Search Results

Search found 16144 results on 646 pages for 'custom identity'.

Page 308/646 | < Previous Page | 304 305 306 307 308 309 310 311 312 313 314 315  | Next Page >

  • Can you install the Unicenter Event Agent on a Windows 2008 server?

    - by hsatterwhite
    I'm trying to install just the Unicenter Event Agent on a Windows 2008 virtual server, but every time I run the NSM 11.2 installer I get the following error code: Unknown or bad error code from "cadepchkx.exe" error code = -1 There are already some Unicenter agents installed on this server, but that was done from a custom install script. Has any one experienced this or know how I can get the installer to run properly, so I can install the event agent?

    Read the article

  • Page layout software that allows mixed visual and programatic editing

    - by Justin Love
    I'd like to use a programming model for custom graphics and precision placement, and an interactive visual mode for large scale layout and less precise placements. I've used tools (PostScript, various vector drawing programs) that do one of these modes well, but leave me pining for the other model. Which tools should I be investigating? I'm currently on OS X. Examples: Creating diagrams with precise spacing, sets of cards, either likely drawing from some sort of data.

    Read the article

  • How do I keep exchange 2013 from converting message bodies from HTML to RTF?

    - by wes
    Is there a way to keep Exchange 2013 from converting HTML message bodies of incoming messages into RTF? I'm looking at a message that was sent to an Exchange 2013 user that has this at the top of the message body (PR_RTF_COMPRESSED): {*\generator Microsoft Exchange Server;} {*\formatConverter converted from html;} The message body is in pure RTF. I expect to see HTML wrapped in RTF, which is what I want. I've looked at "Set-MailUser -Identity blah -UseMapiRichTextFormat Never", but that doesn't work for a user with an Exchange mailbox and I think it only applies to outgoing mail anyway.

    Read the article

  • In Windows 7, is there a way to know how much memory a service is using?

    - by tigrou
    In windows 7, is there a way (by using common interface or a custom utility) to know how much memory a specific windows service is using ? It seems most services are hosted by svchost.exe processes ( some svchosts.exe processes seems to host tons of services). While it is possible to know which services are hosted by a specific process, I found no way to get information about how much memory a service take.

    Read the article

  • can symbolic links be used within App-V packages

    - by user765827
    We use the stats package SPSS through App-V however although it allows use of custom dialogs and macros, these must be placed in a sub folder within the app installation and so this means that users cannot add new macros. Is it possible to have an App-V package include a symbolically linked folder to point to a different place so that this remote folder could be updated easily without necessitating a rebuild and redeployment of the package? Thanks

    Read the article

  • DNS issues on my iPhone

    - by mattalexx
    I'm trying to call up "https://m.google.com" on my iPhone on my home WiFi. It's saying Safari "cannot verify server identity" of m.google.com, then when I press Details, it refers to https://m.google.com as "mattserver". "mattserver" is the name of my development server, a Linux box on my home network. This stinks of DNS issues to me. Accessing the unsecure version of that URL ("http://m.google.com") gives me a blank page. What could be going on here? Is there a way to look at the logs of my router somehow?

    Read the article

  • How can I avoid hard-coding YubiKey user identities into the PAM stack?

    - by CodeGnome
    The Yubico PAM Module seems to require changes to the PAM stack for each user that will be authenticated with a YubiKey. Specifically, it seems that each user's client identity must be added to the right PAM configuration file before the user can be authenticated. While it makes sense to add authorized keys to an authentication database such as /etc/yubikey_mappings or ~/.yubico/authorized_yubikeys, it seems like a bad practice to have to edit the PAM stack itself for each individual user. I would definitely like to avoid having to hard-code user identities into the PAM stack this way. So, is it possible to avoid hard-coding the id parameter to the pam_yubico.so module itself? If not, are there any other PAM modules that can leverage YubiKey authentication without hard-coding the stack?

    Read the article

  • Website & Forum sharing the same login credentials ?

    - by Brian
    I am going to be running a small site (100 hits a week maybe) and I am looking for a quick and easy way to share login information between the main website, a control panel (webmin, cpanel, or something), and the forum. One login needed to access any of the three. The website won't have use for the login, per say. But it will display "logged in" when you are on the website. Any custom solutions, any thoughts, logic, examples?

    Read the article

  • How can I migrate all keyboard shortcuts from one mac to another?

    - by cwd
    I have a lot of custom keyboard shortcuts and will be migration Macs. I tested Migration Assistant and it did not seem to get these. I read somewhere that they are stored in the individual application's plist files in the ~/Library/Application Support folder but even after copying a few of these folders over the shortcuts do not seem to follow. How can I get all of the keyboard shortcuts migrated to a new mac?

    Read the article

  • How can I make my eth0 connection default on startup?

    - by Alex
    I'm running kubuntu 9.10 and every time I log in auto eth0 is used instead of my custom connection called "batnet". I have batnet set to automatically connect, but despite this it is ignored and the default auto eth0 is used instead. This would be fine IF I could somehow figure out how to define a static ip for auto eth0. I would prefer to just make the 'batnet' connection default. How can I do this?

    Read the article

  • How to create issue dependencies/links in Jira (3.13) ?

    - by zarko.susnjar
    Hi, We recently switched from other bug tracking software to Jira (3.13 currently ). We need to set issue linking in a manner that my task start time depends on other colleague's issue and I can not start until he resolves his issue... I goolged and found that this kind of thing is integrated in newer versions :/ Maybe we need some plugin, make some custom field, enable something in administration part... Any help would be appreciated... (please retag/add jira and bug-tracking tags or whatever)

    Read the article

  • How to clean green gunk off case fans?

