Search Results

Search found 5462 results on 219 pages for 'continue'.

Page 78/219 | < Previous Page | 74 75 76 77 78 79 80 81 82 83 84 85  | Next Page >

  • face book security problem

    - by SHAN
    *- Please review recent activity on your Facebook account "Your account was recently accessed from a location we're not familiar with. For your protection, please review your recent activity to make sure no one is using your Facebook account without permission. Reviewing your activity takes just a few moments. We'll start by asking you a couple of questions to confirm that this is your account. (If we recognize your computer, you'll be able to skip this step.)" WHEN I TRY TO LOG MY FACE BOOK PROFILE;ABOVE MESSAGE DISPLAYING....WHAT IS A REASON FOUR THIS MATTER? AND AFTER I CLICKED CONTINUE BUTTON SHOW SOME 4TO MY FB FRIENDS BUT I EXACTLY CANT RECOGNIZE THESE 4TOES.. BECAUSE OF THAT I CANT LOG MY FB PROFILE.NOW HOW I LOG TO MY FB PROFILE...?? PLZ HELP ME SOLVE THIS PROBLEM...!!

    Read the article

  • Browser not parsing PAC file properly?

    - by mfinni
    I have a long PAC file. The browser(s) (IE and Chrome) are configured to use it and it generally does what it says on the tin. I have a domain that continues to go through the proxy although it should be going direct. // Match specific hosts and IPs entered as hosts if (buncha stuff || shExpMatch(host,"(*.newmarketinc.com)") || shExpMatch(host,"(newmarketinc.com)") || buncha stuff ) return "DIRECT"; Pactester shows that anything in the domain should be direct. h:\pacparser\pactester.exe -p h:\pacfile -u http://daas.newmarketinc.com DIRECT But we continue to pass traffic to hosts in this domain via the proxy. Wireshark and Fiddler both show this. How do i figure out how my browser has gotten brain-damage? Traffic to other sites in this stanza does properly go direct, as confirmed by Fiddler and Wireshark.

    Read the article

  • User accounts in FTP

    - by Brad
    I have an FTP server(proftpd on debian) that I'm going to allow a couple friends access to, and I want some safety nets in place, just in case. These are some of the things I'd like to do: Jail the accounts to their home directories and impose a cap on the amount of data they can upload Allow them access to a shared folder(via symlink or something) where they have full access(Also with a storage cap, but larger) Allow my own account full access to the system(Using groups I guess) Not allow anonymous access, or allow it with its own folder, separate from the shared user folder Currently, I've got the accounts set up and jailed, but it seems like the symlink that I put in is not allowing them to visit the shared folder. I suppose this has to do with them not having read permissions anywhere but their own home directories, or maybe it's something else, I'll continue to look into it and provide any information that is requested. Is what I'm trying to do possible? Any tips or resources that you can share are appreciated. Thanks.

    Read the article

  • Compiz shutdown hook?

    - by ???
    I want to check 10+ local Git repositories if they have any unpushed commit, before shutdown. (I always forgot to push them, so later, the next morning I came office and back home again) I think maybe the shutdown process can check some conditions to meet, if any condition is not met, then give the user the choice to continue to shutdown or just cancel. Then, I can write something to hook the shutdown to check my Git repository to push. EDIT I have changed the title from Ubuntu shutdown hook to Compiz shutdown hook. I want to hook to the small lovely shutdown button, rather then click another ugly shortcut icon on the desktop.

    Read the article

  • Is there anything that can be done to make X forwarding over LAN less painful?

    - by Earlz
    I have two *nix machines that I like to remotely do graphical things sometimes with. One of those machines is my Arch Linux media server, and another is my OpenBSD router/general server. My current task was installing a Windows XP over virtual box on my media server. I preferred to do the installation from my main workstation so that I could continue to watch TV from my media server on it's "actual" display. I soon noticed that X forwarding is quite painful though, even over low-latency LAN connections. Are there any settings I can tweak to make it a bit less painfully slow, jittery, and laggy? My LAN is rather small, 100Mbit, and ping times to the other box average at about 0.15ms. Also, I know Virtualbox has a VNC mode it can use instead of doing X forwarding, but this particular task was just an example

    Read the article

  • Unable to install Kaspersky anti virus 2011 on XP

    - by Guruprasad
    I recently tried installing Kaspersky antivirus 2011 on my XP (service pack 2) . Everytime I try to install through setup file, it initiates and then I get a pop up message saying Windows XP not compatible ( Sorry could no get the complete error message ) there is also options which come up saying "continue anyway" but it wont allow to click as the system gets hung . I also tried to skip from incompatible software by following the instructions on Kaspersky's website by creating a short cut to setup file and modifying the target field in it but still I get the same message. It also asks me to reboot before I install but it is still the same . Does this mean that I wont be able to install this antivirus software on my machine ? I also wrote to the Kaspersky support but seems they will take ages to reply.

