Search Results

Search found 24229 results on 970 pages for 'users rights'.

Page 411/970 | < Previous Page | 407 408 409 410 411 412 413 414 415 416 417 418  | Next Page >

  • Mysterious OS X FileVault-related home directory

    - by Nick
    I recently enabled FileVault on Snow Leopard, and after doing so, found a directory /Users/<myusername>.4529809818604982560, containing the original (unencrypted) contents of my home directory, owned by root:wheel with permissions 700, side-by-side with my normal home directory. Does anyone know why this was created (maybe a temporary backup that didn't get erased), or whether deleting it will be harmful?

    Read the article

  • Accidentally broke/remapped git command line command

    - by Kevin Teh
    I think I accidentally remapped my git command to automatically include the subcommand credential-osxkeychain on the command line while trying to install a git credential-helper. When I enter $git it now displays Usage: git credential-osxkeychain <get|store|erase> How can I fix it? Entering $alias returns alias rvm-restart='rvm_reload_flag=1 source '\''/Users/teh/.rvm/scripts/rvm'\''' Entering $which git returns /usr/bin/git I think the problem may have began when I entered a command to move git-credential-osxkeychain into /usr/bin/git instead of /usr/bin/

    Read the article

  • Simple Voip server for ubuntu

    - by Stalkerh
    I have a network that connects 2 households and would like to setup a simple voip server so that I can call between the houses. It needs to be for ubnutu , I have used the free 3CX system and while it works brilliantly it doesnt support linux and I can get a windows box. The users will never need to call external lines. They will only make 'calls' between laptops/pc. Can someone please make a recommendation and maybe even a tutorial that I can follow

    Read the article

  • how can I manage user-dependent variables, that are valid on the whole domain ( Win Server 2003)

    - by Stephane R.
    Hello I am working on a system that needs a user-dependent variable, the user in on Windows XP and is connected to Windows Server 2003. I cannot save this variable in the registry of the local machine under HKCU, because the users are likely to exchange their machines. This variable must be accessible on the whole domain. Do you have any idea of implementing this ? Are there WMI features that may help me ?

    Read the article

  • Is there a LocalAppData Environement Variable in Windows 2003?

    - by brendan
    Per this question I need to call via code the following paths: Windows 2003: C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\Application\chrome.exe Windows 2008: C:\Users\Administrator\AppData\Local\Google\Chrome\Application\chrome.exe Ideally I could use the environment variable %localdata%\Google\Chrome\Application\chrome.exe but this does not work for me in Windows 2003. Should it? How can I refer to this path in both systems using environment variables?

    Read the article

  • Is sending email from EC2 / Rackspace Cloud a bad idea?

    - by Michael Buckbee
    In this article it mentions that TrendMicro is now treating all emails from Amazon's EC2 as coming from "Dial Up Users": likely to be spam and this is creating severe deliverability issues with their emails. We're having all kinds of issues sending email from our app servers on Rackspace cloud (which may or may not be DUL'd) and I wonder if this isn't just a losing battle and we should try to get a different host for our SMTP server.

    Read the article

  • SQL Server maintenance tasks cannot run after changing computer name

    - by Gatura
    I am having a problem performing maintenance tasks on Microsoft SQL Server 2008 after changing my server name from the original random name given during installation to the one I prefer This is the error am getting Could not obtain Information about Windows NT group/users 'WIN-4N4A9TLBGJJ\Administrator', error code 0x534 Is there a way I can fix this problem without having to delete the account and recreating it again?

    Read the article

  • How secure is a subnet?

