Search Results

Search found 77822 results on 3113 pages for 'thanks'.

Page 267/3113 | < Previous Page | 263 264 265 266 267 268 269 270 271 272 273 274  | Next Page >

  • Don't show hidden applications when using Command-Tab

    - by ash
    Hi, I'm wondering if there's a way to not show hidden applications in the list of running apps when using Command-Tab ? LiteSwitch (http://www.proteron.com/) sort of does what I want, except it grays out hidden applications, but I want them to not appear at all. I use hidden applications as a sort of 'I'll get to later, or don't bother me now' method, so it would be great if Command-Tab could honor that (the same was Expose does). Thanks.

    Read the article

  • Is there a way to "lock" the viewport in vim?

    - by breadjesus
    I recently started using Vim with NERDTree. The annoying thing is when I close the buffer, NERDTree expands to fill the rest of the screen, and I have to open another file and reopen NERDTree to get it back to the old layout. Is there a way to "lock" NERDTree in place? Ideally, closing a buffer would replace it with another buffer that's hidden, or open a new blank buffer if no other buffers are open. Thanks!

    Read the article

  • Propagaging Apache rules Automatically for all folders Beneath Root [closed]

    - by Sam
    Hi folks, my webroot folder /httpdocs folder contains a .htaccess file The first lines look like this: RewriteEngine on RewriteBase / AddDefaultCharset UTF-8 Options +FollowSymLinks -Indexes -ExecCGI # DirectoryIndex index.php /index.php # ServerSignature Off Now, I want all settings that I have set it to, to be propagated automatically to other folders as well. How can I do that? Thanks very much for suggestions.

    Read the article

  • How can I tell if I'm behind a portal or proxy

    - by user19269
    I'm testing out a Content management system on my computer and have emailed their support for a problem regarding login.. They've replied back and asked if my CMS is behind a portal or proxy. I feel kind of stupid for not knowing this, but how do I find out? Everything is local (eg, hosted on my computer, etc). Thanks in advance!

    Read the article

  • Creating an .htaccess file? [closed]

    - by Sandeep
    How to create an .htaccess file? Is it required to restart the server after creating an .htaccess file? RewriteEngine On RewriteCompatibility2 On RepeatLimit 200 RewriteBase # unsupported directive: [ISAPI_Rewrite] RewriteCond %{HTTP:Host} ^xxx\.com$ RewriteRule (.*) http\://www.xxxx.com$1 [NC,R=301,U] RewriteRule ^/main.html$ http\://www.xxx.com/index.cfm [NC,R=301,U] ErrorDocument 404 /Errors.htm Thanks in advance.

    Read the article

  • Ubuntu package question

    - by Industrial
    Hi everyone, I run Ubuntu, and If i type the following in a terminal, I start a new instance of memcached, right? # memcached -vv How can I target the the current instance of memcached in terminal? It would help me to see the very-verbose mode on my already running instance. Thanks

    Read the article

  • Uploading User Made Videos to iPhone (from Vista)

    - by Darren E.
    Once a user downloads a video created with the iPhone 3GS and then deletes it from the iPhone, that video cannot be uploaded back to the iPhone...according to Apple. The videos are not treated as Photos and are not allowed to sync to and from the iPhone freely. Has anyone discovered a program or tweek that allows one to upload video to the iPhone? Thanks.

    Read the article

  • Best password practices?

    - by sansenya
    for sensitive data, would it be better to have a somewhat long, but memorable password (and hence not totally random) or use a program like keepass to make a super long, random password with the highest possible entropy, and then just write down the password on a piece of paper kept in ones pocket. If that bang on the door comes, then swallow the paper. Which is a better security practice? I'm not in any way a criminal, i just am curious about topics concerning security. Thanks.

    Read the article

  • Openvpn multiple subnet invisble to each other

    - by VimManiac
    I want to setup openvpn in such a way that i can place clients in different groups and give each group a private subnet (push the addresses to clients when they connect to the openvpn server) where they are visible to each other but not to the clients on other subnets. How do i proceed? Thanks.

    Read the article

  • How to generate Serial Keys? [closed]

    - by vincent mathew
    Which software can I use to generate Product keys if I have the GroupId, KeyId, Secret and Hash for the generation? Edit: I had seen a post which generated Product Keys using this information. [Additional Key Details/Activation Decryption*: GroupId = 86f 2159 KeyId = ed46 60742 Secret = e0cdc320ba048 3954789545910344 Hash = 5f 95 ] So I was wondering if there is any software which could generate keys using this information? Thanks.

    Read the article

  • Web server HW requirements [closed]

    - by Kimo
    Hello, I am trying to search for a book that would teach me how to choose web server HW requirements (hard disk space/technology, ram, internet connection) based on web site statistics (requests per second, etc...), how to scale webservers in case my website is getter higher traffic, etc All I get from the internet is software-related articles. Does anyone know how I can dig in for this kind of information? May be I am just searching using the wrong keywords. Thanks

    Read the article

  • Access to File being restricted after Ubuntu crashed

    - by Tim
    My Ubuntu 8.10 crashed due to the overheating problem of the CPU. After reboot, under gnome, all the files cannot be removed, their properties cannot be viewed and they can only be opened, although all are still fine under terminal. I was wondering why is that and how can I fix it? Thanks and regards

    Read the article

< Previous Page | 263 264 265 266 267 268 269 270 271 272 273 274  | Next Page >