Search Results

Search found 89638 results on 3586 pages for 'file table'.

Page 2329/3586 | < Previous Page | 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335 2336  | Next Page >

  • md5sum returns a different hash value than online hash generators

    - by Ravi
    On suse10, md5sum myname gives md5 hash as 49b0939cb2db9d21b038b7f7d453cd5d The file myname contains string "ravi" while some of the online md5 hash generators for the same string seem to give a different hash http://md5-encryption.com/ http://www.miraclesalad.com/webtools/md5.php They spit out the hash for "ravi" as 63dd3e154ca6d948fc380fa576343ba6 Why is there a difference in md5sum for the same string "ravi" ?

    Read the article

  • Not sure about ACL permissions

    - by Darko Miletic
    I'm writing up something about ACL usage on CentOS but since I still do not have a box ready I would like to ask something. Let us assume we have a folder /var/www/test If I do this in terms of permissions: /bin/chown -R root:root /var/www/test/ /bin/chmod -R u=rwx,go= /var/www/test/ /usr/bin/setfacl -R -m u:apache:rwx /var/www/test/ Will user apache be able to change owner of folder test or of any particular file within that folder? If answer is yes shall I than use group instead of user?

    Read the article

  • Why would the SQL 2008 "Generate scripts..." utility generate an invalid SQL script?

    - by Deane
    I have a SQL2008 database that needs to be restored to a SQL2005 instance. I have gone through the "Generate scripts..." wizard, set it for SQL2005 compatibility, and generated a 62MB SQL script. When I run it on the SQL2005 instance, it throws all kinds of errors, and some of them are really strange in that they describe an invalid database. FK constraints are wrong. It's trying to create FKs on columns that don't exist. It's trying insert records with duplicate key errors. It's trying to create the same objects twice. Any idea how this could happen? This SQL script was generated by SQL Server Management Studio just minutes before I tried to restore it, and was not modified. Why would this generate an invalid SQL file? Doesn't it just describe the SQL2008 database, which is presumably valid since we're using it? In particular, the duplicate key insertion errors mystify me. If there's a key constraint in the SQL script, then there must be the same thing in the SQL2008 table. So how could we get rows in there that violate that key constraint?

    Read the article

  • Full disk encryption on dual boot system using TrueCrypt

    - by Anders Hovgaard
    I'm thinking about encrypting my whole harddrive for example using TrueCrypt, which I've used for encrypting file containers for a while. It is possible to encrypt the whole harddisk through the program and then add a password secured bootloader before the actual bootloader. Is it possible to do this on a dualboot system with Windows 7 and Fedora 15 currently using Grub as the main bootloader? If so, is it possible to reinstall a system later or will that ruin the whole setup? Thanks

    Read the article

  • slow pppoe connection using Ubuntu 9.10

    - by Radu
    I have a Compaq Presario CQ61, instaled Ubuntu 9.10 and Windows 7 on it. It works great except the PPPoE connection in Ubuntu, when i dial in Windows my download speed reach up to 91 Mb, rebooted in Ubuntu, downloaded same file from the same server with a speed of maximum 3 Mb, cheked in Windows again 80 - 90 Mb constant. I can't figure what slow's the internet connection in Ubuntu. Anyone has an ideea on this problem ? (NO iptables configured, NO HTB, CBQ ...etc configured) . Thank you

    Read the article

  • Automate GUI tasks?

    - by overtherainbow
    I have a Windows application which is deadware, and it lacks the option of exporting data into a file. The only way to extract data is to copy each line into the clipboard, and paste it in an editor. As a work-around, I'm thinking of recording the action once, and loop through it until it reaches the last line in the application. I know there are quite a few such utilities for Windows, so I'd appreciate it if you could recommend one for this task. Thank you.

    Read the article

  • Convert .png images into a .ppt presentation on Linux?

    - by darenw
    I've created a presentation as a series of .png images, one per slide. What is a good way to convert these into a .ppt (PowerPoint) that I can give to some audio-visual person? I'm entirely on Linux, with no Windows or Mac software available. (Or maybe PowerPoint isn't the only game in town for presentation file formats?)

