Search Results

Search found 19995 results on 800 pages for 'software updater'.

Page 598/800 | < Previous Page | 594 595 596 597 598 599 600 601 602 603 604 605  | Next Page >

  • Windows equivalent for Linux "screen" or another alternative?

    - by Ubha
    Hello all! I'm on the lookout for a method to control programs in a Windows environment. I would prefer it to be a bit similar to the Linux software "screen". The reason of my search is that I need to start a program (on Windows) with an identifier, so I later would be able to close that specific program, without closing anything else - even though the actual program (.exe file) is running multiple times. So is there anyway I can "name" it? I'm using the following on Linux now: $ screen <params> <id> ./softwareprogram And then I know I can always find it with it's ID :) It's an external program which is closing or starting a 3rd party program. My program is written in C++, if that does any difference. Thanks :)

    Read the article

  • Do you sign contracts digitally or still on paper? And what do clients think?

    - by user1162541
    We are all getting used to checking a box and putting our name in a text field to create a contract with an airline, a hosting company, or a software download. However, for some reason I am still asking clients to sign our contracts for website development on paper, and send me a scan. Few complain about this procedure, but I am personally thinking: what am I doing, doing this the old fashion way?! Signing contracts digitally would be faster, more convenient for clients and for me, and easier to store. So to me it appears to be time to start creating some contract agreement online that clients can read, then print their name, and mark a box "I AGREE WITH THIS CONTRACT AND BY PRINTING MY NAME I AGREE TO SIGNING THIS", or something like that. I would record their IP, browser data, and time of signing. If I really want to ensure their identity, I could link this to OpenID and require them to log in with their e-mail so that I can ensure that they are logged in on an existing e-mail account. Sounds OK to me. My question is: is this practice becoming a standard practice in professional IT services? Are you (as a professional) doing this? If you are, how do clients react? Any drawbacks doing this? EDIT: This question is not about the legal aspects. It is about common practices among programmers and web-development companies, and what clients think of this.

    Read the article

  • How to empty the Directory-Name-Lookup-Cache?

    - by mutzel
    I'm having speed problems with a Windows software that is looking up files in several directories on a NTFS formatted HDD. In order to find out why and in which settings the problem is occurring I set up a test scenario at my local PC. But this did not work as well as I expected. After the program did the first scan on all directories any additional scans on the same directories are done way faster than at the first scan. I assume that the directory names and there containing file names were cached by Windows. Is it somehow possible to either disable or empty this cache, if it is even existing?

    Read the article

  • Query for server DefaultData & DefaultLog folders

    - by jamiet
    Do you ever need to query for the DefaultData & DefaultLog folders for your SQL Server instance? Well, I just did and the following script enabled me to do that: DECLARE @HkeyLocal NVARCHAR(18),@MSSqlServerRegPath NVARCHAR(31),@InstanceRegPath SYSNAME; SELECT @HkeyLocal=N'HKEY_LOCAL_MACHINE' SELECT @MSSqlServerRegPath=N'SOFTWARE\Microsoft\MSSQLServer' SELECT @InstanceRegPath=@MSSqlServerRegPath + N'\MSSQLServer' DECLARE @SmoDefaultFile NVARCHAR(512) EXEC MASTER.dbo.xp_instance_regread @HkeyLocal, @InstanceRegPath, N'DefaultData', @SmoDefaultFile OUTPUT DECLARE @SmoDefaultLog NVARCHAR(512) EXEC MASTER.dbo.xp_instance_regread @HkeyLocal, @InstanceRegPath, N'DefaultLog', @SmoDefaultLog OUTPUT SELECT ISNULL(@SmoDefaultFile,N'') AS [DefaultFile],ISNULL(@SmoDefaultLog,N'') AS [DefaultLog]' I haven’t done any rigorous testing or anything like that, all I can say is…it worked for me (on SQL Server 2012). Use as you see fit. Doubtless this information exists in a multitude of other places but nevertheless I’m putting it here so I know where to find it in the future. Just for fun I thought I’d try this out against SQL Azure Windows Azure SQL Database. Unsurprisingly it didn’t work there: Msg 40515, Level 15, State 1, Line 16 Reference to database and/or server name in 'MASTER.dbo.xp_instance_regread' is not supported in this version of SQL Server. @Jamiet

    Read the article

  • Best way to log internet traffic for office network via remote IP

    - by buzzmonkey
    We have a network of about 40 machines running either Win XP or 7 in our office via LAN switches into 1 x Netgear Router (WNDR3700). We have noticed recently that our local network has been added to the CBL Blacklist due to one of our machines being infected with Torpig. I have attempted to use Kaspersky's TDSSKiller Antirootkit Utility to find the infected machine but all appear to be clear. The CBL register advises to find the local machine which is connection to the remote IP address (CBL has provided the range). However, our router does not have the ability to block remote IP addresses - does anyone know of a software which can log all the internet traffic, which we can then use to find the infected machine.

