Search Results

Search found 14958 results on 599 pages for 'people'.

Page 173/599 | < Previous Page | 169 170 171 172 173 174 175 176 177 178 179 180  | Next Page >

  • Where can I SPECIFICALLY find a place that sells TOSHIBA QOSMIO F30 videocards?

    - by Manny Irizarry
    Where can I SPECIFICALLY find a place that sells TOSHIBA QOSMIO F30 videocards? I need to replace mine for the 3rd time. Two video cards have blown out before because I had a fault, NVIDIA video card software driver installed that they had too many compliants that it was telling the fan that keeps the video card cool to stop working. I had finally discovered why my video cards were blowing out after the 3rd time. So again, please my people, where can i specifically find one?

    Read the article

  • What are your favorite open source tools? (that is not very famous)

    - by sucuri
    I believe every system administrator is used to open source by now. From Apache to Firefox or Linux, everyone uses it at least a little bit. However, most open source developers are not good in marketing, so I know that there are hundreds of very good tools out there that very few people know. To fill this gap, share your favorite open source tool that you use on your day by day that is not very famous. *I will post mine in the comments.

    Read the article

  • Vulnerability research. Is it really research?

    - by Benjamin
    IT security people often say they do "vulnerability research". They defend the idea that they actually are doing some kind of "research". But is searching for vulnerabilities in software real research? A geologist looking for mines in the desert is doing "exploration", not "research".

    Read the article

  • Format Change Event for Excel VBA

    - by The_Third
    I'm trying to prevent people from modifying (most) of my spreadsheet while still alowing them to use the sort function of the AutoFilter. What I've done so far is used the Worksheet_Change event and Application.Undo to automatically undo any values entered into cells that I don't want to be modified. This works great, except that it can't detect changes in formatting. Does anyone know of a means to trigger an event when the format (text/background color) of a cell is changed? Thanks!

    Read the article

  • Website load perfectly from localhost but after 3 or 4 hours is not load from remote computer until restart iis

    - by kia
    I have a web application on IIS 7.5 and windows server 2008 r2. It's load perfectly from localhost but after 3 or 4 hours is not load from remote computer until restart iis or recycle pool. Users of this site are about 900 people. Some setting of my pool: .Net frame work version: v2.0 Manage pipe line mode: Integrated Enable 32-Bit applications: true Identity: Administrator Idle time-out: 120 Load user profile: false Rapid fail protection enabled: false Disable recycling for configuration changes: true

    Read the article

  • Access to MediaShield RAID utility

    - by Serg
    I'm using RAID-1 configuration on a PC which will be accessible by many people who are not very experienced with computers. So I'd want to restrict access to MediaShield RAID configuration utility with pops-up on every boot proposing to press F10 button. Is there a way to hide that boot message or protect the utility with a password?

    Read the article

  • Is there an online identicon creator?

    - by wonsungi
    I thought the pictures associated with our profiles were automatically generated until they were manually changed. A lot of people have these cool identicons based on their IP address. How can I get my own identicon? I am looking for an online generator. Gravator does not seem to have any options to generate identicons. Edit: I will probably accept your answer if you just tell me how you made your identicon (and it did not involve downloading/installing stuff)

    Read the article

  • poorman's redandunt domain name server array

    - by John
    Can I configure my domain, example.com's name servers as: ns1.dyndns.com ns2.dyndns.com ns1.opendns.com ns2.opendns.com That is, combining free dns services to create a redundant name server array? Note these name servers from different companies are not aware other companies' name servers also serve our domain. In case one company, say, ns1(2).dyndns.com is down, will people experience interruption when visiting my example.com? If one name server is unreachable, the next name server will be tried, or?

    Read the article

  • office 365 chat service in ubuntu

    - by GhostRider
    In my organisation, people use microsoft office 365 for mail service. In windows system they can setup a chat client with office 365 and use the instant message sevice. I'm having a ubuntu m/c and when i searched around the web could not find the option to use office 365 chat in my machine.How can i use the same. Error message: No setup available for this computer Read: Set up your Mac for Office 365 Return to Home

    Read the article

  • SharePoint 2007 licensing question

    - by MadBoy
    I've SharePoint 2007 Enterprise installed. I recently found out I have 10 licenses for SharePoint 2007 Enterprise CAL 40 licenses for SharePoint 2007 Standard CAL Does it mean 50 people can use SharePoint or how licensing works in this case? Just for sake of all information, i was given that system and licenses just wanted to be clear what correct licensing should be.