    - by HorusKol
    I have an unfortunate complication in my network - some users/computers are attached to a completely private and firewalled office network that we administer (10.n.n.x/24 intranet), but others are attached to a subnet provided by a third party (129.n.n.x/25) as they need to access the internet via the third party's proxy. I have previously set up a gateway/router to allow the 10.n.n.x/24 network internet access: # Allow established connections, and those !not! coming from the public interface # eth0 = public interface # eth1 = private interface iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A INPUT -m state --state NEW ! -i eth0 -j ACCEPT iptables -A FORWARD -i eth0 -o eth1 -m state --state ESTABLISHED,RELATED -j ACCEPT # Allow outgoing connections from the private interface iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT # Masquerade (NAT) iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # Don't forward any other traffic from the public to the private iptables -A FORWARD -i eth0 -o eth1 -j REJECT However, I now need to enable access to users on our 129.n.n.x/25 subnet to some private servers on the 10.n.n.x/24 network. I figured that I could do something like: # Allow established connections, and those !not! coming from the public interface # eth0 = public interface # eth1 = private interface #1 (10.n.n.x/24) # eth2 = private interface #2 (129.n.n.x/25) iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A INPUT -m state --state NEW ! -i eth0 -j ACCEPT iptables -A FORWARD -i eth0 -o eth1 -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A FORWARD -i eth0 -o eth2 -m state --state ESTABLISHED,RELATED -j ACCEPT # Allow outgoing connections from the private interfaces iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT iptables -A FORWARD -i eth2 -o eth0 -j ACCEPT # Allow the two public connections to talk to each other iptables -A FORWARD -i eth1 -o eth2 -j ACCEPT iptables -A FORWARD -i eth2 -o eth1 -j ACCEPT # Masquerade (NAT) iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # Don't forward any other traffic from the public to the private iptables -A FORWARD -i eth0 -o eth1 -j REJECT iptables -A FORWARD -i eth0 -o eth2 -j REJECT My concern is that I know that the computers on our 129.n.n.x/25 subnet can be accessed via a VPN through the larger network operated by the provider - therefore, would it be possible for someone on the provider's supernet (correct term? inverse of subnet?) to be able to access our private 10.n.n.x/24 intranet?

    Read the article

  • Squid allow both authenticated and ip based logins

    - by Pete Sampras
    I have a proxy server which allows users to connect and authenticates them via user/pass but some of them are complaining about this method since not many of the available proxy software support that method so I wish to config my squid in such way that it allows members to connect via user/pass or based on their pc ip but I'm not sure if that could work. Anyone with an idea?

    Read the article

  • MAX Connection Pool Setting SQL Server 2008

    - by dkeeshin
    We are expecting a large number of users to hit a Website built with IIS/.Net 4.0 that our SQL Server 2008 database server is providing data for. The database is around 2GB in size. We are contemplating increasing the MAX CONNECTION POOL to between 500 to 1000 -- to handle the estimated traffic. Two questions (1) Does anyone have any hard performance numbers indicating the kind of improvement this may provide? (2) What is the impact of hitting that MAX CONNECTION POOL number in a production enviroment?

    Read the article

  • SharePoint MySite - Purge newsfeed activity?

    - by Chris W
    After setting up User Profile sync with AD I've noticed that the newsfeed section of each user's MySite is now flooded with lots of random notes detailing changes that have been pulled in about their (and their contacts') profiles. Is there anyway to purge this activity and stop updates from the sync service getting listed on the newsfeed? Our users are likely to find it strange getting updates about changes to their own profiles that they didn't make themselves.

    Read the article

  • VPN Router drops connections

    - by Kathleen
    We are using a Netgear VPN Firewall Router FVS318v3.. We have a DSL connection here at the office, and my users complain of the connection dropping, or locking up on their end.. Latest firmware is installed, rebooting the router doesn't help, no other internet connectivity issues reported anywhere else (ie., no other internet connection problems here, or at their end, except when connecting to the VPN..) Is there anything else I can check to pinpoint this problem? TIA!!!

