Search Results

Search found 20043 results on 802 pages for 'password assistant mac'.

Page 578/802 | < Previous Page | 574 575 576 577 578 579 580 581 582 583 584 585  | Next Page >

  • Preventing SSH RSA host key warnings for change of key vs IP address

    - by Adam M-W
    I have a network with DHCP enabled, and also a computer that dual boots operating systems and has different SSH keys on each (and yes, I would like to keep different keys on each rather than copying the same identity/private key to each). Because the IP address does not change between operating systems because the MAC address is the same, when connecting to ssh, even when not using the IP address but the hostname via DNS/mDNS, I get the warning: Warning: the RSA host key for 'hostname' differs from the key for the IP address '192.168.1.172' Offending key for IP in /Users/user/.ssh/known_hosts:37 Matching host key in /Users/user/.ssh/known_hosts:38 Are you sure you want to continue connecting (yes/no)? How can I surpress the warning when the hostname differs from the IP address for that hostname, but retain the ability to check host keys are the same for each hostname? (each OS has a unique hostname)

    Read the article

  • Laptop Backup Software (Corporate)?

    - by Hutch
    I wondered if any of you who have a fleet of laptops are using anything to back them up, and if so what? In particular I'm looking for a solution that is totally hands-off once installed i.e. the user doesn't have to do anything, press anything, remember to change something when their domain password changes etc. Right now we use Druva Insync which I have to say is pretty damned good, however our license is up for renewal in a couple of months so I want to be sure it's the best solution before renewing - the only other vaguely comparable product that I know of is from Atempo but the cost of a SQL Server license is a big problem there. Thanks.

    Read the article

  • Laptops trying to connect via wireless? Only able to connect only via wired connection

    - by Chris J. Lee
    It seems that all the wireless laptops in the office have disconnected and are unable to reconnect to the wifi after a terrible storm caused some power interruptions. Troubleshooting actions Verify wireless broadcasting is up With each laptop i ended up flushing their dns cache on Win 7 (ipconfig /flush ) Performed an ipconfig /all to see what the new ip is Made sure password was correct Reset the router (multiple times) restarted each laptop. Tried connecting wirelessly Am i missing some small detail ? Network information The router is a linksys/cisco WRVS4400N router. Supports a lot of fancy features i don't know how to use. We have 3 static ip's the conference room computer, the wireless printer, my computer Mostly windows machines, we have 3 mac users

    Read the article

  • What is the best policy for user account on a Windows 7 Media Center shared by the whole family

    - by Matt Spradley
    What is a good way to manage user accounts for a Windows 7 Media Center PC that is part of an entertainment center for a family? Each family member keeps most of their personal stuff on their own computer. I was thinking the simple approach would be to create an admin account for management and then just create a "Family" user account w/o a password that is the default account used by the media center. This account would be used for the PVR, playing blu rays, music, etc. I don't think it is practical for someone to have to log in every time they use the media center.

    Read the article

  • Provisioning SIP Phones over the internet

    - by Jorge Fernandez
    I have a few SIP Phones that are located of site and connect to my PBX over the internet to make calls. For some reason one of these phones has become unprovisioned. In my office phones get provisioned by the server via TFTP. The ones that I have off site I pre-provisioned manually before I sent them off-site (I'm in Florida the phone is in New Jersey). Whats the best way to provision these over the internet? TFTP is very insecure. Sending the plain text profiles with the SIP Account and Password over the internet is out of the question. The phones have been off-site for about 6 months without any issues. Im using Trixbox and Cisco 7940 Phones.

    Read the article

  • Prevent machine in a LAN from receiving a remote shutdown

    - by WebDevHobo
    I'm probably just overreacting, but I recently came across a LAN-scanner that showed me the option "remote shutdown", for all found computers on the scanned network. Now, how exactly does this work? If I send such a message, will the shutdown happen no matter what, or is it required to have the password/user-name of the user of that other computer. Mostly I'm wondering: can this be done to me and how do I prevent it? EDIT: what's more, I had the scanner check for shares. The result being this: Double clicking the links opens them in explorer, basically meaning my entire C and F drive(only 2 HD's I have) are completely exposed to anyone in my LAN. Or can I open these because it's my own machine?

