Search Results

Search found 47335 results on 1894 pages for 'find'.

Page 294/1894 | < Previous Page | 290 291 292 293 294 295 296 297 298 299 300 301  | Next Page >

  • How can I run Ghost from a bootable USB key drive?

    - by Joe Philllips
    I have a laptop that does not have a cd-rom or floppy drive. It is able to boot from USB though. I have a disk image (ghost) of the disk that I need to restore back onto the laptop. I can't find a way to actually run the Ghost utility from a USB key though. I believe the ghost.exe should run from within DOS just fine but I can't seem to create a bootable USB key with DOS on it that allows me to run an EXE. Edit: I managed to find a Ghost utility that I could load from a bootable USB drive. Unfortunately, when I plug in my NTFS external drive (USB), it is not detected.

    Read the article

  • web browser not opening

    - by Hoss7811
    I had a virus adware on my desktop. I cleaned it using AVG. Now no browser will open, though the Internet connection is fine. When trying to open any browser I get a dialog box that says it can't find that location. This happens to all my browsers. I even downloaded firefox on my laptop and installed it on the desktop and still get the same response - Windows can't find the location. This all started when opening an email. I'm running Windows Vista

    Read the article

  • balancing loudest and quietest speaker noises

    - by Dan
    It is hard for me to find the right volume for my computer to watch my dvd's on because it seems like most reasonable volumes become overwhelming at the loudest parts of a movie and it is hard to even make out the dialog at the quietest parts. I find I'm constantly adjusting the volume during the course of a movie. Are there ways to make the difference between the louds and the quiets not so extreme? (both computer related solutions and non-computer related solutions welcome). Like moving my speakers across the room and increasing the volume? or the opposite? Or would would the extremes be less noticeable if I used headphones? Are there movie players that might have more complex sound adjustment features? If there is a software solution out there for linux that would be great too. Thanks, Dan

    Read the article

  • W3SVC service stopping error

    - by Ashian
    Hi, I have a web server ( IIS 7.5 , windows 2008 64 Bit web server ed) and notice that in last few days all web sites on server stopped and cant browser by visitor. I check the event log but I didnt see any things related to this problem. When I try to restart IIS i got error on W3SVC serivce.When IIS try to STOP it, W3SVC goes to stopping state and never stop. so I can't start it again. I try and find that I never can restart the W3SVC and when IIS work fine if I try to restart this service, it goes to stopping and never stop. 1- how can I find the problem on IIS? ( i have several asp.net app host on it ) 2- how can I fix W3SVC service stopping problem? Thanks Mehdi

    Read the article

  • Internet addicted, need software to control my usage and block access

    - by user69991
    I found I have problem to be a little addictive with surfing on internet. I am trying to find a free ware, (or software), that can help me for exemple to be just 2 hours per day on internet. Like it is counting the minutes and than stop working. not just 2 hours in one time, but in whole day.... maybe that it has different modes (2hours together, in whole day, 2hours + little reserve time) but I need something that really take me away access from internet :) Just counting time, is not enough for me :) Hope we will find something because, I just can't avoid not to loose 4 hours on internet. I have windows 7

    Read the article

  • Increasing the screen resolution in Ubuntu 10.04

    - by Veera
    I'm running Ubuntu 10.04 edition on my Acer 5738Z laptop. The screen size of my laptop is about 15'' but the screen resolution in Ubuntu is stuck at 1366x768. I know that my monitor could give better resolution, because previously I was running Win XP and I was able to set higher resolution there. So, my questions here: How do I increase my screen resolution, here? As per the answer given to a related question, I tried to edit the xorg.conf file, but I couldn't find the file in the place /etc/x11/. Should I create this file? If I have to install screen drivers separately, where could I find it?

