Search Results

Search found 1146 results on 46 pages for 'jikan the useless'.

Page 17/46 | < Previous Page | 13 14 15 16 17 18 19 20 21 22 23 24  | Next Page >

  • Google Chrome in Incognito Mode still logging visits history

    - by casey_miller
    I am using Incognito Mode and today I have noticed that when I frequently visit some site in that mode browser logs it and even on not incognito mode it autofills in address bar making Incognito mode useless in my case. Another fun thing is that the item is not in History so I can't manually remove it. Couldn't find anything in Settings. Why is this happening? BTW, instant search is disabled in my case. Using the latest version to date. Extensions installed List item Send to Google Docs Google Translate Eye Dropper Delicious Readabiliy Pagespeed

    Read the article

  • Exchange 2003 automated mailbox size report

    - by Morris
    I have a question if I may. I have been looking for a while for something that can report user mailbox sizes and percentage used against their quota or something that can warn me when a mailbox is getting close to the quota. I know the user receives a warning but how can I send that same warning a centralized mailbox so we can be pro-active in our support. Either a script or an application that can do this will be helpful. Unfortunately my scripting skills are useless for something this complex. Any ideas of what can be used will be appreciated.

    Read the article

  • Do I need to run a verfication on LTO tape backups even though the drives themselves perform verification as they write?

    - by ObligatoryMoniker
    We have an LTO-3 Tape drive in a Dell media library that we use for our tape backups. The article about LTO on Wikipedia states that: LTO uses an automatic verify-after-write technology to immediately check the data as it is being written, but some backup systems explicitly perform a completely separate tape reading operation to verify the tape was written correctly. This separate verify operation doubles the number of end-to-end passes for each scheduled backup, and reduces the tape life by half. What I would like to know is, do I need my backup software (Backup Exec in this case) to perform a verify on these tapes or is the verify-after-write technology inherent in LTO drives sufficient? I would also be curious if Backup Exec understands the verify-after-write technology enough to alert me if that technology couldn't veryify the data or will it just ignore it making it useless anyway since even if the drive detecs a problem I would never know about it.

    Read the article

  • Lenovo ThinkPad: What does the PWMDBSVC.exe service do? It's writing a C:\Log.txt file.

    - by thinkPadUser
    I found a file that keeps popping up in my C:\ drive root, Log.txt ... after installing Process Monitor and seeing what process was writing to it, I came across PWMDBSVC.exe, which appears to be part of the Lenovo ThinkPad software. Even if I delete it, I can get it to re-create the Log.txt when I lock and unlock my workstation. Does anybody know what this software does and whether it is safe to disable? I searched Google already and got the usual pile of useless hits on the process name but nothing seemingly definitive!

    Read the article

  • C drive should only contain OS. Myth or fact?

    - by Fasih Khatib
    So, I have a 500GB HDD @7200RPM. It is split as: C: 97GB D: 179GB E: 188GB My belief is to keep OS ONLY in C:\ and any adamant programs that won't go anywhere apart from C:\ [because this speeds up the PC during startup process] and install programs in D:\ so that in case I have to reinstall the OS, I will have the programs readily available after reinstall. But I have begun to think this approach is flawed because if C:\ is formatted, I will lose registry values and stuff that goes in %appdata% and so it is no use keeping programs in D:/ drive because they will be useless after all. Should I go ahead and install ALL of my programs in C:\ and then use D:\ and E:\ for storing my data like photos, text files, java files n all? How will this impact the performance of the HDD? I only have 3 programs in D:\Program Files so it will be easy to reinstall them :)

    Read the article

  • How can I change the subject of messages on an Exchange server automatically?

    - by Chris R
    I want to do something more than just normal mail - folder rules; I want to put a layer in front of my exchange server that lets me, for example, rewrite subjects into a more readable form. I get automated messages whose subject format makes them almost useless. Changing the emitting software is not going to happen, so I need to do something client side. I'm interested in anything that would allow me to do this, either on a mac, or on an older linux distro. Preferably the latter, and preferably in a way that I can turn on and forget about.

    Read the article

  • How to script printer creation on a Windows Server 2008 R2 clustered print server?

