Search Results

Search found 5497 results on 220 pages for 'office equipment'.

Page 156/220 | < Previous Page | 152 153 154 155 156 157 158 159 160 161 162 163  | Next Page >

  • type mismatch errors querying data from spreadsheet

    - by user2984933
    In EXCEL 2010 I am trying to querying data in another spreadsheet. The data range in the source sheet/ file is named (DATABASE). The Date field in the database is formatted as short date and when I query the date without criteria I get a different format of European datesYYYY-MM-DD with time in the results. When I use criteria and a specific date in the date field criteria grid using English format MM-DD-YYYY I get results. When I set parameters looking at destination file cells for the date for the parameters, I get Type mismatch EVEN THOUGHT THE CELLS ARE Short date Formatted. This worked perfectly in my 2003 version of EXCEL. Now I am running Win 7 -64 and Office 2010 Pro. Why does the query throw Mismatch with cell references for the parameters but accepts hard value dates in any date format? (MSQRY32.EXE)

    Read the article

  • Most secure way to access my home Linux server while I am on the road? Specialized solution wanted

    - by Ace Paus
    I think many people may be in my situation. I travel on business with a laptop. And I need secure access to files from the office (which in my case is my home). The short version of my question: How can I make SSH/SFTP really secure when only one person needs to connect to the server from one laptop? In this situation, what special steps would make it almost impossible for anyone else to get online access to the server? A lot more details: I use Ubuntu Linux on both my laptop (KDE) and my home/office server. Connectivity is not a problem. I can tether to my phone's connection if needed. I need access to a large number of files (around 300 GB). I don't need all of them at once, but I don't know in advance which files I might need. These files contain confidential client info and personal info such as credit card numbers, so they must be secure. Given this, I don't want store all these files on Dropbox or Amazon AWS, or similar. I couldn't justify that cost anyway (Dropbox don't even publish prices for plans above 100 GB, and security is a concern). However, I am willing to spend some money on a proper solution. A VPN service, for example, might be part of the solution? Or other commercial services? I've heard about PogoPlug, but I don't know if there is a similar service that might address my security concerns? I could copy all my files to my laptop because it has the space. But then I have to sync between my home computer and my laptop and I found in the past that I'm not very good about doing this. And if my laptop is lost or stolen, my data would be on it. The laptop drive is an SSD and encryption solutions for SSD drives are not good. Therefore, it seems best to keep all my data on my Linux file server (which is safe at home). Is that a reasonable conclusion, or is anything connected to the Internet such a risk that I should just copy the data to the laptop (and maybe replace the SSD with an HDD, which reduces battery life and performance)? I view the risks of losing a laptop to be higher. I am not an obvious hacking target online. My home broadband is cable Internet, and it seems very reliable. So I want to know the best (reasonable) way to securely access my data (from my laptop) while on the road. I only need to access it from this one computer, although I may connect from either my phone's 3G/4G or via WiFi or some client's broadband, etc. So I won't know in advance which IP address I'll have. I am leaning toward a solution based on SSH and SFTP (or similar). SSH/SFTP would provided about all the functionality I anticipate needing. I would like to use SFTP and Dolphin to browse and download files. I'll use SSH and the terminal for anything else. My Linux file server is set up with OpenSSH. I think I have SSH relatively secured. I'm using Denyhosts too. But I want to go several steps further. I want to get the chances that anyone can get into my server as close to zero as possible while still allowing me to get access from the road. I'm not a sysadmin or programmer or real "superuser". I have to spend most of my time doing other things. I've heard about "port knocking" but I have never used it and I don't know how to implement it (although I'm willing to learn). I have already read a number of articles with titles such as: Top 20 OpenSSH Server Best Security Practices 20 Linux Server Hardening Security Tips Debian Linux Stop SSH User Hacking / Cracking Attacks with DenyHosts Software more... I have not implemented every single thing I've read about. I probably can't do that. But maybe there is something even better I can do in my situation because I only need access from a single laptop. I'm just one user. My server does not need to be accessible to the general public. Given all these facts, I'm hoping I can get some suggestions here that are within my capability to implement and that leverage these facts to create a great deal better security than general purpose suggestions in the articles above.

