Search Results

Search found 7338 results on 294 pages for 'useful'.

Page 125/294 | < Previous Page | 121 122 123 124 125 126 127 128 129 130 131 132  | Next Page >

  • Exchange 2003 HTTP Account Error

    - by Ryaner
    We are trying to get one of our users connected to our Exchange 2003 server using the HTTP method as they already have an existing Exchange account on another server. The setup goes through and they appear to get connected fine however none of the subfolders are listed. Instead we get one folder of "Error-Pls file a Bug". The usual Google search just throws up nothing useful. Does anyone know how to fix this? Or has anyone actually gotten Outlook (2003 or 2007) to connect to an Exchange 2003 server?

    Read the article

  • "sh: /usr/sbin/xenstored: not found" - But it's there?

    - by Matt H
    What would cause running the file /usr/sbin/xenstored to print sh: /usr/sbin/xenstored: not found However, the file /usr/sbin/xenstored is there and is not a symbolic link. Actually I should be running this as root. That prints a similarly odd message. sudo: unable to execute /usr/sbin/xenstored: No such file or directory By the way, xenstored is not a script, it's an ELF executable. My guess is that it's because I haven't gotten all the dependent libraries installed. However, I would expect it to say something like this: ./xenstored: error while loading shared libraries: libxenctrl.so.4.0: cannot open shared object file: No such file or directory Which is true of running xenstored on a system that doesn't have all the required libraries. Why do I get "not found" vs the much more useful "cannot open shared object file"?

    Read the article

  • What is a good tool to scan a FTP directory and show disk usage visually ala KDirStat/WinDirStat?

    - by Wesley 'Nonapeptide'
    Is there a tool that can scan an FTP directory and build a visual representation of disk usage? I'm running on Windows so that platform is my preference for this tool, but a *NIX tool would also be useful. I'm thinking along the lines of WinDirStat, KDirStat and TreeSize. At first I thought WinDirStat might be able to scan an FTP directory, but it was not so. FOSS is a plus, but not a requirement (I'm not against paying for good software). I'd like to also have a simple report on how many of what types of files are present, largest files, etc. Much like the simple file type reporting in *DirStat.

    Read the article

  • How to prove that an email has been sent?

    - by bguiz
    Hi, I have a dispute on my hands in which the other party (landlord's real estate agent) dishonestly claims to not have received an email that I truly did send. My questions is, what are the ways to prove that the email was indeed sent? Thus far, the methods that I have already thought of are: Screenshot of the mail in the outbox Forwarding a copy of the original email I am aware of other things like HTTP/ SMTP headers etc that would exist as well. Are these useful for my purposes, and if so how do I extract these? The email in question was sent using Yahoo webmail ( http://au.mail.yahoo.com/ ). Edit: I am not seeking legal advice here, just technical advice as to how to gather this information.

    Read the article

  • My computer resets when i try to install Windows 7 (USB/DVD)

    - by Ranhiru
    I had a troublesome software starting up when Windows 7 was starting and i had no way to remove it because i couldn't log in to Windows. Not even safe mode. But i used Hiren's Boot CD to edit the registry to stop that software from starting up... But my efforts were not useful as Windows kept on going to an ultimate freeze just before the login screen should have been shown. And just freezes and I cannot do anything. So i decided heck with it and i now want to format the disk and reinstall a fresh copy of Windows 7. But now regardless of USB or DVD i use to boot the setup, it loads fine till you see the animating Windows and it just resets the laptop! Just plain resets! Hiren's Boot CD and Mini XP, strange enough but still works :( Any ideas what might be causing the laptop to reset in Windows 7 setup?

    Read the article

  • Conditional blocks of code in linux bash

    - by Arek
    Nearly everybody knows very useful && and || operators, for example: rm myf && echo "File is removed successfully" || echo "File is not removed" I've got a question: how to put a block of commands after && or || operators without using the function? For example I want to do: rm myf && \ echo "File is removed successfully" \ echo "another command executed when rm was successful" || \ echo "File is not removed" \ echo "another command executed when rm was NOT successful" What is the proper syntax of that script?