    - by Massimo
    As per subject. I've found some ways of scripting printer creation on Windows print servers using WMI, but it looks like WMI doesn't support clustered print servers (or clustered servers at all). The scripts in C:\Windows\System32\Printing_Admin_Scripts are useless because, they are not cluster-aware and end up creating the printers on the active cluster node (just like using WMI). The only tool I found that was able to work on a clustered print server is printui.exe (shortcut for rundll32 printui.dll, PrintUIEntry), but it can't create TCP printing ports: it can only add printers if the port already exists. How can I completely script printer creation (including TCP printing ports!) on a clustered Windows Server 2008 R2 print server?

    Read the article

  • Add a netbook to an existing Windows XP home network

    - by GorillaSandwich
    I've got a home network set up with a couple of Windows XP computers. I'm now trying to add our new netbook to it - also running XP. (The goal is to share files and a printer.) I have run the Network Setup Wizard and made sure that the workgroup name is the same as the others, and have rebooted several times, but whenever I try to 'view workgroup computers,' the only one on it is the netbook. I have a Windows XP CD, but the netbook has no drive. The wizard has some options for floppy disks, but that's useless to me these days. What is this wizard actually trying to do, and can I do it manually? Surely it can't be this hard.

    Read the article

  • Encrypt shared files on AD Domain.

    - by Walter
    Can I encrypt shared files on windows server and allow only authenticated domain users have access to these files? The scenario as follows: I have a software development company, and I would like to protect my source code from being copied by my programmers. One problem is that some programmers use their own laptops to developing the company's software. In this scenario it's impossible to prevent developers from copying the source code for their laptops. In this case I thought about the following solution, but i don't know if it's possible to implement. The idea is to encrypt the source code and they are accessible (decrypted) only when developers are logged into the AD domain, ie if they are not logged into the AD domain, the source code would be encrypted be useless. Can be implemented this ? What technology should be used?

    Read the article

  • What is the best drive cleaner?

    - by allindal
    What is the best drive "cleaner" application, an application that deletes roaming, temp. and different useless caches. Something similar to CCleaner, but more powerful. I need it to delete more than the basic stuff. Like duplications of complex files or redundancies, (example... for every game there's the DirectX suite) without deleting program essential files, obviously. I know most of this has to do with my selection of these programs, but I haven't seen anything that lets me select types of files to delete, not just specific files.

    Read the article

  • How to prevent HP Photosmart Essential from launching on removal drive insertion

    - by David Boike
    My in-laws bought an HP computer loaded with HP junk, and it's giving me a headache. When they insert a camera memory card into their printer, the Auto-Play dialog comes up, but it also launches the HP Photosmart Essential application, which is a piece of trash. It will NOT launch properly just normally from the taskbar, so that makes it pretty useless. I tried uninstalling it, but then when you insert a memory card, a Microsoft Help window comes up saying how to reinstall HP Photosmart Essential!! Is there any way to find the registry key (I assume) that allows a program to be launched when a memory card is inserted?

    Read the article

  • Cannot write, format, nor erase flash drive

    - by Baruch
    I have a 4gig flash drive, which I can read from but not write on, erase, nor format in any computer (tried in 7 different computers including xp, vista, and win7). I want to erase all the data inside because it is useless. Once I erase something, it erases it and gives me an error that it can't find the file. Once I refresh the folder, the file comes back. I tried holding Shift + Del. I also tried to use the command to format it in safe mode, but it says "access denied". I don't have a write protection button or whatever it is on my flash drive. It's just a simple small 4 gig one.

    Read the article

  • Encrypt shared files on AD Domain.

    - by Walter
    Can I encrypt shared files on windows server and allow only authenticated domain users have access to these files? The scenario as follows: I have a software development company, and I would like to protect my source code from being copied by my programmers. One problem is that some programmers use their own laptops to developing the company's software. In this scenario it's impossible to prevent developers from copying the source code for their laptops. In this case I thought about the following solution, but i don't know if it's possible to implement. The idea is to encrypt the source code and they are accessible (decrypted) only when developers are logged into the AD domain, ie if they are not logged into the AD domain, the source code would be encrypted be useless. How can be implemented this using EFS?