    Read the article

  • Security considerations in providing VPN access to non-company issued computers [migrated]

    - by DKNUCKLES
    There have been a few people at my office that have requested the installation of DropBox on their computers to synchronize files so they can work on them at home. I have always been wary about cloud computing, mainly because we are a Canadian company and enjoy the privacy and being outside the reach of the Patriot Act. The policy before I started was that employees with company issued notebooks could be issued a VPN account, and everyone else had to have a remote desktop connection. The theory behind this logic (as I understand it) was that we had the potential to lock down the notebooks whereas the employees home computers were outside of our grasp. We had no ability to ensure they weren't running as administrator all the time / were running AV so they were a higher risk at being infected with malware and could compromise network security. With the increase in people wanting DropBox I'm curious as to whether or not this policy is too restrictive and overly paranoid. Is it generally safe to provide VPN access to an employee without knowing what their computing environment looks like?

    Read the article

  • My HP ProBook 4520s running Windows 7 hangs intermittently

    - by Rory Alsop
    I have not been able to trace a consistent cause, but a few times a day my laptop will hang for up to about a minute. I can still move the cursor which displays as the wait icon for whatever application I was last in, but cannot carry out any other actions. Unfortunately I can't Ctrl+Alt+Del to bring up a task manager and I just have to wait. I can't pin it down to a particular application either, but generally I have either office apps, a browser or other tools open. I'm tempted to think it may be network timeout on something, as I can't think of anything else which would delay for that long with such a significant impact, but as I'm more a Unix person I thought it would be worth asking here.

    Read the article

  • How to link to an Excel pivot table that will expand over time in Word 2007?

    - by Daljit Dhadwal
    I have a pivot table in Excel 2007 which I’ve pasted it into Word 2007 using Paste Special (Paste link) - Microsoft Office Excel Worksheet Object. The pivot table appears in Word and the link to Excel is working. The problem is that if the pivot table expands (for example, due to showing 12 months of data rather than six months) the link to the pivot table in Word will only show the range cells that were originally copied over with the pivot table. I understand why this happens. When I paste as a link to Word the underling field codes look like this: {LINK Excel.Sheet.8 "C:\Users\myAccount\Documents\testexcel.xlsx" "Sheet2!R1C1:R8C2" \a \p} The codes refer to a fixed area (e.g., Sheet2!R1C1:R8C2 ) of the Excel spreadsheet, and so when the pivot table expands, the expanded cells fall outside the area that is defined in the field codes. Is there some way to have the link refer to the pivot table itself rather than the cell range that happened to be originally copied over from Excel?

    Read the article

  • Prevent runaway threads and ultimately physical overheating and battery drain on Android [migrated]

    - by foampile
    I was wondering if there is a system monitor app that will raise (audible) alerts and offer app closure if it detects runaway threads on Android that cause physical overheating and battery drain. E.g., I just had to turn my phone off because there was a runaway thread that I think was constantly trying to refresh FB where there was very poor connection, so it was going in a virtually endless loop. But I get that with other apps too and not just Facebook. I'd like to actually shut apps down when they're detected. I am not kidding, I nearly burned my fingertips when I touched my phone -- it was on for only 2 hrs and the battery was almost dead. It is because 4G is very poor inside my office building and I checked Facebook walking between my vehicle and the building this AM. After that, the app kept trying to refresh continuously without success and overheating the phone.

    Read the article

  • rsync not using forwarded ssh credentials

    - by Mat
    I have a situation where I would like to rsync some files from a remote server to a server in my office. The source server requires key-based authentication and I have an appropriate key set up on my desktop machine. If I ssh into the local server and then ssh to the remote server, ssh agent forwarding works correctly. However, when I try to rsync over ssh I get permission denied. So, Desktop -- Local server -- Remote server. When ssh'd onto the local server ssh user@remote works, but rsync -avPe ssh user@remote:/src /dest does not - Permission denied (publickey).

