Search Results

Search found 89593 results on 3584 pages for 'gupu user'.

Page 378/3584 | < Previous Page | 374 375 376 377 378 379 380 381 382 383 384 385  | Next Page >

  • Chrome Web Browser does not Work While IE does

    - by aspendox
    When I try to start Chrome Web Browser, "User Account Control" window opens and ask whether I give permission to this application to make changes in my computer. I give the permission, Chrome opens but could not connect to the Internet. There is no error in the opened page. But when I try to connect to internet via IE, it works. I've been experiencing this issue since yesterday, I was able to use Chrome before.

    Read the article

  • Dissect System Restore snapshots

    - by Unsigned
    Is there any way to map the A000????.??? filenames in the System Volume Information to their original names, without restoring them? The reason I ask is that several files in one user's System Volume Information RP1 were infected by a rootkit. Although they've been removed, I'd like to be able to figure out what they were originally. A0001253.sys and A0001211.sys are not very helpful names. :) It happened on two systems, one XP SP2, the other XP SP3.

    Read the article

  • Cannot access client pc remotely due to time/date issue xp win2k3 environment

    - by Flotsam N. Jetsam
    When I run psexec to the user desktop (xp pro) I get "There is a time and/or date difference between the client and the server." I also get "access denied" when I run the at \clientname time /interactive "net time \server /set /y" command. I cannot access the machine from my win2k3 server's AD Users and Computers utilities. Is going to the machine the only way to remedy? Clarify: Going to the machine and doing the net time command works, but I want a remote solution please.

    Read the article

  • Windows 7: Edit group policy from command line

    - by user234461
    I'm writing an installer and need to change all users' wallpaper. I can do this from the group policy editor GUI, but need to do so from my installer. I can't just edit the registry as it gets reset by a GPO on login. How do I apply the relevant administrative template via programatically (preferably cmd.exe or via the registry)? (for interest, it's User Configuration Administrative Templates Desktop Desktop Desktop Wallpaper [sic] Any help would be appreciated. Thanks!

    Read the article

  • Windows XP: How to delete files that cannot be deleted?

    - by glenneroo
    I have a backup copy of my previous Documents and Settings folder which only contains my original user and within that, 2 directories (Favorites and Local Settings) which are visible in cmd shell but when I try to delete them, Windows gives me this error: If I try to delete the Documents and Settings folder, I receive this warning: I tried doing this in a cmd shell: attrib *.* -r -a -s -h /s But it did not help, nor did it return any errors/warnings. Unlocker 1.8.5 returns: No Locking handle found. Any ideas?

    Read the article

  • how do I start GIT daemon automatically under CentOS 4.8 ?

    - by ck2
    Apparently my server is running CentOS 4.8 with Cpanel uname -a 2.6.9-023stab048.6-enterprise #1 SMP MSK 2008 i686 i686 i386 GNU/Linux cat /etc/redhat-release CentOS release 4.8 (Final) I'd prefer to install it as a service but I cannot seem to install "yum git-daemon" there is no package available for CentOS 4.8 (when I try to include another repos for it I get too many dependency failures) So what's the easiest way to just start it? Typically this is how I do it from CLI git daemon --detach --user=git --group=git Thanks for any help!

    Read the article

  • Which wireless keyboard is most secure?

    - by Axxmasterr
    I want to allow someone to use a keyboard wirelessly but I am concerned that the user passwords will be sent across the wire too. Is there a wireless keyboard that encrypts the keystream? I bought an IR keyboard setup however it lacks the range to be useful more than a few feet away from the detector. I need a range of 10 feet.

    Read the article

  • Computer class or home teaching for kids?

    - by JMarsch
    I want to teach my son to be a strong PC user. I could try to strike out on my own for this, but I was wondering if there is a good online (or book based) course for this. Like most kids, he's proficient with Google, YouTube, and Minecraft, but he's very curious, and I would like to teach him more. Even some basic excercises, like working with the file system would be good for him (i would need some help to not make it boring).

    Read the article

  • Others users deleting my folders

    - by Abhiram
    Hi, I'm working in solaris server machine. More than 10 people are logged in to the same server machine.It take one hour for finishing the installation. But after the installation is over , some other user is deleting some of the directories and files in my installation folder. Is there any way to know who removed the files? Or atleast I want to know can I see the command history of other users.

    Read the article

  • Is pst file enough to backup my Gmail with Outlook?

    - by Hasan Gürsoy
    I've backup from my Gmail account at Outlook 2010 beta. I see a pst file which is equal file size with my Gmail used storage. Is this file enough to protect my mails or do I need additional files or whatever? I'm not a regular outlook user. I've read this but I don't think I'm using "Signatures, Templates, Stationery etc."...

