Search Results

Search found 34141 results on 1366 pages for 'even mien'.

Page 234/1366 | < Previous Page | 230 231 232 233 234 235 236 237 238 239 240 241  | Next Page >

  • Unable to establish remote access to workplace pc windows 7

    - by sam
    I am successfully connected to my workplace via vpn. But when I try to connect to my pc via remote desktop it keep asking for credentials even I am providing the right one. This works fine in windows xp but unable to connect using win 7. Also after establishing a vpn I lost my internet access. Any idea.

    Read the article

  • IIS Strategies for Accessing Secured Network Resources

    - by ErikE
    Problem: A user connects to a service on a machine, such as an IIS web site or a SQL Server database. The site or the database need to gain access to network resources such as file shares (the most common) or a database on a different server. Permission is denied. This is because the user the service is running under doesn't have network permissions in the first place, or if it does, it doesn't have rights to access the remote resource. I keep running into this problem over and over again and am tired of not having a really solid way of handling it. Here are some workarounds I'm aware of: Run IIS as a custom-created domain user who is granted high permissions If permissions are granted one file share at a time, then every time I want to read from a new share, I would have to ask a network admin to add it for me. Eventually, with many web sites reading from many shares, it is going to get really complicated. If permissions are just opened up wide for the user to access any file shares in our domain, then this seems like an unnecessary security surface area to present. This also applies to all the sites running on IIS, rather than just the selected site or virtual directory that needs the access, a further surface area problem. Still use the IUSR account but give it network permissions and set up the same user name on the remote resource (not a domain user, a local user) This also has its problems. For example, there's a file share I am using that I have full rights to for sharing, but I can't log in to the machine. So I have to find the right admin and ask him to do it for me. Any time something has to change, it's another request to an admin. Allow IIS users to connect as anonymous, but set the account used for anonymous access to a high-privilege one This is even worse than giving the IIS IUSR full privileges, because it means my web site can't use any kind of security in the first place. Connect using Kerberos, then delegate This sounds good in principle but has all sorts of problems. First of all, if you're using virtual web sites where the domain name you connect to the site with is not the base machine name (as we do frequently), then you have to set up a Service Principal Name on the webserver using Microsoft's SetSPN utility. It's complicated and apparently prone to errors. Also, you have to ask your network/domain admin to change security policy for both the web server and the domain account so they are "trusted for delegation." If you don't get everything perfectly right, suddenly your intended Kerberos authentication is NTLM instead, and you can only impersonate rather than delegate, and thus no reaching out over the network as the user. Also, this method can be problematic because sometimes you need the web site or database to have permissions that the connecting user doesn't have. Create a service or COM+ application that fetches the resource for the web site Services and COM+ packages are run with their own set of credentials. Running as a high-privilege user is okay since they can do their own security and deny requests that are not legitimate, putting control in the hands of the application developer instead of the network admin. Problems: I am using a COM+ package that does exactly this on Windows Server 2000 to deliver highly sensitive images to a secured web application. I tried moving the web site to Windows Server 2003 and was suddenly denied permission to instantiate the COM+ object, very likely registry permissions. I trolled around quite a bit and did not solve the problem, partly because I was reluctant to give the IUSR account full registry permissions. That seems like the same bad practice as just running IIS as a high-privilege user. Note: This is actually really simple. In a programming language of your choice, you create a class with a function that returns an instance of the object you want (an ADODB.Connection, for example), and build a dll, which you register as a COM+ object. In your web server-side code, you create an instance of the class and use the function, and since it is running under a different security context, calls to network resources work. Map drive letters to shares This could theoretically work, but in my mind it's not really a good long-term strategy. Even though mappings can be created with specific credentials, and this can be done by others than a network admin, this also is going to mean that there are either way too many shared drives (small granularity) or too much permission is granted to entire file servers (large granularity). Also, I haven't figured out how to map a drive so that the IUSR gets the drives. Mapping a drive is for the current user, I don't know the IUSR account password to log in as it and create the mappings. Move the resources local to the web server/database There are times when I've done this, especially with Access databases. Does the database have to live out on the file share? Sometimes, it was just easiest to move the database to the web server or to the SQL database server (so the linked server to it would work). But I don't think this is a great all-around solution, either. And it won't work when the resource is a service rather than a file. Move the service to the final web server/database I suppose I could run a web server on my SQL Server database, so the web site can connect to it using impersonation and make me happy. But do we really want random extra web servers on our database servers just so this is possible? No. Virtual directories in IIS I know that virtual directories can help make remote resources look as though they are local, and this supports using custom credentials for each virtual directory. I haven't been able to come up with, yet, how this would solve the problem for system calls. Users could reach file shares directly, but this won't help, say, classic ASP code access resources. I could use a URL instead of a file path to read remote data files in a web page, but this isn't going to help me make a connection to an Access database, a SQL server database, or any other resource that uses a connection library rather than being able to just read all the bytes and work with them. I wish there was some kind of "service tunnel" that I could create. Think about how a VPN makes remote resources look like they are local. With a richer aliasing mechanism, perhaps code-based, why couldn't even database connections occur under a defined security context? Why not a special Windows component that lets you specify, per user, what resources are available and what alternate credentials are used for the connection? File shares, databases, web sites, you name it. I guess I'm almost talking about a specialized local proxy server. Anyway, so there's my list. I may update it if I think of more. Does anyone have any ideas for me? My current problem today is, yet again, I need a web site to connect to an Access database on a file share. Here we go again...

