Search Results

Search found 20827 results on 834 pages for 'check'.

Page 249/834 | < Previous Page | 245 246 247 248 249 250 251 252 253 254 255 256  | Next Page >

  • using web proxies - safe to enter passwords?

    - by bergin
    Hi Wanted to check something on a local site and see how the outside world sees it. however, using a web proxy im not sure that when i enter my credentials the proxy wont record this and give the proxy owner access to my site. is there another way to see my own site as though I was on the other side?

    Read the article

  • How to remote desktop into a sleeping workstation?

    - by Jake
    If an office workstation is turned on, either in wake/sleep/logged off/logged in mode, is it possible to remote desktop into that workstation given that I have full admin priviledge to the Windows Server and Active Directory governing the authentication? What settings is required to check the status of the workstation as well as remote desktop sucessfully? Thanks. NB: There is no one in office. I connect via VPN to the Windows Sever.

    Read the article

  • Attack from anonymous proxy

    - by mmgn
    We got attacked by some very-bored teenagers registering in our forums and posting very explicit material using anonymous proxy websites, like http://proxify.com/ Is there a way to check the registration IP against a black list database? Has anyone experienced this and had success?

    Read the article

  • DVD drive not recognized

    - by David Oneill
    I'm in the midst of building a computer (first time builder) I got everything plugged in, and hit the power button. After the excitement of the first boot coming up on my screen, I was looking through the BIOS settings. However, joy soon turned sour, as I looked at the list of installed SATA devices. My DVD drive wasn't on the list :( So, what are common things I should check/try?

    Read the article

  • Viruses on removable drives - how may they get into the system?

    - by osgx
    Hello When I inserting flash drive of my friend, how can I check that it is safe from infecting me with a viruses? Autorun.inf. This can be disabled with Shift while inserting or in registry anything other way of how can trojan get into my comp? folder.htt - seems to be disabled in modern XP Considering the default Windows XP SP2-SP3, flash is opened with Explorer.

    Read the article

  • Ubuntu Deluge checking downloads at start-up slow

    - by solomongaby
    I am downloading a very large torrent (~60GB) and when deluge clients starts up it takes a lot of time to check the parts downloaded during witch it uses a lot the hardisk that leads to a very slow computer. Is there a way to skip this checking ? or make it be less aggressive on the hardrive ?

    Read the article

  • How to access Jenkins remotely on Ubuntu 12.04 server?

    - by quincyglenn
    I have installed Jenkins and opened port 8080 on Ubuntu 12.04 server but still can't access Jenkins remotely. Below is the procedures I took. # Install Jenkins, enable UFW and open port 8080 sudo apt-get install jenkins sudo ufw enable sudo ufw allow 8080 sudo ufw reload # Check the status sudo ufw status 8080 ALLOW Anywhere 8080 ALLOW Anywhere (v6) # Locally curl -I localhost:8080 HTTP/1.1 200 OK Server: Winstone Servlet Engine v0.9.10 ... # On an external machine curl -I [ip]:8080 couldn't connect to host

    Read the article

  • How to find who deleted a line from a file in a SVN repository?

    - by Ivan Petrushev
    I work on a very large project (10000+ versions) and sometimes it happened that I need to know who of the other users deleted some line in a file. Is there a way to do that that? I can do svn blame with revision number to check if a line exists in that revision, then see in which revision the line is gone and see who commited that revision, but that procedure is lame with that large project. Is there a smarter way to do that?

    Read the article

  • Use a RAID Controller without drivers?

    - by cian1500ww
    Ordered an Adaptec 1420SA RAID card for my Debian Squeeze media server but didn't check to see if it was compatible, turns out it's not because it uses something called hostRAID which requires special drivers that aren't available for Debian. Could I still use the card as an ordinary controller and just use OS software RAID?? I'm not looking for speed, just need to mirror some drives that will be used for storage, the OS will reside on a disk connected to the server's onboard controller so the system won't be booting from any drives on the Adaptec controller.