    Read the article

  • Xcopy batch file behavior

    - by piagetblix
    I have the following backup batch file: xcopy C:\test.txt \server\Data\user\"data test" /e /y /i The issue is why does it not only copy the file listed but proceeds to copy the whole root directory? When i remove the switches it only copies the file. There is nothing in the description of those switches that seems to cause the behavior... They are there because I'm picking up where someone else left and all the batch files use these 3 switches. Thanks

    Read the article

  • Windows Vista - overlay icon with two people

    - by abcdefghijkl
    I had to save data from my harddisk to an external drive (with linux) and after reinstalling Windows Vista (and copying the files back) there is a strange overlay icon with two people. How do I get rid of this ? First I thought it could be shared, but the files are not shared. The user is the owner of all those files and they are accesible to everyone. Any ideas what Vista would like to say to me with these icons and how I get rid of them ?

    Read the article

  • After returning from standby mode, win7 asks for login twice

    - by Force Flow
    When a Windows 7 32-bit PC attached to a domain comes back from standby mode and has no user logged in, if I log in once, it jumps back to the login screen. If I log in for a second time, then it actually logs in. This happens on multiple PCs, and is not a hardware issue. The PCs are also free of viruses/malware, and are otherwise problem-free. Why does it do this, and is there a way to prevent this annoyance?

    Read the article

  • iCal and Windows 7: Do they work together?

    - by Mike
    I'm about to buy an iTouch, mainly because of the iCal. I'm a Windows user, so does anyone know if these two play well together? I'd prefer to be able to update my calendar from either the computer or iTouch and sync. I've searched Google, but I'm sceptic so far. Any experiences, knowledge you can send my way would be appreciated (and possibly save me money). Thanks Michael

    Read the article

  • Reverse KVM solution

    - by aksamit
    I need to setup a computer so that it can be operated from two locations. The locations are about 20 meter from each other and the user wants the experience to be the same from both locations, i.e. no remote desktop or anything like that and preferably a seamless switch. So basically I need a double set of, monitor, keyboard and mouse, and then of course link it together by some kind of suitable hardware.

    Read the article

  • How can I set my TP-Link TL-WR1043ND to extend my router - modem range?

    - by Pitto
    I'd like to extend my WiFi coverage, so I've bought the TP-Link TL-WR1043ND and updated its firmware to the latest (wr1043nv1_en_3_13_4_up(110429)) but I can't find how to use its WDS function. Reading further on Super User I understand that both the modem-router (Pirelli Alice Gate) and the TL-WR1043ND should support WDS. Are there any tricks to achieve the same result - extending my WiFi range - even changing the firmware to DD-WRT or Tomato etc?

    Read the article

  • Server side version of 'receipients address' rule in Outlook

    - by lethalMango
    I currently have a variety of folders on Outlook 2010 which connects to my works Exchange server. I have all the emails received from clients added to the correct folder, what I want to do is make any emails in the recipient address (i.e. I've been cc'ed in to an email sent from another user) to be also moved. Is it possible to achieve this server side opposed to using the "with @domain.com in the recipients address" rule which is client side only?

    Read the article

  • How can I start any application with Guest permissions by default?

    - by Tom Wijsman
    Here are my two questions: How can I start any application with Guest permissions by default? How can I set certain applications not to launch with Guest permissions? For the first bullet, any non-Microsoft signed application I launch should run as the Guest account. For the second bullet, I'm imagining adding menu entries like this would be a nice approach: Set to run as Guest (= default selected entry) Set to run as User Set to run as Admin But how do I do this?

    Read the article

  • Proper upgrade path for Windows 7 to Windows 8 when the directory setup is non-standard

    - by Joey
    I have both a HDD and a SSD in my computer and after installing Windows I moved things around a little to ensure that the OS is on the SSD but my user profile resides on the SSD (with a few exceptions). I used junction points heavily for that. Windows and most applications are fine with that and it works well. Now I wonder whether I can in-place upgrade this to Windows 8 while retaining that exact setup or whether there is anything I can do to ease the upgrade process.

    Read the article

  • Boot log for Windows XP

    - by JasCav
    Where can I find a step-by-step boot log of my Windows XP machine? I'm looking for something akin to the boot log you would get in Linux (with what is running at what times, how long it is running, etc). I am specifically interested in the what is happening after I get out of initial boot phase (AKA, the Windows XP logo goes away and I move to the generic blue background, and as I log in as a user onto the machine).

    Read the article

  • How does Bittorrent work?

    - by mumtaz
    I want to learn more about the bittorrent way of file sharing. I am a technically advanced user (programmer), so technically advanced material is no problem, but it should be concise and to the point. I need a good resource book/web which explains the overall bittorrent architecture. I am not interested in details, just the overall architecture and the terminology like seeds, peers, etc. Any suggestions?

    Read the article

  • Security: Managing network shares remotely on Ubuntu?

    - by Industrial
    Hi everyone, I am about to setup a home network server running Ubuntu Server and I'm currently a bit worried about how to handle network shares and permissions in a good way. After working a bit lately with Netgears ReadyNAS's units, I have become really spoiled with how easy it was to set up network shares and giving a specific user different levels of network access to a specific share (forbidden access, read, read/write). How would I accomplish the same with my Ubuntu server through SSH? Thanks a lot

    Read the article

< Previous Page | 374 375 376 377 378 379 380 381 382 383 384 385  | Next Page >