    Read the article

  • OpenLDAP Replication problem

    - by ramesh.mimit
    Hello Folks, I have a LDAP master server installed on CentOS-5.4 and I have installed LDAP on one more machine and I want it be configured as LDAP slave server but when I am importing the LDIF file or trying to create any new object in slave LDAP getting the below errors: LDIF text import Could not add object dc=transcomus,dc=com LDAP said: Server is unwilling to perform Error number: 0x35 (LDAP_UNWILLING_TO_PERFORM) Description: The LDAP server refused to perform the operation. There is no permission issue already checked that on /var/lib/ldap Any help much appreciate.. Thanks Ramesh

    Read the article

  • How to check if Emacs is in GUI mode (and execute `tool-bar-mode` only then)?

    - by dehmann
    I have this line in my .emacs file: (tool-bar-mode 0) because I hate the toolbars in my GUI emacs (/Applications/Emacs.app/Contents/MacOS/Emacs). But when I start up my other, text-based emacs in the terminal (/opt/local/bin/emacs) it complains about that command: Symbol's function definition is void: tool-bar-mode How can I add an if condition so that it executes the tool-bar-mode command only when I'm in the GUI emacs? Thanks!

    Read the article

  • IMAP mailboxes Backup script...

    - by Paul Stevens
    Hi guys, I need some advise to create a script that runs at night on my IMAP mail server, and backup all the mailboxes (50) and once the backup is done, burn such file in a DVD. What could be the best procedure to accomplish an IMAP backup and what tools should I use?.. Thanks

    Read the article

  • Why does a PDF printed in iWork Pages 09 look crappy in Adobe Reader?

    - by Abhic
    Hello, I use Snow Leopard at home and work and recently realized that the documents I create in iWork Pages 09 don't look good in Adobe Reader. I go about creating a regular document and 'Print' - Save as PDF in Pages in OS X. The saved PDF file looks great in Preview in OS X but it looks pretty bad in Windows' Adobe Reader and even Adobe Acrobat in OS X. Is there something I could do to make it look better on both platforms? Thank you.

    Read the article

  • mod_vhost_alias on cPanel

    - by Bart van Heukelom
    I have a webserver with cPanel / Webhost Manager (WHM). Now I need to install the Apache module mod_vhost_alias so I can use VirtualDocumentRoot. I've added LoadModule vhost_alias_module modules/mod_vhost_alias.so but the .so file does not actually exist. I could download it, but I'm not sure that's the correct way to do it. What is?

    Read the article

  • Cisco router not receiving OSPF updates

    - by WebDevHobo
    Or at least, that's what I think is happening. There doesn't appear to be a debug command for this, or to see if something is in the routing table. I'm testing out this setup in Packet Tracer. I have 3 routers and a webserver From left to right, you have: Webserver - Router1 - Router2 - Router3 Router1 and Router2 can succesfully ping WebServer. Router3 cannot. Router2 has a default gateway set, to send all not-recognized data through its serial interface to Router1. Like this: ip route 0.0.0.0 0.0.0.0 Serial 0/0/1 Serial 0/0/1 being the connection to Router1 Router2 and Router3 have OSPF configured. From their "show run": Router2: router ospf 1 log-adjacency-changes passive-interface Serial0/0/1 network 10.1.1.0 0.0.0.3 area 0 default-information originate ! Router3: router ospf 1 log-adjacency-changes network 10.1.1.0 0.0.0.3 area 0 passive-interface FastEthernet0/0 ! I was under the assumption that setting default-information originate on Router2 would give Router3 the needed information. What's going wrong here? The interfaces are up. Ip addresses are with mask-range, clock rate is set at correct end. I don't know what else to check.

    Read the article

  • rsync + Permission denied

    - by Diana
    I want to copy the some_file using rsync to my machine (red hat 5.3) from other linux server also (red hat 5.3) Is it possible to copy the file without to get "Permission denied." ? Remark - the login and password on 130.146.120.11 machine is: login=root password=moon rsync -WavH --progress 130.146.120.11:/tmp/some_file . Permission denied. rsync: connection unexpectedly closed (0 bytes read so far) rsync error: error in rsync protocol data stream (code 12) at io.c(165)

    Read the article

  • Redirect domainA.com to sub.domainB.com

    - by Duroth
    Just a short and easy question, I hope. Currently, I've got a primary domain linked to my (virtual) hosting server. I now have a second domain name which I would like to link to a specific subdomain, i.e. domainB.com/X - subdom.domainA.com/X Preferably without having this redirect show up in the address bar. Can this be achieved through DNS settings alone, or would it require me to add a .htaccess file in Domain A's root folder?

