Search Results

Search found 22481 results on 900 pages for 'andy may'.

Page 251/900 | < Previous Page | 247 248 249 250 251 252 253 254 255 256 257 258  | Next Page >

  • Why is a network ID not needed to connect to an IP address?

    - by baddogai
    I know how IP basically works, and knows that an IP address composed of a network ID portion and a host ID portion, but when I type a IP address, say 8.8.8.8 into the web browser, I didn't supply any subnet mask information. So, how does the browser know where the dividing line is between the network ID and host ID? Since 8.8.8.8 may mean 8.8.8.8/8, 8.8.8.8/24 etc. In a nutshell, the IP address I supplied is ambiguous.

    Read the article

  • Websites that introducing new stuff

    - by user33929
    Is there any blog/website that introducing new funny/fancy websites or new tech (software/hardware)? I am talking about the site that may introduce digg.com, superuser.com, mint.com or delicious.com when these site first come out. Also, introducing new handy/useful 3rd party applications/tools. Thanks.

    Read the article

  • Looking for a new, free firewall (Sunbelt has a huge hole)

    - by Jason
    I've been using Sunbelt Personal Firewall v. 4.5 (previously Kerio). I've discovered that blocking Firefox connections in the configuration doesn't stop EXISTING Firefox connections. (See my post here yesterday http://superuser.com/questions/132625/sunbelt-firewall-4-5-wont-block-firefox) The "stop all traffic" may work on existing connections - but I'm done testing, as I need to be able to be selective, at any time. I was using the free version, so the "web filtering" option quit working after some time (mostly blocking ads and popups), but I didn't use that anyway. I used the last free version of Kerio before finally having to go to Sunbelt, because Kerio had an unfixed bug where you'd eventually get the BSOD and have to reset Kerio's configuration and start over (configure everything again). So I'm looking for a new Firewall. I don't like ZoneAlarm at all (no offense to all it's users that may be here - personal taste). I need the following: (Sunbelt has all these, except *) - 1. Be able to block in/out to localhost (trusted)/internet selectively for each application with a click (so there's 4 click boxes for each application) [*that effects everything immediately, regardless of what's already connected]. When a new application attempts a connection, you get an allow/deny/remember windows. - 2. Be able to easily set up filter rules for 'individual application'/'all applications,' by protocol, port/address (range), local, remote, in, out. [*Adding a filter rule also doesn't block existing connections in Sunbelt. That needs to work too.] - 3. Have an easy-to-get-to way to "stop all traffic" (like a right click option on the running icon in the task bar). - 4. Be able to set trusted/internet in/out block/allowed (4 things per item) for each of IGMP, ping, DNS, DHCP, VPN, and broadcasts. - 5. Define locahost as trusted/untrusted, define adapter connections as trusted/untrusted. - 6. Block incoming connetions during boot-up and shutdown. - 7. Show existing connections, including local & remote ip/port, protocol, current speed, total bytes transferred, and local ports opened for Listening. - 8. An Intrusion Prevention System which blocks (optionally select each one) known intrustions (long list). - 9. Block/allow applications from starting other applications (deny/allow/remember window). Wish list: A way of knowing what svchost.exe is doing - who is actually using it/calling it. I allowed it for localhost, and selectively allowed it for internet each time the allow/deny window came up. Thanks for any help/suggestions. (I'm using Windows XP SP3.)

    Read the article

  • Can the Installation Monitor from the Win2K Resource kit be used on newer OS's?

    - by Scott Chamberlain
    Can the utility "Installation Monitor" from the Windows 2000 Resource Kit Tools for administrative tasks be used on newer OS's, specifically, Windows Server 2008 R2. The main thing I am concerned about is it may error will not track things correctly without letting me know that that it errored due to how Windows has changed between 2000 and today. If that is not the correct tool to use to monitor what a application is writing to the hard drive and registry, can you recommend me what I should use instead?

    Read the article

  • Core 2 Duo Processor E8400 with LGA 755 socket?

    - by Someone
    The motherboard on my PC (Dell XPS 410) has socket LGA 755 and according to the box on this processor I have, says it requires a motherboard with socket LGA 775. Will this processor work on the 755 motherboard? Edit: After reading further result online, I think I may have been fed some mis-information. According to this thread the XPS comes with socket LGA 755 but on other sites it says that it comes with LGA 775...

    Read the article

  • Blocking specific IP requests

    - by user42908
    Hi, I own a VPS running Ubuntu with Apache stuff. Recently I am getting continous request from IP static-195.22.94.120.addr.tdcsong.se.54303 : 12337 I already installed the 'arno-iptables-firewall'. Have iptables blocking 195.22.94.120 Still then I get the request from that IP if i see via tcpdump. May I know what else i can do to protect my VPS? Thank you.