    - by Wesley
    Hi all, I just bought a used custom-built computer locally. In the process of checking the hardware, I notice that the case fans have accumulated a lot of green "gunk" and I've tried wetting the edge of a paper towel to wipe and rub it off. Still, there is always some residue remaining. What's the best way to clean off this gunk? Thanks in advance. No pictures, but I can take some if needed.

    Read the article

  • ssh login - execute command - exit

    - by renton
    hi folks, is there a way to just execute a command (or script) on a user (ssh) login and then exit? some kind of replacing the default shell with a custom script. i want a user only be able to restart a service, but not to have regular shell-access thanks

    Read the article

  • Recently used contacts getting corrupted Outlook 2010

    - by advis12
    We are using Microsoft's Identity Integration Feature Pack to sync contacts between two separate domains at two separate branches of our company. Recently we have run into an issue with a few of the contacts being pulled/synced from this remote location. When people in our organizaion are sending emails to certain contacts that are being synced from the remote location, the message delivery fails. After looking into the issue we are seeing that this failure is the result of the email being sent to some obscure email address rather than the correct email address. For example, the email address is getting changed to IMCEAEX_O=NT5_ou=44C5AE1BBEE0ED499F607407769311BB_cn=2F31FA0CA187314FA8D6A99BEFC52C36@domain.com rather than [email protected] Clearing the recently used contact list seems to solve the issue, but it does not solve the underlying problem. Because this issue is starting to happen to several different people I would like to solve the underlying cause. Does anyone have any input on how to start troubleshooting this issue? Also, we are using Exchange 2010. Thank you for taking the time to look at this.

    Read the article

  • not able to log on to blackberry gmail even after change of password and Captcha unlock

    - by user34895
    I have custom domain with gmail, and successfully configured gmail account to receive mail in blackberry. However, after deleting the account, I am not able to configure again, and it keep on repeating same problem: invalid email account. I have changed the password, and also did unlocking of captcha many times, but it just doesn't connect with blackberry account. Can I get some advice?

    Read the article

  • Summing of total with dynamics rows coming external datasource

    - by Gainster
    I am using Excel 2010 and retrieving data from SQL analysis service. When I refresh the data from Excel, the rows all refresh as they are bound to an external datasource. I am adding a separate column with a formula to sum the totals. With an increment or decrement of these rows, the alignment of custom columns goes out. How can I resolve this problem that summing of values become dynamic with adding and removal of rows?

    Read the article

  • How to create a Service Connection Point for Exchange (Manually)

    - by Ionoxx
    I'm being cautious here. Before I remove anything I want to be able to put it back. I'm having issues with a domain joined computer that is using SCP to get exchange autodiscovery information. It's getting information for the now unused internal Exchange through SCP even through the profile is using Office 365 on another domain. According to this conversation, I can simply remove the object from Active Directory Sites and Services. I want to know how to add back in should this create more problems, or if we reinstate the Exchange server. Right clicking on the parent "autodiscover" node doesn't allow me to create a Service Connection Point. Will simply running the cmdlet "Set-ClientAccessServer -identity servername -AutodiscoverServiceInternalUri url" be enough to recreate the object? Thank you!

    Read the article

  • What is the correct way to use Chef-server's 'validation key'?

    - by Socio
    It seems to me that the recommended way of adding clients to a chef server - or my understanding of it - is flawed. from the docs: When the chef-client runs, it checks if it has a client key. If the client key does not exist, it then attempts to "borrow" the validation client's identity to register itself with the server. In order to do that, the validation client's private key needs to be copied to the host and placed in /etc/chef/validation.pem. So the "validation key" is basically the superuser credential, allowing anyone who possesses it full access to the chef server? Am I reading this right? Surely the correct model would be for clients to generate their own keypair, and submit the public key to the chef server. Clients should never need access to this superuser "validation key". How can I do it in this, more secure, manner?

    Read the article

  • not able to log on to balcberry gmail even after change of psswd and Captcha unlock

    - by user34895
    I have custom domain with gmail, and successfully configured gmail account to receive mail in blackberry. However, after deleting the account, I am not able to configure again, and it keep on repeating same problem: invalid email account. I have changed the password, and also did unlocking of captsha many times, but it just dont connect with blackberry account. Can I get some advise?

    Read the article

  • Reinstallation or redeployment after hardware crash?

    - by HAY
    What is the best way to bring back the server online after hardware crash. I suppose image won't work after hardware change. So I like to know what is the fastest way to bring everything back. I've the following software running on the server: MSSQL IIS Custom Server Software FTP Server Then there is configuration: Registering asp.net 4.0 Configuration files for server software (these can be put back from backup) Configuration if windows firewall. Thanks in advance

    Read the article

  • Augeas - create new ini section

    - by Tim Brigham
    I have a config file in augeas using a custom lens that outputs the data as follows. /files/opt/../server.conf/target[1] = "general" /files/opt/../server.conf/target[1]/serverName = "XXX" /files/opt/../server.conf/target[1]/guid = "XXX0XXX" /files/opt/../server.conf/target[2] = "sslConfig" /files/opt/../server.conf/target[2]/sslKeysfilePassword = "$1$XXXXX" This works well - some of the target names contain colons, etc so I need to use the target[x] format. What is the correct ins syntax to create a new section in my INI using this syntax?

    Read the article

< Previous Page | 304 305 306 307 308 309 310 311 312 313 314 315  | Next Page >