Search Results

Search found 16385 results on 656 pages for 'fusion applications'.

Page 324/656 | < Previous Page | 320 321 322 323 324 325 326 327 328 329 330 331  | Next Page >

  • How to use remote microphone on Remote Desktop

    - by user553702
    I wish to connect to a remote Windows 7 PC that has a microphone, and use that local microphone (on the destination PC) in recording applications. Unfortunately whenever I connect on Remote Desktop, the remote PC's local microphones become hidden and disabled. Remote Desktop seems to force using the source computer's microphone with redirection, without an option to use the remote PC's microphone Isn't there a way to enable using the remote PC's microphone? I don't get why this should be so hard.

    Read the article

  • MAC OSX Mavericks, using bash to see "Get Info" attributes

    - by Rell3oT
    I want to use my bash shell to see the attributes that are shown when you right click on an Application and click Get Info. The specific attributes that I want to know whether or not they are checked is Open in Low Resolution, Prevent App Nap, and Locked. I looked in the Info.plist file but only generic information about the file was contained here, not which attributes were checked. Is this information contained in the Applications binary? Where is it?

    Read the article

  • X11 on a dedicated server

    - by Matthieu
    Hi all, I discovered X11, and I was wondering if it is possible to install it on a dedicated server, and have a "desktop" from the server running on my personnal computer ? Or maybe it is necessary for the server to have a screen ? Or a least kde or gnome ? What I want is a desktop of my server (as if it had a screen), but on my laptop, through internet. I want to be able to launch graphic applications remotely, as if it was a PC.

    Read the article

  • APPDATA and LOCALAPPDATA environment variables are not set on a profile in Windows 7 Pro 32bit

    - by Timur Fanshteyn
    I am having problem with a user account on a Windows 7 machine (local install, admin user account) APPDATA and LOCALAPPDATA environment are not set. Another user on the same machine, (also a local account, but without admin rights) has the variables set. This started to happen recently, however, I can not figure out if there was something installed on the machine to cause this. This is creating issues with applications that are trying to expand the variables to store local files. Thank you for the help.

    Read the article

  • What files to backup on Lighttpd+MySQL+PHP server

    - by Tomaszs
    I have a VPS with CentOS 5. I would like to create backup of: all my config files tweaks of database, php, server a databases cron settings website files installed applications and their settings (?) What files should i take into account? I don't want to miss any file that will be necessary to restore fast my webserver in case of any failure. And I don't want to create whole backup because entire VPS has like 30 GB of data.

    Read the article

  • Tools for load-testing HTTP servers?

    - by David Wolever
    I've had to load test HTTP servers/web applications a few times, and each time I've been underwhelmed by the quality of tools I've been able to find. So, when you're load testing a HTTP server, what tools do you use? And what are the things I'll most likely do wrong the next time I've got to do it?

    Read the article

  • Linux: Case-INSENSITIVE Filesystem

    - by Quandary
    What methods are there to make the Linux filesystem case-INSENSITIVE ? I have asp.net applications developed on Windows, but there are always issues with capitalization/spelling on mono when putting it on Linux. One way is to mount a localhost SMB share to /var/www. Are there any others ?

    Read the article

  • iChat or Gtalk won't connect to AIM. How can I fix this?

    - by classicrock985
    I can sign onto AIM.com and I know my account is active because I can sign in on my iPhone or AIM express. I can't however log in using any 3rd part applications. I've tried logging in using Adium, iChat, and Gmail Chat (Gchat) I have tried to change my port to "443" and changed the server name to something different. This is so weird. Any suggestions??

    Read the article

  • Is There any way to change Active Directory Users Database Source?

    - by Mehrdad Amini
    I need Active Directory Use My Own Custom Database (or shell or ...) for Authentication Users. Is there any extention or something like this to change User Passwords Database of active directory? I need this Because My Accounts Are In simple Database And I don't Want to Sync them periodically In Fact I can Not Change all My Applications to authenticate from Active Directory!Just I need Active Directory to Use My Database For Authentication.

    Read the article

  • Is it legal to sell this kind of software?

    - by Ivan
    Hi, I 've developed a software that automates an online game similar to oGame. You just plan your attacks or whatever and the application sends them automatically. The application is illegal inside the game (I mean, it's not allowed to use this kind of applications in that game), but I'd like to know if it is legal to sell it to users without getting in trouble with the company that owns the game. Thanks in advance, Ivan

    Read the article

  • Linux TC / Policy Routing tools

    - by Zoredache
    In addition to a really good firewall Linux has a builtin advanced routing and traffic shaping (lartc). There are many applications (firehol, firestarter, etc) to make the creation of iptables firewall easier, what similar to tools exist to make working with the policy routing and traffic control easy?

    Read the article

  • Is dual-booting an OS more or less secure than running a virtual machine?

