Search Results

Search found 5102 results on 205 pages for 'personal tech'.

Page 68/205 | < Previous Page | 64 65 66 67 68 69 70 71 72 73 74 75  | Next Page >

  • What anti-keylogging programs can you use when using public PCs

    - by Jason Smith
    Are there anti-keylogging programs that can keep you safe while you are using a public PC terminal? Do they exist and what are these? I like to know that I am safe when entering data on a public PC for example from malware or keyloggers, who knows where it has been. Or else, how can I keep my personal data safe when using a public PC? I think this question is relevant for anyone who is concerned about their security on any level.

    Read the article

  • Flexible/variable/wildcard vhosts/hosts

    - by Moak
    I am using wamp, have all my projects in E:\webs\*projectname*\htdocs I want to access all of them in my browser with http://*projectname*.loc is there a way i can set up hosts and vhosts files so i never have to open them again? note this is for my own personal use, and I can change from .loc to .whatever if ICANN decides to start selling .loc domains.

    Read the article

  • What is the best powershell script to restore an SQL Database?

    - by EtienneT
    To restore an SQL Server 2008 database, I would lile to be able to just do something like this in powershell: ./restore.ps1 DatabaseName.bak Then the powershell script would by convention restore it to a database with name "DatabaseName". It would disconnect any user connected to this database so that it can restore the DB. It would store the mdf and ldf in the default location. This would mainly be while developing on my personal machine. Just a quick way to restore a DB. Anyone has such a script? Thanks

    Read the article

  • Linux Debian Security Breach - what now? [closed]

    - by user897075
    Possible Duplicate: My server's been hacked EMERGENCY I installed Debian (Squeeze) a while back in my home network to host some personal sites (thank god). During the installation it prompted me to enter a user other than root - so in a rush I used my name as user and pass (alex/alex for what its worth). I know it's horrible practice but during the setup of this server I'm always logged in as root to perform configurations, etc. Few days or a week passes and I forget to change the password. Then I finally get my web site finished and I open the port forwarding on my router and DynDNS to point to my server in my home. I've done this many times in the past never had issues but I use a cryptic root password and I guess disabled regular accounts. Today I reformat my Windows 7 and after spending all day tweaking and updating SP1 I look for cloning apps and find clonezilla and see it supports SSH cloning, so I go through the process only to discover I need a user, so I log into my web-server and see I have the user 'alex' already in and realize I don't know the password. So I change the password to something cryptic and visit the directory 'home' only to realize their are contents such as passfile, bengos, etc. My heart sinks, I've been hacked!!! Sure as hell there are all sort of scripts and password files. I run a 'last' command and it seems they last logged in april 3rd. Question: What can I do to see if they did anything destructive? Should I reformat and reinstall? How restrictive is Debian/Squeeze in terms of user permissions out of the box - all my personal website stuff was created using 'root' so changing files does not seem to have occured. How did they determine there was a user 'alex' on the machine? Can you query any machine and figure this out? What the users are? Looks like they tried to run a IP scan...other nodes on the network are running Windows 7. One of which seems a little wonky as of late - is it possible they buggered up that system? What corrective action can I take to avoid this from happening again? And figure out what might have changed or been hacked? I'm hoping debian out of box is fairly secure and at best he managed to read some of my source code. :p Regards, Alex

    Read the article

  • Flexible/variable vhosts/hosts

    - by Moak
    I am using wamp, have all my projects in E:\webs\*projectname*\htdocs I want to access all of them in my browser with http://*projectname*.loc is there a way i can set up hosts and vhosts files so i never have to open them again? note this is for my own personal use, and I can change from .loc to .whatever if ICANN decides to start selling .loc domains.

    Read the article

  • Price drop patterns

    - by doug
    I'm looking to buy a new laptop, and i don't need the top hi-tech because I'll use it for office type applications. In this case, the CPU and RAM are those who are mostly used. For example Intel i3 CPU was launched in Jan 2010 and in this case, the prices for Core Duo technology will drop. Do you know when or which are the signs? Can we talk about such a pattern?

