Search Results

Search found 47324 results on 1893 pages for 'end users'.

Page 665/1893 | < Previous Page | 661 662 663 664 665 666 667 668 669 670 671 672  | Next Page >

  • HAProxy redirect HTTPS to HTTP

    - by tarnfeld
    I'm using HAProxy as a load balancer and i'd like to redirect any traffic that comes in on 443 (HTTPS) to 80 (HTTP). My site doesn't support HTTPS at all and i'd rather just redirect users than cause any SSL warnings in browsers. All I can find is using the redirect location <to> syntax, but as far as I can tell that requires me to hard code the hostname. The load balancer receives connections for various hostnames so would like to keep it relative.

    Read the article

  • Keep remoting into wrong account. Windows 7

    - by Paul
    I have a home theatre PC running with two users accounts on windows 7. The default account logs into locally. The account 'Paul' is present but is denied local log in so the default auto logs in locally. I am trying to remote into account Paul using RDC however it tries to log into the default account and I am presented with an an option to boot the present user off so I can log in. How do I specify which account I want to log into?

    Read the article

  • How to hide a trusted domain in the logon screen?

    - by Massimo
    I need to create a bidirectional trust between two Active Directory domains. But management is worried that users will be puzzled out when seeing another domain name in the drop-down list in the Windows logon screen (many of them use Windows XP), and that help desk calls for failed logins due to having selected the wrong domain will skyrocket. Also, the two domain names are quite similar, adding to the possible user confusion. Is there any way to hide a trusted domain from the drop-down list in the Windows logon screen?

    Read the article

  • Use WMI to detect a USB drive was connected, regardless of whether it was mounted?

    - by Seth Petry-Johnson
    I am writing a script that uses MS KB 823732 to temporarily prevent users from plugging in new USB storage devices. This works fine, and the HKLM\...\Services\UsbStor registry key successfully blocks newly-connected devices from being accessed. Is there a WMI event that will tell me that a drive was connected, regardless of whether it was mounted? I tried querying for __InstanceCreationEvent but that is apparently raised only after the drive is mounted and made available, which doesn't fit my requirements.

    Read the article

  • Hebrew filenames in the URL

    - by Lea Cohen
    We have a CMS that enables users to upload images and flashes to their site. Sometimes the filenames are in Hebrew. In our development server there is no problem, but in our production server we get a 404 error when the filename ends with Hebrew characters. I tried comparing the sites in the IIS, but I'm not sure what to even look for, so I'd be very happy to get pointers as to what might be causing the problem.

    Read the article

  • Powershell Scripts to modify settings on Gpedit.msc console

    - by Kodeesh
    Can any one of you please explain what is the exact powershell cmdlet for changing settings (Enabled or Disabled) in Gpedit.msc console...? I need a exact query to link (Computer Configuration--Administrative Templates--System--User Profiles-- Do not forcefully unload the users registry at user logoff--'Enabled') in PowerShell. Which means whenever we excutes the function it should Enable the mentioned setting from gpedit.msc console...

    Read the article

  • useradd won't work correctly on Debian Squeeze

    - by user49580
    system: Debian-60-squeeze-64-LAMP 2.6.32-5-amd64 As root I create a user in an ssh-console: useradd -m -G users myuser passwd myuser xxxxxx xxxxxx su myuser or after login via ssh I get: \[\033[01;31m\]\u\[\033[01;33m\]@\[\033[01;36m\]\h \[\033[01;33m\]\w \[\033[01;35m\]$ \[\033[00m\] plus the cursor Using the tab key the cursor just jumps forward, so no completion here. Also the arrow keys do NOT work, if I use right arrow key I get:^[[C What could cause this behavior?

    Read the article

  • Web.config file permissions

    - by ristonj
    I would like to lock down the web.config file as much as possible, so that as few accounts as necessary can read the file. I saw the list here http://msdn.microsoft.com/en-us/library/ms178699.aspx but allowing the Users group read permission on the web.config file seems excessive. Thanks.

    Read the article

  • recommendation for good chassis (case) for first time PC builder

    - by studiohack
    I've been thinking about building my own machine for some time now, and whenever I look at the PC case market, it seems like cases are a dime-a-dozen. As a result, I'm wondering what cases Super Users would recommend in the areas of ease of use, cable management, cooling, etc...in other words, an all-around case for a first time PC builder. Thanks!

    Read the article

  • Are there any online payment services simliar to paypal that do not require customers to setup accou

    - by shady
    I'm integrating PayPal on a client's site and they are not happy with the fact that their customers would have to sign up for an account before they can make a purchase. They like the price of PayPal, but don't really like the interface. Could I offer them an alternative service to PayPal that would allow me to setup a checkout page directly on their website and not require their users to create accounts?

    Read the article

  • Looking for a simple Ticket Management Software

    - by waszkiewicz
    I'm looking for a good, free ticket management software that could be accessible from everywhere. The company is small (10 people) and the first goal is to have a database and to follow important incidents, even if someone is out of office. I tried OTRS, very nice but I suppose a bit complicated for some of our developers. Thanks for your suggestions. EDIT: I forgot to write that the platform is Windows for all users.