    Read the article

  • How do I sync beyond 30 days with BES

    - by Kez
    BES only syncs the last 30 days worth of calendar appointments. I need to change this to sync more than 30 days, e.g. 6 months for example. I read a workaround which involves disabling the wireless sync, syncing with the Blackberry Desktop software and then re-enabling the wireless sync. This would not work, as the 30 day setting would still apply to calendar appointments going forwards. How can I set BES up to sync more than 30 days worth of calendar appointments?

    Read the article

  • USB hardwares driver installation

    - by unknown (google)
    I am using few USB hardwares like camera and scanners with my software application. I plugged my hardware in USB A installed the drivers and the device was working properly. Now I tried to connect the same hardware in USB B (ie, some other USB port), and again it is asking for the driver installation. I need to know the reason behind this. Is it something to do with the particular device or system? Anywork around for this during the first time driver installation? Please anyone explain me how the USB works physical address, how it is assigned and how the driver for a device getting installed. Thanks in advance.

    Read the article

  • SSH disconnects active session after 20 minutes

    - by Paramaeleon
    I’ve just set up a new Linux box (OpenSuSE 12.3 on VmWare). Now I stated that my SSH shell sessions are disconnected exactly after 20 minutes, clearly with activity. (Putty: “Network error: Software caused connection abort”) I already set Putty to send keep alives every 64 sec. In sshd_config, I set ClientAliveInterval 50 ClientAliveCountMax 2 and did a deamon reload. Didn’t help. About two minutes after the link breakdown, ssh reports to /var/log/messages: … … sshd[…]: Timeout, client not responding. … … sshd[…]: pam_unix(sshd:session): session closed for user root I don’t encounter this behaviour when connecting to other virtual machines, so I guess the problem isn’t in the network. Any help is appreciated.

    Read the article

  • How to check the OS is running on bare metal and not in virtualized environment created by BIOS?

    - by Arkadi Shishlov
    Is there any software available as a Linux, *BSD, or Windows program or boot-image to check (or guess with good probability) the environment an operating system is loaded onto is genuine bare metal and not already virtualized? Given recent information from various sources, including supposed to be E.Snowden leaks, I'm curious about the security of my PC-s, even about those that don't have on-board BMC. How it could be possible and why? See for example Blue Pill, and a number of papers. With a little assistance from network card firmware, which is also loadable on popular card models, such hypervisor could easily spy on me resulting in PGP, Tor, etc. exercises futile.

    Read the article

  • Why have we got so many Linux distributions? [closed]

    - by nebukadnezzar
    Pointed to from an answer to another question, I came across this graphic, and I'm shocked how many linux distributions currently exist. However, it seems that most of these distributions are forks of already popular distributions with minimal changes, usually limited to themes, wallpapers and buttons. It would still seem easier to create a sub-distribution with the required changes, such as XUbuntu with XFCE4, KUbuntu with KDE4, Fluxbuntu with Fluxbox, etc. In my mind there are a number of problems with having so many distributions - perhaps less security/stability due to smaller group of developers, and also the confusingly vast range of choice for newcomers to Linux. Some reasons that developers might decide to fork are: Specializing on a particular topic (work-related topic - i.e. for a Hospital, etc) An exceptional architecture, that requires a special set of software Use of non-FOSS, proprietary technology, and such So what other reasons are there that have caused so many people decided to create their own distributions? What are the thought processes that have led to this? And are these "valid" reasons - do we need so many distributions? If you can back your experiences up with references that would be great.

    Read the article

  • What does the term 'overinstallation' mean?

    - by Kent Pawar
    I came across this term here: "11882875 -- Essbase Server does not start after an overinstallation." I know that a clean install is a software installation in which any previous version is removed. Googling 'overinstallation' turned up nothing, and I don't like to just assume it simply means 're-install'. UPDATE: So my understanding now is - the term "re-install" can be a bit ambiguous as it could either signify an installation after an uninstallation or otherwise. On the other hand the term "over-installation" specifically talks about installing something over an existing installation, that involved no uninstallations.

    Read the article

  • VM: Windows 7 host, Linux guest, VT-d?

