Search Results

Search found 9816 results on 393 pages for 'blade servers'.

Page 163/393 | < Previous Page | 159 160 161 162 163 164 165 166 167 168 169 170  | Next Page >

  • linksys WRT350N dd-wrt: how can i give upload priority to slingbox ?

    - by ufk
    Hi. i have the router WRT350N by Linksys I've installed dd-wrt v2.4 sp1 on it how can i configure it to give upload priority to slingbox ? The Slingbox is a TV streaming device that enables users to remotely view their home's cable. it seems that slingbox streams to amazon ec2 servers and from there to the client so i can't really give priority based on ip-address.

    Read the article

  • DMZ and LAN on the same Windows Storage Server 2008 R2

    - by Sergei
    We are moving from EMC Celerra NS20 to Windows Storage Server 2008 R2. I would like to use deduplication feature in WSS (Single Instance Storage) for hosting data for our external FTP server.The idea is to use NFS server on WSS as datastore for Linux FTP server located in DMZ and CIFS services for servers in LAN. Using Celerra fileserver I was able to create multiple instances of fileservers with multiple virtual interfaces and separate filesystems so all data and networks would be separated. Would it be possible to do something similiar on WSS?

    Read the article

  • ICS attachments disappear after migrating to exchange 2007

    - by jdiaz
    We currently have a small c# script that pulls a calendar appointment from Siebel OnDemand and mails it out to our users using smtp. This all worked before we migrated some users to Exchange 2007 this weekend. Now the .ics calendar file doesn't show up for those that have been migrated but still show up for those who haven't. The Exchange team says there isn't a problem with our servers. Has anyone seen this type of problem? Any solutions?

    Read the article

  • secure data transport between web server and database server

    - by atypicalgeek
    I asked this question in stackoverflow and it was suggested to try here so here goes... I'm planning on provisioning a web server and database server in a server farm environment. They will be in the same network but not in the same domain, both windows server 2008 and the database server is sql server 2008. My question being, what is the best way to secure data in transport between the servers? I've looked into IPSEC and SSL but not sure how to go about implementing either.

    Read the article

  • whois returns correct changed date but wrong nameservers

    - by sergio
    I was just told by 1&1 customer support that "the date in the whois could show correctly while the nameservers information being the old one" I though the whole document was stamped at once, not "built" from different data sources. Am I being lied to? or how is that possible? The site is not visible yet, the whois shows correct date the change was made, and the nameservers are still wrong in that report/record/document and of course in the world's dns servers.

    Read the article

  • Advice on moving a machine room to a new location?

    - by MikeJ
    Our company is moving to new offices in a couple of months, and I am responsible for looking after the move of the development servers in the company. most of the dev equipment is in 5, 42U cabinets + rack for switching/routing equipment. How do most people do this sort of thing? Move the cabinent whole or extract the indvidual components and move the racks empty. any advise on prep and shutdown before the move would be welcome

    Read the article

  • How to perform "tracert" like operation from browser?

    - by user329777
    I'm remotely investigating issue with my friend's WIN XP computer. The browsers (Chrome and IE) won't show any pages but message with err_connection_reset in details. I've tried to perform "telnet google.com 80" and send there "HEAD / HTTP/1.0" from console and everything went fine, but browsers refused to give me anything. I've checked for presence of firewalls and proxy servers in the settings, but nothing seems to be there. What else to check?

    Read the article

  • What happens when the server that the Remote Desktop Connection Broker goes down?

    - by Frank Owen
    I would like to setup the Remote Desktop Connection Broker to allow better load balancing of the two terminal servers we have as well as allowing the user to re-establish to the correct server if they get disconnected. My worry is, if I set this up and the server this service is running goes down, does the terminal server stop accepting connections or will they just lose the benefit of having RDCB turned on? I don't want to add another point of failure in this equation unless I have to.

    Read the article

  • Using the same machineKey across two web farms

    - by wwilkins
    We have two separate NLB web farms. The first farm runs an app that delivers content to the customer facing application on the second NLB. We've noticed a single Cryptographic error in our logs that occurs whenever a page loading content from the first farm is accessed. Is there any reason to not give all of the servers in both farms the same machineKey settings?

    Read the article

  • Making Active Directory changes atomic

    - by Matt Simmons
    I've got a Windows 2003 Active Directory infrastructure, and there are times (such as when terminating an employee) that I want instantaneous propagation across both of my AD servers. Currently, I make the change in both places, which I suspect is unhealthy, but it's the only way I know to make sure that the account is disabled to every machine. Is there a better way? Do I have to wait for the normal propagation time for convergence, or is there a way to "force" it?