    Read the article

  • subversion on a local drive problem

    - by mousey
    Hello guys, I am setting up subversion using this link http://svn.spears.at/ It says that "As the Subversion book warns, make sure to create all repositories on your local disks [FiberChannel is treated as a local disk]. Failing to do so, may result in repository corruption. " This us a big problem for me. Isnt there a way I can set subversion on shared drives. Is there a work around because availability is a major concern with local drives.

    Read the article

  • Nginx proxy with SSL Authentication

    - by Dustin Oprea
    I need to proxy an SSL-authenticated connection to another server that requires an SSL authenticated connection. I realize that the incoming and outgoing connections of the proxy may have different certificates, but is it possible to call proxy_pass and tell it to use a certificate/private key for connection to the proxied system? Based on the documentation, it doesn't seem possible. Maybe with another module?

    Read the article

  • Firefox addon for quick adding of rss feeds to thunderbird needed.

    - by alehro
    Actually the matter grown from SE using. It's quite bothering to: right click on rss link, choose "copy", then swich to tunderbird, right click on rss folder, choose "subscribe", push "Add", insert, ok. I'd prefer to: right click on rss link and choose the rss folder. The second motive for the question is that I'd like to look at implementation of interprocess manipulation of thunderbird. May be there is not exactly but something similar exist.

    Read the article

  • Apache: scope for environmental variables

    - by Anonymous
    While there's documentation available on Apache environmental variables, I can not find answer to one important question. Imagine I use rewrite rules to set environmental variable RewriteRule ... ... [E=something:1] What is the scope of "something" - global Apache server (this means "something" will be available for other request transactions), this request (means that "something" is only valid for THIS http request (and its related processing - but what's about internal redirects and other internal stuff - are they considered as THIS request, or another one?), and may be set differently within another (concurrent) request?

    Read the article

  • system is not Starting correctly when Booting windows

    - by sharza
    This menu allows you to select a hardware profile when Windows is started If your system is not starting correctly, then you may switch to a previous system configuration, important: system configuration changes made since the last successful start up will be discarded. Profile 1 If I choose Profile 1 (the only choice) Windows loads normally. This menu always appears when I turn on the computer. Is there any can solve it?

    Read the article

  • How to boost system sound output?

    - by infant programmer
    When I use Earphones, I feel that my system output is very low, I have set all the volume output to maximum in "control panel\Sounds and Audio devices", but still not satisfactory. May be my earphones output proportionality is lower. No problem with sub-woofer, I think its because of the amplifier. Is there any software to boost up system volume output to compensate ?

    Read the article

  • DVD-Player "Simulation"

    - by SjoerdV
    This may sound like a strange question, but I was wondering if there is software available which can emulate the behaviour of standalone dvd-players. I'm currently debugging a DVD we're creating, and I can't afford to go hopping to my house every time to check. The reason I'm asking is because the problems just appear on 'some' dvd-players which I cannot predict. Other option maybe, is there software that can check a VIDEO_TS folder or iso file for errors?

    Read the article

  • Throttle or limit resources used by a user in a database?

    - by Eduardo
    I would like to know how databases (like MySQL) are able to manage per user resources (like Oracle Database Resource Manager does) to be able to have users that may only get resources only when the database is mostly idle. http://stackoverflow.com/questions/2418581/is-there-a-way-to-throttle-or-limit-resources-used-by-a-user-in-oracle

    Read the article

  • CPU fan making noise. plz suggest

    - by user32185
    CPU fan is making noise ...i figured out reasons: Cable coming out of fan is vibrating ... And may be also CPU fan is loose causing vibration... suggest options... i cleaned the fan ...but found that there is no heatsink compound /paste between processor and the fan..is it ok . My processor is p4 2.4 ghz motherboard intel 845 gvsr

    Read the article

  • LaTeX Editors

    - by thinkhard
    Whats the best LaTeX editor you've used, and what would you recommend someone read to understand and become proficient with authoring papers/books in LaTeX? Additionally, I have failed in migrating to this site from StackOverflow and ServerFault so I cannot create a new tag for this. Anyone with sufficient reputation may tag this question for me with LaTeX and edit this paragraph out.

