Search Results

Search found 17953 results on 719 pages for 'someone someoneelse'.

Page 83/719 | < Previous Page | 79 80 81 82 83 84 85 86 87 88 89 90  | Next Page >

  • Microsoft Excel 2010

    - by Bruce
    I've one "master" sheet in the Excel 2010 file with all my outstanding orders detail and also reflecting how many days the orders have been outstanding. I've 4 other sheets, I'd like to extract the orders from the "master" sheet to to each of these sheets grouping them into these criteria. The 4 sheets need to reflect as follows <60 Days 60 Days <90 Days 90 Days <120 Days 120 Days Can someone assist?

    Read the article

  • Using PhysX on a Radeon GPU?

    - by davr
    Is it possible to get PhysX to run on a Radeon GPU? I've seen various posts on forums claiming someone has found a way, but I was unable to locate any actual guides or software downloads to do it. Note: I don't mean running a GeForce and Radeon GPU in the same machine, I mean having only a Radeon GPU and having it run PhysX.

    Read the article

  • AMD Opteron BSOD - A clock interrupt was not received on a secondary processor within the allocatio

    - by laurens
    On one of our servers we got an -for me new- BSOD with the error message: "A clock interrupt was not received on a secondary processor within the allocation time interval" The server's specs: HP XW9400 2x Dual-Core AMD Opeteron 2224 SE 3,20Ghz (4CPUs) 16GB HP ECC RAM Windows 2008 R2 Enterprise 64bit Nvidia Quadro 4xxx graphics (?) Sounds familiar to someone ? Thanks in advance

    Read the article

  • structure of ethernet frame (tcp/udp) [closed]

    - by rtmrtm2
    How is an ethernet-frame structured. is it: |MAC | |_______________| | |IP | | |___________| | |TCP | | |_______| | |HTTP| |__________|____| or the other way around? so in words: is the mac wrapped around the ip wrapped around the tcp wrapped arround the http? can someone post an image of the specific 'wrapping'? thanks in advance. regards, rtmrtm2

    Read the article

  • Email delivery error

    - by Tim
    I sent an email, but immediately got a reply saying: Final-Recipient: rfc822;[email protected] Action: failed Status: 5.0.0 (permanent failure) Diagnostic-Code: smtp; 5.1.2 - Bad destination host 'DNS Hard Error looking up smtpint.xxx.edu (MX): NXDomain' (delivery attempts: 0) I was wondering what this error report means, where in the delivery route the error happened, who should be contacted to solve this issue and how to solve it? Thanks and regards! I also appreciate if someone can explain a bit more about the mechanism behind the email delivery.

    Read the article

  • Access to Windows 7 log from a remote machine

    - by robob
    I'm trying to access with EventViewer (from a Windows XP Prof) to a remote machine with Windows 7 (Seven). Before I started the Service "RemoteRegistry" I received an "Access Denied". After started the service I can connet to the machine Log (in EventViewer app) but when i clik on any log as "Application" or "Security" I receive a "privilege" error. Could someone help me, please?

    Read the article

  • Apache LDAP authentication (mod_auth_ldap) on MacOS Server (10.5)

    - by Ursid
    A - Is there a LDAP authentication module (mod_auth_ldap) for the version of Apache that comes built into MacOS Server 10.5? (I'm pretty sure no, but maybe someone compiled one.) B - If not, can it be compiled into MacOS' version of Apache? (Man, that would be nice.) 3 - If I can't use the Apple version of Apache for this, what is the best way to get Apache LDAP authentication working on MacOS Server 10.5? (Preferably one that works with MacOS Servers management software)

    Read the article

  • Installing windows 8 on windows 7

    - by ZainShah120
    I had windows 7 installed on my Laptop,I installed windows 8 on it, without formatting the System Drive,Therefore now I can see two folders windows.old and Windows,The windows folder contain my new Windows 8, IS there any way that I can go back to Window 7? without formatting, This question is not programming related but I hope I can find some good answers here, If someone think that it is not fruitful, please comment on it, and I will delete that instead of down vote.. Looking forward to hear from you Thanks

    Read the article

  • Sonicwall 3500 (Creating VLANS for usage of multiple SSID)

    - by Thomas Chia
    I have an issue here. Here is my setup: X0 - STAFF network | X2 - AGENT network | X4 - Wireless AP (for multiple SSID) Okay, basically I'm going to set up the wireless AP to be broadcasting 2 SSID, STAFF-WIFI and AGENT WIFI. When connected to STAFF-WIFI, the users will be connected to the STAFF network, while connected to the AGENT WIFI, the users will be connected to the AGENT network. Can someone explain in details how to go about setting up this configuration? Thanks!

    Read the article

  • Portable voice recorder

    - by Quintin Par
    Where should I look for if I need a good voice recorder? Can someone point me to good reviews? I remember seeing this Olymbus model sometime back, but not sure if it’s the best. Also it seem be to be a bit pricy... Should not be expensive USB Really good battery power Bluetooth Small size English Translator

    Read the article

  • What software will run the new Windows 8 in virtualization under OS X?

