Search Results

Search found 30252 results on 1211 pages for 'network programming'.

Page 620/1211 | < Previous Page | 616 617 618 619 620 621 622 623 624 625 626 627  | Next Page >

  • solve TOR edge node problem by using .onion proxy?

    - by rd.
    I would like to improve the TOR network, where the exit nodes are a vulnerability to concealing traffic. From my understanding, traffic to .onion sites are not decrypted by exit nodes, so therefore - in theory - a .onion site web proxy could be used to further anonymize traffic. Yes/no? perhaps you have insight into the coding and routing behind these concepts to elaborate on why this is a good/not good idea.

    Read the article

  • My VPS was wiped, can I still access it?

    - by Lucas806
    Someone gained access into my Ubuntu VPS via SSH, they entered rm -Rf / which wiped it and now I can't access it via SSH or SFTP. On SFTP I get the the following error: Error: Connection timed out Error: Could not connect to server And then on SSH, I try to connect to my VPS IP on Port 22, it doesn't come up with anything for ages (it should come up asking for a username) and then a op-up appears saying: Network Error: Connection timed out. Is it possible to fix this, if so, how?

    Read the article

  • Temporary Tables in Oracle and SQL Server

    Jonathan Lewis (Oracle Ace Director, OakTable Network) and Grant Fritchey (Microsoft SQL Server MVP) will host a live discussion on Oracle and SQL Server, this time in relation to temporary tables. NEW! Deployment Manager Early Access ReleaseDeploy SQL Server changes and .NET applications fast, frequently, and without fuss, using Deployment Manager, the new tool from Red Gate. Try the Early Access Release to get a 20% discount on Version 1. Download the Early Access Release.

    Read the article

  • Juju Ceilometer-Agent is not reporting about nova-compute

    - by user283530
    I have deployed both ceilometer and ceilometer-agent and added relationship between them. After deployment I can see the resource usage for network(neutron), glance, cinder but I cannot see the information for nova-compute. But it is instructed that ceilometer-agent should deployed in every compute node but with juju its not possible to deploy it on specific compute node. Thanks in advance for your help.

    Read the article

  • Slides and Code from “Using C#’s Async Effectively”

    - by Reed
    The slides and code from my talk on the new async language features in C# and VB.Net are now available on https://github.com/ReedCopsey/Effective-Async This includes the complete slide deck, and all 4 projects, including: FakeService: Simple WCF service to run locally and simulate network service calls. AsyncService: Simple WCF service which wraps FakeService to demonstrate converting sync to async SimpleWPFExample: Simplest example of converting a method call to async from a synchronous version AsyncExamples: Windows Store application demonstrating main concepts, pitfalls, tips, and tricks from the slide deck

    Read the article

  • How can I create a content widget generator?

    - by Richard
    Sites like Buzzfeed offer widgets (Javascript, PHP, WordPress, etc.) for syndicating their content on other sites. Does anyone have any ideas on how I could go about creating/implementing some kind of interactive widget generator that gives users options for customizing their widget? I assume this would require RSS. Check out the Buzzfeed generator to see what I mean http://www.buzzfeed.com/network/widget

    Read the article

  • Share USB devices between 32 bit and 64 bit systems

    - by Sreejith S
    The latest version of USBDeviceShare, the USB over IP software, supports sharing USB devices between 32 bit and 64 bit editions of Windows. A USB device plugged in to a 64 bit PC running 64 bit version of Windows can be shared and remotely accessed from a 32 bit PC and vice versa. Download USBDeviceShare USB over Network software from http://www.sysnucleus.com/usbshare/usbshare_download.html Keywords : USB over Ethernet, USB Server, Remote USB Access, Share USB

    Read the article

  • Why can't a device connect through a wireless after router restart?

    - by Kalmar
    My laptop with lubuntu 12.04 used to connect to the wifi. But after the router (Cisco E4200) was restarted I cannot connect anymore through wireless connection. (No problem using a cable.) The network is hidden and secured by WPA/WPA2 Personal, I am the only person having this problem, so I guess it's somewhere on my side. What could cause such a problem, how to diagnose it and finally how to fix it?

    Read the article

  • Online Reputation Management - The Basics

    Bad publicity is just a reality of doing business these days, especially for any company that is even moderately in the public eye. With hundreds of television channels, a print media network larger than the entire European Union and the Internet, negative comments are hurled at everyone from the Pope to Oprah.

    Read the article

  • Webinar: Temporary Tables in Oracle and SQL Server

    Once again Jonathan Lewis (Oracle Ace Director, OakTable Network) and Grant Fritchey (Microsoft SQL Server MVP) will host a live discussion on Oracle and SQL Server, this time in relation to temporary tables. Will they agree on some common ground? Or will it be an out and out argument? Either way, be prepared for a lively exchange that will not only entertain, but will teach you key concepts on Oracle and SQL Server.

    Read the article

  • SEO Tools and Techniques

    Internet marketing, one of the latest marketing techniques which are a very effective method of selling products through online network and SEO is the major source of internet marketing. It focuses on increasing the web traffic on a particular website, through popular search engines. Search Engine Optimisation can be categorized into various broad topics such as image search, local search and various business specific searches.

    Read the article

  • A tinkered PC resets its nameserver (resolv.conf) on each boot

    - by aitchnyu
    The Ubuntu 11.10 PC resets resolv.conf on each boot, only with a comment remaining. How do I fix this by setting the persistent storage? It was tinkered by somebody else and I (and him!) cant trace his actions. The graphical connection manager also refuses to work thanks to the tinkering. Content of interfaces file: root@technovia-3:~/dev/spectrum/spectrum# cat /etc/network/interfaces auto lo iface lo inet loopback

    Read the article

  • Free E-Book from APress - Building the Infrastructure for Cloud Security

    - by TATWORTH
    Originally posted on: http://geekswithblogs.net/TATWORTH/archive/2014/05/29/free-e-book-from-apress---building-the-infrastructure-for-cloud.aspxAt http://www.apress.com/9781430261452, APress are offering a free E-Book on Building the Infrastructure for Cloud Security. “This book provides a comprehensive look at the various facets of cloud security – infrastructure, network, services, Compliance and users.  It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a security perspective. ”

    Read the article

  • Why is user "lightdm" trying to log into my SBS 2003?

    - by user652740
    I have 7 Ubuntu desktops connected to a SBS 2003 using Centrify. I have a rather weird scenario, whereby a user with the name lightdm is trying to log into our server, possibly automatically. I thought lightdm was the session manager, not a user? Does anybody know what could be causing this? There is no user: "lightdm" on the server and the problem only comes from one of the 7 internal desktops connected to the server (its IP address is in the local network).

    Read the article

  • Managing Printers with Group Policy, PowerShell, and Print Management

    Just because it is possible to do many configuration jobs 'click by bleeding click', doesn't mean that it is a good idea. It is better to step back, plan, and use the advanced resources provided for managing large network. Printer configuration is the perfect illustration of this, and Joseph demonstrates how the use of Group Policy, PowerShell, and Print Management can turn a time-consuming chore into a pleasure.

    Read the article

< Previous Page | 616 617 618 619 620 621 622 623 624 625 626 627  | Next Page >