Search Results

Search found 21991 results on 880 pages for 'going crazy'.

Page 174/880 | < Previous Page | 170 171 172 173 174 175 176 177 178 179 180 181  | Next Page >

  • How stable is zfs-fuse 0.6.9 on Linux?

    - by Mavrik
    I'm thinking of using ZFS for my home-made NAS array. I would have 4 HDDs in raidz on a Ubuntu Server 10.04 machine. I'd like to use the snapshot capability and dedup when storing data. I'm not so much concerned about the speed, since the machine is accessed via N wireless network and that is probably going to be the bottleneck. So does anyone have any practical experience with zfs-fuse 0.6.9 on such (or simillar) configuration?

    Read the article

  • How do you set up SSL and Nginx Proxying?

    - by Jason Christa
    I have Nginx listening to traffic on port 80 and proxying certain request to Apache over port 8080. I am going to set up Nginx to listen to port 443 for https traffic, but my question is how should the proxying be done now? Does the proxy to Apache need to be https or has Nginx already decoded it so I can keep sending it to Apache over port 8080. BTW, Apache is running with the least amount of modules installed possible and has currently has no SSL related modules, would I need to install any?

    Read the article

  • Partition is gone after power failure

    - by David
    Just had a power failure and am just going through my 4 usbdisks to remount them and found that 1 (the most important one) is coming back as 'doesn't contain a valid partition table'. What can I do to try to repair the disk and hopefully retrieve the partition? Lukily I do nightly backups. but would like to get what was there today if possible.

    Read the article

  • What to filter when providing very limited open WiFi to a small conference or meeting?

    - by Tim Farley
    Executive Summary The basic question is: if you have a very limited bandwidth WiFi to provide Internet for a small meeting of only a day or two, how do you set the filters on the router to avoid one or two users monopolizing all the available bandwidth? For folks who don't have the time to read the details below, I am NOT looking for any of these answers: Secure the router and only let a few trusted people use it Tell everyone to turn off unused services & generally police themselves Monitor the traffic with a sniffer and add filters as needed I am aware of all of that. None are appropriate for reasons that will become clear. ALSO NOTE: There is already a question concerning providing adequate WiFi at large (500 attendees) conferences here. This question concerns SMALL meetings of less than 200 people, typically with less than half that using the WiFi. Something that can be handled with a single home or small office router. Background I've used a 3G/4G router device to provide WiFi to small meetings in the past with some success. By small I mean single-room conferences or meetings on the order of a barcamp or Skepticamp or user group meeting. These meetings sometimes have technical attendees there, but not exclusively. Usually less than half to a third of the attendees will actually use the WiFi. Maximum meeting size I'm talking about is 100 to 200 people. I typically use a Cradlepoint MBR-1000 but many other devices exist, especially all-in-one units supplied by 3G and/or 4G vendors like Verizon, Sprint and Clear. These devices take a 3G or 4G internet connection and fan it out to multiple users using WiFi. One key aspect of providing net access this way is the limited bandwidth available over 3G/4G. Even with something like the Cradlepoint which can load-balance multiple radios, you are only going to achieve a few megabits of download speed and maybe a megabit or so of upload speed. That's a best case scenario. Often it is considerably slower. The goal in most of these meeting situations is to allow folks access to services like email, web, social media, chat services and so on. This is so they can live-blog or live-tweet the proceedings, or simply chat online or otherwise stay in touch (with both attendees and non-attendees) while the meeting proceeds. I would like to limit the services provided by the router to just those services that meet those needs. Problems In particular I have noticed a couple of scenarios where particular users end up abusing most of the bandwidth on the router, to the detriment of everyone. These boil into two areas: Intentional use. Folks looking at YouTube videos, downloading podcasts to their iPod, and otherwise using the bandwidth for things that really aren't appropriate in a meeting room where you should be paying attention to the speaker and/or interacting.At one meeting that we were live-streaming (over a separate, dedicated connection) via UStream, I noticed several folks in the room that had the UStream page up so they could interact with the meeting chat - apparently oblivious that they were wasting bandwidth streaming back video of something that was taking place right in front of them. Unintentional use. There are a variety of software utilities that will make extensive use of bandwidth in the background, that folks often have installed on their laptops and smartphones, perhaps without realizing.Examples: Peer to peer downloading programs such as Bittorrent that run in the background Automatic software update services. These are legion, as every major software vendor has their own, so one can easily have Microsoft, Apple, Mozilla, Adobe, Google and others all trying to download updates in the background. Security software that downloads new signatures such as anti-virus, anti-malware, etc. Backup software and other software that "syncs" in the background to cloud services. For some numbers on how much network bandwidth gets sucked up by these non-web, non-email type services, check out this recent Wired article. Apparently web, email and chat all together are less than one quarter of the Internet traffic now. If the numbers in that article are correct, by filtering out all the other stuff I should be able to increase the usefulness of the WiFi four-fold. Now, in some situations I've been able to control access using security on the router to limit it to a very small group of people (typically the organizers of the meeting). But that's not always appropriate. At an upcoming meeting I would like to run the WiFi without security and let anyone use it, because it happens at the meeting location the 4G coverage in my town is particularly excellent. In a recent test I got 10 Megabits down at the meeting site. The "tell people to police themselves" solution mentioned at top is not appropriate because of (a) a largely non-technical audience and (b) the unintentional nature of much of the usage as described above. The "run a sniffer and filter as needed" solution is not useful because these meetings typically only last a couple of days, often only one day, and have a very small volunteer staff. I don't have a person to dedicate to network monitoring, and by the time we got the rules tweaked completely the meeting will be over. What I've Got First thing, I figured I would use OpenDNS's domain filtering rules to filter out whole classes of sites. A number of video and peer-to-peer sites can be wiped out using this. (Yes, I am aware that filtering via DNS technically leaves the services accessible - remember, these are largely non-technical users attending a 2 day meeting. It's enough). I figured I would start with these selections in OpenDNS's UI: I figure I will probably also block DNS (port 53) to anything other than the router itself, so that folks can't bypass my DNS configuration. A savvy user could get around this, because I'm not going to put a lot of elaborate filters on the firewall, but I don't care too much. Because these meetings don't last very long, its probably not going to be worth the trouble. This should cover the bulk of the non-web traffic, i.e. peer-to-peer and video if that Wired article is correct. Please advise if you think there are severe limitations to the OpenDNS approach. What I Need Note that OpenDNS focuses on things that are "objectionable" in some context or another. Video, music, radio and peer-to-peer all get covered. I still need to cover a number of perfectly reasonable things that we just want to block because they aren't needed in a meeting. Most of these are utilities that upload or download legit things in the background. Specifically, I'd like to know port numbers or DNS names to filter in order to effectively disable the following services: Microsoft automatic updates Apple automatic updates Adobe automatic updates Google automatic updates Other major software update services Major virus/malware/security signature updates Major background backup services Other services that run in the background and can eat lots of bandwidth I also would like any other suggestions you might have that would be applicable. Sorry to be so verbose, but I find it helps to be very, very clear on questions of this nature, and I already have half a solution with the OpenDNS thing.

