Search Results

Search found 34758 results on 1391 pages for 'linear linked list invert'.

Page 705/1391 | < Previous Page | 701 702 703 704 705 706 707 708 709 710 711 712  | Next Page >

  • Some keys not working under screen in vim

    - by Art
    When using vim under screen, some keys are not working. Namely, Pressing Alt-Left produces '3D' and Alt-Right produces '3C' Also, pressing Up/Down when scrolling list of files in Command-T plugin produces 'A' and 'B' respectively. When I exit the screen and run vim just under ssh session, all works fine. Are there any settings in screen itself or terminal server/client I can tweak to fix this issue?

    Read the article

  • laptops with 5.1 surround sound card for external use and not internal [closed]

    - by Jayapal Chandran
    I want to buy a laptop with 5.1 sound card from which i should be able to connect my external 5.1 speakers for example creative inspire 5.1 or similar creative model speakers. Is this option available. It should be and i want suggestions or a list of manufacturers with such option. My friend got one but he said it cannot be use with external speakers it is just built in 5.1 speakers. So i am asking this question.

    Read the article

  • Find rows that match multiple (two) criteria

    - by Scott Sanders
    I am trying to get a list of items that match on two criteria. DATE PRODUCT CHANNEL DEC 13 Cat Chow DRUG NOV 13 Pupperoni DRUG DEC 13 Meow Mix DRUG DEC 13 Jerky Treats DRUG This is the data from A1 to C5. I want all the product sold on DEC 13 and in the DRUG channel. This is the formula that I have now, which is only bringing back the first example. INDEX($B$2:$B$5, MATCH(1, ("DRUG"=$C$2:$C$5)*("DEC 13"=$A$2:$A$5), 0) )

    Read the article

  • What are the most common dangerous domains that I should block?

    - by Dalia
    I am trying to configure my wireless router to block domains that are potentially dangerous to privacy, security, and bandwidth-hogs. Is there a list of domains that I can block at the router level? On a machine level, I have set the hosts file from www.mvps.org and that works on my machine. However, I want to implement something at the router level too - so that all computers in my household are somewhat protected.

    Read the article

  • Data Sources (ODBC) hangs when trying to create a new database connection

    - by FredrikD
    When I try to create a new database connection, the Data Sources (ODBC) programs hangs or takes a very long time to find the list of available SQL Servers. This only happens when there are other computers on the network, when my machine (a standard Windows 7 laptop) is alone, it works just fine. My question is: What should I look for in terms of SQL server or ODBC configurations that will take away this random behaviour?

    Read the article

  • How to detect bots programatically

    - by Tom
    we have a situation where we log visits and visitors on page hits and bots are clogging up our database. We can't use captcha or other techniques like that because this is before we even ask for human input, basically we are logging page hits and we would like to only log page hits by humans. Is there a list of known bot IP out there? Does checking known bot user-agents work?

    Read the article

  • Command-line tool to disable IPv6 in 2K8R2?

    - by brianicus
    I'm in the process of deploying a bunch of Win2K8R2 VMs via vSphere's deployment template stuff, and in the deploy specification it allows you to punch a list of commands to run. Aside from activating Windows (which it doesn't do), it works pretty well. Does anyone know the command-line equivalent of going into a network adapter's properties and unchecking the IPv6 box? If I had that I could put that in the spec and not have to manually uncheck the IPv6 box.

    Read the article

  • How can I change my default Outlook account ?

    - by user596509
    I am trying to remove my current email account from outlook and add another one I clicked on toolsaccount settings then removed my current account(gmail account) from the list of emails Then I clicked on new and add my new account (hotmail account), but no messages loads from my new account and my old messages from the old email still there under personal folders! Then I click on tools account settings data files and found personal folder as a defult file I tryed to remove it but I cant then I tried to set my new account as default but it didnt work

    Read the article

  • Where can I request a new enhancement for Google Chrome?