    Read the article

  • Need help making a bootable portable USB hard drive. [Utility I need will only create bootable CDs or USB flash drives]

    - by Sootah
    I've got a copy of Spotmau's Bootsuite 2012, which is an utterly fantastic tool. It has completely replaced Bart PE for me, and I relied on BPE for YEARS. Anyway, the issue I'm having is that the Bootsuite installer utility will only create bootable USB flash drives, or bootable CDs. The USB hard drive is detected as a hard drive instead of as a USB device, and as such I cannot use the included app to install to the USB HDD. Is there a way of either copying the files from a bootable flash drive to a USB HDD and making that work, or of taking an .ISO of the bootable CD and using that to make the portable HD bootable? The flash drives I've made of it are great as I can always have it with me [have 16GB dangling from my keychain. :) ], but my USB hard drive is FAR faster than any flash drive I have, so I'd like to be able to use that when I'm working out of my office or happen to have it with me.

    Read the article

  • Need to access Mac via ssh remotely through another Mac with Internet Sharing

    - by Ze'ev
    My setup at office is: Internet - AirportExtreme --(wifi)-- AirportExpress --(eth)-- MacPro1 --(eth)-- MacPro2 I want to be able to access MacPro2 from laptop at home via ssh (and sftp). Is it possible? The AirportExtreme is set to "DHCP and NAT" and is doling out 10.0.1.xxx IPs. The AirportExpress is 10.0.1.2. MacPro1 is 10.0.1.3 via Ethernet to AirportExpress. It is then connected by 2nd Ethernet port (192.168.2.1) to MacPro2, which is 192.168.2.2. Is there any way to "tunnel through" to MacPro2 from home? Thanks!

    Read the article

  • Linux QoS (Skype / BitTorent / SIP / HTTP priority)

    - by Andre
    We are configuring a linux box that will act as internet gateway for an office of 30-50 computers. We are using iptables/HTB for traffic shaping. Is there a way to match traffic on L7 level? It's easy to identify traffic by TCP/UDP ports (like SIP and HTTP). But what if we are dealing with Skype & BitTorent? It was surprise for me that there is no powerful and matured sulution for tasks like this. I found only l7-filter (http://l7-filter.clearfoundation.com/) patch for the Linux kernel, but it's no longer supported (it seems to). Moreover it couldn't be compiled with modern Linux kernels. The only option I found was to use a Cisco router. Are there other ways to identify and shape Skype and Bittorent traffic?

    Read the article

  • Sharing RAM resources between 2 or more computers

    - by davee44
    I know there was a somewhat similar question before: How to share CPU or RAM? But, let me just specify it a little more... When Microsoft Windows requires more RAM capacity than available it uses a swap-file to temporarily store the data there, this is actually something like a hard-drive-based RAM. This technology is used for many years. Theoretically, it shouldn't be too hard to implement a similar technology that uses the RAM of different computer(s) in the network for temporary data storage. This just requires a software that runs on computers in the network that accepts and returns data from/to the main computer and keep that data in the RAM; plus the operation system of the main computer must have the ability to use computers in the network instead of (or in addition to) the swap-file. I wonder, are there any implementations of this idea? This would allow users to build RAM clusters using all of their home or office computers, that will boost the performance of a single computer for some development/gaming/video tasks, etc.

    Read the article

  • Backup software for Ubuntu - which one?

    - by Industrial
    Hi everybody, I have spent some time testing out different backup solutions for my small home office during the last weeks, but still haven't found anything that have been working out too well yet. We can definitely work with a non-GUI script if that's what it takes, if only the requirements are fulfilled: Upload to Amazon S3 Europe. We get unbelievable slow uploading speed to US, so uploading 400+ GB of data will not be happening anytime this year... Incremental backups - only changed files shall be uploaded or we will have a big bill from Amazon in the end of each month.. Files should not be uploaded in one big per-folder archive. This is not efficient at all, since if we change one file in a subfolder, a huge two-digit GB sized file would have to be uploaded during next backup. Not good for economy again, or traffic overhead on our internet connection. What options are available to us? Thanks!

    Read the article

  • Exchange Online - granting admin rights on a multi-domain account

    - by user1571299
    I'm the admin of a handful of domains on Office 365. The thing is some of my clients would like to manage their mailboxes by themselves. So I started looking into it and the closest I got was this page: http://community.office365.com/en-us/forums/158/p/20912/98083.aspx I created a Group Role with a Write Scope according to that post. I also assigned the Reset Password, Recipiants Creation, Mail Recipients and Distribution Groups rolls. But unfortunately that just doesnt work. The user in question is still unable to manage anything. Any suggestions?