    Read the article

  • Laptop freezes on Wireless Mouse Adapter attach/detach

    - by Sergiy Byelozyorov
    I am using Microsoft Wireless Notebook Optical Mouse 3000 with Toshiba Satellite Pro P300-1CG. Recently I have installed Windows 7 64-bit. Now once in a while when I plug-in or plug-out wireless mouse adapter, the computer freezes (image stays on the screen, but the computer is not responsive). I have noticed that it mostly happens after I recover my computer from sleep mode. To continue using laptop I have to shut it down by pressing and holding power button for 7 seconds and then booting it up again. What can be done to prevent this?

    Read the article

  • Empty track in Windows Media Player 12 that can't be deleted

    - by David Brown
    Right after I installed a fresh copy of Windows 7, I synced with my DropBox account that contains all of my music and added the directory to Windows Media Player 12. I now have a strange track that really isn't a track at all. It's grouped under "Unknown Artist" and has absolutely no text. The only reason I know it's there is because it highlights on mouse-over. Double-clicking on it does nothing. When the song before it ends, Windows Media Player stops playing altogether until I choose a different song (it should continue to play the next song on its own). When I try to delete this mysterious track, nothing happens. I've cleared my library and re-imported everything, but this empty track keeps appearing. I have also checked my Music directory and there is no empty MP3. What is going on here?

    Read the article

  • 2nd/3rd version of wireless network appears

    - by neildeadman
    I replaced an old SpeedTouch ADSL router with a Netgear DG384 that I have and whilst doing so decided to change the wireless password. For this question assume my wireless network SSID is DeddersHome. On my netbook and macbook pro (running Win7) it won't connect to the Internet. When I hover over the tray icon for wireless it says "DeddersHome 2" and "DeddersHome 3" have no internet connection. What are these additional wireless networks? I can't see them in the wireless network list on any wireless device I have. Wired connections and wireless through my iPhone work fine. I saw this before with the SpeedTouch, but it just went away!! I also have one Apple AirPort Express connected to the wireless network which my Xbox is connected to (wired). This all worked before... I am going to remove AirPort to see if it is this causing the problem, but thought I'd ask the question to give it time for an answer whilst I continue to search. Cheers

    Read the article

  • Win 7 Explorer backup and long paths

    - by user53299
    I use Explorer to do backups because Win 7's backup program asks me to take backups previously done and to put them back in the drive. I am opposed to that idea since I believe backups should remain in storage. With Explorer backups (burn and burn to disc) I have encountered the "destination path too long" error message and it shows the name of a folder "Debug" three times. I have hundreds of folders named "Debug" thanks to Visual Studio. At this moment I'm too angry at Microsoft to write a program to determine my 3 longest paths. (Aside: This is all after coincidentally reading two articles about path junctions earlier this evening which already made me kind of unhappy.) Please, is there an easy way to continue to make backups with Explorer? Edit: I should add that renaming paths wrecks Visual Studio projects so I really need to isolate the small number of problem paths or find a cleaner solution.

    Read the article

  • How do I either use DNS forwarding or aliasing to display a specific domain?

    - by PeanutsMonkey
    We have a domain abc.com from which a particular page will display the contents from the domain def.com which does not belong to us. Now rather than display def.com in the address bar in the browser, we would like to continue using abc.com. We would like to achieve it without using iframes or screen scraping. Is there a way to achieve what we are after using DNS forwarding or aliasing? If so how? We have a choice of using Microsoft's DNS server or BIND.

    Read the article

  • What's the utility of the return command in autohotkey?

    - by Shashank Sawant
    In the instances where the return command returns a value, the utility is obvious. I have seen the return command being used even when it is seemingly unnecessary. Let me show the following examples: Example 1: Loop { if a_index > 25 break ; Terminate the loop if a_index < 20 continue ; Skip the below and start a new iteration MsgBox, a_index = %a_index% ; This will display only the numbers 20 through 25 } Example 2: IfWinExist, Untitled - Notepad { WinActivate ; Automatically uses the window found above. return } Why is the return command used in Example 2 but is not used in Example 1? Both examples are copy-pasted/modified-pasted from the autohotkey.com's documentation.

    Read the article

  • what constitutes out-of-band access to a server?

