Search Results

Search found 1981 results on 80 pages for 'trick jarrett'.

Page 31/80 | < Previous Page | 27 28 29 30 31 32 33 34 35 36 37 38  | Next Page >

  • How to troubleshoot if a zip file is valid or if it is big file size to be unzipped ?

    - by mireille raad
    Hello , I am trying to unzip a file with the size of 2GB I am getting the following error : unzip CLTE_C_08.zip Archive: CLTE_C_08.zip End-of-central-directory signature not found. Either this file is not a zipfile, or it constitutes one disk of a multi-part archive. In the latter case the central directory and zipfile comment will be found on the last disk(s) of this archive. unzip: cannot find zipfile directory in one of CLTE_C_08.zip or CLTE_C_08.zip.zip, and cannot find CLTE_C_08.zip.ZIP, period. After some googling, some people say that this error is because the file is too big, others say because file is corrupt, others say that it could be a not unix archive. So my question , how to find out if file is valid archive file on my Centos and what is the command/trick to uncompress big files ( if any ) Thanks in advance :)

    Read the article

  • Thunderbird + Gmail, has to send emails twice.

    - by Mohammad
    I've configured Thunderbird to place a copy of my sent emails in my remote "sent" folder of my Gmail account as opposed to the local thunderbird one. This ensures I can completely take advantage of my imap synchronization. And so whenever I send an email, it first sends one to the address list, then it sends a new one to my sent box, however doing this with large attachments seems like a waste of time and bandwidth. Do you guys know of any extension or a combination of a trick plus a Gmail filter that could automate this in one step?

    Read the article

  • Is there a convenient method to pull files from a server in an SSH session?

    - by tel
    I often SSH into a cluster node for work and after processing want to pull several results back to my local machine for analysis. Typically, to do this I use a local shell to scp from the server, but this requires a lot of path manipulation. I'd prefer to use a syntax like interactive FTP and just 'pull' files from the server to my local pwd. Another possible solution might be to have some way to automatically set up my client computer as an ssh alias so that something like scp results home:~/results would work as expected. Is there any obscure SSH trick that'll do this for me? Working from grawity's answer, a complete solution in config files is something like local .ssh/config: Host ex HostName ssh.example.com RemoteForward 10101 localhost:22 ssh.example.com .ssh/config: Host home HostName localhost Port 10101 which lets me do commands exactly like scp results home: transferring the file results to my home machine.

    Read the article

  • 'Singleton' application - or let the user only launch one instance of a program at the time

    - by Disco
    I'm running a few linux desktops; mainly for kids (yeah, trying to teach them the right OS at early stage) (running Ubuntu 10.10, Gnome) The problem is that they found very funny to make their workstations (actually, old 512 Mb pentium 4) by launching thousands of firefox instances. I'm looking for a way to restrict them to launch 'N' instances of a particular application. Haven't figured yet how. Thought of a monitoring daemon but I think that would be too ressources hungry. Any idea of a script/trick to achieve this ? Note: i might have 1-2 level of users (the kids, and the more grown up kids) so i have also to limit per user; something like user1: 3firefox, user2: 2firefox instances.

    Read the article

  • How to restrict windows service to X cores?

    - by Martinnj
    I'm currently trying ot figure out a decent/nice way of determening what core(s) a single service should run on, in Windows Server 2008. I'm aware that for procceses there is two ways to do it: set affinity through task manager after proccess is launched. use "start /AFFINITY 0x1" or similar bitmask However this does not seem to work very well with services. When i try to launch the exe that the service will also run (the one that needs restriction) it just spawns a new commandline (and starts the process) but the process terminates shortly after. Does anyone here know how to do a similar trick for services? It is not important what core it is running on, it just needs to be restricted to only one. And preferably it should be something that can be automated, so we do not have to interfere when there is a server restart.

    Read the article

  • Is WinRT really as secure as it's made out to be?

    - by IDWMaster
    Prior to releasing Windows 8, Microsoft claimed that all WinRT apps are cleanly removed from your computer after uninstalling them, and that WinRT apps should not interfere with other running applications, because they are ran in a "sandboxed" environment. Microsoft has also claimed numerous times on Channel9 that Windows 8 apps are not ran in a VM. So my question is; are these claims accurate? If the application is not running inside of a VM, how is it possible to protect the system against malicious code at runtime, assuming the attacker was able to bypass the screening process of the Windows Store system? Microsoft allows "native code" in WinRT apps, so wouldn't it be possible (using hand-coded assembly or some odd pointer manipulation trick to call functions outside of the sandboxed environment and interfere with the rest of the system, if it's really "native code" and not some VM?