    Read the article

  • Can thunderbird with -no-remote launch firefox without it?

    - by Simon
    We have two thunderbird profiles, and we launch thunderbird using -no-remote as follows: thunderbird -no-remote -P Profile1 and thunderbird -no-remote -P Profile2 unfortunately, this means that if either of us click on a link in an email, and firefox is already running, we get a warning message telling us that firefox is already running, rather than having it open the link. Is it possible for thunderbird to use firefox's remote, even though it has been launched with -no-remote? (if it makes a difference, this is on Xubuntu Karmic)

    Read the article

  • running csync2 in stand-alone server mode gives error

    - by amin
    I installed csync2 on two ubuntu node as documentation in http://oss.linbit.com/csync2/paper.pdf. when i use a one-shot command csync2 -xv every thing goes well. but when i try to run csync2 in stand-alone server mode i get error: Server error: Address already in use. i searched over net and no documentation found on this problem, even tracing code and grep in files didn't get any result of problem source. do you have any idea?

    Read the article

  • how to stop homegroup sharing folders?

    - by srisar
    hi, i have homegroup on my pc and laptop, both running windows 7 , i can share the folders & files easily, but the problem is i cant stop sharing the folder. even i went to computer manage and stop sharing from there, but inside the homegroup the "stopped" share files are still showing. but now i cant open them because its showing the network resource is unavailable. but still the folders are showing how to hide them?

    Read the article

  • Free web app that can be used to keep track of loans made to people (like Mint)

    - by ShaChris23
    Is there a web app that is: Free Behaves like Mint But allows me to keep track of money I loan or owe other people? I should be able to setup an "account" for each person that I loan out to, and be able to "check off" when the person returns me the money, etc. I should also be able to add notes to each transaction to help me remember what it was for. Would be even nicer if I can add transactions via text messaging, email, etc.

    Read the article

  • What is a reasonable range for signal strength when next to my router?

    - by Jeff
    I know that these things depend largely on specific hardware but I don't even know if I am in the neighborhood. What would a reasonable range of signal strength be when my device is less than 5 feet from my router? House3 is my main router at 61% strength and that seems very low! Repeater is my... repeater which is 50' away in the next room. I'm not terribly concerned with the Repeater until I get my main router settled.

    Read the article

  • DI-524UP will become deadly slow when downloading torrents

    - by abolotnov
    I have a DI-524UP router that shares internet to two notebooks at home via wireless and a desktop via wired collection. It will become barely available/pingable via wireless when I download torrents on a desktop computer. Even when I limit download speed to 20% or less of available bandwidth - it must be something else, not the speed that causes the issue. I've tried limiting number of active connections and stuff but it will still not cure. Is there anything I can do about this?

    Read the article

  • Migrating VirtualPC images to Hyper-V

    - by Andrey
    I have a couple of development Virtual PC images; now I installed Windows Server 2008 + Hyper-V on my main dev laptop and need to migrate those images to Hyper-V. Google only finds steps for some older version of Hyper-V - I don't even see the wizard steps they are talking about. Any help would be highly appreciated!

    Read the article

  • Office 2010 beta affects trial instalation

    - by user33366
    I've found that after expiration of Office 2010 beta when I want to install trial, installation always ends up with an error 25400, even if everything is uninstalled. I've read that it's because Office refuses to install a trial after using a key that expires (like beta one). If so, is there a solution to reset that? I really need that trial. Please note that I don't want do anything illegal - I just want to use my obtained trial after betatesting Office 2010 before.

    Read the article

  • DNSSEC - What doesn't it cover?

