Search Results

Search found 9954 results on 399 pages for 'mean'.

Page 77/399 | < Previous Page | 73 74 75 76 77 78 79 80 81 82 83 84  | Next Page >

  • Postrouting rule in NAT table

    - by codingfreak
    Hi I have a strange question regarding NAT using iptables. When I do SNAT in a postrouting chain in NAT table at the end of the rule should I give -J ACCEPT? I see counters on the postrouting rule getting incremented but no packet leaving the machine. So does it mean the packet is DROPPED automatically?

    Read the article

  • Why is a network ID not needed to connect to an IP address?

    - by baddogai
    I know how IP basically works, and knows that an IP address composed of a network ID portion and a host ID portion, but when I type a IP address, say 8.8.8.8 into the web browser, I didn't supply any subnet mask information. So, how does the browser know where the dividing line is between the network ID and host ID? Since 8.8.8.8 may mean 8.8.8.8/8, 8.8.8.8/24 etc. In a nutshell, the IP address I supplied is ambiguous.

    Read the article

  • Why specifying keyboard layout?

    - by amyassin
    Most operating systems (if not all) asks about the keyboard layout during installation. Why do they need to know the layout? I mean, when pressing key, does the keyboard send a specific signal indicating what it represents (if so, why needing to specify the layout?) or it sends a signal indicating its position (the second raw, third key) and then the OS detects what key is that from the layout specified?

    Read the article

  • Unable to locate existing XP system partition during Windows 7 upgrade install.

    - by glenneroo
    I have Windows XP 32-bit installed on this computer. I just purchased a Windows 7 64-bit as an ISO download upgrade version which I promptly burned to DVD and attempted to perform an upgrade installation. Here is the error message I am getting: Firstly, where are these "Setup log files" located? Second, does this mean I need to find compatible (64-bit?) drivers for the Mainboard and put them on floppy?

    Read the article

  • X Error of failed request: BadMatch (invalid parameter attributes) ffmpeg error

    - by Evan Carroll
    I'm getting the following error message in ffmpeg: X Error of failed request: BadMatch (invalid parameter attributes) Major opcode of failed request: 140 (MIT-SHM) Minor opcode of failed request: 4 (X_ShmGetImage) Serial number of failed request: 11 Current serial number in output stream: 11 I turns up when I run the bash function mentioned in a forum post about streaming in Linux. What does it mean and how can I fix it?

    Read the article

  • Can I set up a different method of authentication on Nagios?

    - by cwd
    Nagios is a wonderful too for monitoring servers. Their web interface is not bad, either. However I am not crazy about using the HTTP Authentication that comes standard. Is there a way to use another method of authentication? (and I don't mean restricting access by IP address in the .htaccess file) Something with a form-based login would be wonderful, but perhaps there is no such thing. I'm hoping you guys have found something I haven't.

    Read the article

  • creating new application in IIS 7 can cause other applications running on same IIS to log out?

    - by mokokamello
    Hi Experts I am new to IIS 7 and i am running a 16 user Application Server i received complains from my colleagues that their application log out suddenly and not saving edits. i compared the time of complains and they match the time when i was trying to install a new asp.net application or modify an existing one (of course not the very one they complained from) does this make sense? i mean are these events (application crash and installing new application on IIS) related together. note that i did not restart IIS

    Read the article

  • Adjust Subtitles track

    - by CodingTales
    How do you adjust the subtitles track? I have a video and I downloaded the subtitles from somewhere. It is a few seconds after the video. I mean can you push the track a few seconds forward or pull it backward in either VLC or Windows Media Player?

    Read the article

  • Are there any issues with using an ATI 5870 on an nVidia motherboard?

    - by Liam
    I have an Alienware machine, so I'm not entirely sure on the make of motherboard, however, I do know it's got nforce on it and allows me to use nVidia cards in SLI. My 8800GTX has recently died and I'm looking to buy a replacement - I'm considering the ATI 5870, but what I want to know is, if I choose this card, does it mean I will need to change motherboard just to change graphics card vendor or does it not matter?

