Search Results

Search found 17569 results on 703 pages for 'computer intelligence'.

Page 333/703 | < Previous Page | 329 330 331 332 333 334 335 336 337 338 339 340  | Next Page >

  • a couple of questions about proxy server,vpn & how they works

    - by Q8Y
    I have a couple of questions that are related to security. Correct me if i'm wrong :) If I want to request something (ex: visiting www.google.com): my computer will request that then it will to the ISP then to my ISP proxy server that will take the request and act as a middle man in this situation ask for the site (www.google.com) and retrieve it then the proxy will send it back to me. I know that its being done like that. So, my question is that, in this situation my ISP knows everything and what I did request, and the proxy server is set by default (when I ask for an internet subscription). So, if I use here another proxy (lets assume that is a highly anonymous and my ISP can't detect my IP address from it), would I visit my ISP and then from my ISP it will redirect me to the new proxy server that I provide? Will it know that there is someone using another proxy? Or will it go to another network rather than my ISP? Because I didn't get the view clearly. This question is related to the first one. When I use a VPN, I know that VPN provides for me a tunneling, encryption and much more features that a proxy can't. So my data is travelling securely and my ISP can't know what I'm doing. But my questions are: From where is the tunneling started? Does it start after I visit the ISP network (since they are the one that are responsible for forwarding my data and requests)? If so, then not all my connection is tunneled in this way, there is a part that is not being tunneled. Since, every time I need to do anything I have to go to my ISP and ask to do that. Correct me if I misunderstand this. I know that VPN can let my computer be virtually in another place and access its resources (ex: be like in my office while I'm in my home. This is done via VPN). If I use a VPN service provider so that I can access the internet securely and without being monitored by my ISP. In this case, where is my encrypted data saved? Is it saved in my ISP or in the VPN service provider? If I use a VPN, does anyone on the internet know what I'm doing or who I am? Even the VPN service provider? Can they know me? I think they should know the person that is asking for this VPN service, am I right?

    Read the article

  • Is a local account OK for TFSREPORTS in TFS 2010?

    - by Edward Brey
    When installing a single-server TFS 2010 installation into a Windows Server 2008 R2 installation on a domain, a user account is required for TFSREPORTS and WSSSERVICE (which share the same account by default). Is there any value in using a domain account or would a local account on that computer (not a built-in account) work just as well?

    Read the article

  • How to troubleshoot a hardware problem on linux?

    - by Jack
    Just to note I am not having a problem at the moment, but have had previously so it sparked my curiosity... When a computer locks up suddenly to so caps lock flashes incessantly and the only possibility to restart....how do you troubleshoot what is causing it? On Windows there would be some errors in the event log...on Linux it seems there is no opportunity for anything to be written to the log, making it hard to troubleshoot... In this case, how would you troubleshoot the problem through linux?

    Read the article

  • Windows Vista x64 freezes randomly

    - by François Daemin
    Hello, my computer (a Dell XPS M1330 - Vista x64) hangs randomly. When it happens I can't run the task manager (or another app), nor the Start menu, and when i try to close an application the title bar shows "Not responding". In the event viewers, nothing particular, excepts the hard shutdown. (I apologize in advance for my bad english..)

    Read the article

  • Active Directory VBS Script for Auditing a Presentation

    - by Steven Maxon
    Can anyone help me with this VBS script? Thanks in advance. User logs in to a XP computer and a PowerPoint presentations or web page starts They read through the presentation and then click a links that says: “Click here to complete presentation”. When they click the link it will send their username and time/date stamp to a text file on a server. The next time they log in they will not get the PowerPoint or web page presentation.

    Read the article

  • Google is blocking our requests due to "automated queries"; what's the best way to find out why?

    - by Ryan Detzel
    This started a few weeks ago and we thought it was a virus so we checked every computer and all though 50%(Yeah, that's right) were infected once they were cleaned the problem didn't go away. It's really frustrating so I want to figure it out so I need suggestions on how to find the culprit. I think the router has logging but it logs everyone so it's hard to tell and I might be able to setup a proxy but again it's hard to tell when and what to monitor. What are your suggestions?

    Read the article

  • Some services refusing to start on Win 7 machine. What could the root cause be?

    - by BombDefused
    When I check msconfig, there are no services that are blocked from starting up. When I look in services.msc, the problem services have a start up type of 'Automatic', but have a blank space where others will show 'Started'. Attempting to start them manually results in the following pop up error messages. I have no idea what's causing this, looks like some sort of cascade effect from another problem service. It's affecting scheduled tasks, SQL server agent and windows back up services. How can I resolve this? I don't know how to work out what the root cause is. Task Scheduler Service Start Error: "Windows could not start the Task Scheduler service on local computer. 1068: The dependecy service or group failed to start. SQL Server Service Start Error: "The SQL Server Agent service on Local Computer started and then stopped. Some services stop automatically if they are not in use by other services or programs." UPDATE: I've just noticed some other services have a description of "Failed to Read Description. Error Code: 2" They are: NetMsmqActivator, NetPipeActivator, NetTcpActivator, NetTcpPortSharing UPDATE 2: As joeqwerty says the Event Log service does seem to be the root of the problem. This service will not start either. It fails with 'Error 31 - A device attached to the system is not functioning correctly'. I've tried detaching all devices. I've also followed the advice here, where the same problem is described, but with no luck: http://social.technet.microsoft.com/Forums/en/w7itprosecurity/thread/44479c49-55e6-4bd7-b25e-3f2a6497306e Update 3 @ Pacey - The following was a good tip, really clear instruction. However, I found that those reg keys do not exist on my system. "Your Problem might also derive from the UpperFilter or LowerFilter Settings of the CDROM Drive. These are a known cause for Errorcode 31. You can find step-by-step instructions on removing the filters on about.com" I followed the advice through to checking every component in device manager separately, but everything is reported as working correctly!? These services did all work at one point. The hardware set up hasn't changed much. Guess I'm looking at a repair install maybe???!