    Read the article

  • Netbeans: Install/Activate/Uninstall/Deactivate plugins buttons disabled

    - by Josh
    I recently installed Netbeans 6.9 on a new computer. I went to install the NB Android plugin, which I have on another computer, but I found most of the functionality of the plugins window disabled. The install, uninstall, activate, and deactivate buttons are grayed out. I have included images at the bottom. This hasn't happened to me before, and searching Google hasn't turned up anything useful. I thought it might have been a permission problem so I tried running Netbeans with gksudo but that didn't help. I also thought it might have been something wonky with the Ubuntu Software Center install, so I uninstalled that one, and downloaded Netbeans from the main site and I installed it in my home directory, but it does the same thing. I'm running Xubuntu 10.10 and Netbeans 6.9.1 Available Plugins Tab It won't let me add more than one hyperlink due to a lack of reputation. Installed Tab - http + i.imgur.com/Nhqi4.png

    Read the article

  • How to analyse logs after the site was hacked

    - by Vasiliy Toporov
    One of our web-projects was hacked. Malefactor changed some template files in project and 1 core file of the web-framework (it's one of the famous php-frameworks). We found all corrupted files by git and reverted them. So now I need to find the weak point. With high probability we can say, that it's not the ftp or ssh password abduction. The support specialist of hosting provider (after logs analysis) said that it was the security hole in our code. My questions: 1) What tools should I use, to review access and error logs of Apache? (Our server distro is Debian). 2) Can you write tips of suspicious lines detection in logs? Maybe tutorials or primers of some useful regexps or techniques? 3) How to separate "normal user behavior" from suspicious in logs. 4) Is there any way to preventing attacks in Apache? Thanks for your help.

    Read the article

  • How do you map a solo press of a modifier key to its own function or mapping on Windows?

    - by Conrad.Dean
    Today on hacker news there was a clever article on custom shortcut keys. The author talks about a technique for remapping a modifier key such as CTRL to ESC if CTRL were pressed without a modifier. This is useful in vim because of how often you need to press ESC. Another technique he describes is mapping the open parenthesis, ( to the left shift key, and ) to the right shift key. If another key is pressed when shift is held down, the shift key behaves normally. The author describes the software he uses on OSX, but is there a way to do this on Windows? I've heard of AutoHotKey but it seems to only fire macros when simple keys are pressed, rather than the conditional state switch that this would require.

    Read the article

  • How can I load an image directly into the Windows clipboard from the command line?

    - by Daniel J. Pritchett
    My dad asked me how he could script the pasting/inclusion of images in various applications. I'm sure I could script out some quick <img src=... HTML but I believe he's also looking to do this in Windows GUI applications like Word or Outlook. So, how could I script a process with the following inputs and outputs: load_image_into_clipboard_script.cmd sample_file.jpg Clipboard now contains the aforementioned image file, just as if I'd e.g. opened it in Paint and done a Select All - Copy. I noticed there's a clip.exe utility with Vista/Win2003 and up; perhaps that will be a useful intermediary?

    Read the article

  • Separate tables or single table with queries?

    - by Joe
    I'm making an employee information database. I need to handle separated employees. Should I a. set up a query with a macro to send separated employees to a separate table, or b. just add a flag to the single table denoting separation? I understand that it's best practice to take choice b, and the one reason I can think of for this is that any structural changes I make to the table later will have to be done in both places. But it also seems like setting up a flag forces me to filter out that flag for basically every useful query I'm going to make in the future.

    Read the article

  • Alternative to the tee command whitout STDOUT

    - by aef
    I'm using | sudo tee FILENAME to be able to write or append to a file for which superuser permissions are required quite often. Although I understand why it is helpful in some situation, that tee also sends its input to STDOUT again, I never ever actually used that part of tee for anything useful. In most situations, this feature only causes my screen to be filled with unwanted jitter, if I don't go the extra step and manually silence it with tee 1> /dev/null. My question: Is there is a command arround, which does exactly the same thing as tee, but does by default not output anything to STDOUT?

    Read the article

  • Arch Linux shows a blinking cursor instead of a booting installer

    - by fakedrake
    Arch Linux shows a blinking cursor instead of a booting installer. I ran sudo dd if=archlinux-2010.05-core-i686.iso of=/dev/sdb1 and checked the MD5 sums. I tried to boot it on two different PCs and got the same result: instead of booting GRUB — or anything useful, for that matter — it just showed a blinking cursor at the top left corner of the screen. The machines became unresponsive to any kind of input, the flash drive LED didn't seem to blink or shiver at all and there seemed to be no other activity whatsoever. I tried using another flash drive, but the machine completely ignored it, booting Windows "normally."

    Read the article

  • Asking for Credentials, when requesting shared folders on the server, regularly for domain users?