    Read the article

  • Ethernet 802.1x client -> WiFi AP on a Raspberry Pi?

    - by Martin Janiczek
    I have an Ethernet connection that requires 802.1x authentication (TTLS, MSCHAPv2, name+password). My goal is to connect that to something that would then act as an WiFi AP, so I can use the connection on more devices (iPhone, notebook, etc.) Would it be possible/good idea to use Raspberry Pi for this purpose? Or are there better-suited devices to do this? EDIT: found some alternatives but because of low rep can't post more than two links... OpenWRT + wpa_supplicant guide Carambola - works with OpenWRT (but probably not standalone?) Hornet-UB - works with OpenWRT Asus RT-N10+ + OpenWRT how-to EDIT 2: probably going to try TP-LINK TL-WR740N. It's a classic router, but can be flashed with OpenWRT, and the price beats everything else I've seen.

    Read the article

  • How to highlight full row in GNU screen

    - by dorelal
    I have a mac pro and now I am trying to use GNU screen instead of terminal. When I need to look at the log the I hit Ctrl A [ and I get into copy mode. However it is really hard to detect where my cursor is since it is of color red and it is underscore. Is it possible to get the cursor in a block form in copy mode. Or highlight the whole row. Any stronger visual indication of where my cursor is in copy mode would be of help. Thanks

    Read the article

  • why is my Bamboo pen always drawing and a yellow note pad appears?

    - by cboi
    I have had a Bamboo pen and touch tablet for a couple years but have not used it in a long time. Now that I'm trying to use it again it is behaving very strangely. It won't drag anything on my desktop, the minute I try there is this yellow pad that appears and the pen draws a line on it instead of dragging the file. The yellow pad and drawn line disappear the second I lift the pen from the tablet. The most frustrating is it does the same thing when I try to draw in Photoshop. It won't draw with the paintbrush on my canvas because the minute I try to this yellow pad appears and it draws a line on it instead of on the canvas, which disappears the second I lift the pen from the tablet. It also bizarrely automatically switches from the paintbrush to the automatic selection tool. Has anyone had this problem? Any suggestions on how to fix this? I operate with Mac OS X 10.5.8

    Read the article

  • How to completely remove MySQL from Windows?

    - by Nathan Long
    (I realize there are similarly-titled questions, but this one is really 'how do I reset the password', and this one doesn't specify an OS and has only gotten Linux-oriented answers.) On Windows XP, I just uninstalled MySQL and deleted the folder that it was installed in. I then rebooted and reinstalled MySQL. When it comes back up, it still has the databases it had before the uninstall. Where did it keep that database info? How do I completely remove MySQL and start over, as if I'd never installed it?

    Read the article

  • Apache - Same username in several .htpasswd files

    - by greydet
    In a virtual host, I setup two different <Location> blocks for which the access is restricted by two basic authentication htpasswd files. One htpasswd contains different usernames + a common user name. The other htpasswd file only contains the common user name. My problem is that once users connect a location with the common user name, they have immediate access to the other location without being asker for a different user name. Is there a way to restrict the username access only to the corresponding htpasswd file? Is there a way for users to ask to be re-prompted for another username/password?

    Read the article

  • Finding spoofed IP address on network

    - by Jared
    I have a few IP spoof dropped messages coming out of my Sonicwall firewall, we'll call them Source A and Source B. Both of these sources have the same mac address indicating they're coming from the layer 3 switch behind my firewall. Source A has an ip within a valid subnet on my network and it shows up in the ARP table of my layer 3 switch. I was able to trace the exact location and fix the issue. Source B's ip however, is not within valid subnet on my network and it's not showing up in my layer 3 switches arp table. Any idea how I can trace the location of this device within my network? Thanks in advance.

    Read the article

  • Computers on preexisting Windows 2008 domain accepting accounts from Samba3/4 domain

    - by Ivan Vucica
    I have a web application written in PHP where I would like to allow existing users to log into Windows computers, too. Re-hash of their passwords is doable (by requesting them to change the password). And to solve desync of passwords, I intend to have webapp authenticate users primarily against the domain. I don't want to give webapp users accounts on the existing domain, which we can call example.local. Instead, I want to provide them accounts on a new domain, let's call it webapp.example.local. From some research I have done, setting up a Samba4 domain and joining computers into this webapp.example.local domain would be one way to allow webapp users to log in. But, the computers should be members of the example.local domain. How can I get computers that are members of and are authenticating against Windows 2008-based example.local to also authenticate users against webapp.example.local? Magic keywords seem to be "trust relationship", "forest", etc, but at this point I haven't found a concrete example on how to establish this trust.

