Search Results

Search found 5048 results on 202 pages for 'safe browsing'.

Page 70/202 | < Previous Page | 66 67 68 69 70 71 72 73 74 75 76 77  | Next Page >

  • All office apps crash immediately on server 2008

    - by Tim
    Hi, I have a brand new windows 2008 server (64 bit) with a brand new installation of Office 2007, fully patched with all windows updates etc. Every time I try to run any of the office apps it crashes immediately, even in safe mode. the only remotely useful information I get is: Exception Code: c0000005 Exception Data: 00000008 If I Run in compatibility mode for windows XP, everything is fine. Anyone ever seen this before? I've tried turning off DEP but that made no difference either Thanks Tim

    Read the article

  • Configuring Eclipse with wxPython

    - by Alex
    Hi, I've been browsing documentation, but haven't been able to find a straightforward tutorial, so I apologize if this is a really simple question. Anyway, I have eclipse with pydev installed on MAC OSX, and I want configure wxPython to work with eclipse, how do I do this? Once I've downloaded wxpython, what steps do I take to allow wxPython development from eclipse? Thanks!

    Read the article

  • Filter Django Haystack results like QuerySet?

    - by prometheus
    Is it possible to combine a Django Haystack search with "built-in" QuerySet filter operations, specifically filtering with Q() instances and lookup types not supported by SearchQuerySet? In either order: haystack-searched -> queryset-filtered or queryset-filtered -> haystack-searched Browsing the Django Haystack documentation didn't give any directions how to do this.

    Read the article

  • How do IE, FF, and Chrome compare in security? [closed]

    - by cable729
    I'm trying to determine which of the three main browsers (Chrome, Firefox, and Internet Explorer) are the most secure and safe. Right now, in our system, Firefox 10 and IE 8 are cleared as 'good-to-use', but Chrome isn't. Is Chrome really less secure than Firefox and IE, or are the IT folks are slow at updating (Firefox 12 and IE 9 and 10 preview are out right now)? Completely rewrote question. I found the original was not specific enough and the edits started sapping its focus

    Read the article

  • Pointless 'MIDL_INTERFACE' Macro in winapi?

    - by nebukadnezzar
    After browsing some old code, I noticed that some classes are defined in this manner: MIDL_INTERFACE("XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX") Classname: public IUnknown { /* classmembers ... */ }; However, the macro MIDL_INTERFACE is defined as: #define MIDL_INTERFACE(x) struct in C:/MinGW/include/rpcndr.h (somewhere around line 17). The macro itself is rather obviously entirely pointless, so what's the true purpose of this macro?

    Read the article

  • NFS Client library

    - by Reflog
    Hello. I'm looking for some stand alone library to access NFS shares. I am not looking for mounting the shares, just browsing and accessing the files for reading. Preferable something with a simple simple API similar to regular POSIX operations of opendir, scandir, read and etc. Thanks in advance!

    Read the article

  • Sysadmin Dress Code

    - by andyh_ky
    What kind of dress code do you have at work as a systems administrator? Business casual, casual, some days casual, some days business casual, formal? It's safe to say "it all depends on the type of day we're planning on having" - but what happens if you need to speak to some C level personnel? Do you have a spare set of clothes?

    Read the article

  • Information on Rojiani's Numerical methods C textbook

    - by yCalleecharan
    Hi, having taken a look at a few textbooks that discuss numerical methods and C programming, I was gladly surprised when browsing through "programming in C with numerical methods for engineers" by Rojiani. I understand of course it's important that one need to have a solid background in numerical methods prior to try implementing them on a computer. I would like to know if someone here has been using this book and if possible point out strengths and weaknesses of this textbook. Thanks a lot...

    Read the article

  • How to know when the kernel was last compiled?

    - by Mehmet Tuncal
    I have installed a linux distro and I "think" it is vulnerable to kernel exploits. I have to update kernel but I need to know if it is really compiled in year 2003? How can I know if additional updates are made to the kernel? Linux gandalf 2.4.21-4.ELsmp #1 SMP Fri Oct 3 17:52:56 EDT 2003 i686 i686 i386 GNU/Linux Does also "smp" mean that it is safe from latest threats or something? Thank you.

    Read the article

  • See images in SSMS?

    - by Vaccano
    I was browsing around and found this blog post: http://erikej.blogspot.com/2010/04/version-3-of-exportsqlce-now-available.html (It is for a great add in if you user SQL Server CE.) On that post I saw an screen shot of SSMS with images in the results. How is this done? I have images in my database (PNG files that are serialized via memory stream), but I just see numbers when I select the image column.

