Search Results

Search found 47324 results on 1893 pages for 'end users'.

Page 669/1893 | < Previous Page | 665 666 667 668 669 670 671 672 673 674 675 676  | Next Page >

  • Windows Home 7 and virtualization

    - by progtick
    so apparently, you can't use VirtualBox etc with Windows Home 7. because you would be using two licenses instead of one. So other users that tried virtualization with Windows Home Premium 7, did you just end up using another OS like Ubuntu etc? Did you find a workaround for using Windows? When I say virtualization, I mean virtual machine of sort - where dangerous websites can be visited, nasty applications can be tried etc.

    Read the article

  • how can I manage user-dependent variables, that are valid on the whole domain ( Win Server 2003)

    - by Stephane R.
    Hello I am working on a system that needs a user-dependent variable, the user in on Windows XP and is connected to Windows Server 2003. I cannot save this variable in the registry of the local machine under HKCU, because the users are likely to exchange their machines. This variable must be accessible on the whole domain. Do you have any idea of implementing this ? Are there WMI features that may help me ?

    Read the article

  • Is sending email from EC2 / Rackspace Cloud a bad idea?

    - by Michael Buckbee
    In this article it mentions that TrendMicro is now treating all emails from Amazon's EC2 as coming from "Dial Up Users": likely to be spam and this is creating severe deliverability issues with their emails. We're having all kinds of issues sending email from our app servers on Rackspace cloud (which may or may not be DUL'd) and I wonder if this isn't just a losing battle and we should try to get a different host for our SMTP server.

    Read the article

  • Bridging wlan0 to eth0

    - by user46127
    On arch Linux, I would like to mainly have eth0 (connected to bridged router) share the connection recieved from wlan0, Ive read tutorials but I'm not command sabby as other users are and don't completely understand. I would appreciate some help! Ty!

    Read the article

  • Enterprise level control of ClickOnce product on corporate network with group policy?

    - by MrEdmundo
    Hi there I'm a developer looking at introducing ClickOnce deployment for an internal .NET Winforms application that will be distributed via the corporate network. Currently the product roll out and updates are handled by Group Policy however I would like to control the updates via ClickOnce deployment now. What I would like to know is, how should I initially roll out the package to make sure that all users have got it. Can I use a combination of Group Policy (the roll out) and then rely on the ClickOnce deployment model for any further updates?

    Read the article

  • Using mod_rewrite to hide tomcat port

    - by user123181
    I have apps on Tomcat that use URLs like this: http://xxx:8080/myapp I don't want the users to see the port in the URL. Hi can do a rewrite rule like this: RewriteRule ^/myapp(.*) http://xxx:8080/myapp$1 [P,L] This way, if a user goes to the URL http://xxx/myapp he can enter the app fine, but the port will still show up on the browser. I want the URL that the user sees to be always http://xxx/myapp How can I do this using mod_rewrite?

    Read the article

  • How do Windows 7 encrypted files look like?

    - by Sean Farrell
    Ok this is kind of an odd question: How do Windows 7 (Home Premium) encrypted files look like "from the outside"? Now here is the story. An acquaintance of a freind of mine got a nasty virus / scareware. So I wiped out my PC technician cap and went to work on it. What I did was remove the drive from the laptop and put drive into my external drive bay. I scanned the drive and yes it was loaded with stuff. That basically cured the infection and I could start the system back up. To check if it cured the problem I wanted to see the system while running. There where two user accounts, on with a password and one without (both admin users !?!). So I logged into the unprotected user and cleaned up the residual issues, like proxy server to localhost in the browser config. Now I wanted to do the same for the password protected user. What I noticed that from my system and the unprotected user account the files of the protected user looked garbled. The files are something like 12 random alphanum chars, but the folders looked ok. Naive as was thought this might be how encrypted files looked "from the outside". (I never use Microsoft's own security features, so how would I know. TrueCrypt is one big blob.) Since the second user could not be reached, I though sod it and removed the password from the account. (That might have been a mistake, I know.) Now I did the same clean up tasks and all nice and fine; except for the files which where still "encrypted". So I looked into many Windows Encrypted Files recovery posts and not all hope is lost, since I should be able to extract the certificate and with the password regain access to the files. Also note that windows did "only" prompt me that removing the password would be insecure, not that access to encrypted files would be lost, like it is claimed in most recovery articles. Resetting the password did not help and I gave up for the night. The question that nagged me half of the last night was, what if the files are not encrypted, but the scare-ware encrypted / destroyed the files? I don't want to spend hours of work trying to recover files that are not recoverable. The ting is that the user does not remember turning it on and aren't the files marked in blue and the filename is readable? Many thanks for input from users who have more knowledge about WEF...