    Read the article

  • My laptop was stolen. What do I need to do?

    - by chris
    My laptop was recently stolen. It was a corporate system running XP, which means it was part of a domain - I'm assuming that makes it impossible for someone to log into it, although I know there are ways to reset the local admin account. Is there any way to tell if someone boots it up? I was logged into gmail, using two factor authentication. I will change my password, but is there any chance of tracking any attempted accesses? Other than changing passwords on all my web accounts, is there anything else I need to do?

    Read the article

  • 2 accounts in safe mode ?

    - by Rameshwar.S.Soni
    When I start my laptop in safe mode, I have 2 accounts displayed, i.e. Administrator and one as R122, but when I start it in normal mode, only the R122 account is being displayed and not the Administrator one. My R122 account is password protected, so once I had a problem in installation and had to go to safe mode for some reason, I was shocked to see 2 accounts. I had once formatted my laptop with a friend of mine. Why are there 2 accounts in safe mode and only 1 in normal mode ?

    Read the article

  • Lock Windows keyboard and mouse but still display screen normally

    - by Stephen Lacy
    I'm using windows 7, I have a dual monitor display. It displays important information related to the business, I'd rather that random users that walk in can't just walk over to it and start using the computer with the same access rights as the user the monitoring software is running as. What I would like is if any time someone presses a button on the keyboard including alt-ctrl-delete all that would appear is a dialog asking for a password. Then I can click cancel and it will return to showing the data I want displayed. ClearLock doesn't work I tried it btw

    Read the article

  • Update server version for postgres 9.1.2

    - by Nai
    I'm trying to run a postgis sql script and I'm running into the following error. Am I correct to say that updating my server version will fix it? If so, how can I go about updating it? I'm on Mac OSX Lion and installed Postgres via brew. Apparently I have an older version installed which is 9.1.2 but installing postgis installed postgres 9.2.1 on to my system. How can I point my postgres server to the new one? nai@nyc /usr/local/share/postgis (git::master) $ psql -d template_postgis -f postgis.sql SET BEGIN psql:postgis.sql:49: ERROR: incompatible library "/usr/local/Cellar/postgresql/9.2.1/lib/postgis-2.0.so": version mismatch DETAIL: Server is version 9.1, library is version 9.2. nai@nyc /usr/local/share/postgis (git::master) $ psql psql (9.2.1, server 9.1.2) WARNING: psql version 9.2, server version 9.1. Some psql features might not work.

    Read the article

  • TheGreenBow VPN with Cisco 2811 config

    - by Fujishiro
    Okay. Im using the feared x64 Win7 retail. I tried soooo many clients/methods, but none of them worked. Finally after a long battle, I made TGB working. YAY! I only have problems with the configuration. What data I've got? group auth user+pw;3DES enc(saw it from the router cfg);user+password. And that's all. I tried using the TGB provided manual and the howtos on their site, but there is no instruction for the given model, and the other cisco type conf wont work.) I tried to configure it up, but its not that easy.. as I mentioned aldy. If anyone uses this app or knows how to configure it up... please..help me.

    Read the article

  • Repairing a corrupt exFat file system

    - by Wandyer
    Long story short : I messed up my GPT and went on to try to fix it without asking anyone, just searching around. Didn't turn out too well. Right now all I'm concerned about is a 500GB that I formatted as exFat partition with some important files. But on my journey to fix, I may have used the 'fdisk' command on a GParted Live CD I have (couldn't get on any OS) and switched it to ext2. Now I can't get access to it, doesn't show up on Windows or Mac. Only on the partition table as ext2. I have got access to most of my files through recovery softwares but they cannot recover with the originial directory or file names, which would be a pain to fix. I want to know if there is a way to change back the file system to exFat without having to format it. Thanks in advance. EDIT: This is how my partitions look like right.

