Search Results

Search found 25214 results on 1009 pages for 'browser tools'.

Page 618/1009 | < Previous Page | 614 615 616 617 618 619 620 621 622 623 624 625  | Next Page >

  • Block complete network access for one local user

    - by tumchaaditya
    Well, this is quite trivial question but I could not find a satisfactory answer even after trying many search queries both here and on Google. I want to share my PC with my room-mate. And I don't want him to access ANY network(LAN included). So, I can create an account for him and block network access for the same. I would prefer avoiding any third-party tools as far as possible. It's a simple home PC hooked up to a router for internet. No domain and other stuff. (Technically, guest account can achieve this. But somehow, the guest account on my PC has network access!)

    Read the article

  • How do I remove Windows Update uninstall files on Windows Server 2008?

    - by Robert Koritnik
    I'm running Windows Server 2008 Standard running in VMware. It has 2 disks: system disk: 16 GB data disk: 500 MB I installed Visual Studio 2008 SP1 + MSDN and some small tools and libraries that don't take much space. Over time the system disk's free space has been going down (I suspect because of regular system updates - NetFx (.NET), service packs, and regular updates). Questions 1 How do you remove Windows Update uninstall files from Windows Server 2008? Question 2 I also found lots of files in C:/Windows/Installer folder. Is it possible to determine which .msp file goes with which patch? I would like to delete some of them, because they do take a lot of space.

    Read the article

  • nginx deny directory and files to be downloaded

    - by YeppThat'sMe
    gurus. I have a problem and i dont know how to solve it. I am working with Git and Compass/SASS on some projects. Now i want to protect those directories. When i go only to the folder its all fine – i get what i expected a 403 forbidden. location ~ /\.git { deny all; } But when i try use the full path to the config file from git the browser start to download it. Same scenario with compass. There is a config.rb file within the folder which also starts to download it. How can i prevent this behaviour? How can i deny downloading specific files?

    Read the article

  • Apple Wireless (aluminium) Keyboard on Windows

    - by Dave Arkell
    I have an apple wireless keyboard which I am using with my windows pc and it works excellently, and looks superb. It all connects fine (particularly with a flashed dbt-120). However, I haven't had great success with getting all those useful keys to work with the 'fn' key. I've been using uawks as a way to get it working, but it doesn't always work. Has anyone had success with any other tools to get the fn key working (and therefore creating shortcuts to 'End', 'Home', 'Break', 'Pgup', etc? I should point out that this is not a mac computer, it is a plain old pc.

    Read the article

  • How can I automate my Linux computer to power off (and on preferably) under certain circumstances?

    - by Ashimema
    OK, So a little background; I've been using Windows Home Server as a Backup Appliance, Media Server and Share Server at home for some time. I decided it was costing me allot of juice so very early on added the "Lights Out" add-on to ensure it was only running as and when needed. I'm now looking to switch to a Linux based server and I'm looking for a similar tool/set of tools for advanced power management. Now the question; Anyone got any all-in-one suggestions (i.e with client parts for both Windows and Linux and a server part for the Linux server), or can anyone simply verify that I'll need to set-up all the individual bits for this myself separately? (A tool similar to "[SmartPower][2]" but for linux would be a great start)

    Read the article

  • What is a descriptive name for a web service that responds with plain text?

    - by Rich Shealer
    I'm looking for the proper name for a web service that responds with text as opposed to XML. As an example this "cardServer" service will return 5 cards for a poker hand. http://hostname:8080/cardServer/deal/Game=Poker&Qty=5 The result could look like this: Card1=Ad Card2=Kc Card3=Ts Card4=5d Card5=3d The real world example is not as trivial, but the concept is the same. Parameters if any are passed as POST variables. We currently parse the response into a string list and use the values. The process works just fine. What I'm wondering if this service method has a name that has easier tools to deal with the responses and therefore did we reinvent the wheel? For the record the service was provided and maintained by a customer.

    Read the article

  • UsrClass.dat does not load, any ideas on what to check?