    Read the article

  • Why does my Windows 7 computer wake itself up from sleep mode?

    - by AbuHamzah
    I have XPS9100 DELL desktop computer awakes out of the sleep mode without me prompting it. I have 64 bit OS Before I go to sleep I put that in sleep mode but in the morning I see its awake and I try every setting possible but could not help I have tried this command and here is what I got and I am not sure what to do. C:\Users\NAME>powercfg -lastwake Wake History Count - 1 Wake History [0] Wake Source Count - 1 Wake Source [0] Type: Wake Timer Owner: [SERVICE] \Device\HarddiskVolume3\Windows\System32\svchost.exe (wuauserv)

    Read the article

  • CMAK Custom Action to run synchronous executable

    - by Charles Gargent
    I am using the Connection Manager Administration Kit (CMAK) to create vpn connections for my users, if it is possible how do I create a custom action that launches an executable that runs synchronously? In the help file it says Only DLLs run synchronously, meaning that Connection Manager starts the action and then waits for the function to return before continuing Is there any way around this? I have seen something similar called VPN-Q which from the screen shots appear to do just that.

    Read the article

  • How to reset the Windows 7 desktop gadgets?

    - by Simon
    After changing the Windows Sidebar settings C:\Users\USERNAME\AppData\Local\Microsoft\Windows Sidebar\Settings.ini ( http://superuser.com/questions/150072/where-are-the-settings-for-the-windows-7-clock-gadget-stored ) How do i refresh the Windows Sidebar to pick up these changes?

    Read the article

  • Why Can't I Pre-Zip Server Files?

    - by ThinkBohemian
    It's just good common sense to have your server gzip your files before they send them to users (I use Nginx) Is there anyway to save the server some overhead and pre-zip those files for the server, and if not why? For instance rather than giving the server an myscript.js and having the server zip the file and send it to the user, is there a way to create myscript.js.zip so the server doesn't have to?

    Read the article

  • SBS_LOGIN_SCRIPT not updating the ESET NOD32 clients versions

    - by Orr Yoffe
    I used the following Login script (with version 4.2 of NOD32). After updating the ERA and the Server to version 5.0.122.0, I've updated my script to the following, resulting in alot of nothing. Any suggestions whats wrong here? rem \SBS\Clients\Setup\setup.exe /s SBS @echo off net time \s2008 /SET /Y net use P: \s2008\public /Y net use u: \s2008\users\%username% /Y net use L: \s2008\clientapps /Y call \s2008\eset\install_eav.bat call \s2008\eset\UpgVer-Eset5.0.bat exit

    Read the article

  • *nix: Run as different user GUI

    - by singpolyma
    I want to run an application using only GUI as a different user. Not root. I want the user to be presented with a dropdown of system users, select one, enter the password, and the app gets run as that user. Like gksudo but user to run as specified in GUI and not as switch. Does such an app exist?

    Read the article

  • Mysterious OS X FileVault-related home directory

    - by Nick
    I recently enabled FileVault on Snow Leopard, and after doing so, found a directory /Users/<myusername>.4529809818604982560, containing the original (unencrypted) contents of my home directory, owned by root:wheel with permissions 700, side-by-side with my normal home directory. Does anyone know why this was created (maybe a temporary backup that didn't get erased), or whether deleting it will be harmful?

    Read the article

  • How secure is a subnet?