    Read the article

  • KeePass justification

    - by Jeff Walker
    I work at a place that tries to take security seriously, but sadly, they often fail. Currently, one of the major ways they fail is password management. I personally have about 20 accounts (my personal user id on lots of machines). For shared "system" accounts, there are about 45 per environment; development, test, and production. I have access to 2 of those, so my personal total is somewhere around 115 accounts. Passwords have to be at least 15 characters with some extensive but standard complexity constraints, and have to be changed every 60 days or so (system accounts every year). They also should not be the same for different accounts, but that isn't enforced. Think DoD-type standards. There is no way to remember and keep up with this. It just isn't humanly possible, as far as I'm concerned. This might be a good justification of a centralized account management system, a la LDAP or ActiveDirectory, but that is a totally different battle. Currently the solution is an Excel spreadsheet. They use Excel to put a password on it, and then most people make a copy and remove the password. This makes my stomach turn. I use KeePass for this problem and it manages all of my account very well. I like the features like auto-typing, grouping, plugins, password generation, etc. It uses AES-256 encryption via the .Net framework, and while not FIPS compliant, it has a very good reputation. The only problem is that they are also very careful about using randomly downloaded software. So we have to justify every piece of software on our workstations. I have been told that they really don't want me to use this, be cause of the "sensitive nature" of storing passwords. sigh My justification has to be "VERY VERY strong". I have been tasked with writing a justification for KeePass, but as I am lazy, I would like any input that I can get from the community. What do you recommend? Is there something out there that is better or more respected than KeePass? Is there any security experts saying interesting things on this topic? Anything will help at this point. Thanks.

    Read the article

  • price patterns drops

    - by doug
    I'm looking to buy a new laptop, and i don't need the top hi-tech because I'll use it for office type applications. In this case, the CPU and RAM are those who are mostly used. For example Intel i3 CPU was launched in Jan 2010 and in this case, the prices for Core Duo technology will drop. Do you know when or which are the signs? Can we talk about such a pattern?

    Read the article

  • Tool for Network game party

    - by nXqd
    I'm looking for tools for a network game party ( LAN ) .This is my first time I join as a tech-support for this party. I already know some tools like Desktop Sharing, Desktop lock . Anyone suggest more tools ? And links are appreciated :)

    Read the article

  • Streaming Netflix through Wifi kills all other devices

    - by maleki
    I have a "Belkin N150" Router. My current setup is wired connection to my personal tv and xbox with wireless going to the Wii and Bedroom laptop. Anytime I try streaming Netflix Instant Queue on the Wii, every other device has problems. The Wii works fine but everything else's connection is destroyed. Streaming through the Xbox doesn't create any issues for other devices. What kind of issue is occurring and how can I fix it?

    Read the article

  • CentOS with an Ubuntu kernel

    - by Gaia
    The Rackspace cloud server tech tells my CentOS 5.4 VPS (Xen) runs "CentOS with an Ubuntu kernel" Could someone explain, in plain terms, what "CentOS with an Ubuntu kernel" means and if there are any disadvantages (performance, mgmt) between that and running CentOS with a CentOS kernel? Thanks

    Read the article

  • Unix Password Management Keyring

    - by Phil
    I am looking for a password manager for a command-line Unix environment. So far all I can find are keyring applications for Windows, Linux, and Mac. But no command-line Unix interfaces. My main goal is to be able to access a password keyring through an SSH connection to a machine that has no graphical user interface. If there are no good unix password keyrings out there, what would be a better way to store personal passwords in a central location?

    Read the article

  • Optimize windows 2008 performance

    - by Giorgi
    Hello, I have windows server 2008 sp2 installed as virtual machine on my personal laptop. I use it only for source control (visual svn) and continuous integration (teamcity). As the virtual machine resources are limited I'd like to optimize it's performance by disabling services and features that are not necessary for my purposes. Can anyone recommend where to start or provide with tips for getting better performance. Thanks.