    Read the article

  • Copy data from a remote Linux box to my Windows desktop

    - by Sanjay Rao
    I use Putty to login to the remote server and then set the environment and change the path to a particular directory. Now from this dir, I need to copy a folder to my desktop which is Windows? How can I achieve this ? Some of my failed attempts are as follows scp -r remote_foldername srao@my_ipaddress:C:\srao\Users\Desktop So from the remote server which is to be copied through putty, to my_username_in_windows@ip_address:path to destination

    Read the article

  • Nagios only create warning for a http service

    - by MeinAccount
    I would like to also monitor non-crucial services with nagios like for example our GitLab-server or phpMyAdmin instance. Is there any way to just create warnings instead of circuital errors for some services? At the moment I'm using the following: define service { host_name localhost use generic-service service_description HTTP GitLab check_command check_www!git.example.com!'/users/sign_in' } define command { command_name check_www command_line /usr/lib/nagios/plugins/check_http -H '$ARG1$' -I '$HOSTADDRESS$' -e 'HTTP/1.1 200 OK' -u '$ARG2$' }

    Read the article

  • Where to find a list of bad passwords?

    - by Steve Morgan
    I need to implement a 'stop list' to prevent users selecting common passwords in a new online service. Can anyone point me to such a list online anywhere? Edited: Note that I'm only trying to eliminate the most common passwords, not an exhaustive dictionary. And, of course, this complements a reasonably strong password policy (length, use of non-alpha characters, etc.) Thanks.

    Read the article

  • Screen Snip/Capture Utility callable from API or command line?

    - by Raymond
    I am looking for a screen capture tool that is controllable from the command line. Ideally I would pass the filename, and possibly some options (capture mouse pointer or not, etc..), then it would take control, allow the user to select a region of the screen, and then save it to the specified file and disappear. screensnip.exe /output c:\users\public\pictures\screenshot.png /hidecursor user draws rectangle on screen control passes back to batch file, script, etc....

    Read the article

  • Make logwatch reports more interesting?

    - by Alexander Shcheblikin
    Is it possible to improve the quality of reports from logwatch? Like make it not just report disk usage which doesn't even change much in daily operation, but report significant changes in usage or approaching critical capacity levels? If I cannot do that with logwatch and instead have to write custom scripts to produce such reports, logwatch appears to be pretty useless, or even dangerous, as many users reportedly grow to ignore emails from it knowing they are so boring.

    Read the article

  • Administrator can run a application but produces error while a administrator previllaged user can run without error

    - by tough
    I have an application which can run as admin prevailed user without error but while administrator runs it it produces error. The input string was not in correct format-application error. I tried to figure it out but not possible, since most of the people are looking for admin privilege to run it, me looking why can't a admin run the program without errors? The program is related to mssql-2008 r2. The SQL log-in settings are same for both the users.

    Read the article

  • how to setup OpenSSH per-user authentication types?

    - by Seaweed
    Hi - I'd like to be able to have one set of users authenticating using public key auth and the other set to use username/password. Is this possible in OpenSSH on Linux? If so how do I go about it? Right now, I'm stuck with only having one option as far as I can see in /et/ssh/sshd_config - it's either PAM or PublicKey authentication...

    Read the article

  • Timout dead connections to Digi PortServer TS16

    - by MT
    We are using Digi portservers for console management of our routers. Basically users telnet to the Digis on ports 2001-2016 (corresponding to the physical serial port they want to connect to). Does anyone know if there is a way to cause the digi to close/release a user's connection after an period of idle time and if possible, where that time can be specified?

    Read the article

  • How can I prepare a TortoiseSVN installer to use the serf HTTP library instead of neon?

    - by Sam Johnson
    I'm going to be distributing instructions on how to access our new Subversion repository with TortoiseSVN. Because it's hosted on Windows, and we have some large files in the repository, we have to use the Serf HTTP library instead of neon. This is normally specified by manually editing the Subversion "servers" file on the client machine and adding the line http-library=serf Is there a way I can customize the TortoiseSVN installer to do this automatically? I'm just trying to get it up and running as easy as possible for our new SVN users.

    Read the article

< Previous Page | 407 408 409 410 411 412 413 414 415 416 417 418  | Next Page >