    Read the article

  • Avoiding syslog-ng noise from cron jobs [closed]

    - by Eyal Rozenberg
    Possible Duplicate: How can I prevent cron from filling up my syslog? On my small Debian squeeze web server, I have syslog-ng installed. Generally, my logs are nice and quiet, with nice -- MARK -- lines. My syslog, however, is littered with this Sep 23 23:09:01 bookchin /USR/SBIN/CRON[24885]: (root) CMD ( [ -x /usr/lib/php5/maxlifetime ] && [ -d /var/lib/php5 ] && find /var/lib/php5/ -type f -cmin +$(/usr/lib/php5/maxlifetime) -delete > /dev/null) Sep 23 23:09:01 bookchin /USR/SBIN/CRON[24886]: (root) CMD ( [ -d /var/lib/php4 ] && find /var/lib/php4/ -type f -cmin +$(/usr/lib/php4/maxlifetime) -print0 | xargs -r -0 rm > /dev/null) Sep 23 23:17:01 bookchin /USR/SBIN/CRON[24910]: (root) CMD ( cd / && run-parts /etc/cron.hourly) kind of garbage. What's the clean way to avoid it?

    Read the article

  • Why change net.inet.tcp.tcbhashsize in FreeBSD?

    - by sh-beta
    In virtually every FreeBSD network tuning document I can find: # /boot/loader.conf net.inet.tcp.tcbhashsize=4096 This is usually paired with some unhelpful statement like "TCP control-block hash table tuning" or "Set this to a reasonable value." man 4 tcp isn't much help either: tcbhashsize Size of the TCP control-block hash table (read-only). This may be tuned using the kernel option TCBHASHSIZE or by setting net.inet.tcp.tcbhashsize in the loader(8). The only document I can find that touches on this mysterious thing is the Protocol Control Block Lookup subsection beneath Transport Layer in Optimizing the FreeBSD IP and TCP Stack, but its description is more about potential bottlenecks in using it. It seems tied to matching new TCP segments to their listening sockets, but I'm not sure how. What exactly is the TCP Control Block used for? Why would you want to set its hash size to 4096 or any other particular number?

    Read the article

  • Does a successful exit of rsync -acvvv s d guarantee identical directory trees?

    - by user259774
    I have two volumes, one xfs, and another ntfs - ntfs was empty, and xfs had 10 subitems. I needed to sync them. I initially copied a few of the subitems by dragging them over in a gui fm. Several of the direct descendants which i had dragged finished, apparently. One I stopped before it was done, and the rest I cancelled while it still appeared to be gathering information about the files. Then I ran rsync -acvvv xmp/ nmp/, where xmp and nmp are the volumes' respective mountpoints, which exited with a 0 status. find xmp -printf x | wc -c and find nmp -printf x | wc -c both return 372926. My question is: Am I guaranteed that the two drives' contents are identical?

    Read the article

  • how can I see a page's referrer in Chrome?

    - by EmmyS
    I've read the "answers" on this question, which is pretty much what I'm asking, but no one actually provides an answer. Nowhere in the Developer Tools (that I can see, anyway) is there a clear indicator of the current page's referring page. This is something that's really easy to find in Firefox; just right-click and choose Page Info. Where is this functionality in Chrome? If it's in the developer tools, which tab is it under? If it's not, is there an extension I can use to get this info? I've tried the Web Developer extension, and can't seem to find this very basic piece of info there, either.

    Read the article

  • Afraid computer is not secure

    - by Michael James
    I have recently implemented LastPass as a secure password manager. When I changed the password for my email address an associated account ([email protected]) that i had never seen before came up in association with my account. It asked me if i wanted to change password for my account and the "smithfaketester" account I used Google to try and find out what is going on, but came up empty. I am afraid my computer is bot net-ed. Any input is greatly appreciated. I have used google to search for reasons why this fake account was coming up but I did not find any meaningful info.

    Read the article

  • Installing Postgresql: postmaster not found

    - by user41667
    Hello, I'm trying to get a postgesql server running (most recent version). I downloaded the source, and it compiled fine. I also created a user postgresql and let that user own /usr/local/pgsql/data and such. I followed the installation procedure on the website of postgresql. However, the system now can't find the postmaster program, necessary to start the server (not on my account, but also not on the special created postgres account). Apt-get install also can't find a program called postmaster, so I assumed it was part of postgress. Clearly I did or understood something wrong, can you help me? Thanks in advance.