    Read the article

  • What is the best solution for letting both Macs and PCs access digital images and videos on a networ

    - by Gertbert
    I'm looking for a simple way to share digital images and videos over a network to both Macs and PCs. I'm currently looking into three options: NAS, WD MyBook Mirror drives attached to a router, or an HP WHS product like the Data Vault. I'm looking for something easy to implement that allows for drive mirroring but also has good performance for both Macs and PCS. I've read that the HP WHS devices rebalance on their own schedules, making them useless for streaming video, and hope someone can definitively confirm or deny this as it's a dealbreaker if true. Any other suggestions are appreciated. Thanks!

    Read the article

  • Apple TV photo fail

    - by Tony
    I just bought the new (2nd gen) Apple TV. Everything works beautifully, except for Photos. I have 25,000 pictures on my computer, which creates 3 issues with Apple TV 1) It takes roughly an HOUR to load my photos, every time! (if I navigate anywhere else, its has to reload all over again next time) 2) It condenses all of my folders-sub-folders-sub-sub-folders into just the top folder. Having only 5 top folders with 5,000 pictures each is pretty much useless. 3) It has an artificial cap of 20,000 pictures, after which it won’t load more. The first two are the big ones, since they pretty much make the product unusable. I have called apple support (they just said “sorry…too bad”), and have checked all the online forums I can. Also it is definitely not a connection issue, as it streams HD Netflix movies with ease. Does anyone else here have this issue, and/or hopefully some solutions?

    Read the article

  • Remapping special keys on the keyboard

    - by thedude
    Hey there. I just bought a new keyboard today, and to my suprise it doesn't include "Next/Previus track" keys, although it has other media keys. It also has useless keys like "Home" which brings up the webbrowser. Or well, it's not actually the "Home" key, it's a special key on the keyboard with a house on it - no idea what it's called. Anyway, so i'd like to remap the "House" key to "Next track". I've tried three different remapping programs now and none of them seem to be working. I think the real problem is that it's a special key, so it's not included in any keyboard remapping applications. The keyboard is a Logitech, can't seem to find the exact model though. Any tips?

    Read the article

  • Dealing with LDAP failure when using it for PAM/NSS?

    - by Insyte
    I use a redundant pair of OpenLDAP servers for PAM auth and directory services via NSS. It's been 100% reliable so far, but nothing runs flawlessly forever. What steps should I take now so I have a fighting chance of recovering from failure of the LDAP server(s)? In my informal testing, it appears that even already authenticated shells are largely useless as all username/uid lookups hang until the directory server comes back. So far I've come up with only two things: Do not use NSS-LDAP and PAM-LDAP on the LDAP servers themselves. Create a root-level account on all boxes that only accepts publickey authentication from our local subnet and protect that key well. I'm not sure how much good this would do me as once I'm logged in, I suspect I wouldn't be able to accomplish anything since all the userid lookups would be hanging. Any other suggestions?

    Read the article

  • Aventail VPN connection doesn't work

    - by Warlax
    I installed the Aventail VPN client on both the Mac and a Windows 7 machine, both on my home network. When I try to connect one or the other (I make sure one is disconnected before connecting through the other machine), I get a connection and view the correct certificate - accept it and Aventail tells me that I am connected. However, accessing any page inside my company's network is only possible on Windows. On the Mac I get this page: It looks like my ISP doesn't know how to redirect me? Maybe something about my DNS being set incorrectly on the Mac? Our helpdesk has been completely useless.

    Read the article

  • Xen P2V for large physical hosts with much free space

    - by Sirex
    I need to P2V a rhel5 machine to xen under rhel5. I know I can use dd if=/dev/sda then using virt-install --import on the host, but the downside of this is the original machine has 80% free space on its drive. Does anyone know of (or can document) a quick and easy method which works reliably, to produce a bootable xen image which can run under a hvm in such cases ? I tried clonezilla to make the image, to avoid the free space problem, but it failed to do the clone with "something went wrong" (useless info, i know). At the moment im looking at doing a dd of each partition, and a file level copy of the partition which is mostly empty, then creating a new virtual disk, copying the partitions over to it by mounting both the new image and the virtual drive on a second vm, then copying the boot sectors over, then copying the file level backup..... there must be an easier way ? Oh, and budget is $0. :)