    Read the article

  • How to Reset Windows 7 to its default font for the whole system?

    - by Fellknight
    This might sound a little bit silly but please bear with me. Somehow I changed my default display font, the one that Windows uses for system dialog boxes, accept/cancel buttons, pretty much everything in the system (it even goes as far as to change how my the text in my web browser appears). Now everything that it's affected looks like under the effects of the bold button in office (very black and very thick words). This is an inconvenience for example on some mail accounts who use this effect to display unread messages. Is there any way to return it to its default state, non "bold" typography for the whole system?

    Read the article

  • How can I do a bulk caller ID lookup (reverse phone lookup) on a list of phone numbers?

    - by rob
    I have a tab-delimited text file with all of the phone numbers I've called or received calls from in the past year. The phone numbers are all based in the US, so the format is ###-###-####. For tax purposes, I need to know which calls were personal and which ones were business-related. I could enter them all one-by-one into Google, but that will take forever because there are hundreds of numbers to check. Is there a program, MS Office plugin, or website that I can use to look up all of the numbers at once? If not, is there some way to create an Excel macro to do the lookups for me?

    Read the article

  • A Duplicate name exists on the network

    - by Adam
    Recently we changed out office IT structure from having a dedicated server to be the DC, a dedicated server for the exchange etc... (Each running Windows Server 2003 R2) Now we have a single server running Windows SBS 2008 and created a new domain (with a different domain name) We then changed every PC so it connected to the new domain and renamed every PC with a new naming structure. After I had done this, we were getting several PCs that would get the following message just before the login screen (Alt+Ctrl+Del Screen) A Duplicate name exists on the network I have checked the ADUC and have removed the trouble PCs from the list and renamed each PC and changed the SID before connecting back onto the domain but still getting this message. I have tried everything that i can think of but still getting the problem. Any help would be greatly appreticated.

    Read the article

  • What is jQuery for Document.createElementNS()?

    - by C.W.Holeman II
    What is jQuery for Document.createElementNS()? function emleGraphicToSvg(aGraphicNode) { var lu = function luf(aPrefix){ switch (aPrefix){ case 'xhtml': return 'http://www.w3.org/1999/xhtml'; case 'math': return 'http://www.w3.org/1998/Math/MathML'; case 'svg': return 'http://www.w3.org/2000/svg'; } return ''; }; var svg = document.evaluate("svg:svg", aGraphicNode, lu, XPathResult.FIRST_ORDERED_NODE_TYPE, null). singleNodeValue; $(svg).children().remove(); rect = document.createElementNS(lu('svg'), "rect"); rect.setAttribute("x", "35"); rect.setAttribute("y", "25"); rect.setAttribute("width", "200"); rect.setAttribute("height", "50"); rect.setAttribute("class", "emleGraphicOutline"); svg.appendChild(rect); } The code is a simplified fragment from Emle - Electronic Mathematics Laboratory Equipment JavaScript file emle_lab.js. The Look-Up-Function, luf(), maps a complete reference to a shorten name for the namespace in the XPath string and createElementNS(). The existing svg:svg is located, removed and replaced by a new rectangle.

    Read the article

  • Why can't I open programs after watching youtube videos for a while?

    - by manjivsanotsu
    I have recently built a new PC, and it worked fine for a while (1-2 months of no problems whatsoever). However in the recent weeks I noticed that after I watched some youtube videos and closed everything, I can no longer do anything except move the mouse and expand the Startup Menu. If I click on any of the programs on the Start Menu or type a program on the Run text box, it won't open anything. I can't open taskmgr, or windows explorer, or even shut down the PC. I don't have anything else running when I'm watching videos except ZoneAlarm and Avast. The only workaround I can do when this happens is a forced shutdown (holding the power button of my PC), and restart if I wanted to do anything more. But this happens a lot - about 4-5 times a week so I'm worried it would fry up my hardware if I keep on doing this. OS: Windows 7 Other Installed Software: Open Office, Tropico 4 game, Adobe Photoshop Browser used: Google Chrome Hardware: CPU: i7 2600K RAM: 16 GB Motherboard: Asus P8Z68-V GEN3 Hard Drive: 120GB Corsair Force GT SSD Graphics: 2047MB GeForce GTX 560 Ti

    Read the article

  • Safari 4.0.5 will not play any HTML5 (H.264) video

    - by user34407
    The html5test.com tells me that my browser does not support the <video> element, and when I try example page, I get the fallback message, usually "Your browser does not support HTML5 video." I know this should work in Safari. I am on Windows 7, 64-bit (running 32-bit Safari). Video works in Safari for everyone else in the office. (Windows 7 setup exactly like mine, Vista, OSX.) I have tries uninstalling, deleting all user preferences, and reinstalling. Anything else I should try?