    - by Mark
    I run two operating systems on two separate disk partitions on the same physical machine (a modern MacBook Pro). In order to isolate them from each other, I've taken the following steps: Configured /etc/fstab with ro,noauto (read-only, no auto-mount) Fully encrypted each partition with a separate encryption key (committed to memory) Let's assume that a virus infects my first partition unbeknownst to me. I log out of the first partition (which encrypts the volume), and then turn off the machine to clear the RAM. I then un-encrypt and boot into the second partition. Can I be reasonably confident that the virus has not / cannot infect both partitions, or am I playing with fire here? I realize that MBPs don't ship with a TPM, so a boot-loader infection going unnoticed is still a theoretical possibility. However, this risk seems about equal to the risk of the VMWare/VirtualBox Hypervisor being exploited when running a guest OS, especially since the MBP line uses UEFI instead of BIOS. This leads to my question: is the dual-partitioning approach outlined above more or less secure than using a Virtual Machine for isolation of services? Would that change if my computer had a TPM installed? Background: Note that I am of course taking all the usual additional precautions, such as checking for OS software updates daily, not logging in as an Admin user unless absolutely necessary, running real-time antivirus programs on both partitions, running a host-based firewall, monitoring outgoing network connections, etc. My question is really a public check to see if I'm overlooking anything here and try to figure out if my dual-boot scheme actually is more secure than the Virtual Machine route. Most importantly, I'm just looking to learn more about security issues. EDIT #1: As pointed out in the comments, the scenario is a bit on the paranoid side for my particular use-case. But think about people who may be in corporate or government settings and are considering using a Virtual Machine to run services or applications that are considered "high risk". Are they better off using a VM or a dual-boot scenario as I outlined? An answer that effectively weighs any pros/cons to that trade-off is what I'm really looking for in an answer to this post. EDIT #2: This question was partially fueled by debate about whether a Virtual Machine actually protects a host OS at all. Personally, I think it does, but consider this quote from Theo de Raadt on the OpenBSD mailing list: x86 virtualization is about basically placing another nearly full kernel, full of new bugs, on top of a nasty x86 architecture which barely has correct page protection. Then running your operating system on the other side of this brand new pile of shit. You are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can't write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes. -http://kerneltrap.org/OpenBSD/Virtualization_Security By quoting Theo's argument, I'm not endorsing it. I'm simply pointing out that there are multiple perspectives here, so I'm trying to find out more about the issue.

    Read the article

  • How to excport hives from registry in Windows.000 after re-install

    - by Mawg
    I had to reinstall Windwos and my old WIndows directory is now called Windows.000 I tried to resinatll my s/w applications, but one told me it has been insatlled on the max number of PCs, even though this was the first I ever sinsatlled it on. I think it might be ok if I can export teh relvant registry hive from teh old windows & import it into the new ... but how can I do that? Thanks in advance

    Read the article

  • Merging `Program Files` and `Program Files (x86)` folders in Windows 7 64-bit

    - by Mehper C. Palavuzlar
    Windows 7 64-bit version installs 32-bit programs to Program Files (x86) folder, and 64-bit programs to Program Files folder. Of course, Microsoft must have a reason for doing that, but as a user I don't find it handy to have 2 separate program folders. Is there any way to merge those folders into one (preferably, Program Files) without corrupting installed programs? And would it be a problem to install 32-bit applications into Program Files folder?

    Read the article

  • Does the use of a POS terminal mean I need PCI DSS compliance?

    - by Nic
    I've read a lot about PCI DSS and its requirements, but I'm unclear on what exactly determines whether an organization needs to worry about PCI DSS compliance. We accept payments using a basic HiSpeed 6200 POS terminal which is connected to the internet through our office LAN. We aren't using VLAN's. The terminal isn't integrated with any payment processing applications, it just prints out paper receipts. Do I need to worry about PCI DSS compliance?

    Read the article

  • GTD tool for Mac OS X and iPhone?

    - by harald
    I am looking for a GTD (getting things done) tool, which there is a OS X and an iPhone app available. I don't want any web based stuff, but native applications. The Mac application needs some functionality for synchronization with the iPhone app. Are there any GTD apps, which fit my requirements?

    Read the article

  • Volume control tools

    - by Stan
    Sometimes I feel watching some youtube in Chrome has very low volume even if I turn everything to 100%. Is there any tools can increase volume above the system's maximun? I know IndieVolume does, but that didn't support some of my applications. So try to look for some alternatives. thanks

    Read the article

  • Running Safari from the command line adds current directory to the URL

    - by Charles Anderson
    I am trying to run the Safari browser (on Mac OS 10.4) from the command line, as follows: /Applications/Safari.app/Contents/MacOS/Safari http://localhost/dev/myfile.html However, Safari starts up and tries to access file:///Users/charlesanderson/scripts/http://localhost/dev/myfile.html /Users/charlesanderson/scripts happens to be my current directory. Can someone explain why Safari does this? Firefox is much better behaved?

    Read the article

< Previous Page | 320 321 322 323 324 325 326 327 328 329 330 331  | Next Page >