    - by MFH
    In our network, single domain controller, when some users (members of the domain) request shared folders on the server they are required to enter their credentials, the server is Windows Server 2008 R2, even checking to remember my credentials doesn't work, sometimes it shows this message: "The system has detected a possible attempt to compromise security. Please ensure that you can contact the server that authenticated you", sometimes it shows different messages, when I try to recreate the case sometimes I failed, I searched Google for it, I didn't find useful results, some talk about kerberos, but we don't use kerberos, this keeps going each day or two, how to overcome this, I don't want these messages to appear to users?

    Read the article

  • Are formulas supported on fields in Office Word 2007

    - by Robert Koritnik
    Scenario I'd like to use: I want to have two fields in a Word document. I would like to enter a date in the first one. Then I want the second one to display a value based on the date I entered in the first field. Is there support for this kind of scenario in Office Word 2007? I looks on the web but couldn't find any useful info. I did find info about formula support but not for this kind of scenario.

    Read the article

  • Newbie: VirtualBox "no bootable medium found"

    - by Newton Falls
    My first foray into VM land so please excuse the stupidity expressed below. Running VirtualBox on Kubuntu 9.10 and trying to set up a VM running Windows 7. Windows 7 came installed and is functional as a dual-boot but I want to stay in kubuntu hence the VM. Received "Fatal: no bootable medium found" when trying to start a VM. Not surprising since VBox never gave me an option (that I recognized anyway) to tell it to look on the hard drive. I did not receive a CD of Windows 7 with the machine. How can I tell VirtualBox to grab what it needs from the hard drive? Or am I out of luck because I don't have a CD? Update: This might not be possible. The installed Windows 7 is useful only to pull the installation key. It is easier to just to download or get an ISO from a friend and enter in your own key.

    Read the article

  • New Linux Mint User Networking questions

    - by nyCecilia
    I have a readynas that I've been using with XP, Vista, and Win7. Because of weirdness with Vista, it is set up for full read/write guest access. Now I have a Linux Mint netbook. I have set up smb on it and can read from the readynas smb shares, but I can't write. What else can I check? Part2--(keep in mind my network knowledge is small...or smaller) what is the difference between NFS and SMB, can a readynas be set up to allow access to the SMB shares via NFS (if I can figure out NFS lol)? A link to a guide for beginners would be appreciated, google searching "Linux Mint Readynas" doesn't give me anything useful.

    Read the article

  • Build a user's profile directory on creation in batch

    - by Moses
    I have a batch script that I use when I set up new Windows 7 PCs that creates a user based on a variable, creates a folder on their desktop, then shares it: @echo off SET /p unitnumber="Enter unit number: " net user unit%unitnumber% password /add /expire:never MD "C:/Users/unit%unitnumber%/Desktop/Accounting #%unitnumber%" runas /user:administrator "net share "Accounting#%unitnumber%"="C:/Users/unit%unitnumber%/Desktop/Accounting#%unitnumber"" I discovered that the share that is created is overwritten when the newly created user first logs on, because Windows creates builds their profile directory at that time. Is there any way to initiate a build of a user's profile directory in the batch file just after creating the it? The only thing that looks useful is the /homedir:pathname switch for the net user command, but I believe that option assumes the directory already exists. Other than that web research hasn't been fruitful. I'd be to use whatever to get this done as long as I can incorporate/launch it from the batch. Any suggestions?

    Read the article

  • Changing shared printer settings to default to greyscale

    - by Chris
    My company has about 60 employees all running Windows Vista or 7 and a gigantic Minolta printer hooked up to an EFI Fiery Image Processor. We're burning about $300 a month in printer supplies alone. I'm trying to find a way to cause the printer to default to grayscale in order to save money. So far I've tried: Changing settings on the image processor Changing settings on the print server Looking through the Group Policy editor to see if I can find anything useful Creating a new printer on the print server and setting it to be grayscale only Adding the printer to my computer directly (through a TCP/IP port) and setting it to be greyscale only Has anybody successfully done this before? If so, how was it gone about? I don't expect anybody to know the specifics of my environment, I just not sure what the right direction is.

