what should I do to get rid of this problem? p.s. I'm using CentOS 5.7

    Read the article

  • In-house Trusted Certificate

    - by MrEdmundo
    Hi there I'm a developer looking at introducing ClickOnce deployment for an internal .NET Winforms application that will be distributed via the corporate network. Now I would like to deploy this application under the full trust model however in order for that to happen I need to sign the software with a certificate. I can do that with a "test" certificate that has no information of the publisher etc, however that means an extra step will occur on the users workstation where they will have to confirm that the software is OK. So what I want to know is. is there a way I can get my IT Infrastructure guys to create me a an "internal" certificate from the domains Certificate Authority, or do I have to go and pay for a certificate from somebody like VeriSign? Thanks

    Read the article

  • error: no such partition. Grub rescue

    - by user1440731
    I deleted Linux (Ubuntu) partition from windows Ii forgot to repair mbr. The thing is I don't have my windows boot CD with me now and not CD drive. so the solution I needed is that is there any small utility software that can be easily downloaded (I knew about hiren CD but that's about 500 MB and I don't need that whole stuff) and can work through USB? Also explain steps to perform. Thank you UPDATED: Any small Linux live CD can also b taken into consideration as i can boot that on USB using pendrivelinux software

    Read the article

  • To program in free time as a programmer, is to show that programming is passion. If not, is the programmer good? [closed]

    - by SonofWatson
    Possible Duplicate: I don't program in my spare time. Does that make me a bad developer? A lot of blogs and advice on the web seem to suggest that in order to become a great developer, doing just your day job is not enough. For example, you should contribute to open source projects in your spare time, write smartphone apps, etc. In fact a lot of this advice seems to suggest that if you don't love programming enough to do it all day long then you're probably in the wrong career. That doesn't ring true with me. I enjoy my work, but when I come home from the office I'm not in the mood to jump straight back onto the computer and start coding away until bedtime. I only have a certain number of hours free time each day, and I'd rather spend them on other hobbies, seeing friends or going outside than in front of the computer. I do get a kick out of programming, and do hack around outside of work occasionally. I'm committed to my personal development and spend time reading tech blogs and books as a way to keep learning and becoming better. But that doesn't extend so far as to my wanting to use all my spare time for coding. Does this mean I'm not a 'true' software developer at heart? Is it possible to become a good software developer without doing extra outside your job? I'd be very interested to hear what you think.

    Read the article

  • 8GB, but have to run Windows Xp (32 Bit). Anything I can do with the additional memory?

    - by user12889
    I ordered a new computer with 8GB RAM with the plan to run Windows 7, 64Bit. Turns out now, that I need to run a 32Bit OS (XP or 7) due to some software which does not run on 64Bit yet (not even with any of the available compatibility settings / modes). Is there anything I can do with the memory above 4GB in this scenario? I'm willing to consider creative solutions like running a hypervisor under XP that offers the memory as a RAM-Disk for swapping etc. ? The software that does not run on 64Bit is CISCO VPN (there seems to be a half-working solution for that) and CISCO IP phone / webcam integration "CISCO Unified Video Advantage" (there is apparently no solution for that).

    Read the article

  • CVE-2011-3146 Denial of Service (DoS) vulnerability in librsvg

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3146 Denial of Service (DoS) vulnerability 6.8 librsvg Solaris 11 11/11 SRU 8.5 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Game-over! Gaining Physical access to a computer

    Security requires defense in depth. The cleverest intrusion detection system, combined with the best antivirus, won’t help you if a malicious person can gain physical access to your PC or server. A routine job, helping a family member remove a malware infection, brings it home to Wesley just how easy it is to get a command prompt with SYSTEM access on any PC, and inspires him to give a warning about the consequences.