    - by Bob Simmons
    I have an odd problem where one of my users' UsrClass.dat hive does not load, which causes .NET ClickOnce applications to fail to start. They are one of several users on a Windows 2000 terminal server, all the others have no problem. Nothing is mentioned in any logs. I can manually load the hive to the correct HKEY_USERS\..._Classes location using REGEDT32, which works around the problem, but I've no idea what could be causing this in the first place. Any ideas what to check here, or any diagnostic tools or procedures that would help?

    Read the article

  • Solution to Manage and Monitor (Ubuntu) Machines

    - by Elmar Weber
    I'm looking for a tool like Canonical (system management and monitoring for Ubuntu) that is Open Source and free. The goal is to manage a dozen or so KVM machines for private testing purposes. I know of puppet and munin or RHQ as separate tools to manage and monitor, but I'd prefer something integrated. Any tips? Basic requirements would be: system package management and update (individual selection for each managed node) configuration of basic system services (Users, NFS, cron, ideally also Apache) monitoring (charting of system resources, disk, io, memory, etc) and alerting, ideally a default configuration with sensible values for alerts

    Read the article

  • How do I prevent internet access to a group of computers on my network?

    - by Kevin Boyd
    Well I have the following setup... Computer A , B and C are networked.... Computer A is connected to the internet, computer B and C are not setup for internet access currently but I guess its possible with some kind of setting they would eventually be able to access the internet and this is what I would like to prevent. In summary only A should have internet access while A and B and C should still be on intranet. Is this kind of config possible?, what kind of software or setup or tools would I need to achive this?

    Read the article

  • Installing my own XP VHD into Win 7.

    - by malcolms
    Hi, I am follwing instructions on this site to install my own XP VHD into Win 7 virtual PC (XP mode) http://www.windows7hacker.com/index.php/2009/09/how-to-make-your-own-vhd-to-xp-mode-or-even-vista-mode-ready/ Problem is when I click on install Integration Components on the Tools menu the setup does not start. And I do not understand this message that comes up because I can't start VM at this point at all. It says "If setup does not run automatically, open the CD-rom drive inside the virtual machine and run setup" So what does the mean when i cant run the VM?? Malcolm

    Read the article

  • Excel shows different files in same window

    - by pacoverflow
    In a browser, I downloaded an Excel spreadsheet and it displayed a dialog box asking what to do with it, so I selected "Open in Excel". Then I downloaded another Excel spreadsheet and opened that one in Excel as well. My taskbar shows 2 Excel icons, but there's only one Excel window. When I use the taskbar to switch between the spreadsheets, each one replaces the other in the Excel window. How can I get 2 Excel windows - one for each spreadsheet? I am running Windows 7 with Excel 2010.

    Read the article

  • What are the components required to run taskpads on a workstation?

    - by Darktux
    we are planning to implement task pads in our enviroment for delegation for user administration.I have few questions regarding this. 1.) To run a taskpad (with AD users and computers) ; does the workstation contain whole set of Administrative tools oris there a way just to compy dsa.msc to all workstations and get done with? Note: All tak pads will be shared on a file share and users access them via powershell scripts. 2.) We are creating MMC's in Windows 7 and keeeping them in a share; will the work with Windows XP too or do we need to develop 2 versions of them? We are aiming to keep away software from workstations and maintain it as much as possible on centralized file shares. Please shoot me any questions or clarifications pertaining to my query.

    Read the article

  • rsync server side limit bandwidth/connection

    - by c2h2
    In a VOIP application, I have upto 3000 clients rsync audio files from there linux server in a daily, server is placed at a data center (10Mbps in/out bound), the server works as a VOIP sip server running FreeSWITCH (low ping latency should be ensured.) Therefore I would like to have server side control of rsync which controls: Limit total outbound bandwidth. Limit total number of connections. (Reject clients while at max number of connection and let it retry after a specific time frame.) OPTIONAL: list/kill individual connections. Normally I would use ssh + rsync + pem_keys with some extra options, but above requirements are not feasible by simple command lines. Can anyone point me some direction. or show some scripts/tools? I would also probably integrate them and release on github. Thanks!