    - by broiyan
    The first time I access my server with a new installation of Filezilla or Putty, I will get prompted that I should continue only if the RSA key shown to me is correct. The cloud provider has advice on their website that I ought to use their AJAX console to get a key out-of-band with which to compare to the one shown by Filezilla. The AJAX console is launched from a link on the cloud provider's website which requires a login. Exactly how is this AJAX console considered to be out-of-band when it obviously is not a form of physical access to the server?

    Read the article

  • Authentication Order with SSH

    - by Oz123
    i am still have troubles mastering sshd - when I login with -v I see that ssh is authenticating the following way debug1: Authentications that can continue: publickey,gssapi-with-mic,password,hostbased I would like to change the order ... any idea how ? My bigger problem is that user with locked accounts, can still login via public-keys. I have found that I could add the user to a group "ssh-locked" add deny that group from sshing, but I am still wondering if there is a way to tell ssh'd : Please check password before keys ... Thanks, Oz

    Read the article

  • Tools for analyzing performance of SQL Server/Express?

    - by Adam Crossland
    The application that I have customized and continue to support for my client is seeing dramatic performance problems in the field. Simple queries on rather small datasets take over a minute when I would expect them to complete with sub-second times. My current theory is that SQL Server Express 2005 is too limited for the rather non-trivial demands being made of it, but I am not sure how to get about gathering data that I can use to either prove my point or allow me to move on to finding another cause. Can anyone point me toward some tools that would allow me to analyze the load on this database? Information such as simultaneous connections, execution times of individual queries, memory usage, heck just any profiling data at all would be a help. Many thanks.

    Read the article

  • How to change the amount of RAM displayed in System Properties

    - by Nicu Zecheru
    I have this product that requires at least 1 GB Physical Memory in order to be installed. On my XP Pro machine I have 1 GB of RAM but in System Properties only 0.99 GB of RAM is displayed. The problem is that the product installer checks the memory displayed in System Properties (just a guess, not sure) and cannot continue the setup because it sees only 0.99 GB. Is there any way to change the displayed memory in the System Properties? Or how can I trick the installer to skip the memory check? Thanks.

    Read the article

  • Skype account migration / username change

    - by Kristian Glass
    Some time ago now I created myself a Skype account. I've since amassed a number of contacts, and also realised that the username I chose really isn't one I wish to continue using, for a variety of reasons. Services like Twitter and GitHub offer username-change functionality; I can't find this in Skype. Am I missing something, or does it just not exist? If, as I suspect, it doesn't exist, is there anything I can do to migrate my contacts across to a new, more sensibly-named, account, or am I going to find myself having to manually publicise my account name change and adding contacts to the new account one-by-one?

    Read the article

  • Preventing SSH RSA host key warnings for change of key vs IP address

    - by Adam M-W
    I have a network with DHCP enabled, and also a computer that dual boots operating systems and has different SSH keys on each (and yes, I would like to keep different keys on each rather than copying the same identity/private key to each). Because the IP address does not change between operating systems because the MAC address is the same, when connecting to ssh, even when not using the IP address but the hostname via DNS/mDNS, I get the warning: Warning: the RSA host key for 'hostname' differs from the key for the IP address '192.168.1.172' Offending key for IP in /Users/user/.ssh/known_hosts:37 Matching host key in /Users/user/.ssh/known_hosts:38 Are you sure you want to continue connecting (yes/no)? How can I surpress the warning when the hostname differs from the IP address for that hostname, but retain the ability to check host keys are the same for each hostname? (each OS has a unique hostname)

    Read the article

  • Xdebug 2.0.5 with Zend Server CE PHP5.2.12 possible?

    - by notbrain
    I'm using Zend Server CE with PHP 5.2.12 on OSX Snow Leopard and want to use Xdebug. I've turned off Zend Data Cache, Zend Optimizer+, and Zend Debugger in the console. When I run $ cd ~/Downloads/xdebug-2.0.5 $ /usr/local/zend/bin/phpize I get Configuring for: PHP Api Version: 20041225 Zend Module Api No: 20060613 Zend Extension Api No: 220060519 The PHP API Version, 20041225, seems to be off from the documentation (aka wrong). When I continue installation with $ ./configure ---with-php-config=/usr/local/zend/bin/php-config $ make $ sudo make install The installed xdebug.so seems to be the wrong one. Which version of xdebug do I need for this PHP API version? The Zend API numbers are ok. I'm just confused at why the PHP API Version doesn't match. PHP Warning: PHP Startup: Unable to load dynamic library '/usr/local/zend/lib/php_extensions/xdebug.so' - (null) in Unknown on line 0 PHP 5.2.12 (cli) (built: Feb 17 2010 13:39:36)