    Read the article

  • Is there a (free or commercial) print server which print PDFs from networks?

    - by Eonil
    I'm working in office which uses Windows server for printing. Because our printer supports only Windows driver. But here are Mac OS X also which requires network printing... I'm sure there is no driver of the printer for Mac. So I figured out an idea to do this. On the Mac, a virtual printer driver generates and sends PDF file to print server. Print server, prints PDF files with it's local printer. Is there a solution can do this? (free or commercial)

    Read the article

  • Template loading slowness on VPN

    - by Mesut
    Hi All We have got lots of Word templates on our network. They are perfectly working on local area network. However, if users try to create a new word document from a template when they are connected to VPN outside of the office, it takes nearly 20 minutes to create a word file which is not reasonable at all. Have you guys ever come across with this type of issue? if yes, any suggestion or help would be appreciated. Many Thanks from now on. Best Regards Mesut

    Read the article

  • How can I prevent Apache from exposing a user's password?

    - by Marius Marais
    When using basic authentication (specifically via LDAP, but htpasswd also) with Apache, it makes the REMOTE_USER variable available to the PHP / Ruby / Python code underneath -- this is very useful for offloading authentication to the webserver. In our office environment we have lots of internal applications working like this over SSL, all quite secure. BUT: Apache exposes the PHP_AUTH_USER (=REMOTE_USER) and PHP_AUTH_PW variables to any application inside PHP. (PHP_AUTH_PW contains the plaintext password the user entered.) This means it's possible for the app to harvest usernames and passwords. Presumably the same information is available to Python and Ruby (all three are currently in use; PHP is being phased out). So how can I prevent Apache from doing this? One idea is to use Kerberos Negotiate authentication (which does not expose the password and has the benefit of being SSO), but that automatically falls back to Basic for some browsers (Chrome and in some cases Firefox), causing the password to be exposed again.

    Read the article

  • Two VPN connections from the same IP address

    - by Tayles
    I have set up a server running Windows Server 2008 which two remote users can dial into using a VPN connection. It works fine unless they are both in the same location, in which case only one of them can connect. I understand this is because the PPTP protocol cannot cope with two VPN connections from the same IP address. Is this correct? If so, what can I do about it? Please note that the remote location in question is a serviced office, so we're not in a position to change or play around with their router. Thanks!

    Read the article

  • Web application access different between Domain Name and IP

    - by h82
    in our office, we have a web application running. When we access the application by the domain name, http://server.domain.com/application/name it will display the current version of application. However, when we go by the IP address, http://192.168.1.111/application/name it will display the old version of that application. One thing is that we can access that application either by http://server.domain.com/ (it will be redirected to the long URL automatically) or http://server.domain.com/application/name when we are using domain name. But only accessible via the exact URL when we use IP address. Why is it showing the old version and how can it be corrected? It is running JRun4, Apache on Red hat. I've checked in httpd.conf a bit but could not find any. Please advice what should be done to display the same (updated version) when we access using domain name or IP address. Thank you.

    Read the article

  • How to create or save a PDF with printing/editing restrictions without using Adobe?

    - by suit
    I saved a Powerpoint as a pdf in Office 2007 but I don't see any options to add print restrictions or edit restrictions to it. I don't have Adobe either, so I'm wondering if there is any alternative way to add restrictions to a pdf. I know there are tools to remove document restrictions, but can they do they opposite? Is there any freeware or websites available that can add restrictions to my pdf I created? I found a website that looked promising but it didn't end up working (The upload didn't work).

    Read the article

< Previous Page | 152 153 154 155 156 157 158 159 160 161 162 163  | Next Page >