    - by Oscar Reyes
    I have a request for enhancement for Google Chrome, but don't know where to place it. I checked http://code.google.com/p/chromium/issues/list but it seems to be only for bugs. I use the spelling check quite often, but I need to swap between english and spanish all the time according to the website. Since chrome can detect the webpage language, it would be great to have the spell check set to that language by default.

    Read the article

  • What is the usual procedure for working with remote Git repositories?

    - by James
    A slightly open question regarding best practices, I can find lots of functional guides for git but not much info about standard ordering of operations etc: Whats the standard/nice way of working with remote repositories, specifically for making a change and taking it all the way back to the remote master. Can someone provide a step-by-step list of procedures they normally follow when doing this. i.e. something like: 1) clone repo 2) create new local branch of head 3) make changes locally and commit to local branch 4) ...

    Read the article

  • Essential Business Server

    - by Dan
    We are trying to run the Preparation Wizard for Essential Business Server 2008 and receive the following error. "A list of servers could not be collected from Active Directory Domain Services (AD DS). Ensure that your network is functioning correctly and that this computer can access AD DS." Our network is an Windows Server 2003 network with all of the services running fine. I can't run this from either a machine or a server. Any idea where we should start?

    Read the article

  • Failure Scenarios in IP networks [closed]

    - by Karthik
    I am searching for a list of faults that may occur in a traditional IP network. To give you a better understanding of what I am looking for: For an MPLS-IP network the set of faults may be something as given in this cisco site. I want pointers to such kind of faults for a traditional IP network. Individual suggestions from you are welcome, but in doing so, please also provide a link to the official site from which you came with those failure scenarios.

    Read the article

  • Slideshow from excel file listing the caption, sound file and image file?

    - by Slabo
    Hello, I have excel files with the following header: Caption Sound: Location of sound file Image: Location of image file How can I make a slideshow from this? Each slide should show image, caption, and play sound automatically according to the excel list. I don't care what software I use, if I can get the job done. Total slides ~10,000. In case interested,this is review material for English second language students. Any help appreciated, Thanks

    Read the article

  • Filter file types on desktop

    - by Jonathan
    I've seen videos of things like 3D desktops and used things like Stardock's fences. But are there any programs that will allow me to have a filters like on the side of my desktop which I can click to only who certain file types. So like on the right of the desktop is a list of filetypes which have files on my desktop and I can click them and it will only shows files on my desktop (not in explorer windows) of that filetype.

    Read the article

  • Available shells in plesk

    - by jr0d
    Does anyone know where plesk pulls its list of available shells under the domain setup page? I am on a box which is missing /bin/bash (chroot), though the majority of the system users on the machine have the shell: /usr/local/psa/bin/chrootsh On a redhat/centos machine, chrootsh is provided by the base psa package. I have also checked that chrootsh is specified in /etc/shells. I have poked around the psa database, but have not been able to ascertain where the drop down box is populated from.

    Read the article

  • What does a green colored file name mean? [duplicate]

    - by user178744
    This question already has an answer here: What do green folders mean in Windows 7 Explorer? 2 answers I downloaded a .zip file the other day and extracted it using 7zip from my desktop to my laptop over my home network, when it finished, its filename and the filename of its contents was green. What does this mean, can i revert it to normal, has anything been modified and is there a list somewhere of color codes for windows file names.. ? (I can recall seeing blue somewhere before).

    Read the article

  • 'Save as' dialogue box in Vista/Win7

    - by DrZaiusApeLord
    Is there a way to get this box to list the local and network drives first instead of listing favorites and libraries first? I have a user who claims this is how this box was until fairly recently but I have not made any changes nor pushed out any big updates. Now that he mentions it, its starting to bug me too. Thanks.

    Read the article

  • Is there a find and replace application with multiple rules?

    - by Joe
    I'm looking for a search and replace tool that takes a list of rules and either a file (or directory) and runs those rules on the files. I have a bunch of different things that need to be changed in many files, and I'd like to be able to run all the rules in one shot. I was hoping I could put the rules separate file, and use the same set of rules over and over again. Does such a tool exist?