    Read the article

  • How to get rid of Gmail's on "behalf of" using postfix

    - by user2815
    I'm using the default configuration of postfix on Ubuntu 9.04, and I've been trying to configure Gmail to send email through my server. I'm looking for a simple configuration for 10-15 users (like using a password file), but all the tutorials I have found have been too extensive and seem very enterprise-oriented. I just need to configure postfix with AUTH/TLS that is compatible with gmail.

    Read the article

  • Advantages of using .msi files?

    - by Frode Lillerud
    What are the advantages of using .msi files over regular setup.exe files? I have the impression that deployment is easier on machines where users have few permissions, but not sure about the details. What features does msiexec.exe have that makes deployment more easy than using setup.exe scenarios? Any tips or tricks when deploying .msi applications?

    Read the article

  • How to find who deleted a line from a file in a SVN repository?

    - by Ivan Petrushev
    Hello, I work on a very large project (10000+ versions) and sometimes it happened that I need to know who of the other users deleted some line in a file. Is there a way to do that that? I can do svn blame with revision number to check if a line exists in that revision, then see in which revision the line is gone and see who commited that revision, but that procedure is lame with that large project. Is there a smarter way to do that?

    Read the article

  • What Triggers a syncronization between Exchange 2007 Mail Store and Edge Servers?

    - by BillN
    We are using Exchange 2007 for our mail. In our configuration, we need to add an alias to each users mailbox. When we do, the Edge server, another Exchange 2007 box, will reject the alias with a User Unknown error until the next morning. I seem to recall that in Exchange 2003, you could force an update from the Management console, but I can not find a way in 2007. It is obvious that a sync job is scheduled to run each night, but I cannot find it.

    Read the article

  • Exchange 2010: Possible to close for incomming mails for specific acount and reply with "no longer a

    - by Mestika
    Hi, I was wondering if it is possible, in Exchange server 2010, to disable a mailbox account, lets call it mailuser and if anyone sends a E-mail for [email protected] then it will send a mail back with some sort of standard "This E-mail is no longer in use. Please write to [email protected] instead" mail. I know I can create an "out-of-office" reply from the users outlook, but it would be so much faster to do it within the exchange server. Sincerely Mestika

    Read the article

  • How can I password prompt certain IPs and allow all others free access using Apache?

    - by Moak
    SOLVED: The idea is that if the visitor comes from China they have to pass a basic authentication. If you have any other IP address you can visit the site without being hassled (including proxies) //1400 rules.... SetEnvIf Remote_Addr 222.249.128.0/19 china SetEnvIf Remote_Addr 222.249.160.0/20 china SetEnvIf Remote_Addr 222.249.176.0/20 china AuthType Basic AuthName "Restricted" AuthUserFile /www/passwd/users Require valid-user Order allow,deny Allow from All Deny from env=china Satisfy any

    Read the article

  • sbs 2001 essentials rdp cert install package

    - by Crash893
    Im using Microsoft SBS 2011 esentials to allow some of my users to remote into there work machines when they try they get and error that says that the rd gateway can not be trusted I looked up the error on google and confirmed that i need to install the ssl cert on the local machine but the instructions given are for sbs 2011 standard (website here ) but the path given is not in sbs essentials so where can i find the " Install Certificate Package.zip " file in essentials?

    Read the article

  • Including existing ISA server into domain

    - by user23419
    Is there any problem or pitfall including ISA server into domain after ISA was installed and configured and worked for a while? All the rules at the moment are based upon IP addresses, All Users. Addendum 1 ISA is an edge firewall, so it is connected to one Internal network (this is where domain is) and to the Internet provider (External Network). Addendum 2 I'm absolutely sure ISA should be a member of the domain.

    Read the article

  • XP User account cannot write to USB

    - by Quick Joe Smith
    Is there a local security policy setting or somesuch to allow limited user accounts to modify the contents of USB drives? Currently I get an "Access denied" error, further saying "Make sure the disk is not full or write-protected and that the file is not currently in use." The Administrator account has no such obstacles. Update: The problem is at least solvable by altering NTFS permissions (granting Full Control to Users), and therefore I'm losing hope that there is a more global solution.

    Read the article

  • Setting a non-standard proxy

    - by Julio Guerra
    I am behind a proxy which requires users to login during the first connection with a username and password with a HTML form. Thus, it is not handled with usual http://username:[email protected] and any attempt to access the internet from this setting falls into the login form. How could I automatically login to the proxy? In linux, what manages proxy stuffs when a command tries to access the internet? Thank you.

    Read the article

  • How many copies of files are needed by video server?

    - by Trilok
    A quick question. How many copies of the same movie are kept in a video server (a video streaming server)? Suppose a particular video is at max requested by 1000 users at the same instant of time, how many copies would be sufficient so that parallel streams can be provided to each user? Ideally 1 copy would solve the purpose, but what is the optimum number keeping the bandwidth and simultaneous access in mind?

    Read the article

< Previous Page | 661 662 663 664 665 666 667 668 669 670 671 672  | Next Page >