    Read the article

  • Why are all google website suddenly giving untrusted certificate warnings in my Firefox v10?

    - by WilliamKF
    Today, I am suddenly getting the untrusted website error for all Google websites, but not for any other. Internet Explorer gives no such error. Reboot of this Windows 7 computer does not help. Is this some kind of virus infection that is hijacking DNS resolution away from Google to some spoofer? How can I resolve this issue and get Google websites working again normally? If I manually enter a Google IP Address, the page loads correctly.

    Read the article

  • What's port 1283?

    - by kbluck
    I see a lot of connection attempts to 1283/tcp on my firewall from a client computer to a Windows Server 2008 Domain Controller. What exactly is this traffic? Something to do with NetBIOS, perhaps?

    Read the article

  • Anybody makes stylish PC cases that look like the Cobalt Cube?

    - by OverTheRainbow
    Hello I'm looking for computer cases that don't look like regular PC's in case customers would like to keep it on their desktop so it has to look stylish. I liked the Cobalt Cube: http://en.wikipedia.org/wiki/Cobalt_Qube Does someone know if some company makes cases that look the same (I know about Shuttle : they're too pricey), and possibly one that has a really quiet power supply? Thank you.

    Read the article

  • Why does the mouse always move to the bottom left?

    - by AngryHacker
    In the course of doing stuff on the computer, the mouse always moves, by itself, to the bottom left of the screen - I'd say several times in the course of an hour. I thought this might be an issue with the driver, so I re-installed the driver, but the problem continued. Then thinking that the mouse is faulty, I replaced my Microsoft Wheel Mouse with a Dell mouse. The problem still continues. How can I fix this problem?

    Read the article

  • How do you move the subscription folder to a different folder than the default Music Folder?

    - by Bryant
    I'm using Skydrive to store the music I purchase from Zune in the cloud so that I can share the songs with my wife's computer. However, I don't want to sync all the subscription music which is music I haven't purchased. Zune puts all the subscription music into the default music folder in a separate folder called Subscription. Is there a way to have just this folder somewhere else? I know you can't currently exclude folders in Skydrive, otherwise I would just take this route.

    Read the article

  • How to refresh tag list in org-mode without closing and reopening emacs

    - by Pete
    In my emacs org-mode org file I have a tag list #+TAGS: OFFICE(o) COMPUTER(c) HOME(h) PROJECT READING(r) PHOTOGRAPHY(p) At some point, I wish to add a new tag to the list, and apply it to an item (using C-c C-c). But the new tag does not show up in the list of selectable tags. In order to fix this, I close and reopen emacs. But I'm sure that isn't necessary, How do I refresh this list without restarting emacs?

    Read the article

  • Infotips for Word Documents in Windows XP in Network Drives

    - by Knight Samar
    Hi, MS Word 2007 files have a property page for entering details like summary and title. This is displayed when you hover over the documents on Desktop. Now on my Windows XP SP2 computer, inside Windows Explorer, it shows the special properties for all such files from Desktop, but not from the Network Drives. This is a big problem when I have a large collection of Word documents all in one folder. How can I display these special properties (infotips) for documents in my network drives ? Thanks :)

    Read the article

  • Free application which reports that computers are running

    - by Darqer
    I'm searching for an application which reports that the computer is running. I imagine it in the form of two piece software. the first part, some kind of dashboard with list of active IPs, is on the server and awaits for information from remote hosts, the second part will be on clients and it will be reporting that client is working. Do you know something like this, I'm searching for free application that is lightweight and does not require installation.

    Read the article

  • How to pause an m4b file

    - by Phenom
    When I play m4b files on my computer, they open with iTunes. I can stop the file, but I cannot resume the file from within iTunes. In order to pick up where I left off, I have to open the file again. How can I resume where I left off from within iTunes? Is there another program that will play m4b files and resume from where you left off?

    Read the article

  • How do I teach my command line manners?

    - by Sam152
    Whenever I complete something in the command line while using Ubuntu and my computer does something of value to me, I enjoy saying thank you, just because it's the polite thing to do. A typical conversation might look something like this: mtp-sendfile HamishAndyPodcast.mp3 /Music/podcasts Sending file... Progress: 17769768 of 17769768 (100%) New file ID: 76098 sam@sams-laptop:~$ thanks thanks: command not found What's the best way to teach my PC a few manners and respond with something like "No problemo".

    Read the article

< Previous Page | 329 330 331 332 333 334 335 336 337 338 339 340  | Next Page >