    - by HorusKol
    I have an unfortunate complication in my network - some users/computers are attached to a completely private and firewalled office network that we administer (10.n.n.x/24 intranet), but others are attached to a subnet provided by a third party (129.n.n.x/25) as they need to access the internet via the third party's proxy. I have previously set up a gateway/router to allow the 10.n.n.x/24 network internet access: # Allow established connections, and those !not! coming from the public interface # eth0 = public interface # eth1 = private interface iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A INPUT -m state --state NEW ! -i eth0 -j ACCEPT iptables -A FORWARD -i eth0 -o eth1 -m state --state ESTABLISHED,RELATED -j ACCEPT # Allow outgoing connections from the private interface iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT # Masquerade (NAT) iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # Don't forward any other traffic from the public to the private iptables -A FORWARD -i eth0 -o eth1 -j REJECT However, I now need to enable access to users on our 129.n.n.x/25 subnet to some private servers on the 10.n.n.x/24 network. I figured that I could do something like: # Allow established connections, and those !not! coming from the public interface # eth0 = public interface # eth1 = private interface #1 (10.n.n.x/24) # eth2 = private interface #2 (129.n.n.x/25) iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A INPUT -m state --state NEW ! -i eth0 -j ACCEPT iptables -A FORWARD -i eth0 -o eth1 -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A FORWARD -i eth0 -o eth2 -m state --state ESTABLISHED,RELATED -j ACCEPT # Allow outgoing connections from the private interfaces iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT iptables -A FORWARD -i eth2 -o eth0 -j ACCEPT # Allow the two public connections to talk to each other iptables -A FORWARD -i eth1 -o eth2 -j ACCEPT iptables -A FORWARD -i eth2 -o eth1 -j ACCEPT # Masquerade (NAT) iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # Don't forward any other traffic from the public to the private iptables -A FORWARD -i eth0 -o eth1 -j REJECT iptables -A FORWARD -i eth0 -o eth2 -j REJECT My concern is that I know that the computers on our 129.n.n.x/25 subnet can be accessed via a VPN through the larger network operated by the provider - therefore, would it be possible for someone on the provider's supernet (correct term? inverse of subnet?) to be able to access our private 10.n.n.x/24 intranet?

    Read the article

  • Copy data from a remote Linux box to my Windows desktop

    - by Sanjay Rao
    I use Putty to login to the remote server and then set the environment and change the path to a particular directory. Now from this dir, I need to copy a folder to my desktop which is Windows? How can I achieve this ? Some of my failed attempts are as follows scp -r remote_foldername srao@my_ipaddress:C:\srao\Users\Desktop So from the remote server which is to be copied through putty, to my_username_in_windows@ip_address:path to destination

    Read the article

  • Simple Voip server for ubuntu

    - by Stalkerh
    I have a network that connects 2 households and would like to setup a simple voip server so that I can call between the houses. It needs to be for ubnutu , I have used the free 3CX system and while it works brilliantly it doesnt support linux and I can get a windows box. The users will never need to call external lines. They will only make 'calls' between laptops/pc. Can someone please make a recommendation and maybe even a tutorial that I can follow

    Read the article

  • Pinned start menu/taskbar shortcuts gone.

    - by Joey Morani
    Hello. I just restarted my Windows 7 PC to find all my pinned shortcuts have disappeared from the start menu and taskbar. I've looked here "C:\Users\USERNAME\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned" And it seems the shortcuts are still there. Is there maybe a service that isn't running, which is causing this problem? Thanks.

    Read the article

  • Is there a LocalAppData Environement Variable in Windows 2003?

    - by brendan
    Per this question I need to call via code the following paths: Windows 2003: C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\Application\chrome.exe Windows 2008: C:\Users\Administrator\AppData\Local\Google\Chrome\Application\chrome.exe Ideally I could use the environment variable %localdata%\Google\Chrome\Application\chrome.exe but this does not work for me in Windows 2003. Should it? How can I refer to this path in both systems using environment variables?

    Read the article

  • SQL Server maintenance tasks cannot run after changing computer name

    - by Gatura
    I am having a problem performing maintenance tasks on Microsoft SQL Server 2008 after changing my server name from the original random name given during installation to the one I prefer This is the error am getting Could not obtain Information about Windows NT group/users 'WIN-4N4A9TLBGJJ\Administrator', error code 0x534 Is there a way I can fix this problem without having to delete the account and recreating it again?

    Read the article

  • Accidentally broke/remapped git command line command

    - by Kevin Teh
    I think I accidentally remapped my git command to automatically include the subcommand credential-osxkeychain on the command line while trying to install a git credential-helper. When I enter $git it now displays Usage: git credential-osxkeychain <get|store|erase> How can I fix it? Entering $alias returns alias rvm-restart='rvm_reload_flag=1 source '\''/Users/teh/.rvm/scripts/rvm'\''' Entering $which git returns /usr/bin/git I think the problem may have began when I entered a command to move git-credential-osxkeychain into /usr/bin/git instead of /usr/bin/

    Read the article

< Previous Page | 665 666 667 668 669 670 671 672 673 674 675 676  | Next Page >