Search Results

Search found 18907 results on 757 pages for 'computer history'.

Page 379/757 | < Previous Page | 375 376 377 378 379 380 381 382 383 384 385 386  | Next Page >

  • Make all changes by a user reversible on linux

    - by Darokthar
    Is it possible to safe all changes a user does in his home directory? The idea is to be able to recover a home directory if a file is deleted or overwritten. My problem is having an old family member (80+ years) who wants to learn how to use a computer. For me it would be easier to recover the home directory from any abuse or mistakes that the user might do. Is there an easy solution, which is quite failsafe?

    Read the article

  • Windows 7 hidden account

    - by deverop
    I hid one of the accounts on my computer from the welcome screen by adding it to the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList I was hoping I'd be able to log in to this account by hitting Ctrl+Alt+Del on the welcome screen, but Windows 7 completely ignores this. Is there a way to login to the hidden account on a Windows 7 machine?

    Read the article

  • How to stay connected on remote desktop even if different user tires to connect

    - by Darqer
    I'm logging through Remote Desktop to windows 7. Some other users sometimes tries to connect to the same computer, then a message box pops up with information that I have 30 to break this trial or I will be logged off. Sometimes I'm away and then I'm being logged off and when I come back I have to log on again. Is there a way to turn off this functionality for single user. Is there some application that always break this login process ?

    Read the article

  • Configure server on network to analyze traffic

    - by Strajan Sebastian
    I have the following network: http://i.stack.imgur.com/rapkH.jpg I want to send all the traffic from the devices that connect to the 192.168.0.1 router to the 192.168.10.1 router(and eventually to the Internet), by passing through the server and an additional router. Almost 2 days have passed and I can't figure what is wrong. While searching on the Internet for some similar configuration I found some articles that are somehow related to my needs, but the proposed solutions don't seem to work for me. This is a similar article: iptables forwarding between two interface I done the following steps for the configuration process: Set static IP address 192.168.1.90 for the eth0 on the server from the 192.168.1.1 router Set static IP address 192.168.0.90 for the eth1 on the server from the 192.168.0.1 router Forwarded all the traffic from 192.168.0.1 router to the server on eth1 interface witch seems to be working. The router firmware has some option to redirect all the traffic from all the ports to a specified address. Added the following rules on the server(Only the following, there aren't any additional rules): iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE iptables -A FORWARD -i eth1 -o eth0 -m state -–state RELATED,ESTABLISHED -j ACCEPT iptables -A FORWARD -i eth0 -o eth1 -j ACCEPT I also tried changing iptables -A FORWARD -i eth1 -o eth0 -m state -–state RELATED,ESTABLISHED -j ACCEPT into iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT but still is not working. After adding the following to enable the packet forwarding for the server that is running CentOS: echo 1 /proc/sys/net/ipv4/ip_forward sysctl -w net.ipv4.ip_forward = 1 After a server restart and extra an extra check to see that all the configuration from above are still available I tried to see again if I can ping from a computer connected to 192.168.0.1/24 LAN the router from 192.168.1.1 but it didn't worked. The server has tshark(console wireshark) installed and I found that while sending a ping from a computer connected to 192.168.0.1 router to 192.168.1.1 the 192.168.0.90(eth1) receives the ping but it doesn't forward it to the eth0 interface as the rule tells: iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT and don't now why this is happening. Questions: The iptables seem that don't work as I am expecting. Is there a need to add in the NAT table from iptables rules to redirect the traffic to the proper location, or is something else wrong with what I've done? I want to use tshark to view the traffic on the server because I think that is the best at doing this. Do you know something better that tshark to capture the traffic and maybe analyze it?

    Read the article

  • Operation Has Been Cancelled in Windows 7!!!

    - by hosseinsinohe
    Hi All I Use Windows 7.I am Not Administrator.I want run executable files in Windows ,but I can not do it,Because when I try System Has a Error: "This Operation has been cancelled due to restriction in effect on this computer.please contact your system administrator". I want Solve this problem,and I do not want contact my Administrator. I try MMC And gpedit.msc but those do not work And I See this Error Again. Please Help me

    Read the article

  • Has anyone tried to DIY his own router?

    - by router
    Can someone provide all necessary components to assemble a router? Especially,what's the component to make it programable? Seems google doesn't give such information . UPDATE I'm not gonna use a computer as router,definitely perfer an embeded device,but what's the component list of the device?

    Read the article

  • Wondering about the Windows 7 serial number my laptop has, and its uses.

    - by overmann
    So that's the serial number of my pre-installed windows copy, I take it. But am I allowed to use it again when, say, I don't know, my system gets crippled by a sneaky virus? If I format my computer and install windows starter again from a USB drive (speculating. I've never format before, I suppose is completely possible) Is that serial number still valid? I'm talking about the number printed on the back of my laptop.

    Read the article

  • Linux: permission to read file from /sys/kernel/debug wihout root privileges

    - by gogowitczak
    I'd like to read small text file, located at: /sys/kernel/debug/vgaswitcheroo/switch without root permissions. It contains information about graphic cards (dedicated ATI Radeon and integrated Intel HD3000). I wrote a simple script displaying infomation I need, but it works only with root privileges. I already tried changing file & folder permissions, but when I restart my computer, the problem remains. Is it possible to permanently change that file permissions or owner?