    Read the article

  • Amazon EC2 root defaults on EBS

    - by CodeShining
    I'm trying to understand why when launching a new instance Amazon defaults to EBS (8gb root) instead of instance storage. Why do they sell instance storage then if it's not used also to boot the base system? Is it safe to uncheck delete on termination, make it bigger (~50GiB) and keep all files on that EBS instead of creating a new one to make sure data will persist and it will also be usable by another instance?

    Read the article

  • Linux Teamviewer functionality, but for ssh only

    - by Icapan
    I need to access some Linux server behind NAT (no ports forwarded), so I need to have something like "phone home" like Teamviewer has. There is no GUI, but somebody can log in through SSH and dictate a password if it is changing (like Teamviewer). SSH (port 22) is enough (I can tunnel ports through SSH if I need). Any suggestions? How safe is it?

    Read the article

  • Are Time Machine backups secure?

    - by Leandro Ardissone
    I have my Time Machine backups on an external disk (WD My Passport with no hardware encryption) and I'm worried if the data stored on the disk is safe in case somebody steals it and connect it to any Mac/PC. Does any Mac can browse the Time Machine backups? Or are they encrypted in any way? If no, is there a way to improve security of the backups, should I buy a hardware encryption based HD? Thanks.

    Read the article

  • Data Execution Prevention in Windows Live Messenger

    - by Andrija
    I keep getting "Data Execution Prevention" error in Windows Live Messenger. I have noticed that this is happening usually when I leave computer to get coffee, and screensaver comes up, WLM breaks. Is there any way to prevent this error from happening? I see I can turn off this "Data Execution Prevention", but is that safe, since I know that WLM is under heavy attacks from spammers/hackers? Thanks

    Read the article

  • create assembly from network location

    - by mjw06d
    The error I'm receiving: CREATE ASSEMBLY failed because it could not open the physical file "\\<server>\<folder>\<assembly>.dll": 5(Access is denied.). TSQL: exec sp_configure 'clr enabled', 1 reconfigure go create assembly <assemblyname> from '\\<server>\<folder>\<assembly>.dll' with permission_set = safe How can I create an assembly from a unc path?

    Read the article

  • Oracle on windows cluster with online/offline IPs

    - by yzador
    I have a windows cluster (on windows 2008 server) with nodes in different subnets. So cluster has two IPs, one for each node (I'm talking not about node IP, but about cluster IP). One is online, the other is offline. Is it possible to run Oracle Fail Safe on this configuration? I've tried to install it, but it gives me the following error when trying to verify group or add database to group: FS-10220: Network name maps to IP address in the cluster resource but maps to IP address on the system

    Read the article

  • What is a good software development plan?

    - by Totophil
    Whilst browsing through answers on SO I came across something that is, in my view, one of the more frequent software development management misconceptions: "[software development] plan is a reasonably detailed description of all the activities you need to undertake". Hence the question: what is good software development plan? Can it be boiled down just to a work breakdown structure; is WBS the single most important thing for a software development plan anyway?

    Read the article

  • Install McAfee And Nod32

    - by hosseinsinohe
    Hi All I have a computer with windows XP service pack 3 as an operating system.This computer is in a network with McAfee update server.This server will install and update McAfee client in all computers in that network.When I install and running 'Eset Nod32 Smart Security (AntiVirus)',computer is getting hanged. (Not works in Safe Mode). How can I install both Nod32 and McAfee on this network ?

    Read the article

  • Standby Internet connection by means of 3G Modem if Internet Fails

    - by Sarah Boss
    In my office I have 4 computers connected to the Internet with a DIR-615 Wireless N 300 router which gives Internet to all pc's via Ethernet cable. But sometimes this Internet goes off and I have to call the ISP and it takes them 2 days to repair it. I wanted to know if in such cases, can I connect my two zte 3g usb modems to this DIR-615 Wirless N300 router and get emergency Internet in my office? What other steps are required to set up this fail-safe connection?

    Read the article

  • How to share information across controllers?

    - by Steffen
    Hi everybody, I recently started programming my first Cocoa app. I have ran into a problem i hope you can help me with. I have a MainController who controls the user browsing his computer and sets some textfield = the chosen folder. I need to retrieve that chosen folder in my AnalyzeController in order to do some work. How do i pass the textfield objectValue from the MainController to the AnalyzeController? Thanks

    Read the article

< Previous Page | 66 67 68 69 70 71 72 73 74 75 76 77  | Next Page >