    Read the article

  • SSH: Configure ssh_config to use specific key file for a specific server fingerprint

    - by Penthi
    I have a key based login for a server. The IP and DNS of the server can change, because it is hosted on Amazon. Is there a way to configure the ssh client config to use the specific key file for this server only, when the fingerprint of the server matches? In other words: Normaly servers are matched by IP or DNS in the ssh client config. I want to do this by fingerprint, becaus IP and DNS can change.

    Read the article

  • How much bandwidth do I really need (to stream video)?

    - by BCS
    I'm looking to get an internet connection for my place (I have been using work, school and coffee shops) and I'm wondering how much bandwidth I really need to do different kinds of things? Google turns up lots of stuff but more than 1/2 are for servers and none of the rest give a "To do A you need X Mb" list.

    Read the article

  • Home computer as ssh bridge

    - by pistacchio
    Hi at work, due to our network configuration, i cannot ssh external servers. We are on a Windows environment. I need to ssh a server of mine, but i can only exit from our LAN via port 88. How could I use my home MacOs box to accept an http connection from my home computer and route it via ssh to the server i need to' connect to? Thanks.

    Read the article

  • How to know disk quota on network share in windows?

    - by myforwik
    I connect to a share on a windows server and I have a quota of unknown size. All the tools I have seen are reporting the disk size/disk free space, not the quota size for myself. The only way I can figure out my quotas is to keep writing junk until I reach the quota. There must be a better way than this? My PC is windows XP and the servers are mainly 2003server.

    Read the article

  • Xen VPS web front end manager

    - by JavaRocky
    Do any Xen VPS web front end managers exist for provisioning and managing virtual private servers? I am comfortable on the command line creating new virtual machines, however it would be nice if i could use a nice web front end.

    Read the article

  • Identify OpenVZ virtual machine from inside

    - by Alfred Godoy
    Is there any way for me to identify which OpenVZ container I am in, from inside the container? I am working on a setup where OpenVZ machines shall boot the same (read-only) disk image, so I can not configure them individually in the file system. I need a unique identification for each of the virtual servers, to be used by scripts running inside the OpenVZ containers. (I'm running Debian Lenny, BTW.)

    Read the article

  • How to setup Mercurial on Mac OS X 10.5.8 for remote access

    - by Abhic
    Hello I have a stable hackintosh box running 10.5.8 at home with py 2.5.1 and mercurial 1.5.2 setup successfully. Now I do not have any ports opened from this box and the associated router nor do I have any web servers running on this system. What are the steps that I have to take to setup this machine to be a remotely available as a mercurial repository? Thank you folks.

    Read the article

  • Will running CSF & Bastille cause any conflicts?

    - by MatW
    I'm taking my first steps into the world of un-managed servers, and have confused myself whilst reading through the 101 tutorials on server hardening that Google spews out! The most recent advice I have been given is to install both CSF and Bastille on my server (used to serve a consumer-facing ecommerce site and act as the business' email server), but my understanding was that both of these tools were an abstraction layer above netfilter / iptables. Will installing both packages cause any conflicts, or do they play well together?

    Read the article

  • What do YOU use for your Windows Server backup solution?

    - by Justin Higgins
    I know there are many choices, from builtin ntbackup, to FOSS, to commercial to custom script, but I was wondering what YOUR choice is for your servers and environment and a brief explanation of why. As each environment and requirements differ, there is no one right solution, except that you should be backing up and verifying restoration regularly. As a bonus, do you use D2D2D? D2D2T? D2D2Cloud?

    Read the article

  • Other then DDNS, can a fake primary DNS server break anything else?

    - by Nimmy Lebby
    I am aware that the primary server listed in SOA record has to be valid for DDNS to work. Is anyone aware of any other application that uses the SOA listed primary DNS server in one way or the other? By a fake primary server I mean either: Inaccessible by anything else other than secondary servers (this is called hidden primary correct? unsure). A completely fake domain name like dig +short soa spamhaus.org

    Read the article

  • Multi-core processors: Better performance running multiple applications?

    - by aip.cd.aish
    I realize for single applications - the application itself has to be designed to take advantage of multiple cores. But what about executing many different applications simultaneously? On my development machine at an average instance, I run multiple servers (a database server, a web server), multiple instance of IDEs (either Visual Studio or NetBeans), Web-browser with multiple tabs (in Chrome, each tab is a process on its own), FTP client, SSH client etc. Does having a multi-core system improve the ability to run multiple applications simultaneously?

    Read the article

< Previous Page | 159 160 161 162 163 164 165 166 167 168 169 170  | Next Page >