    Read the article

  • Internet Explorer 8 remembering me (keeping cookies) in "New Session"

    - by GJ
    From what I gather (e.g. http://tutorialfeed.blogspot.com/2009/06/ie-8-perk-access-multiple-gmail.html ) one can get a new IE8 window clean from older cookies and independent of what's going on in other windows. Alas, when I try that web sites still remember me in the window of the new session. Any ideas what's wrong in my setup? Thanks!

    Read the article

  • How can I export search folders in Outlook 2010?

    - by Martin
    In Outlook it is possible to export rules. Is it also possible to export custom search folders? I am trying to export the custom search folders I have defined in Outlook 2010 (the logic, not the contents). I have tried: right clicking the search folders and looking into the available menus going into the outlook Import/Export menu, but I can only export real folders to .pst etc. looked into the rules menu

    Read the article

  • In OpenOffice Calc, how do I drag and drop cells to insert rather than replace their destination?

    - by joachim
    I want to rearrange rows with the mouse in Calc. In Excel, I select the whole row, then drag and drop it while holding Shift. This causes the drag and drop cursor to turn into a bar rather than cells, and the cells are inserted at the bar's position. Is there a way to accomplish the same sort of thing in Calc without going around the houses inserting columns before the drag operation?

    Read the article

  • What is 'FizzBuzz' for system administrators?

    - by docgnome
    FizzBuzz is a simple test of programing ability, often used by employers to weed out people who can't actually program. Is there an equivalent test for system administrators and general IT guys? Clarification I'm looking for things that can be tested in an interview setting with some accuracy. Obviously, this isn't going to clearly determine the right person, just as FizzBuzz doesn't for programmers. I'm just looking to weed out people who think they can work as a system administrator/IT Person because they can surf the web.