    Read the article

  • Private key authentication with pam_ldap

    - by Gareth
    I'd like to set up pam_ldap on some of our servers so that we can centrally manage who has access to which server, and easily revoke access if e.g. someone leaves the company. I've done some research and got this working. Hooray! However I'd also like to be able to use public-private key logins - i.e. allow users to store their public keys in the LDAP directory and have these work for logins too. I can't find any documentation about being able to do this, but I also can't find any reasons that it shouldn't be possible. Is there a way to do it, or is there some fundamental reason that it won't work?

    Read the article

  • Does exist an MKV meta tag / metadata editor?

    - by Vittorio
    Hi, I'm looking for an MKV meta tag editor, I'm using PLEX Media Server and PLEX Media Center on my iMac to see movies. PLEX is great because it automatically find and name all my movie library with year, director, gender, original title, description, movie poter art, etc. Unfortunately, it saves all the data only on a app DB file without edit any tag on the MKV files. A 20% of the movies needs to be fixed or PLEX needs help to find exactly the movie name, so if I need to move all my library elsewere, I need to do all the tagging work again. So, does exists MKV meta tag editor? Oh I'm a Mac user

    Read the article

  • What does % mean in linux / how to install jmf

    - by Ben
    I am fairly new to linux and am using fedora 14 (64 bit). I have to install the java media framework for one of my projects. In the installation instructions on their website (http://www.oracle.com/technetwork/java/javase/download-142937.html) they use the % symbol. I have done some research and googling and can't find what the significance of % is. Does anyone know? I have been able to find just about every other symbol meaning (., .., #, and more). They use it in the following context Run the command % /bin/sh ./jmf-2_1_1e-linux-i586.bin

    Read the article

  • Skype account migration / username change

    - by Kristian Glass
    Some time ago now I created myself a Skype account. I've since amassed a number of contacts, and also realised that the username I chose really isn't one I wish to continue using, for a variety of reasons. Services like Twitter and GitHub offer username-change functionality; I can't find this in Skype. Am I missing something, or does it just not exist? If, as I suspect, it doesn't exist, is there anything I can do to migrate my contacts across to a new, more sensibly-named, account, or am I going to find myself having to manually publicise my account name change and adding contacts to the new account one-by-one?

    Read the article

  • How to remove leading whitespace from file and folder names?

    - by timoto
    How to remove leading whitespace from file and folder names? (I'm running OS X 10.6 Snow Leopard.) As provided below by @Lri I was able to remove trailing whitespace using this: #!/bin/bash IFS=$'\n' for d in {1..9}; do find ~/Desktop -name '* ' -depth $d | while read f; do mv "$f" "$(sed 's/ *$//' <<< "$f")" done done Now I'm trying to remove leading whitespace with this: #!/bin/bash IFS=$'\n' for d in {1..9}; do find ~/Desktop -name '* ' -depth $d | while read f; do mv "$f" "$(sed 's/^ *//;s/ *$//' <<< "$f")" done done but it doesn't work. What am I doing wrong?

    Read the article

  • Where do Outlook folders go when moved?

    - by balexandre
    I have an account with external user mailboxes opened and accidentally I have moved a folder and now I can't find it anywhere. Action: I clicked on a folder and dragged it into another one. Result: Can't find the moved folder anywhere The above picture is the folders I currently have from my Outlook 2010 (via Exchange 2010), under an AD Network. Where can I (me, having admin rights over the network) retrieve that missing folder again? Attempts: The original and the one folder I need was accidentally moved, but I have created a poi folder and tried the same way, and I got the same result... the folder went missing. I also tried to reboot the client machine and access the same mailbox from OWA ... no luck on both attempts :( Any ideas on how I can retrieve the missing folder and its emails again?

    Read the article

  • Are formulas supported on fields in Office Word 2007

    - by Robert Koritnik
    Scenario I'd like to use: I want to have two fields in a Word document. I would like to enter a date in the first one. Then I want the second one to display a value based on the date I entered in the first field. Is there support for this kind of scenario in Office Word 2007? I looks on the web but couldn't find any useful info. I did find info about formula support but not for this kind of scenario.