    Read the article

  • Auto-symlink contents of directory in my home directory?

    - by Nathaniel
    So I'm a dual-booter. I'm looking for an easy way to keep up-to-date symlinks in my Linux home folder pointing to every file and folder in the root of Windows personal directory. So, say I have foo.txt and bar.txt in C:\Windows\Documents and Settings\Nathaniel. I want symlinks of those files to automatically be made in /home/nathaniel/ (while I'm running Linux, of course).

    Read the article

  • What features would you add to Firefox to get it into the enterprise?

    - by Robert MacLean
    Firefox adoption in the home/personal user base seems to be growing fine, but adoption in the enterprise is not going anywhere quickly. My view on this is because SysAdmins are not promoting it within the organisations because Internet Explorer has features which make it more acceptable to an enterprise, such as Managing settings via GPO Integration into the rest of the update stack Support of common business applications So what would you add to Firefox to get it more promotion by SysAdmins in the enterprise?

    Read the article

  • Internet is a series of tubes?

    - by Zoredache
    Almost all of use have heard of Ted Stevens trying to describe the Internet with the analogy that it is a series of tubes (mp3). I believe that it likely that some tech person somewhere tried to describe the Internet to him and this was the best analogy they could come up with. What analogy would you use to describe the Internet, and issues related to bandwidth, latency, etc, to your grandmother or someone else with no IT experience.

    Read the article

  • IEEE 1394 Firewire Card is not visible in Device Manager in WIndows 7

    - by Shyam
    I have a IEEE 1394 card that I have placed in one of the PCI slots of my Windows 7 PC. I have moved to Windows just last week and Windows is not detecting this card. It is not listed in the Devide Manager. Earlier when I used Fedora 12, I was able to use this interface for capturing videos from my DV Camera. The manufacturer is Tech-Com, which has not provided a driver CD for this. What can I possibly try?

    Read the article

  • How to encrypt an USB stick?

    - by Dimitri C.
    When storing personal data on a USB stick, data needs to be encrypted to ensure privacy. Regrettably, this is far from easy to do without introducing a lot of overhead; ideally, the whole encryption process should done automatically. Does anyone know of a convenient way to encrypt the data on a USB drive? Update: I am using Windows Vista, although I would prefer a cross-platform solution.

    Read the article

  • Can i run this monitor ?

    - by akshay
    I am upto buying new Monitor for mine desktop here are some specs.and you please help me choose a better one (an which one will work)? Graphics property of system : Intel(R) 82845G Graphics Controller Memory 64 MB Memory type 2 Driver version 6.13.01.3317 Monitors i think will be good is. Monitor : http://www.google.com/products/catalog?q=viewsonic+22&cid=10503070423897692907&ei=MKj_S5OGCpOgjgSghsX2CA&sa=title&ved=0CAcQ8wIwADgA&os=tech-specs

    Read the article

  • Any Linux distro which is supported on EFI enabled XServe

    - by geoaxis
    I am looking into installing Linux on a test XServe machine and see how it goes overall. We have our entire infrastructure on OSX and would like to move to Linux servers. Is there any distribution which has good support for XServe? Google search yielded nothing conclusive. I don't mind hacking around for personal use (compiling kernel, tweaking packages and configurations) but when running in production it's good to be cautious. Paying for commercial support is definitely an option.

    Read the article

  • Using multiple accounts on Gmail on a Blackberry

    - by Andrew G. Johnson
    I love the whole "one inbox" concept on my blackberry. Facebook updates, SMS/MMS messages, and email all lands in the same list. Problem is they assume I have a simple Gmail account without multiple accounts. I have my Gmail account setup to receive email from ~15 different accounts. I assume a lot of tech people do something like this. How have you gotten around in?

    Read the article

< Previous Page | 64 65 66 67 68 69 70 71 72 73 74 75  | Next Page >