    Read the article

  • Can't type text into table cell when form is protected in Word 2002

    - by Gus
    I created several tables in an Word 2002 document to act as a form for users to fill out. In some cells I added check boxes and dropdown lists for people to select options from. When I click on the Protect form button the check boxes and dropdowns become active; however, I can't type anything in the other cells. If I click in an empty cell it automatically moves to the next checkbox. When I unprotect the form then I can type in the empty cells but then checkboxes and dropdowns become useless. I know that the user can double click on the checkbox and then manually select to have it checked, but they can't do this with the dropdowns. What do I have to do to allow the user to type in responses to the tables cells and also select answers from checkboxes and dropdowns? Thanks!

    Read the article

  • Can I use my Belkin router as a repeater?

    - by Kyle R
    I've got a brand new, unopened Belkin N600 DB router (yay 50% off sale), and I can't seem to figure out if I can use it as a repeater. As far as I can tell, it doesn't support DD-WRT or Tomato, but I'm wondering if there may be some way to rig it up to repeat Wifi. Also, I really need to know before I open it, because, being a bit tight on money at the moment, I'll probably sell it if I can't use it as a repeater. Finally, two caveats: I can't use the other wireless router for anything other than broadcasting straight from the modem (parents are paranoid about anything technological). I can't run ethernet to the second router due to the layout of the house. Thanks so much for the help everyone--if I'm being vague, tell me! EDIT: Also, the manual here is pretty useless on this topic as far as I can tell.

    Read the article

  • Songbird too damn slow, at least on my mac

    - by Cawas
    I've read on few places that Songbird is no good with more than some thousands of library items because it starts getting quite slow. Well, in my case (which is a clean install) I've imported 17k items (which I know is not that much) and instead of becoming just too slow it frequently gets to not responding for several minutes until getting back to its senses again. That's for whichever random operation such as deleting 1 item from library. I've also read on few more places that gives very little hope on fixing this issue, but I wonder... Is there any way to tweak it and make it work as fast as expected? Am I missing something or is this just a complete and utterly useless piece of software for libraries with more than 10 thousand thingies?

    Read the article

  • Is it possible to use a dual processor computer as your desktop?

    - by Ivo Flipse
    I've seen some people suggesting to get a motherboard that supports two processors and stick two Xeon Nehalem processors in it. Could you use this system as a desktop PC or is this useless or even impossible? It's more hypothetical question if Windows 7 would support such a set-up. I know you could just take an i7, but wouldn't two of those processors be a whole lot more awesome? Like the previous generation Skulltrails? The idea would be to have a motherboard like this ASUS Z8NA-D6C Dual LGA 1366 Intel 5500 ATX and two Xeons (since I don't think i7's could be used) Intel Xeon E5405 Harpertown to run something like Windows 7 Ultimate.

    Read the article

  • How to create Restoration Partion?

    - by Fellknight
    For some time now, when buying new computers (laptops in particular) from big name brands-like DELL, HP, TOSHIBA, etc.-most of them come with a "rescue" or "restore" partion instead of installation CD/DVD. Said partitions have everything needed to rebuild the factory installed OS, unfortunately they also include all crapware that the OEM installed on the machine. Is it there a way to custom create such a partition with out all the useless software included?. They seem quite appealing considering they only use about 10GB-20GB of space and offer the pretty much the same functionality as a complete system image/backup.

    Read the article

  • why skype is not available on messengers like pidgin

    - by sterz
    i really like pidgin, empathy etc. (especially pidgin) because they gather all accounts like xmpp, msn etc. together except skype. i know skype uses a proprietary protocol but so does msn and it is available on pidgin. is it that hard to "put" skype on pidgin or alike messengers? what is the reason that skype is not implemented in pidgin? note: i know there is a plugin for pidgin to support skype but it requires the official skype client to be installed and running. pretty useless.

    Read the article

< Previous Page | 13 14 15 16 17 18 19 20 21 22 23 24  | Next Page >