    Read the article

  • Serving protected files using Nginx's X-Accel-Redirect header

    - by andybak
    I'm trying to serve protected files using this directive in my nginx.conf: location /secure/ { internal; alias /home/ldr/webapps/nginx/app/secure/; } I'm passing in paths in the form: "/myfile.doc" and the file's path would be: /home/ldr/webapps/nginx/app/secure/myfile.doc I just get 404's when I access "http: //myserver/secure/myfile.doc" (space inserted after http to stop ServerFault converting it to a link) I've tried taking the trailing / off the location directive and that makes no difference. Two questions: How do I fix it! How can I debug problems like this myself? How can I get Nginx to report which path it's looking for? error.log shows nothing and access.log just tells me which url is being requested - this is the bit I already know! It's no fun trying things randomly without any feedback. Here's my entire nginx.conf: daemon off; worker_processes 2; events { worker_connections 1024; } http { include mime.types; default_type application/octet-stream; server { listen 21534; server_name my.server.com; client_max_body_size 5m; location /media/ { alias /home/ldr/webapps/nginx/app/media/; } location / { proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; fastcgi_pass unix:/home/ldr/webapps/nginx/app/myproject/django.sock; fastcgi_pass_header Authorization; fastcgi_hide_header X-Accel-Redirect; fastcgi_hide_header X-Sendfile; fastcgi_intercept_errors off; include fastcgi_params; } location /secure { internal; alias /home/ldr/webapps/nginx/app/secure/; } } } EDIT: I'm trying some of the suggestions here So I've tried: location /secure/ { internal; alias /home/ldr/webapps/nginx/app/; } both with and without the trailing slash on location. I've also tried moving this block before the "location /" directive. The page I linked to has ^~ after 'location' giving: location ^~ /secure/ { ...etc... Not sure what that signifies but it didn't work either!

    Read the article

  • Improve backup performance by watching files added/modified in given directories?

    - by OverTheRainbow
    I use SyncbackSE on Windows to back up files between two hard drives daily. Every time the application starts, it scans every single file in the directories that it watches before copying files that were added or modified. To improve performance, I was wondering if there were a Windows backup application that would hook into Windows to keep tracks of files that were added/modified in given directories, so that it only needs to go through this list when it comes time for a backup. Thank you.

    Read the article

  • Is the guideline: don't open email attachments or execute downloads or run plug-ins (Flash, Java) from untrusted sites enough to avert infection?

    - by therobyouknow
    I'd like to know if the following is enough to avert malware as I feel that the press and other advisory resources aren't always precisely clear on all the methods as to how PCs get infected. To my mind, the key step to getting infected is a conscious choice by the user to run an executable attachment from an email or download, but also viewing content that requires a plug-in (Flash, Java or something else). This conscious step breaks down into the following possibilities: don't open email attachments: certainly agree with this. But lets try to be clear: email comes in 2 parts -the text and the attachment. Just reading the email should not be risky, right? But opening (i.e. running) email attachments IS risky (malware can be present in the attachment) don't execute downloads (e.g. from sites linked from in suspect emails or otherwise): again certainly agree with this (malware can be present in the executable). Usually the user has to voluntary click to download, or at least click to run the executable. Question: has there ever been a case where a user has visited a site and a download has completed on its own and run on its own? don't run content requiring plug-ins: certainly agree: malware can be present in the executable. I vaguely recall cases with Flash but know of the Java-based vulnerabilities much better. Now, is the above enough? Note that I'm much more cautious than this. What I'm concerned about is that the media is not always very clear about how the malware infection occurs. They talk of "booby-trapped sites", "browser attacks" - HOW exactly? I'd presume the other threat would be malevolent use of Javascript to make an executable run on the user's machine. Would I be right and are there details I can read up on about this. Generally I like Javascript as a developer, please note. An accepted answer would fill in any holes I've missed here so we have a complete general view of what the threats are (even though the actual specific details of new threats vary, but the general vectors are known).

    Read the article

< Previous Page | 701 702 703 704 705 706 707 708 709 710 711 712  | Next Page >