    Read the article

  • How to configure Time Machine to also backup an connected external hard drive?

    - by Another Registered User
    I've inserted a sweet SSD into my MacBook Pro, but it had limited space. So I had to export 60 GB of Data to an external hard drive. But now, when I run TimeMachine to backup my stuff, of course it only backups what's on the system disk. Is there a way how to also backup the connected external hard drive together with TimeMachine? Maybe there's a trick to get this work, with a fake folder that's actually the mounted drive? What could I do?

    Read the article

  • Squid url rewrites https>>http

    - by bobfran
    I'm exploring some uses with Squid proxy 2.7 and I have seen a good number of examples for url rewrites that take urls such as: http: //somesitename.com and then the rewriter can change the url to: https: //somesitename.com And those examples work great. What I'm wondering though, is if its possible to do the reverse with a squid url rewriter. that is, to go from https: //somesitename.com to http: //somesitename.com ? Simply trying to edit the script file that handles the rewrites doesn't seem to do the trick. So I was wondering if there are some certain things I have to configure squid to do first, if its even possible to do what I am asking. I have my browser manually set up to have squid as a proxy for all requests and I can see https requests showing up in my squid access.log file (via the CONNECT method).

    Read the article

  • What happens if a server never receives the RST packet?

    - by Rob
    Someone recently decided to show me a POC of a new Denial of Service method using SYN/TCP he's figured out. I thought it was complete nonsense, but after explaining to him about SYN-SYN/ACK-RST, he left me speechless. He told me "what if the server you're using to trick into sending the SYN/ACK packets can't receive the RST packet?" I have no idea. He claims that the server will continue trying to send SYN/ACK packets, and that the packetrate will continue to build up. Is there any truth to this? Can anyone elaborate? Apparently, the way it works is this: He spoofs the IP of the SYN packet to the target's IP. He then sends the SYN packet to a handful of random servers They all reply with their SYN/ACK packet to the target IP, of course The target responds with RST, as we know BUT somehow he keeps the target from sending the RST or keeps the random servers from processing it With this, apparently the servers will continue trying to send the SYN/ACK packets, thus producing a somewhat of a "snowball" effect.

    Read the article

  • IIS 6.0 mitigating BEAST

    - by D3l_Gato
    Recently, my PCI assessor informed me that my servers are vulnerable to BEAST and failed me. I did my homework and I want to change our webservers to prefer RC4 ciphers over CBC. I followed every guide I could find... I changed my reg keys for my weaker than 128bit encryption to Enabled = 0. completely removed the reg keys for the weaker encryptions. I downloaded IISCrypto and unchecked everything but RC4 128 ciphers and triple DES 168. My webserver still prefers AES-256SHA. Is there a trick in IIS 6.0 to get your webservers to prefer RC4 ciphers that I am not figuring out? It seems like in IIS 7 they made this very easy to fix but that doesn't help me now!

    Read the article

  • table alias (or 'symlink') in mysql

    - by andreash
    Hi there, in MySQL5.1, is there a way to make one table accessible by two different names? I'm thinking about somethink like a symlink on linux filesystems. I know theres the CREATE VIEW myview AS SELECT * FrOM mytable thing, but I don't only need to SELECT from both names, but also delete etc ... You might ask why I want to do this? It's about getting a commercial, closed-source app to work, which is crappily programmed (usually, the table names are all lower-case, but occasionally, they use capitalized names for the same table ...). Oh, that would be another idea: Is there a way to tell MySQL not to care about capitalization of table names (like on Windows filesystems?)? that would also do the trick ... Thanks for your insight! A.

    Read the article

  • How to setup a Linux machine to remotely use laptop screen as a second display?

    - by Ignas Limanauskas
    I am looking for a similar solution to MaxiVista, but for Linux (Ubuntu). I have an Ubuntu machine with just one display attached, but I also have a Windows laptop running a virtual machine with Ubuntu installed. I figured there must be a way to trick the main Ubuntu machine remotely use the virtual machine's display capabilities. After all, X11 does support forwarding and things like that. Any ideas how to do it using VNC? I saw some references to xdmx, but instructions so far are vague and do not seem to work on my machine(s).