    - by chx
    I am sick of the driver issues of Linux. So I am planning to switch to Windows 7 as a host and virtualize my Linux into it. My laptop has integrated Intel graphics and supports VT-d. For speed reasons I would like to assign that card to Linux. Now, Parallels could do it but this page says Note: If you have only one PCIe video adapter, its name will be grayed out in the PCI Devices list and you will not be able to allocate it to your virtual machines. I would be perfectly fine with a headless Windows 7 (I can remotely admin from other computers or just the Linux guest) -- is there any VM software that doesn't have this restriction?

    Read the article

  • Remove Legal Notice IN Registry

    - by Jerry
    I have a very slow laptop that I need to reboot 3 times a day. It is connected to a Windows domain. I have managed to get it to auto-logon, but I still get prompted to hit ok after reading a legal notice. I have cleaned out [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] and exported it. I import it every 10 minutes via a script. How can I permanently remove the legal notice. A new laptop is not an option right now.

    Read the article

  • How can I copy files to an external drive and verify their integrity in OS X?

    - by jedavis
    I'm moving large amounts of data from one external drive to another larger one. The files are important and the smaller drives need to be cleared and reused (HD camera). Is there some utility for moving files and verifying their integrity? I've been using this command find . -type f -exec md5 '{}' \; > md5list.txt in the terminal to create a list of MD5s for each file then using diff to compare the two. However, I am moving 320GB at a time, which takes a while by itself. Computing the checksums takes another hour or so. It would be much more efficient to do this on the fly, during the copy. I'm just hoping someone has already written the software...

    Read the article

  • Can the traditional remote desktop client be accessed in Windows RT?

    - by nhinkle
    As mentioned in another question, I've been unable to connect through the Remote Desktop metro app to some computers, in particular those requiring VPN access or load balancers. I'm considering purchasing a Microsoft Surface RT, but given that the app store hasn't matured significantly yet and some niche software will likely never be ported to the Modern UI, I must have acess to remote systems somehow. Until Citrix fixes the receiver app for Windows 8, I'm stuck using remote desktop. Which doesn't work. I've heard that Windows RT comes with some of the Microsoft desktop programs built in, like Microsoft Office and File Explorer. Is the "normal" Remote Desktop Connection program available in Windows RT, and if so, is it 100% compatible with previous versions?

    Read the article

  • Fastest OS for Java applications

    - by user33408
    Hello I have a multithreaded Java program. I am dealing with certain perfomance problems. I have improved everything. Hardware + Software. Now I think that it's time to move to proper Operating System. I was wondering, what OS is the fastest for Java Virtual machine? I am using Sun Java6. Do you think that Sun Solaris would be the best choice for Java applications? Or FreeBSD? or CentOS (I am using it currently)? Thanks

    Read the article

  • Xen VGA passthrough: is it possible to have dual GPU's with single monitor

    - by user489481
    I hate dual-booting between Windows when I want to play a game and Linux when I need to work. I don't fancy running Linux in a VM and Wine almost never works for me. So, I'm thinking about buying a new mainboard and CPU that is compatible with Xen's VGA passthrough and HVM virtualization. I want to be able to switch between the Linux Dom0 and Windows DomU with ease, but the problem is I need two GPU's and have only one monitor. Right now I have a nVidia GTX 260 in my PC, but I also have a Radeon 4850 sitting in my closet that I was going to sell. My question is, can I salvage the Radeon card to run the Dom0 and have the nVidia card run the DomU while having some kind of device/software to connect them a single monitor? Power supply and airflow issues aside. If not, what would you suggest? Is this even possible?

    Read the article

  • Replace single character in windows filenames

    - by Matt Rogish
    I have a Win2k3 server that has a whole bunch of filenames that need renamed. Basically, I just need all - (dashes) replaced with _ (underscores), no matter where they are in the string. Assume that there are no duplicates. I can do this on my mac with a little script but the files are too large and crazy to transfer to my mac, rename, then go back to the server. Would love to do this in a command shell and not have to download a renamer or any add'l software. Thanks!

    Read the article

  • wireless dropping out

    - by Sam
    My wireless network connection is dropping out and its driving me nuts. It is weird because it happens at totally random intervals and other devices work while my computer has been dropped. Both my USB dongle and wifi card randomly disconnect from the router and I am unable to connect for a couple of minutes. It is especially irritating because two different adapters are failing at the same time, sounds like a software problem to me, but where? Both my laptop and iPod remain connected when the connection drops. What on earth is happening? I doubt its the router because the other devices would disconnect as well.