    Read the article

  • App store for Windows

    - by Renaud Bompuis
    I'm wondering if there is any good App Store for Windows. I stumbled on allmyApps, and this question, but surely there are more out there. My dream Windows App Store would do things like: Allow me to download and install software Allow me to pay for apps Check which apps are already registered on my machine and keep track of them Keep track of all my machines Keep track of available upgrades and easily deploy them. Let me discover new apps that may be useful I know this is utopian on the Windows platform since development, upgrading, purchasing are so fragmented, but the Apple Store, Chrome App store, etc do make your life easier. Just trying to find something to ease the pain a little bit... So, are there any good services/software out there that would help me achieve some of the listed goals?

    Read the article

  • Color Calibrate Dual Monitor XP SP2

    - by Laramie
    This topic has been touched on before but not really answered. I have a dual monitor system and the colors differ wildly. I currently live Buenos Aires where color correction hardware costs premium prices. I do some graphic design, but don't require a pro-level calibration. That said, I'd like my monitors to be set as close to "true color" as possible. I've located the useful and free Monitor Calibration Wizard, but it seems to adjust the entire system internally at startup. I could use the Microsoft Color Control Panel Applet to set a different ICC or ICM profile for each monitor, but the Monitor Calibration Wizard outputs its own format for profiles.

    Read the article

  • How can I edit files directly from find results

    - by Sergio Tulentsev
    Let's say, I want to replace one string with another. Normally I use TextMate, but today, I don't remember why, I decided to run the search in Sublime Text 2 (which I installed some time ago, but haven't used since). I was impressed with "Find Results" window, seems more useful that textmate's. Then I tried to edit text right inside that window and (I can swear on my macbook) it worked (I was able to commit those changes to git repo)! I thought then, "Wow, that's a really nice feature. Should I migrate from TM already?". Unfortunately, I wasn't able to reproduce this behaviour later. I can still edit text in "find results" window, but changes don't persist (that is, original files are not touched). Am I doing something wrong now, or was it caffeine-induced hallucination earlier in the day?

    Read the article

  • Why is System listening on port 8000?

    - by poke
    I noticed by accident today that I have some unknown webserver listening on port 8000. Opening http://localhost:8000 just returns 404, so I don’t get any hint what exactly is listening there. I’ve used netstat -ano to find out, that the process with PID 4 is listening on that port. PID 4 is the System process. Why is my system listening on that port, without me actually starting a server? Or how can I find out what exactly is listening there? I’ve read the related questions about port 80 and port 443, but none of the services mentioned there were running on my system. And the other suggestions there didn’t work either. edit: The HTTP response of the server lists Microsoft-HTTPAPI/2.0 as the server. edit2: As requested by Shadok, here are the entries of TCPView with 8000 as the port. But I doubt it’s useful at all…

    Read the article

  • Kernel appears to have no modules

    - by George Reith
    Useful info: OS: CentOS 5.8 final Kernel: 2.6.32-042stab056.8 My kernel came prebuilt with the server, I don't know anything about kernels and not a lot about linux however as far as I do know I should have some modules loaded by the kernel. I came across this problem because I am unable to run iscsi as it is expecting certain modules to be loaded. lsmod returns nothing. depmod -a returns: WARNING: Couldn't open directory /lib/modules/2.6.32-042stab056.8: No such file or directory FATAL: Could not open /lib/modules/2.6.32-042stab056.8/modules.dep.temp for writing: No such file or directory I have rebooted and nothing has changed. Does anyone know why this is happening?

    Read the article

  • Cisco access list logging. Why is there a difference between IPv4 and IPv6?

    - by growse
    I've got a Cisco 877 router. I've got an IPv4 access list and an IPv6 access list set up and configured similar to this: interface Dialer1 ... ip access-group INTERET-IN ipv6 traffic-filter IPV6-IN Each of these access lists has a final rule of deny ip/ipv6 any any log. However, in my syslog I notice that there's a difference in formatting between the two types of entries. IPv4 will say: %SEC-6-IPACCESSLOGP: list INTERNET-IN denied udp 88.89.209.63(137) -> 1.2.3.4(137), 1 packet Whereas the IPv6 list will say %IPV6_ACL-6-ACCESSLOGNP: list IPV6-IN/240 denied 59 2001:0:5EF5:79FD:14F9:B773:3EBA:3EE3 (Dialer1) -> 2001:800:1000:0::1, 8 packets Both have broadly the same information, but the IPv6 log entry is missing the protocol type and port, both of which are very useful if I'm trying to troubleshoot connectivity. Why is this? How do I get IPv6 deny logs to display the protocol and port used, if any?

    Read the article

< Previous Page | 121 122 123 124 125 126 127 128 129 130 131 132  | Next Page >