    Read the article

  • CVE-2012-0050 Denial of Service (DoS) vulnerability in OpenSSL

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-0050 Denial of Service (DoS) vulnerability 5.0 OpenSSL Solaris 11 11/11 SRU 4a This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Multiple vulnerabilities in LibTIFF

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2010-2595 Denial of Service (DoS) vulnerability 4.3 LibTIFF Solaris 10 SPARC: 119900-13 X86: 119901-12 CVE-2010-4665 Denial of Service (DoS) vulnerability 4.3 CVE-2011-0192 Denial of Service (DoS) vulnerability 9.3 CVE-2011-1167 Buffer Overflow vulnerability 6.8 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Multiple Denial of Service vulnerabilities in Ghostscript

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2009-4270 Denial of Service (DoS) vulnerability 9.3 Ghostscript Solaris 10 SPARC: 122259-05 X86: 122260-05 CVE-2010-4054 Denial of Service (DoS) vulnerability 4.3 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • CVE-2011-0419 Denial of Service (DoS) vulnerability in Solaris C Library

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-0419 Denial of Service (DoS) vulnerability 4.3 C Library (libc) Solaris 10 SPARC: 147713-01 X86: 147714-01 Solaris 9 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Amazon S3: allow users to upload on a restricted basis (per bucket maybe)?

    - by Tom
    Hi there, I'm thinking about signing up to the Amazon S3 storage service. What I want to do is create a service where other people can register their own bucket with a certain amount of storage. These users will install my software, which then uploads their files. Of course, the users may only upload what they have paid for. For this to work I would like to create a separate bucket for each customer, each with its own properties. Question 1: is this possible with the API? How? This means that the installed software must have the rights needed to upload to my Amazon S3 account. Question 2: can I create individual authentication IDs for each bucket or customer, so that they can only upload with restrictions I have set? Thanks in advance.

    Read the article

  • CVE-2012-1573 Denial of Service vulnerability in gnutls

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-1573 Cryptographic Issues vulnerability 5.0 gnutls Solaris 11 11/11 SRU 12.4 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Windows Azure from a Data Perspective

    Before creating a data application in Windows Azure, it is important to make choices based on the type of data you have, as well as the security and the business requirements. There are a wide range of options, because Windows Azure has intrinsic data storage, completely separate from SQL Azure, that is highly available and replicated. Your data requirements are likely to dictate the type of data storage options you choose.

    Read the article

  • Triple head DVI KVM

    - by cat pants
    I am trying to run a Linux desktop and Windows desktop simultaneously with a KVM for maximum productivity. Also running three monitors. I need a KVM that can do 3x DVI @ 1920x1080 + 2x usb (mouse and keyboard) + toslink for two machines. What would you suggest? I ask on here because I have searched quite a bit and have yet to find a KVM with these requirements. (I would be open to something like modifying 3x regular KVMs to control them with one button or similar) Thanks! (I tried posting this question earlier, but it was closed as being "not related to computer hardware or software" ... is a KVM not related to computer hardware or software? I'm pretty sure it is. kvm-switch has been tagged 100 times on here for example.)

    Read the article

  • Microsoft Offers Office XP Shim, but No Patch

    Security bulletin MS10-036 is designed to fix an "important" vulnerability in Office XP, Office 2003 and Office 2007....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • CVE-2011-0465 Improper Input Validation vulnerability in X.Org

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-0465 Improper Input Validation vulnerability 9.3 X.Org Solaris 10 SPARC: 147227-01 X86: 147228-01 Solaris 9 Contact Support Solaris 8 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Protecting the SQL Server Backup folder

    I want to backup my SQL Server databases to a folder, but I want to minimize who has access to the folder. In other words, I want to make sure that members of the Windows Local Administrators group don't get to the backups without intentionally trying to bypass the security. How do I do that? Is your SQL Database under Version Control?SSMS plug-in SQL Source Control connects SVN, TFS, Git, Hg and all others to SQL Server. Learn more.

    Read the article

  • Multi-machine backup solutions

    - by Paul
    I have a growing number of PCs and laptops in my home that need a backup solution. My question is 2 fold: Most commercial backup vendors appear to license by the machine, are there any products that give a license that can be used on all your machines, without a per machine cost? An alternative is to have a centrally controlled back up strategy controlled from a single PC with an attached hard drive that can back up other machines on the network. What backup software is suitable for this approach? Will this software be windows/Linux interoperable? I've searched for duplicate questions but don't see anything that addresses the multi machine/cost issue. OSs in network will be Windows (XP, Vista, 7) and Linux variants. Not pattern to when machines will be switched on.

    Read the article

< Previous Page | 534 535 536 537 538 539 540 541 542 543 544 545  | Next Page >