    Read the article

  • double-click to run .sh file

    - by Delirium tremens
    GUI: I changed the permissions of an sh file, so that I can read, write and execute it. I double-clicked it, selected run in Terminal, but it didn't run. I double-clicked it, selected run, but it didn't run. Command-Line: bash *filename* runs it sh *filename* runs it The file content is: #!/bin/bash # get dirsyncpro home DIRSYNCPRO_HOME="$(dirname $0)" # start programm and pass any parameters java -Xmx512M -jar "$DIRSYNCPRO_HOME/dirsyncpro.jar" $* Works in this person's computer: http://www.knowliz.com/2008/08/how-to-installrun-sh-file-in-linux.html What's going on?

    Read the article

  • Printer monitoring script

    - by HannesFostie
    I am going to write a script of some sort to check event viewer in a windows server 2003 for all printjobs, and then write them to a comma delimited textfile like printername_floor_room.txt I am wondering what the best way is to do this realtime, and keep checking the event viewer constantly. Any caveats I need to be aware of? Thanks

    Read the article

  • Printer monitoring script

    - by HannesFostie
    I am going to write a script of some sort to check event viewer in a windows server 2003 for all printjobs, and then write them to a comma delimited textfile like printername_floor_room.txt I am wondering what the best way is to do this realtime, and keep checking the event viewer constantly. Any caveats I need to be aware of? Thanks

    Read the article

  • What is the real meaning of the "Select a language [for] non-Unicode programs..." dialog?

    - by Joshua Fox
    What is the real meaning of the "Select a language to match the language version of the non-Unicode programs you want to use" dialog under Control Panel-Regional Settings-Advanced in WinXP and Win2003? According to the dialog text, Windows will use this to display the resource strings such as menus. The treatment of text files is application-specific, so this setting will not affect that. But can I expect any other change in behavior from this setting? Any insights into what is really going wrong?

    Read the article

  • 3g/4g compatibility

    - by terrani
    Hi, I am looking for buying Ipad wifi + 3g, but I just heard about 4g. 4g is coming to Verzion very soon. If I buy ipad wifi + 3g now, am I going to able to use 4g with it??

    Read the article

  • Rack layout tools

    - by Luke
    I'm wondering if there's any tools (preferably offline) that would allow me to layout all of the new equipment that will be going into several standard racks. Currently I'm using Excel to map out all of the slots columns for the data but I suspect that there is some better method of doing this. Suggestions? Edit: Dell has an online tool, but doesn't seem very good at actually saving the data that you're working on (and obviously it's geared towards Dell hardware).

    Read the article

  • How to debug GPLI/OCS NG importing

    - by Xian
    I have OCS NG and GLPI set up and working fine idependently of each other on the same host. For a while GLPI was sccuessfully importing computers from OCS NG, but now GLPI shows there are new computers to import but doesn't do anything when requested to import them. How do I find what is going on? Are there any log files or debug modes I can turn on? Documentation on the interaction of these pieces of software is pretty sparse.

    Read the article

  • QMail Problem: Can't send email to one specific domain

    - by Andrew Phillips
    I'm running qmail as part of a Plesk installation on a Debian server. Everything works fine apart from any emails sent to @nandos.co.uk. I get no error messages they just end up stuck in the queue for eternity. I have no idea what is going on, because as far as I can tell this is the ONLY domain the server won't send emails to. Any ideas? TIA

    Read the article

  • Cygwin unable to compile

    - by christine
    I just downloaded Cygwin, I've never used it before cause I've always used putty. Cygwin is not letting me compile; I can see the files but it just doesn't let me compile and I do not understand why, am I doing something wrong? This is what's going on: Christine@Christine-PC ~ $ ls 8.6.c a.b.c a.c.c core new 2.txt test.c 9.13.c a.c a.out days.c new2.c test.txt Christine@Christine-PC ~ $ gcc a.c.c -bash: gcc: command not found

    Read the article

  • Sun Virtualbox: Cannot Install Windows 95 or 98

    - by c00lryguy
    I'm running XP and I've tried to install Windows 95 and 98 with the official CDs in Virtualbox. Both of them give the error: FATAL: no bootable medium found! System Halted I've mounted the CD drives within Virtualbox and also tried to change the boot order so that the CD drive is first but to no avail. I don't understand exactly what's going on here.

    Read the article

< Previous Page | 170 171 172 173 174 175 176 177 178 179 180 181  | Next Page >