    Read the article

  • Amazon Linux AMI release 2010.11.1 corresponds to which RHEL version (4/5/6)?

    - by Jayesh
    I am using the default Amazon Linux AMI in an EC2 instance - Amazon Linux AMI release 2010.11.1. I can see that it's a Redhat based system, but after trying many tools (/etc/issues, uname -a, lsb_release), I cannot tell which version of RHEL or CentOS is it based on. I need to get some packages that are not available in Amazon's package repos. I have list of custom yum repos that I can use, but since I don't know which RHEL version is the Amazon AMI based on, I cannot choose from different versions of repos. How can I find whether it's running RHEL 4/5/6 (or their CentOS counterparts)?

    Read the article

  • Can't Open Up Event Viewer

    - by Erik W
    I just installed a large backlog of Windows Updates (I have Windows 7 Ultimate 64-bit) and now a handful of programs are acting strangely (not opening, crashing, etc) I went to try to diagnose the program using the Event Viewer, but when I open it up I get the error "Microsoft Management Console has Stopped Working" immediately after I double-click on the icon. Is there any way for me to figure out what is going wrong? I have another Windows 7 PC, that I tried to remotely view the logs from, but I got the error "The RPC Server is Unavailable". I'd like to start up the service, but oh wait, I can't open anything in the "Administrative Tools". I'd like not to re-install Windows, as I had just done so a couple months ago after a Windows Update jacked up my graphics card drivers.

    Read the article

  • Yahoo toolbar and local sites (e.g. Intranet)

    - by Klaptrap
    We have local sites running on IIS in regular MS Windows network. User base has IE, FireFox and Chrome. Local sites are isolated by host headers and DNS record created for the common IP accordingly. This is a regular set-up. Users without Yahoo Toolbar type http://intranet and the sites resolves. Users with Yahoo toolbar type http://intranet and the toolbar goes off to search for this site in public domain. This is irrespective to whether the address is typed into the browser address bar or the toolbar. All versions of toolbar and IE are affected. I cannot see a setting on the toolbar to switch this "irritating" behaviour off and simply un-installing the toolbar is not an option. Any ideas?

    Read the article

  • need help in backing up 2 partitions to flash drive(Acronis)

    - by Nrew
    I'm trying it on virtual box and installed Acronis 2010. The backup was successful but when I checked on the backup which is on my flash drive. Here's my problem: Ive installed firefox before the backup, but the program files folder in the flash drive has no folder called firefox. How do I restore the the 2 partitions using the backup. What I did was to: Go to tools & utilities in Acronis then chose clone disk. Selected the source and destination(flash drive). Then I restart, the backup began. First with the first partition which has xp installed and the 2nd was vista lite. What do I do to restore it: I only got these folders on the root of the flash drive: Documents and settings Program files Windows BOOTSECT.BAK

    Read the article

  • Recommend a web file sharing software please.

    - by Baczek
    I'm looking for a web platform to put company files at. My requirements are: should be accessible via a browser should be open source must be installable (dropbox is a no-go) must have an option to put a access time limit on a file must perform garbage collection automatically after a file expires must be able to mark files as public or private an option to protect a file via a pin-code for users without accounts in the system would be nice to have The problem is I don't even know what to search for - all my googling results in either complete groupware solutions or p2p file sharing software. If such a thing doesn't exist, please don't hestitate to say so, so I can crawl to a corner and cry myself to sleep. TIA

    Read the article

  • MD5 and SHA1 checksum uses for downloading

    - by Zac
    I notice that when downloading a lot of open source tools (Eclipse, etc.) there are links for MD5 and SHA1 checksums, and didn't know what these were or what their purpose was. I know these are hashing algorithms, and I do understand hashing, so my only guess is that these are used for hashing some component of the download targets, and to compare them with "official" hash strings stored server-side. Perhaps that way it can be determined whether or not the targets have been modified from their correct version (for security and other purposes). Am I close or completely wrong, and if wrong, what are they?!?! Thanks!