    - by KP65
    I'm currently revising for an exam to do with DNS/DNSSEC. While I know DNSSEC provides various security enhancements for DNS, I would like to dive a bit deeper(for my own thirst for knowledge!) and would like to know what is still problematic security wise even after DNSSEC is employed? After all it can't have solved all programs DNS was having with regards to security, right? Thanks

    Read the article

  • How to push configurations to multiple Cisco Switches

    - by nixda
    Assume I have around 50 Cisco IE2000 Switches connected together and I want to reconfigure some settings, the same settings for every switch. Normally I would open a command line session via Putty and paste the commands. But as the number of switches is growing, even this method takes its time. I am aware of Kiwi CatTools. Unfortunately it's not free so I'm wondering if there are other efficient ways to configure a large number of Cisco switches.

    Read the article

  • MySQL my.cnf file? - MySQL Server 5.1

    - by Kevin
    hello guys, I have MySQL Server 5.1 installed on my computer (complete), and I can't seem to find the my.cnf file. I don't even have the etc directory. And I've also done a complete search for it but no results... Can anyone help me out here? Thanks, Kevin

    Read the article

  • Why is Transmission constantly active?

    - by Dov
    I am using Transmission (1.92, the latest version) in Mac OS X 10.6.2 Snow Leopard, and have noticed that, without any torrents (at all, not even paused), Little Snitch reports constant activity from it. What's going on? I'd always assumed when I saw that with Torrents loaded but inactive, it had to do with the DHT, or some such kind of scanning activity. But what could it be doing when no torrents are loaded at all?

    Read the article

  • Running PCIE card with the on board video card as well in Windows 7

    - by Russ Johnson
    I have an emachines Windows7 PC. I am trying to run the on board video card along with the dual DVI card I installed in the PCIE slot. In CMOS it shows the on board card as disabled and it will not let me enable it? Its greyed out so I cant even highlight it to change anything. I have done this before in XP on a few different machines so I know its possible, Any idea?

    Read the article

  • Change the Safari home page for the OSX Guest account

    - by John Lemberger
    I'd like to setup the guest account with easy access to a particular web site, but cannot figure out how to change the default. In 10.5.8 the parental controls can be used to control the list of bookmarks, but I haven't seen any reference to the home page. And when logged in as Guest, the home page settings are read-only, even if you enter an administrator password. How can the Safari home page be changed (and be made persistent) for the OSX Guest account?

    Read the article

  • Unreal Development Kit Hardware requirements?

    - by gojira666
    I am very interested in trying out the Unreal Development Kit for my own small to medium-sized hobby projects. I am wondering about the minimum hardware requirements. I have a Vaio Z laptop with dual-core 2.4 GHZ CPU and 2 GB RAM, and graphics chip is GeForce 9300M GS. Is it even practicable to run UDK on this hardware? Or do I need a "real" desktop PC?

    Read the article

  • Is VBoxManage guestcontrol passing parameters incorrectly?

    - by Dan Jones
    I had an idea of using my Windows VM (on a Ubuntu host) to open itms:// links (for iTunes) from the host. So, I'm using vboxmanage guestcontrol to make this happen. I have a script (win_vm_launcher.sh) that takes a link as the argument, and passes it to the host like this: vboxmanage guestcontrol "$VM" exec --image 'C:\Windows\System32\cmd.exe' --username "$USER" --password "$PASSWORD" -- /c start "$@" This works if I copy a link from my browser, and change http to itms. E.g., for https://itunes.apple.com/us/album/new-york-city/id3202598, I can do win_vm_launcher.sh itmss://itunes.apple.com/us/album/new-york-city/id3202598 and it works fine. The album opens up in iTunes on my VM. However, when I click a "View in iTunes" link from the iTunes site, it adds an extra parameter to the URI (specifically, the referrer), so it looks something like itmss://itunes.apple.com/us/album/new-york-city/id3202598?ign-msr=https%3A%2F%2Fitunes.apple.com%2Fus%2Falbum%2Fit-came-upon-midnight-clear%2Fid578946739 Unfortunately, if I try to run win_vm_launcher.sh itmss://itunes.apple.com/us/album/new-york-city/id3202598?ign-msr=https%3A%2F%2Fitunes.apple.com%2Fus%2Falbum%2Fit-came-upon-midnight-clear%2Fid578946739 it insteads opens up a regular Command Prompt window with the title "itmss://itunes.apple.com/us/album/new-york-city/id3202598?ign-msr=https%3A%2F%2Fitunes.apple.com%2Fus%2Falbum%2Fit-came-upon-midnight-clear%2Fid578946739". I don't even know how to set the command prompt window title, so I'm not sure how that's happening. If I run the command in the guest, it works fine, opening the album in iTunes: cmd /c start itmss://itunes.apple.com/us/album/new-york-city/id3202598?ign-msr=https%3A%2F%2Fitunes.apple.com%2Fus%2Falbum%2Fit-came-upon-midnight-clear%2Fid578946739 I found a VirtualBox bug that seems somewhat related, but not exactly. It probably doesn't matter, but my host is Ubuntu 12.04, and my guest is Windows 7. So, any idea if vboxmanage is incorrectly passing the arguments, and if so, is there a way around it? If I can't figure out the right way to do it, I'll end up having to process each argument, and stripping out any parameters on any URIs. P.S. I tried creating a batch script (out.bat) like this: echo %1 > %TEMP%/testing.txt and then running it from the host like this: vboxmanage guestcontrol "$VM" exec --image 'C:\Windows\System32\cmd.exe' --username "$USER" --password "$PASSWORD" -- /c "C:\path\to\out.bat" "itmss://itunes.apple.com/us/album/new-york-city/id3202598?ign-msr=https%3A%2F%2Fitunes.apple.com%2Fus%2Falbum%2Fit-came-upon-midnight-clear%2Fid578946739" It ran as expected, and when I open %TEMP%/testing.txt, it contained: "itmss://itunes.apple.com/us/album/new-york-city/id3202598?ign-msr=https%3A%2F%2Fitunes.apple.com%2Fus%2Falbum%2Fit-came-upon-midnight-clear%2Fid578946739" including the quotes. So, it sort of passed the parameter correctly (not sure why it still had quotes), so maybe the problem is with cmd.exe, or even the start command. I'm stymied.