    Read the article

  • Rename Devices in Device Manager

    - by Luke
    This is mostly just for the USB ports, as I recognize everything else in computers.... Anyways, is there a way to rename, or otherwise, identify which USB port (or other hardware for that matter) is which device in Device Manager? I know I can plug in a flash drive, then see what port it is connected with, and find out that way. What I would like though, is to find out that a certain plug is always a certain device in Device Manager. If I can then have a system in mind that always has the same order, I can look and see if a USB port is not being detected or not working properly, and as I uninstall/reinstall USB devices, I know I won't lose my keyboard or mouse, for example. The OS in question currently is Windows 7, but I would accept a solution for ANY version of Windows USB Devices | +--+USB Root Hub Port A | | | ---Keyboard | +--+USB Root Hub Port B | | | ---Mouse | +--+USB Root Hub Port C | ---Empty

    Read the article

  • Changing shared printer settings to default to greyscale

    - by Chris
    My company has about 60 employees all running Windows Vista or 7 and a gigantic Minolta printer hooked up to an EFI Fiery Image Processor. We're burning about $300 a month in printer supplies alone. I'm trying to find a way to cause the printer to default to grayscale in order to save money. So far I've tried: Changing settings on the image processor Changing settings on the print server Looking through the Group Policy editor to see if I can find anything useful Creating a new printer on the print server and setting it to be grayscale only Adding the printer to my computer directly (through a TCP/IP port) and setting it to be greyscale only Has anybody successfully done this before? If so, how was it gone about? I don't expect anybody to know the specifics of my environment, I just not sure what the right direction is.

    Read the article

  • SVN command that returns wether a user has a valid login for a repository?

    - by Zárate
    Hi there, I'm trying to find out an SVN command that would return some kind of true / false value depending on wether the user running it has access to a given repository. I'm building a tool for automated deployment and part of the process is checking out the code from the SVN repository. I'd like to find out if the user running the tool has a valid login already. If there's no valid login, just show a message and exit the tool (handling the SVN login internally is not an option at the moment). Plan B would be parsing the file in svn.simple looking for the repo URL, but thought about asking first. Thanks, Juan

    Read the article

  • Why is System listening on port 8000?

    - by poke
    I noticed by accident today that I have some unknown webserver listening on port 8000. Opening http://localhost:8000 just returns 404, so I don’t get any hint what exactly is listening there. I’ve used netstat -ano to find out, that the process with PID 4 is listening on that port. PID 4 is the System process. Why is my system listening on that port, without me actually starting a server? Or how can I find out what exactly is listening there? I’ve read the related questions about port 80 and port 443, but none of the services mentioned there were running on my system. And the other suggestions there didn’t work either. edit: The HTTP response of the server lists Microsoft-HTTPAPI/2.0 as the server. edit2: As requested by Shadok, here are the entries of TCPView with 8000 as the port. But I doubt it’s useful at all…

    Read the article

  • Host a SSTP VPN Server on Windows 8

    - by Maarten
    I have a small server computer running Windows 8 at home. Currently it is hosting a PPTP VPN server using the build-in Windows 8 functionality for that. What I would want is something more secure, like an SSTP VPN server. However, I can't find any functionality of windows 8 or 3rd party software that can HOST a SSTP vpn server on Windows 8. I've only seen Client stuff and vpn pass trough services via google, all which i don't want/need. The only HOST stuff i find via google is the PPTP i set up currently. Is there any way of hosting a SSTP VPN server on my home machine? Thanks in advance, Maarten

    Read the article

  • How do companies know they've been hacked?

    - by Chad
    With the news of Google and others getting hacked, I was wondering how companies find out, detect, and/or know they've been hacked in the first place? Sure, if they find a virus/trojan on user's computers or see a very high access rate to parts of their system that don't usually see much, if any, traffic. But, from what I've see in articles, the attack was pretty 'sophisticated', so I wouldn't imagine the hackers would make it so obvious of their hacking in the first place. Maybe someone can enlighten me on current detection schemes/heuristics. Thanks.

    Read the article

< Previous Page | 290 291 292 293 294 295 296 297 298 299 300 301  | Next Page >