    Read the article

  • Adding additional locations to Office 2013 save "Places"

    - by Paperjam
    When saving a document in Office, you are given the option of saving locally or to your SkyDrive account. Presumably, it's possible to add additional locations to this menu (Dropbox, etc.). Is this possible in the Live Preview, and how does one accomplish this? Edit: when I asked this question, I was not logged into a Live account. I have since logged in and discovered services may be added to the logged-in account, however Dropbox (and non-MS services) are not offered. Account settings:

    Read the article

  • source command in Linux

    - by Rodnower
    My question is: why if I run some file with name aliases for example with content such as: alias lsa="ls -a" directly: $ ./aliases it don't create the alias (may be only in script context). But if I run it with command "source": $ source aliases it do the work? I mean after execution the alias "lsa" existing in context of command shell? "man source" give: "No manual entry for source", and in google I just found that it runs Tcl, but why Tcl influence shell context and bush not?

    Read the article

  • How much audio latency is noticeable by human brain?

    - by Borek
    I am choosing a wireless headset for my PC (I hate cables) and am looking at Sennheiser RS 170 / 180. They supposedly sound great, however, there is a 25ms audio latency. I've heard that this is OK when watching TV or listening musing but is bad for games. The question is - has there been any research / hard data that would show how much of a delay is noticeable by human brain? 25ms doesn't sound like a lot but I may be wrong.

    Read the article

  • TrueCrypt partition will no longer mount

    - by sparkyuiop
    I am hoping for some advice to help me out of my situation, with luck. I have a computer running Windows 7 Ultimate x64 with 3 hard disks installed. On my 2TB hard disk 2 (non-system disk) I have 4 partitions. One is for music, another for video, a downloads partition and a 500GB RAW Truecrypt encrypted partition / volume that I had setup to mount with 4 photographs used as keyfiles. The 4 photographs are located in my 'Documents' partition which is one of four partitions on my 1.5TB hard disk 1 (non-system disk) When I setup the disk encryption I did not (I'm 99% sure) create a password, I only used the 4 photograph keyfiles to mount the volume. Recently my 1TB hard disk 0 (system / boot) started to fail so I decided to replace it. I was going to clone the old disk to a new disk but decided that a fresh installation would be more beneficial. Once I had transferred all the required 'User Data' from my old hard disk 0 (C: disk) I discarded it. I reinstalled Truecrypt, pointed to the partition, selected my 4 keyfiles photographs and I mounted my encrypted volume with no issues. In fact I mounted it several times after re-installing Windows and after reboots. Now all of a sudden when I try and mount it I get the message "incorrect keyfile(s) and/or password or not a Truecrypt volume". Now I am not sure why this happened as I do not recall exactly what I did between last mounting the volume successfully and it not mounting. Here are some of the possible things I may have done to cause it to stop working but I am at a loss as to where to start to try and resolve the problem. 1. I had swapped the drive letters to a preferred order. 2. I possibly swapped the physical SATA connectors on the mainboard. 3. I enabled 'Hot Plugging' for the two non-system hard disk SATA ports and the DVD SATA port in the BIOS. I have tried changing the encrypted partition drive letter as suggested in another post but this does not help. On my old system the encrypted drive was drive "X". I have about tried it with all the other free drive letters but alas nothing changes. I do not recall what drive letter was allocated to the encrypted partition before I changed them all. I have not tried to change the letter back to what it possibly was to start with as I am happy with the current layout. I will try this is anyone thinks it would be worthwhile though. I do hope I have managed to convey my situation in an understandable manner and live in hope someone could help me recover years of personal files. Thank you very much for taking the time to read my post and for any suggestions you may offer. Regards Phillip Thorne (UK) Anyone???

    Read the article

  • is it possible for a host to maintain a tcp connection with two hosts with the same IP?

    - by wenzi
    I have two hosts A and B and a host(called client here) C C will establish a tcp connection with A, and send http requests to A then A will relay the HTTP requests to B (the relaying may be seconds of delay) and B will spoof its IP address as the IP of A and send http response to C I know there is sequnce number inconsistency problem, but is it possible to trick the TCP protocol to make the connection viable? thanks!

    Read the article

  • How to recover from deleted kernel on Solaris 2.6

    - by joshxdr
    I suspect that I have delected the kernel in my Solaris 2.6 workstation. I may have deleted /kernel by accident. Now on bootup I get the error "misc/krtld not found". I have the Solaris 2.6 installation disks. Is it possible to re-install without a reformat? Thanks for your help!

    Read the article

  • How to destroy a CD/DVD rom safely?

    - by HaLaBi
    I have old CDs/DVDs which have some backups, these backups have some work and personal files. I always had problems when I needed to physically destroy them to make sure no one will reuse them. Breaking them is dangerous, pieces could fly fast and may cause harm. Scratching them badly is what I always do but it takes long time and I managed to read some of the data in the scratched CDs/DVDs. What's the way to physically destroy a CD/DVD safely?

    Read the article

< Previous Page | 247 248 249 250 251 252 253 254 255 256 257 258  | Next Page >