    Read the article

  • How do I set up domain names for IP's on my LAN?

    - by Qemal Stafa
    I have a LAN with 50 clients and my company has made me do a local WebApp. This is new territory for me, but as I see it, the individual internal IP's are regulated by MikroTIK. I was wondering, how does one make MikroTIK recognise internal domain names for this IPs? Right now, the WebApp works fine and can be used by entering 192.168.3.150/app/ But since most people have difficulties entering IPs I was wondering if i could do smth like : myroom.lan would be just as you typed 192.168.3.150

    Read the article

  • Permission denied but group permissions look good on redhat

    - by Tony
    I have a user ftpadmin: -bash-3.2$ id ftpadmin uid=10001(ftpadmin) gid=2525(fsg) groups=2525(fsg),10005(git) The important group to note is "git" Then I have my git repository: ls -al drwxrwxr-x 7 git git 4096 Apr 20 14:17 fsg So ftpadmin is a member of git, and git has given all permissions to people in the group. Why do I see this when I login as ftpadmin: -bash-3.2$ ls -al /home/git/ ls: /home/git/fsg: Permission denied ... Seems like I should have permission...

    Read the article

  • easy to setup FTP server on Linux?

    - by George2
    I am using Red Hat Linux Enterprise 5. I am new to this development environment, and previously worked on Windows. Could anyone recommend an easy to setup/maintain and free FTP server for my platform? I just need basic features and used by a couple of people only. Thanks in advance.

    Read the article

  • Users take over a minute to log onto a 2008 windows server. LSM.exe running at 100MB+ memory.

    - by seanyboy
    We've a 64bit Windows Server 2008 running Remote Desktop. The application lsm.exe (the local session manager) appears to be leaking memory. Although the memory usage is quite low when the server is rebooted, this continues to climb until people can no longer log in. The server has no audio card and does not have any AV software installed. The server is fully service packed. (Service pack 2) What could be causing this, and how would I fix it?

    Read the article

  • Squid vs mod_proxy (apache)

    - by Fahim Akhter
    Hi, New to servers, been hovering on http://highscalability.com/ for some days. Most of the architectures there show that people are using squid for proxy. Apache also provided mod_proxy which to a noob eye seems pretty much the same. Is there a perticular reason to opt for squid instead of mod_proxy? Thanks

    Read the article

  • How to provide wireless internet in a small business?

    - by ColinYounger
    My wife has a small business that she wants to offer a free WiFi hotspot in. She suggested opening up our private 'net connection to the customers - T&Cs of our internet provider and thoughts of random people viewing kiddy porn floated through my mind. So, first action will be to get a separate internet connection. But I have no experience of setting up a public WiFi connection. What considerations should I make with regards to: WAP Security Access logging?

    Read the article

  • How to provide wireless internet in a small business?

    - by ColinYounger
    My wife has a small business that she wants to offer a free WiFi hotspot in. She suggested opening up our private 'net connection to the customers - T&Cs of our internet provider and thoughts of random people viewing kiddy porn floated through my mind. So, first action will be to get a separate internet connection. But I have no experience of setting up a public WiFi connection. What considerations should I make with regards to: WAP Security Access logging?

    Read the article

  • Minimize writes to SSD disks with Windows 7

    - by mfn
    Most people use their SSD as their primary system installation disk with Windows 7. W7 already has a lot of optimizations for SSDs, both in terms of performance and lifetime. Minimizing writes increases the lifetime of SSDs, so post each suggestion as an answer and let others vote on them.

    Read the article

  • Can I prevent Oracle users from creating public synonyms but allow private ones?

    - by ninesided
    I've had a few issues where users have mistakenly created public synonyms which have led to people thinking some objects are in one schema when they're actually in another schema. Everyone knows they should be using private synonyms, but occasionally they forget or they make a mistake and someone gets burned. Is it possible to GRANT users the permission to create private synonyms but disallow public ones?

    Read the article

  • Rundown on Jira Permissions

    - by Jay
    Hi there, I'm trying to setup Jira for some company projects, and also some personal projects, and I'm running into some confusion with the permissions. Would someone running a Jira server be able to give me a basic rundown of the most efficient way to setup company projects (where a group of people will be working on the project), and a personal project (where only myself, and perhaps one other person will be working on the project)? Any help on this, or a very basic "best practices" guide for Jira permissions would be extremely helpful. Thanks very much

    Read the article

< Previous Page | 169 170 171 172 173 174 175 176 177 178 179 180  | Next Page >