    Read the article

  • Office 2003 won't install with proper CD KEY

    - by MadBoy
    I wanted to reinstall Office 2003 Pro. I retrieved the key with NirSoft ProduKey, confirmed with Jelly Bean Windows Key Finder and the key is the same. I've tried 3 different Office 2003 PRO CD's and it still won't install because it's saying key is bad, i even tried with different key from other computer and it also won't install. Anyone can suggest some workaround?

    Read the article

  • Good infrastructure design questions for software developers?

    - by JakeRobinson
    Building on Jeff's blog post titled Vampires (Programmers) versus Werewolves (Sysadmins) From my perspective, the whole point of the company is to talk about what we're doing. Getting things done is important, of course, but we have to stop occasionally to write up what we're doing, how we're doing it, and why we're even doing it in the first place -- including all our doubts and misgivings and concerns. So, what are some questions you ask your software developers when they request a server?

    Read the article

  • How can I prevent static when PC is plugged into an amplified speaker system?

    - by Kyle
    I've plugged a computer into an amp, using a 1/8 inch male extension cord, into a female adapter, that adapts into a male microphone 1/4 end. That being said, the amp sits at about half volume all the time because there are other things that play on it. (This issue is not flexible, nor is changing the amp) The problem is that now, even when I mute out the computer, you hear some static in the background. I was wondering some about some solutions (preferably multiple).

    Read the article

  • php-cgi memory usage higher than php's memory limit

    - by Josh Nankin
    I'm running apache with a worker MPM and php with fastcgi. the following are my mpm limits: StartServers 5 MinSpareThreads 5 MaxSpareThreads 10 ThreadLimit 64 ThreadsPerChild 10 MaxClients 10 MaxRequestsPerChild 2000 I've also setup my php-cgi with the following: PHP_FCGI_CHILDREN=5 PHP_FCGI_MAX_REQUESTS=500 I'm noticing that my average php-cgi process is using around 200+mb of RAM, even as soon as they are started. However, my php memory_limit is only 128M. How is this possible, and what can I do to lower the php-cgi memory consumption?

    Read the article

  • wvMaxima Error: "Not Connected To Maxima" on Windows

    - by muntoo
    Maxima gives an error "Not Connected To Maxima" whenever I try to do anything with it. I've looked around, but I couldn't figure out how to fix this on Windows. The only results I got were for Fedora. According to them, I think this may have something to do with the Firewall, but I can't figure out what. I even tried adding wvMaxima to the Windows Firewall exceptions list, but the same error comes up.

    Read the article

  • Change Adobe Reader's default program for e-mail links

    - by doncherry
    When I click an e-mail address in Adobe Reader X, an Outlook e-mail window opens, even though Thunderbird is my standard e-mail client and assigned to the mailto: protocol. How can I make Adobe Reader X open e-mail links in Thunderbird? I'm using Windows 7. How to Change the Email Client in Adobe Reader doesn't seem to apply to this version of Adobe Reader, I don't see the drop-down menu of step 6.

    Read the article

< Previous Page | 230 231 232 233 234 235 236 237 238 239 240 241  | Next Page >