    Read the article

  • Auto logon to internet provider

    - by user31673
    We use wireless internet access. The wireless is secured and to get an IP address, you provide the right key. That is setup just fine. However, on top of that, the first time we access the internet, a browser page appears and we have to enter a password. then we have access to the internet for a period of time. How can the password step be automated? I also have a web-based printer that doesn't work (except via USB connection) because it can't get out to the web. I can't change the router settings. Is there anything I can do to get the printer working and automatic the access?

    Read the article

  • Belarc Advisor (Store Passwords using Reversible Encryption)

    - by Steve
    Hi, I'm using Belarc Advisor to examine my PC. Part of BA is a security benchmark summary, which examines components of windows security and provides a benchmark rating. Two items are marked as Fail: - Store Passwords using Reversible Encryption - Password History Size I have opened the Local Security Settings tool from the Control Panel Administrative Tools, and ensured that the "Store passwords using reversible encryption" setting is enabled. Also, I've set the password history to a number. So I'm a bit miffed about the Fail marks. Any idea why the Fail marks appear? Any clues how I can Pass them? Thanks, Steve.

    Read the article

  • Print Screen key of Windows on Mac

    - by mgpyone
    I've tried Win 7 on my MacBook. then I'm facing a problem of capturing the screen . I want to take the screen shot of the whole screen(including the cursor) . I'm sure that I can grab it with the key "Print Screen" . but I don't found any key for it on my Mac. also though Windows Snippet tools can take the whole screen, I've to use the cursor .. Thus, any solution that can help out my problem will be appreciated.

    Read the article

  • Laptop loses signal from WiFi router, but mobile phone holds it fine

    - by Anton
    Hi, I have an extremely weird issue with my WiFi router. Both Ubuntu & Windows 7 can connect to it fine, but after 5-10 minutes browser (any one) stops opening pages and tells me it cannot resolve host address. But, at the same time, tools like Skype or BitTorrent work without any issues. I can also browse Internet on my mobile phone connected to the very same router. If I reset router it helps, but after 5-10 minutes I see just the same problem... Ubuntu tells me that WiFi signal is lost (mobile sees it), Windows 7 just won't let me browse anywhere. Can anyone give me a suggestion on this, please? Thanks

    Read the article

  • nginx caching per user agent

    - by Tuinslak
    I'm currently using nginx as reverse proxy with caching enabled. However, the main site has two different layouts, depending on the user-agent (mobile or not). I've tried something similar to this: # mobile users if ($http_user_agent ~* '(iPhone|iPod|mobile|Android|2.0\ MMP|240x320|AvantGo|BlackBerry|Blazer|Cellphone|Danger|DoCoMo|Elaine/3.0|EudoraWeb|hiptop|IEMobile)') { set $iphone_request '1'; } if ($iphone_request = '1') { proxy_cache mobile; } if ($iphone_request = '') { proxy_cache site; } proxy_cache_key "$scheme://$host$request_uri"; proxy_pass http://real-site.tld; However, nginx gives an error, stating proxy_cache can't be used in an if-structure. Any other way to serve from a different cache depending on the browser? Thanks, Tuinslak

    Read the article

  • How to know if it's phishing or not in android apps?

    - by Zakaria Dza
    In IM apps (not only), there is a browser frame that appears and prompts for example to connect to facebook account, ebuddy for example (can't post pictures :( ) http://nsa34.casimages.com/img/2013/06/26//130626121230193046.jpg My question is: how can I know if this frame is from facebook.com and not a phishing website. I know that the apps in the play store are legit (mostly at least), but how can we trust apps that we install from outside the store? Or is there any way to check the credentials form action? Thanks for your answers and sorry for my bad english. (And sorry for the picture, couldn't make a screenshot ;-) )

    Read the article

< Previous Page | 614 615 616 617 618 619 620 621 622 623 624 625  | Next Page >