    Read the article

  • Windows XP hour glass cursor?

    - by feklee
    For an illustration, I need the Windows XP hour-glass cursor as a transparent image (PNG or whatever). Is it possible to extract the cursor from some system file? I found a page with cursors, but the hour-glass one is missing: http://telcontar.net/Misc/screeniecursors/

    Read the article

  • Can't remember the website for downloading common tools after reinstall

    - by JB
    I remember a while back finding a website for downloading lots of common tools in one go after a system reinstall. It had a dark background and checkboxes for selecting the tools (browsers, editors, readers, im clients, etc.). After selecting the tools it downloaded a file which went away, downloaded everything you'd selected and then performed an install on each of the different apps. Does anyone have any idea what I'm talking about?

    Read the article

  • How to turn off the cursor in OpenOffice

    - by hcs42
    When OpenOffice opens a file in read-only mode, it does not show a cursor, and the arrow keys (up and down) will move the page instead of the cursor. (By "cursor", I mean the blinking thing also called "caret" and not the mouse cursor.) Is there any way to turn off the cursor when the document is not read-only?

    Read the article

  • Internet slowed down because of SQUID Server setup

    - by Ranjith Kumar
    Recently I have setup a squid server for our office. I have computer (A) with two ethernet cards, one for internet and the second one for local networkIt has Ubuntu server OS with squid-server and dhcp3-server installedI have added few iptable rules to work like a router and redirect all http traffic to 3128 port This link is my reference. Everything worked fine for 2 days. All of a sudden internet speed went down drastically. When I connected the internet cable to my laptop to test the internet speed it was fine. Again when I reconnected it back to computer A everything was normal. This happened 4 times in a week. Could anyone here please help me why the internet speed is going down and it becomes normal when I reconnect the cable. EDIT: Rebooting the system (computer A) didn't make a difference. I have changed iptables so that http traffic doesn't redirect to 3128 port any further, still no change in the internet speed. I think the problem is not with squid but with something else. Here are my iptable rules SQUID_SERVER="10.1.1.1" INTERNET="eth1" LAN_IN="eth0" SQUID_PORT="3128" PROXYSERVERS=(Atlanta Baltimore Boston Chicago Dallas Denver Houston KansasCity LosAngeles Miami NewYork Philadelphia Phoenix SanAntonio SanDiego SanJose Seattle Washington) SERVERLEN=${#PROXYSERVERS[*]} I=0 iptables -F iptables -X iptables -t nat -F iptables -t nat -X iptables -t mangle -F iptables -t mangle -X modprobe ip_conntrack modprobe ip_conntrack_ftp echo 1 /proc/sys/net/ipv4/ip_forward iptables -P INPUT DROP iptables -P OUTPUT ACCEPT iptables -A INPUT -i lo -j ACCEPT iptables -A OUTPUT -o lo -j ACCEPT iptables -A INPUT -i $INTERNET -m state --state ESTABLISHED,RELATED -j ACCEPT iptables --table nat --append POSTROUTING --out-interface $INTERNET -j MASQUERADE iptables --append FORWARD --in-interface $LAN_IN -j ACCEPT iptables -A INPUT -i $LAN_IN -j ACCEPT iptables -A OUTPUT -o $LAN_IN -j ACCEPT while [ $I -lt $SERVERLEN ]; do iptables -t nat -A PREROUTING -i $LAN_IN -p tcp -d ${PROXYSERVERS[$I]}.wonderproxy.com --dport 80 -j ACCEPT let I++ done iptables -t nat -A PREROUTING -i $LAN_IN -p tcp --dport 80 -j DNAT --to $SQUID_SERVER:$SQUID_PORT iptables -A INPUT --protocol tcp --dport 80 -j ACCEPT iptables -A INPUT --protocol tcp --dport 443 -j ACCEPT iptables -A INPUT --protocol tcp --dport 22 -j ACCEPT iptables -A INPUT -j LOG iptables -A INPUT -j DROP

    Read the article

< Previous Page | 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335 2336  | Next Page >