    Read the article

  • Windows 7 upgrade advisor issue

    - by Groo
    I am preparing to migrate a pretty old XP machine to Windows 7. I ran the Windows 7 Upgrade Advisor and got a couple of smaller issues (low 512Mb RAM complaints and similar stuff). Apart from that, everything else was shown as compatible, including my old ATI Radeon 9550/X1050 card: ATI Radeon 9550/X1550 Series: This device is compatible with Windows 7. The thing that concerns me is that people around the web seem to be unable to actually find a Windows 7 driver for this card. Even the ATI web page states that this is a legacy device: If the user chooses to, they can install the ATI Catalyst Windows Vista graphics driver under Windows 7. [...] Using the ATI Catalyst Windows Vista driver under Windows 7 is not officially supported by AMD [...] Should I trust the Advisor and continue with the update? Does this mean Microsoft will provide at least a generic driver which will allow hardware acceleration with this card?

    Read the article

  • cygWin connect by SSH using RSA key; ssh.exe couldn't create /home/user/.ssh

    - by Kirzilla
    I'm using Win XP and I'm trying to connect by SSH to remote host using RSA key. I've investigated that cygWin recognizes Documents and Settings dir as home directory Z:\app\cwRsync\bin>cygpath -H /cygdrive/c/Documents and Settings I've created .ssh directory in Documents and Settings/user/.ssh and moved known_hosts, id_rsa, id_rsa.pub there. Now, I'm trying to connect via ssh.exe to remote host Z:\app\cwRsync\bin>ssh -p 22 [email protected] Could not create directory '/home/user/.ssh'. The authenticity of host '[remotehost.com]:22 ([remotehost.com]:22)' can't be established. RSA key fingerprint is f7:f4:2c:e0:c6:7e:d2:a4:45:70:63:df:bf:f2:84:46. Are you sure you want to continue connecting (yes/no)? What I'm doing wrong? Why ssh.exe couldn't create directory /home/user/.ssh? Thank you.

    Read the article

  • Cannot install new certificate in IIS 7 on Windows Server 2008 R2

    - by Alex B.
    We are trying to renew our existing web site certificate on our IIS 7 site under Windows Server 2008 R2, but we continue to get the "Access is denied" error that others have posted. However, when we have gone to implement the common fix of making sure the Administrator group has full access to all folders and subfolders on the C:\ProgramData\Microsoft\Crypto\RSA folder, we get an "Access is Denied" error on changing those permissions. Yes, we are logged in as Administrator user - it just seems to not allow us to modify the group permissions to this folder. Help! We need to renew our certificate before March 2011!

    Read the article

  • SSL Certificates, two-way authentication and loadbalancers

    - by 5arx
    We're looking to implement two-way authentication with client certificates for a privileged subset of our application users. The idea will be that if a certificate is detected the user will be asked for an additional password/PIN and that will be used to verify the certificate and user. Ordinary users will continue to authenticate themselves via the standard login mechanism. Our production environment (hosted by a well-known company) comprises load-balanced application servers and I'm unclear as to how this set-up will handle the certificates and I'm not certain if there are any pitfalls I should be aware of. I would very appreciate some thoughts, comments or real-world advice on the subject.

    Read the article

  • Check if current Command Prompt was launched as the Administrator

    - by Canadian Luke
    I am looking to write a script that takes user input, then makes system wide changes. I need this to be very generic, but simply put, at the top, I need it to check to see if it's being run 'As an Administrator'. If it's not, then I want to display a message to tell them that; if it is, I want it to continue on. Is there a constant way to verify this? I am not looking to start a new session as the Administrator, I just want to detect if it's currently run as admin

    Read the article

  • Can spell checking be disabled by default on OS X?

    - by Lri
    Is there some way I could disable continuous spell checking or other settings in the substitutions menu by default? System Preferences only has an option to disable autocorrect. defaults write -g CheckSpellingWhileTyping -bool false would be overridden by keys on the property lists of applications. This would only apply to applications that have been used before: #!/bin/bash for d in $(defaults domains | tr -d ,); do osascript -e "app id \"$d\"" > /dev/null 2>&1 [ $? == 1 ] && continue echo $d defaults write $d CheckSpellingWhileTyping -bool false defaults write $d SmartDashes -bool false defaults write $d SmartLinks -bool false defaults write $d SmartQuotes -bool false defaults write $d SmartCopyPaste -bool false defaults write $d TextReplacement -bool false done

    Read the article

< Previous Page | 74 75 76 77 78 79 80 81 82 83 84 85  | Next Page >