    Read the article

  • An device with an unknown MAC address is connected to my router

    - by Yar
    There is a computer that is not mine that is accessible on my network. I can even access its filesystem via AFP. What I want to know is how the computer could get on my network. My network is secured like this: Does that mean that they've used password cracking tools? The pass is not easy to guess but not hard to figure out via brute-force hacking, I guess. If I am being hacked, should I switch to WPA?

    Read the article

  • I keep getting a Java incoming connections pop up

    - by 1.21 gigawatts
    I keep getting the following message, "Do you want the application “java” to accept incoming network connections?" First of all, what application? Second, if it's part of the browser, which sometimes the browser isn't open, it doesn't show me what page is requesting it. "Application" is very generic. Third what does that mean? Is it asking if anyone on the internet can make connections to my computer?

    Read the article

  • How does /burnmemory=XXX boot.ini switch work?

    - by user371602
    I know what the /burnmemory switch does on Windows, but I'd like to understand what Windows is doing under the hood to support it. It's described on msdn as the "amount of memory, in megabytes, that Windows cannot use". Does this mean simply that the kernel does not allow user virtual memory mapping into this area? How is this accomplished in the kernel, and are there other restrictions that the kernel will make when burnmemory is set?

    Read the article

  • Ubuntu server users question

    - by Camran
    I have read this article: https://help.ubuntu.com/9.04/serverguide/C/user-management.html But it doesn't go into depth with the privileges section. I need to know how to set privileges of me (as a user). I am the only user, but I want access to everything, but I don't want to manage my VPS logged in as root. So I am creating a username. Anybody have a list of privileges, what they mean and how to set them? Thanks

    Read the article

  • Booting a virtual os on a physical environment

    - by Nrew
    Is there an application that allows you to add a virtualized version of your operating system into the mbr? By virtualized, I mean that if you boot this one, any changes made in it will not be committed to the disk. Just like how deepfreeze, returnil, and shadow user works. Is it possible to do that? Because the applications mentioned above requires you to reboot if you want that changes will not be retained.

    Read the article

  • Sql Server huge tables with no rows

    - by Mike Gates
    I have a Sql Server database that has a few tables with zero row count but take up a combined 10 GB of space. I can see this by doing right-click/properties on the tables in question (data space is huge, between 1 and 6 GB, and row count is zero on these tables). I have no clue what could be causing this as I would assume zero rows would mean nearly zero space taken. Any ideas?

    Read the article

  • An unknown Mac is connected to my router?

    - by Yar
    There is a computer that is not mine that is accessible on my network. I can even access its filesystem via AFP. What I want to know is how the computer could get on my network. My network is secured like this: Does that mean that they've used password cracking tools? The pass is not easy to guess but not hard to figure out via brute-force hacking, I guess. If I am being hacked, should I switch to WPA?

    Read the article

  • setting up static ip on linux

    - by user64908
    I understood the interface file in linux needs to be edited and the corresponding lines added. I don't understand what network and broadcast are for, it seems extra versus a windows static ip configuration. In my case my gateway is 192.168.5.1 and my machine ip is 192.168.5.101, what would be my network and broadcast address, is the below correct and what exactly do they mean? iface eth0 inet static address 192.168.5.101 gateway 192.168.5.1 netmask 255.255.255.0 network 192.168.5.0 broadcast 192.168.5.255

    Read the article

  • How (in terms of which parameters) is a "professional-grade" broadband connection different from a "consumer" one?

    - by odemarken
    By "professional" I mean here: The kind you can get at a datacenter for your server The kind you can get at an office that would be good enough for hosting web and mail server with low to medium traffic. (Please ignore other aspects of "the self-hosting problem" and focus only on broadband connection quality). Another way to frame this question would be "what parameters should office broadband have to compare to a datacenter-provided one for the purposes of self-hosting". The knowledge I have gathered so far is in answer format below.

    Read the article

< Previous Page | 73 74 75 76 77 78 79 80 81 82 83 84  | Next Page >