    Read the article

  • Can we change control of two keys on keyboard?

    - by mr_eclair
    I'm using Eliteook 8440p hp machine and two keys on my keyboard aren't working v and b. laptop keyboard replace will take 2-3 days, and I can't stop my office work. I'm bored of using On screen keyboard to write v and b. I don't have any portable USb keyoard to connect to laptop right now. I'm thinking I'm not using Pg up and Pg Down button at all, is there any software or trick which can make it possible so that If i press Pg Up it will write v on page and Pg Down will write b. Hoping for quick and positive response.

    Read the article

  • Prevent Windows Exporer to extract metadata

    - by olafure
    Windows Explorer (windows 7 x64) crashes when it sees allegedly corrupted .wav files. I'm dealing with this problem and the hotfix doesn't work for me: http://support.microsoft.com/kb/976417/en-us The hotfix says that this happens if the .wav file is corrupt (which btw I don't think it is). What makes this even worse is that I can't access the file in any program! As soon as the open dialog sees the file, windows tries it's metadata extraction trick and exporer.exe halts. So my question: Can I by any means tell windows to stop this "metadata extraction" action ? (I have seen multiple problems associated with it in the past).

    Read the article

  • how to google a symbol keyword like "$?"

    - by ZhengZhiren
    i saw a trick in a book: in a linux shell, we can use &? to get the return value of a command. For example,we run a command,if it exit normally, the return value is 0. And then we type $?,we will get 0 in the screen. i want to google this kind of usage, so i have to type these two symbol $? in the search blank.But the search engine just return nothing to me... i have looked at the google help page, but still can't find a solution. so my question is: how can i search with this kind of keyword. or if you can give me some advise of the usage of $? or sort of thing, that will be also appreciated.

    Read the article

  • Proxying/Tunneling IPSec traffic via netcat or SOCKS?

    - by MattC
    I have a client that is using a SonicWall router as their VPN concentrator. I downloaded the client software and set up the router as a peer. My issue is that my company uses a dual DMZ setup, meaning we have an interior firewall, then a bunch of DMZ servers, then an external firewall, then finally the telco router. In this setup, the interior firewall has no way to communicate with the exterior firewall since they are on two totally separate subnets. The communication occurs through the servers that straddle the networks. In this case, I need some way to forward the ISAKMP/IPSec traffic from my desktop out to the Internet. My usual trick of using netcat on the intermediate proxy server doesn't work here since it's not TCP/UDP traffic as far as I can tell. All of my previous experience with VPN's have been using SSL-based VPN's which are clearly very easily proxy-able. Any help would be appreciated, thanks!

    Read the article

  • Is there a way to get the size of Outlook Calendar meeting items?

    - by bethlakshmi
    In our Exchange environment, our company caps the size of an Exchange account at a certain size. That size is the sum of all the exchange related stuff stored on the server - includign both the Inbox and the Calendar. I can tell with the Mailbox properties, Folder Size... window that my Calendar is a good 50% of my account's footprint. Is there any way to get a more detailed view of what meetings in the Calendar are taking up the space? Given the general pattern of incoming mail, it's my belief that 2-5 meetings are responsible for 75% of the memory consumption... I just need to find which meetings are the problem... and with my current calendar, it's a bit like finding a needle in a haystack. Anyone got a trick for this?

    Read the article

  • Renaming an Invalid Filename in NTFS

    - by Sadeq Dousti
    Recently, I loaned my flash disk to one of my friends, who had Mac OS. He copied a file on it, whose name included a backslash (\). The flash disk is NTFS formatted. Windows does not allow such filenames, and neither opens the file, nor deletes it, nor lets me delete the file. There are naive approaches to this problem, like: Formatting the flash disk; Giving it back to my friend and asking to rename it; Loading into some live Linux and renaming it. However, I'm looking for something more clever, like a program that can do the trick under Windows. PS: There's a tool called NTFSWalker which can browse the MFT records of the NTFS, but is unable to make any changes to them.