    Read the article

  • How to share my localhost over the internet?

    - by Loolooii
    I really want to share my localhost over the internet to show my friends the progress of the website we're working on, so that I don't need to upload it to the public server each time I make a change. showoff.io is not free and localtunnel gives me "failed to authenticate" when trying to upload my public key (a lot of people seem to have this problem and there doesn't seem to be a solution for this). Does anyone know any other free service I can use or any other solution at all? I'm using a Mac. Thanks. UPDATE: with localhost I mean a web server running on my computer, I have a dynamic IP address and no I'm not behind a router (just using a wireless modem).

    Read the article

  • How secure is Microsoft 2007's encryption?

    - by ericl42
    I've read some various articles about Microsoft's encryption, and from what I gather, 2007 is secure using all default options due to it using AES, and 2000 and 2003 can be configured secure by changing the default algorithm to AES. I was wondering if anyone else has read any other articles or know of any specific vulnerabilities involved with how they implement the encryption. I would like to be able to tell users that they can use this to send semi sensitive documents as long as they use AES and a strong password. Thanks for the information.

    Read the article

  • Have OS X send wake on lan before printing to shared printer

    - by Dean Hill
    I have a MacBook that prints to a shared Windows 7 printer. Sometimes the Windows machine is asleep, and the Mac will just queue up its print requests. I recently created a script to send a wake-on-lan packet to a Windows 7 machine. This wakes up the Windows machine and printing starts. Great, but I think the system can be automated en Is it possible to have the MacBook run the wake-on-lan script everytime something is printed? Stated more generally, can I have the OS X print subsystem execute a script everytime something is printed?

    Read the article

  • Making my computer an iPhone music dock?

    - by deddebme
    Are there any application which lets me play the music in my iPhone through the USB cable? It will be very convenient if I can just dock the phone (while the music is playing), and the music will come out from the computer's speakers instead of the speaker in the iPhone. Edit 1: Stock iPhone dock does have a line-out jack, thanks SidneySM for reminding me. Now the problem is, even though I have select Line In as the Sound Input in Mac OSX, there is no sound coming out from the speaker. How do I make the Speaker output the Line In audio?

    Read the article

  • Configuring Nagios BGP plugin on Ubuntu

    - by user141610
    I am trying to configure nagios check_bgp_neighbors plug-in on Ubuntu and followed README file of check_bgp_neighbors plug-in. I have made following changes: define command{ command_name check_bgp_all command_line $USER1$/check_bgp_neighbors -H $HOSTADDRESS$ -C $USER3$ -n $ARG1$ -n $ARG2$ } to define command{ command_name check_bgp_all command_line /usr/local/nagios/libexec/check_bgp_neighbors.sh -H xx.xx.xx.49 -C xx.xx.xx.50 And define service{ use server-service hostgroup_name svc-bgp1 service_description BGP Check 1 check_command check_bgp_all!10.0.0.1!172.16.0.2 } to define service{ use generic-service hostgroup_name svc-bgp1 service_description BGP Check 1 check_command check_bgp_all!xx.xx.xx.50 } xx.xx.xx.49 is the IP of the host router and xx.xx.xx.50 is the IP of eBGP neighbour. After that it shows critical status. I know my command is not correct but cannot detect the problem. I learned that in this plug-in user-name and password of the host router are required but don't know how and where to provide it. Nagios log does not show any error message. Status information: Failed: status:0 prefixes:0 sent:0 received:0

    Read the article

  • Ubuntu 10.10: 2nd instance of Firefox does not obey GTK2 customizations

    - by Cocoro Cara
    Hi On Ubuntu 10.10 I started a 2nd instance of Firefox using the command: $ firefox -ProfileManager -no-remote & Created a new profile and everything works smoothly except for the fact that this instance of FF does not obey by GTK2 customizations that I have placed in ~/.gtkrc-2.0 Moreover, only SOME of the customizations are not obeyed. For example, the vertical scrollbars are supposed to be on the left, but they are on the right. The scrollbar arrows are together (Mac-like) as specified, so is the scrollbar width. The first instance obeys all customizations with scrollbars on the left. Any ideas?

    Read the article

< Previous Page | 574 575 576 577 578 579 580 581 582 583 584 585  | Next Page >