    - by bmike
    I've read a lot about the new Windows OS, but would like to run it first hand. I've got several Macs with Mountain Lion (10.8) and presume I can use this evaluation license to test the OS for my consulting company. What else do I need to run Windows 8 in virtualization (as I'd rather not mess with BootCamp for several reasons)? Any other gotchas from someone who has gone down this path would be appreciated as well.

    Read the article

  • How to make a 100% UNIQUE dvd? [closed]

    - by sajawikio
    Is it possible to make a DVD which would be next to impossible to replicate exactly even with special equipment? To be clear, not in the sense of making the data itself resistant to piracy - nothing like that. More like as an analogy to antiques - a reproduction of a furniture would be able to be spotted to a trained eye, that it is not the original. Is it possible to do this for a dvd? Like, say a dvd is copied, even by someone who is trying to use even special equipment and is hypothetically dying to copy the dvd exactly for whatever reason - even such copied dvd would be detectable that it is not exactly the original dvd somehow (as if it were a reproduction of an original antique, but not the original), and would be almost or even preferably impossible to actually copy 100% exact the dvd ever again. Just some ideas below on the sort of thing i might go about doing to do this, but really am not sure how or what programs, media, hardware, etc. would do the trick Not sure what would do the trick -- but for instance do there exist any blank dvd's that already come pre-recorded with some sort of serial number or bar code, or other metadata, or an encrypted hash, or something like that? Maybe any blank dvd will do but i should get a special software to extract hardcoded metadata? If so which software? Or special hardware even maybe? Such dvd which the "secret" can be: Well, to know what the "secret" is and if it is present on the disk, it probably should be readable by some software or maybe a particular hardware (i guess preferably only if some sort of key is known and input into the software, even better, only then such secret data on disk can be read, otherwise nothing shows up and it looks like just a regular disk with no secret on it), and Would be impossible to actually replicate, especially not with regular burning hardware and preferably not at all. Other idea: Is there any special software that can direct the write head of laser to physically "mar" the dvd in such a way that, when played in dvd player, makes a particular visual pattern or something like that, also say the mar itself shows up as faint scratch on disk, but would be impossible for someone to do themselves exactly? EDIT: Also to clarify suppose the dvd contains video and music that should be playable on dvd players, maybe a menu too (i.e not a dvd containing software), and also to clarify the question is about how to make dvd 100% unique, not how to make the actual content of dvd protected from "piracy".

    Read the article

  • How do I disable location services system wide?

    - by Daisetsu
    Google has an API which can determine someone's location based on the wifi router names which a user's computer can see. You will see this if you go to google maps and your browser may ask if you would like to share location data. I am wondering if there is any way to disable this on a system wide setting rather than just in each browser (Chrome can do this too). Is there any way I can limit which applications have a list of the wireless routers I can see?

    Read the article

  • network endpoint accessible via hostname only, not address?

    - by Dustin Getz
    someone told me that this piece of network hardware (NAS) has a security setting such that it can only be accessed by hostname, not by IP address. I don't understand, as I thought DNS resolved the hostname to an address on the connecting client's side, then at protocol level always used the raw address, so how can this 'security' measure be possible?

    Read the article

  • pdf printer in wine ?

    - by Arkapravo
    I wish to convert (print) my MS Word files to pdf on the fly ! I am on Ubuntu 9.10 and using Wine 1.1.40. Can someone help ? I have heard that pdf printer can be installed using Wine Cups ! Thanks !

    Read the article

  • Best practices for SQL Server audit trail

    - by Ducain
    I'm facing a situation today where it would be very beneficial to me and my company if we knew who had logged into SQL and performed some deletions. We have a situation where at least 2 (sometimes 3) people login to SQL using SQL Server Management Studio, and perform various functions. What we need is an audit trail. If someone deletes records (mistakenly or otherwise), I'd like to know what was done. Is there any way to make this happen?

    Read the article

  • Dell inspiron 1525 laptop won't boot up.

    - by Becca
    It comes to a page called "Dell Media Direct" and then loads another page where it says "A problem has been detected and windpws has been shut down to prevent damage to your computer." then it has a bunch of info about why it may be the cause. can someone please help?

    Read the article

  • Outlook 2010 keeps losing the search index for emails

    - by Igor K
    Hoping someone can help here, this is driving me insane. Outlook 2010 keeps losing the search index so when I search for an email it has the yellow bar saying: search results may be incomplete because items are still being indexed Clicking on the bar says eg: 49200 items remaining to be indexed If it makes any difference, this is an IMAP account. If I leave Outlook open all day it will eventually index everything. But then say a week/month later it happens all again.

    Read the article

  • How to connect to the guest console via SSH without being admin on host?

    - by Sorin Sbarnea
    How can someone connect to a VM console via SSH, without being an admin on VM-host. This means that you should be able to see the guest boot screen and grub menu in a ssh session. That's important because in some cases you may need to fix the VM without having access to the VM-host admin console. Mainly this is about how you can have your own VM-guest which you can fully control but without having access to VM-host.

    Read the article

< Previous Page | 79 80 81 82 83 84 85 86 87 88 89 90  | Next Page >