    Read the article

  • Constantly visible notification and access icon for Empathy in Gnome 3

    - by aef
    Since a short while I'm using Ubuntu Oneiric Ocelot (11.10) with gnome-shell (Gnome 3) and I'm trying to get accustomed to the default Empathy Instant Messaging client. One mayor problem for me (coming from Gnome 2 and Psi) is that there is no constantly visible icon which makes it clear (for example by changing its icon or showing an animation) if there are incoming messages which I did not read already and which lets me jump into them with one click. Also I'm missing a way to bring up the contact list or hide it away with a click. I sometimes have real problems even figuring out how to even open the contact list up again. Is there a Gnome 3 extension or some other trick available to display such a notifier in the top bar? I'm talking about something just like the sound and network controls which are already located there. I know that there are notifications in the lower notification area (former system tray), but as it is only visible as I move the mouse in the lower right corner of the screen, its useless for me.

    Read the article

  • Is Defrag "invisible" in Windows 8?

    - by Clay Shannon
    After (buzzard's luck) installing Visual Studio 2013 RC a couple of days ago, and then Visual Studio 2013 RTM yesterday, I thought I should defrag, what with all that install/uninstall activity going on. So I mashed the Window key and typed Defrag, and up came the "Defrag" search result. I mashed the Enter key and ... nothing ... Is Defrag working behind the scenes? I see no icon on the task bar ... Is there a trick to defragging beyond what I did?

    Read the article

  • Get into the router setting without knowing the password [on hold]

    - by Aron
    So my father has changed the router passwords, and programed the router to turn my wifi connection off automaticly at some times, for example at night. I wanted to know if there is any way I can trick this feature? Can i change my ip in some way, the router won't recognize my ip, so my new ip would have internet connection? Is it any way i can get into the router settings and turn that feature off without knowing the router password? Would be happy if I could get replies as soon as possible!

    Read the article

  • Viewsonic Monitor Resolution - Drivers are not working

    - by ravidev
    I have Viewsonic va1716w monitor which has VGA/D-SUB video input. I bought new Motherboard Intel DH67GD which has HDMI & DVI output. I connect my motherboard to monitor using DVI to VGA connector. It's working. Yesterday I installed windows 7 OS and also installed monitor drivers(downloaded from viewsonic site - signed version) When i set display resolution to 1440 x 900. It's not setting it.it sets back to 800x600. What should i do to make resolution to 1440x900 (monitor resolution)? DVI to VGA causing this problem or i need to do any trick? Any link to download drivers Please guide me.. Thanks in advance !!

    Read the article

  • Windows 7 RDP Fullscreen mode

    - by kubal5003
    I have a problem with remote desktop connection in Windows 7. When I connect to remote computer I would like to switch to fullscreen like I did in previous versions - just by clicking maximize. When I was in fullscreen mode and I moved the mouse to the upper border of the screen a nice bar appeared and I could minimize rdp or close it. In Windows seven when I click on the maximize button the window maximizes like a normal window - menu start/taskbar(whatever you call it) is still visible and because the resolution of the rdp client desktop is set like on the computer that I'm using it's not fully visible and scrollbars appear. That's really annoying. Can anyone tell me what to do? Is it a bug or maybe there is a "magic shortcut" that is poorly documented and does the trick? (I was trying to find it myself first ofcoz, but no result)

    Read the article

  • How to move a partition to the end in gparted?

    - by matnagel
    I can't find a way to move the partition /dev/sdb2 to the end, where 12GB are free http://dl.dropbox.com/u/3358699/permanent/gparted-sdb.png I can resize (expand) the partition, but not create (insert) any free space in front of it. How to do the trick? (There are 2 small black arrows on the top of the popup window in the screenshot at the side of the blue box that represents the 400 GB sdb2 - I can only move the right arrow to the right, which extends the size, but I cannot move the left arrow. When I enter something in the free space preceding box it is always reset to zero by the programm immediateley) I hope I explained this well enough, please feel free to ask for details. This is serious for me as I am expanding a live image. Maybe there is another solution with linux commandline tools ?

    Read the article

  • How to turn ON bluetooth in Dell Inspiron?

    - by ykombinator
    I bought a new Dell Inspiron laptop a month ago. The company had pre-installed all the required software in my laptop. As such, the bluetooth used to be switched ON whenever I switched on my machine. However, a few days later, the bluetooth stopped working. I re-started the Laptop and it was ON! Now I am facing this problem very frequently. As such, the wi-fi connection doesn't work unless the bluetooth is switched ON. The bluetooth turns ON after a few re-boots and sometimes doesn't turn ON for many days. Does anybody know any trick to keep the bluetooth ON everytime I switch ON my machine. P.S: The Dell manual did not help.

    Read the article

< Previous Page | 27 28 29 30 31 32 33 34 35 36 37 38  | Next Page >