    Read the article

  • Which software is used to publish a book of size A5.

    - by Mirage
    I have some text and i want to make book of A5 size. The fonts is also not english its in my own language. Which software should i use to make a soft copy. And how can i give them to print shop so that they can print with some images and required fonts which will not be in their computer

    Read the article

  • Using a 20V power block on a 19V notebook

    - by user4444
    Is that dangerous : for the computer (without the battery) for the cells If possible, explain why. Edit : Here are some more assumptions : Without the battery included, there is no risk of overheating the cell, or over charging them. But there is still some dc to dc conversion taking place on the motherboard. I assume this dc to dc stage to be quite tolerant. What kind of trouble can I run into when using 20V instead of 19V ? Overheating ?

    Read the article

  • Unable to locate existing XP system partition during Windows 7 upgrade install.

    - by glenneroo
    I have Windows XP 32-bit installed on this computer. I just purchased a Windows 7 64-bit as an ISO download upgrade version which I promptly burned to DVD and attempted to perform an upgrade installation. Here is the error message I am getting: Firstly, where are these "Setup log files" located? Second, does this mean I need to find compatible (64-bit?) drivers for the Mainboard and put them on floppy?

    Read the article

  • How to make a dial up connection disconnect automatically after downloading + uploading 90 MB data in Windows?

    - by Shanky
    I am using a modem (ZTE USB Modem FFF1) to connect to internet and I want it to disconnect automatically after completing 90 MB (Downloaded data + Uploaded Data). Can anyone suggest how can I do this. I am using a desktop computer running on Windows 8 Consumer Preview. There's no router. I am using a dial up connection to connect. I just want to limit the data usage of my internet connection, considering sent data + received data.

    Read the article

  • change socket to other then default in phpPgAdmin

    - by DanFromGermany
    I need to change the socket phpPgAdmin connects to in its config. // Hostname or IP address for server. Use '' for UNIX domain socket. // use 'localhost' for TCP/IP connection on this computer $conf['servers'][0]['host'] = '/opt/jasperreports-server-cp-5.1.0/postgresql/.s.PGSQL.5432'; this does not work (even without the last part .s.PGSQL.5432). The path is correct, because I can connect through: :~# psql --host=/opt/jasperreports-server-cp-5.1.0/postgresql/

    Read the article

  • Is there a webmail client which can handle mutiple mail accounts ?

    - by Tanmoy
    Hi, Everyone here must be aware of mail clients which can handle multiple email accounts simultaneously(eg. Thunderbird or Outlook). These are desktop clients which should my installed on the clients computer.Suppose i don't have harddisk, now how will i access my multiple mail accounts on web using a single application ? Thanks in advance, Tanmoy

    Read the article

  • Remote users on domain share

    - by user19039
    I am trying to share a domain share so only a specific machine with a specific user can connect. I have tried all the normal ways of actually adding the computer to the domain and then using its unc to map a user but to no avail. Is this possible? How do you do this?

    Read the article

  • Practical way to implement prevention of IP Spoofing

    - by user1369975
    I am an undergraduate Computer Science student and was hoping to gain some knowledge of ways to help prevent IP spoofing but all the resources I have tried out elaborate this concept in a theoretical way. I want to try out my hands at one of the techniques like: http://en.wikipedia.org/wiki/Port_knocking http://en.wikipedia.org/wiki/SYN_cookies How do I simulate this whole situation in my own system were I myself am the attacker and I myself have to defend it? And once I have gained an understanding of it, then how do I start translating that into programming terms?

    Read the article

  • system is not Starting correctly when Booting windows

    - by sharza
    This menu allows you to select a hardware profile when Windows is started If your system is not starting correctly, then you may switch to a previous system configuration, important: system configuration changes made since the last successful start up will be discarded. Profile 1 If I choose Profile 1 (the only choice) Windows loads normally. This menu always appears when I turn on the computer. Is there any can solve it?

    Read the article

  • How to stay connected on remote desktop even if different user tries to connect

    - by Darqer
    I'm logging through Remote Desktop to windows 7. Some other users sometimes try to connect to the same computer, then a message box pops up with information that I have 30 seconds to block this try or I will be logged off. Sometimes I'm away and then I'm being logged off and when I come back I have to log on again. Is there a way to turn off this functionality for single user. Is there some application that always breaks this login process ?

    Read the article

  • Virtual session on windows xp

    - by dotnet-practitioner
    What is the easiest way to install , setup, and run virtual session on my fresh install on my windows xp computer? I want to be able to browse , install a new software in a new virtual session instead of machine itself. What is available out there? What kind of software it would take and are there any free solutions out there? Easiest solution would be very helpful for me.

    Read the article

  • Essential Business Server

    - by Dan
    We are trying to run the Preparation Wizard for Essential Business Server 2008 and receive the following error. "A list of servers could not be collected from Active Directory Domain Services (AD DS). Ensure that your network is functioning correctly and that this computer can access AD DS." Our network is an Windows Server 2003 network with all of the services running fine. I can't run this from either a machine or a server. Any idea where we should start?

    Read the article

< Previous Page | 375 376 377 378 379 380 381 382 383 384 385 386  | Next Page >