    Read the article

  • Seek bounced emails tracker

    - by justSteve
    I'm preparing to implement a .net webapp on my IIS7 box where code generates emails and sends them using the native SMTP server. What facilities/utilities exist to alert me to non-successful conditions. Specifically i'm looking to automate some way to highlight the exceptions that need attention as opposed to disciplining myself (staff) to 'check the logs'. thx

    Read the article

  • Hyper-V RedHat Guest OS

    - by user8160
    I installed RedHat as a guest, and it installed fine. However, I do not have a connection to the internet, I bring up a browser and it cannot surf anywhere. Would someone be able to give me some things to check/do to figure out the issue?

    Read the article

  • Will terminal keep executing a command after i disconnect my VNC session?

    - by Fer
    I established a remote session in a MacOSX (10.6.8) from my PC (Windows7) using VNC. I initiated terminal and it is currently executing a task that will take probably 1 day before completing. Should I expect that even if I disconnect the VNC session, Terminal will keep running after I disconnect? I assume so since I used VNC just to remotely start the process but want to double check. Can anybody tell me if I am wrong?

    Read the article

  • Using Twitter to accept messages for a web app

    - by Jon
    I'd like my web app to be able to accept direct messages via twitter. My app won't be sending our any spam, in fact it won't send out any messages at all. It will essentially be a bot controlled account as I would only access the account via an API to check for direct messages. Is this kind of usage permitted within twitter's t & c? Thanks.

    Read the article

  • Nameserver Checker

    - by Steve Griff
    Hello, I've got Bind running on a server and although access to the domains I've set up is correct. I was wondering if there was an online (or offline) tool to check if I had setup the service correctly? Regards Steve Griff

    Read the article

  • Can all notebooks record from the sound card?

    - by Stefan Walter
    Is it possible that a modern notebook (say built in the last 5 years) contains a (onboard) sound card that it is not possible to record from? I've always assumed that this is a very basic capability, but since I can't get it to work, I would like to check that before I put any more effort into it. In case it matters, my notebook is an ASUS UL50VT, I'm trying with Sound Recorder and Audacity under Ubuntu, but I am, at this point, not asking for "Try that"-support or software recommendations.

    Read the article

  • Is it perfectly safe to install grub bootloader on regular partition?

    - by Flint
    One of the methods to do dual booting Windows with Linux OS is by installing grub boot loader onto Linux partition so you can retain Windows boot loader and let Windows handles the dual booting process. What's the odd that grub bootloader could partially overwrite the data at the beginning of the Linux partition and corrupt the file? Does grub actually check if there's a data at the beginning of the partition and move it to other location on the partition before writing its bootloader?

    Read the article

  • Does SDHC have any write error recovery ?

    - by marc
    What happen if SDHC card get write error (damaged cell / bad sector) ? Whole card is unusable (to trash, all data written to that sector now and in future will be lost) ? or rewrite sector (flash memory get corrupted when writing so maybe have any function to check if sector was written successfully) to another and mark as fault as unusable what will be seen as reduction of capacity but no data lost. I have to do some research about SD card-s on disk less machines. regards

    Read the article

  • Time until Members added to Group Policy is Replicated

    - by Kyle Brandt
    If I have a group policy, and add a group/user/machine etc to that group policy, how long is it until all domain controllers have that change in effect? This is a Windows 2003 Domain set up with controllers at different geographic locations (Each with a different L3 network). I realize it probably depends, but how do I figure out how long it generally takes for my given setup? Also, is there an event I can check to see if it has a reached a particular domain controller?

    Read the article

  • Why can't I sent emails from vtiger?

    - by lbownik
    I have configured an outgoing and incoming mail box settings in vtiger 5.04. I created a new marketing campain, added a contanct (lead) to it and try to send e-mail to that contact. When I click "send" I get: Please check the current user mailid. It should be a valid mailid to send Emails". But I configured everything!

    Read the article

  • Windows 7: "Replace All Child Object Permissions" Doesn't Stay Checked

    - by raywood
    I right-click on a top-level folder in Windows Explorer. I choose Properties Security tab Advanced Change Permissions. I check "Replace all child object permissions with inheritable permissions from this object" Apply. I get a Windows Security dialog that says, "Setting security information on" the list of objects that flashes by. But now the "Replace all child object permissions" box is unchecked. What is happening here?

    Read the article

< Previous Page | 245 246 247 248 249 250 251 252 253 254 255 256  | Next Page >