    Read the article

  • High Availability

    - by mattjgilbert
    Udi Dahan presented at the UK Connected Systems User Group last night. He discussed High Availability and pointed out that people often think this is purely an infrastructure challenge. However, the implications of system crashes, errors and resulting data loss need to be considered and managed by software developers. In addition a system should remain both highly reliable (backwardly compatible) and available during deployments and upgrades. The argument is that you cannot be considered highly available if your system is always down every time you upgrade. For our recent BizTalk 2009 upgrade we made use of our Business Continuity servers (note the name, rather than calling them Disaster Recovery servers ? ) to ensure our clients could continue to operate while we upgraded the Production BizTalk servers. Then we failed back to the newly built 2009 environment and rebuilt the BC servers. Of course, in the event of an actual disaster there was a window where either one or the other set were not available to take over – however, our Staging machines were already primed to switch to production settings, having been used for testing the upgrade in the first place.   While not perfect (the failover between environments was not automatic and without some minimal outage) planning the upgrade in this way meant BizTalk was online during the rebuild and upgrade project, we didn’t have to rush things to get back on-line and planning meant we were ready to be as available as we could be in the event of an actual disaster.

    Read the article

  • How to prevent firefox from updating

    - by Larry
    I have firefox 3.6.x in Mint Linux. For physical problems -- eyes and color, I want to keep this version and not do any updates ever to it. I don't know if it is a firefox or linux issue, but nothing seems to work. It should not be rocket scientist enabled. :P This is what I have tried: Update Manager and added to ignore package --firef0x* Fully removed all traces of firefox and reinstalled 3.6.28 In firefox, set the upgrade options (3) of them to unselected and saved. Scanned computer for firef* to insure all traces were removed, to include /usr/bin/firefox. Using Mint Linux 9, otherwise fully upgraded for packages. That's the main things I've done. My major issues is the later versions of that software are almost impossible for me to see.

    Read the article

  • How to interconnect laptop, PC, Android & Symbiam phones with WiFi?

    - by noquery
    What I have Level One wifi Router hub Laptop with Windows 7 (wifi enabled) Desktop PC with Windows 7 (with no wifi, maybe LAN cables can help) 2 android & 1 Symbian Phones each wifi enabled. LAN Cables Hathway Internet connection which allows only 1 login to access internet What I want Is it possible to access internet on PC, laptop, mobiles at the same time with only one connection? Since I don't know even A of networking so please suggest some software which require minimum cofiguration. Let me know if any other hardware I require.

    Read the article

  • Why doesn't Ghost 2003 offer to fill the destination drive?

    - by Neil
    Because it is dangerously low on disk space, I want to upgrade an SBS 2003 server by replacing its existing 72GB drive with a 364GB drive. When I tried to use Norton Ghost 2003 to clone the disk it didn't suggest that I use the entire new drive. I'm worried that I caused the process to fail by overriding its decision - although the cloned drive boots in Safe Mode, if I try booting it normally then none of the SQL Express instances start and something causes the server to reboot before even the Ctrl+Alt+Del screen appears. Does Ghost 2003 know something that I don't? Or should I be using some other software?

    Read the article

  • Virtual bridge/switch for Windows server&client?

    - by Tiberiu-Ionu? Stan
    I can't find a very simple application, with litle to zero configuration on both client and server side which would help one computer to bring other computers on an existing private LAN. OpenVPN seems like an overkill for this type of thing, and is really hard to get running or debug by various clueless people trying to connect. Does such a software exist? It's very odd not to. THe Windows provided VPN (PPTP over TCP and GRE) is not what I'm looking for because it is often filtered by ISPs. Only TCP and UDP solutions pls. Encryption is not needed.

    Read the article

  • Installing Solaris 10 on sunT5220 - ZFS/UFS raid 10?

    - by Matthew
    I am in a bit of a time crunch, and need to get two T5220's built. We were very happy to see two boxes in our aged inventory which had 8 HDD's each, but didn't think to check if they were running hardware RAID or not. Turns out that they aren't. When we install, we are given the option to use UFS or ZFS, but when we select a place to install we're only given the option of installing on one single disk. Is it possible to create a software raid 10 across all of the disks and install the OS on that? Sorry if any lingo is wrong, I'm not really a Sun guy and our guru is out of town right now. Any help would be really appreciated! Note: Most of the guides I've found on google entail installing the OS on a single disk, and then creating a separate RAID 10 on other disks. We would actually like the OS to reside on the RAID 10. Hope that clarifies things.

    Read the article

< Previous Page | 594 595 596 597 598 599 600 601 602 603 604 605  | Next Page >