Search Results

Search found 21184 results on 848 pages for 'cable internet'.

Page 417/848 | < Previous Page | 413 414 415 416 417 418 419 420 421 422 423 424  | Next Page >

  • USA : un mouvement de protestation contre les programmes d'espionnage en préparation, WordPress et d'autres manifesteront le 4 juillet

    USA : un mouvement de protestation contre les programmes d'espionnage en préparation WordPress et d'autres manifesteront le 4 juillet La fête d'indépendance américaine risque de laisser un arrière-goût amer aux responsables de la politique américaine. En effet une large coalition de droits civils, de groupes privés et potentiellement de milliers de sites internet membres de la « Internet Defense League » (qui a 30 000 membres) a prévu de protester contre les programmes de surveillance de l'agence américaine de renseignements NSA le 4 juillet prochain. Le quatrième amendement de la constitution américaine qui protège contre les perquisitions et saisies non motivées et qui requiert un mandat pour toute perqu...

    Read the article

  • Acquiring the Skill of SEO

    Many people might not be aware of the topic or what the article is in fact focusing upon. Basically the term referred in the above topic is related to internet tactics. It refers to search engine optimization which is a very well-known skill nowadays. Well moving on towards the definition, it is the process of improving the ranking of a particular website on a search engine. It is known as an internet market strategy in which first of all an analysis of working of search engines is carried out.

    Read the article

  • How to be anonymous on IPV6 protocol by not using MAC address in EUI-64?

    - by iugamarian
    The IPV6 protocol has a feature called "Extended Unique Identifier" or EUI-64 witch in short uses the MAC address of the network card when choosing an IPV6 Adress. Proof: http://www.youtube.com/watch?v=30CnqRK0GHE&NR=1 at 7:36 video time. If you want to be anonymous on the internet (so that nobody can find you when you download something, etc.) you need this EUI-64 to be bipassed in order for the MAC address not to be discovered by harmful third parties on the internet and for privacy. How do you avoid EUI-64 MAC address usage in IPV6 selection in Ubuntu? Also for DHCP IPV6?

    Read the article

  • Hitachi Data Systems definition of cloud

    - by llaszews
    1. Ability to rapidly provision and de-provision a service. (aka: provisioning) 2. A consumption model where users pay for what they use. (aka: chargeback and showback) 3. The agility to flexibly scale - 'flex up' or 'flex down' - the services without extensive pre-planning. (aka: elasticity) 4. Secure, direct connection to the cloud without having to recode applications (aka: internet-based) 5. Multi-tenancy capabilitites that segregate and protect the data. (as it says multi-tenancy) Happen to be I have been talking about 4 of the 5. Did not mention connection to internet as assumed this.

    Read the article

  • 407 Proxy Authentication Required

    - by user38507
    When I try to install a software using Ubuntu Software center I get: Failed to download repository information Check Your Internet connection When I try to do a apt get-install something, I get: 407 Proxy Authentication Required I use a proxy server that requires a user-name and a password. I have set my systems proxy manually, by plugging in the required numbers in the Networks proxy and applied it system wide. I guess the problem now is plugging in my user-name and password. When I use INTERNET via Mozilla, it specifically asks me for my user-name and password.

    Read the article

  • Samsung NC10 Broadcom difficulties

    - by simonp
    I am new to Ubuntu/Linux and am stuck already! Any help much appreciated. I have managed to install Ubuntu Maverick 10.10 (from a USB flash drive) on my NC10 which also has Windows 7 on the partitioned drive. But the wireless internet is not working. I have identified the hardware as a Broadcom BCM4313. I have also managed to find that the correct driver is installed (Modaliases for Broadcom 802.11 Linux STA driver). I have followed advice from elsewhere and there does not seem to be any competition from other drivers. I am now stuck and do not have any other internet access on this netbook. Any ideas?

    Read the article

  • Tumblr is visiting my blog?

    - by Hermes
    I have created a blog on Tumblr a few days ago. Looking over the statistics, it seems that Tumblr itself is visiting my website, using different browsers. What is this supposed to mean? Are these real visitors or is it a Tumblr bot? One example: Browser: Chrome 32.0 OS: Win8 Resolution: 1024x768 Location: New York, United States IP Address: Tumblr (66.6.40.249) Referring URL: (No referring link) Other browsers used include: Chrome 20.0.1090.0 Firefox 21 Opera 12.14 Chrome 15.0.861.0 Chrome 32.0.1667.0 Internet Explorer 6 Internet Explorer 9 Opera 12 Opera 12.02 They all use the same screen resolution (1024x768) and have no referrer. The flash version is not set, but they do support javascript. Unfortunately, I don't have the full user agent string.

    Read the article

  • My wireless connection isn't working well

    - by Maikel Braas
    So this is my problem, I intalled ubuntu 12.04 with the wubi.exe and everything works fine, but my internet connection. When I try to install a program or use firefox, it goes with 24kb/s with a little luck for 1-2 seconds and then my internet terminates and it starts up again after 3-5 mins. Then it goes with an other 24kb/s and this will repeat. The thing is my connection works perfectly with windows. The laptop its running on is a Acer ASPIRE V3-771G. I tryed using a different network adaptor but that didn't help either. Please, some one help me with this. friendly regards, Maikel

    Read the article

  • Google se lance encore un peu plus dans la voix sur IP et la vidéo-conférence, au moment où Skype so

    Mise à jour du 19/05/10 Google se lance dans la voix sur IP et la vidéo-conférence Au moment où Skype sort la nouvelle version de son application Les deux faits ne sont pas liés, mais ils montrent que la voix sur Internet (VoIP) au sens large est un secteur en plein devenir. Après Gizmo5 (lire ci-avant), Google vient en effet de lancer une Offre Publique d'Achat (OPA) sur une société norvégienne spécialisée dans la « transmission du son et de la vidéo en temps réel » sur Internet. La définition d'une technologie qui fait furieusement penser à Skype. La direction de Global IP Solutions a d'ores et déjà annoncé qu'...

    Read the article

  • ethernet problems in ubuntu 12.04

    - by h4x0rj3ff
    so today i popped out my hdd with ubuntu on it and put in a fresh hdd and installed win8 (wanted to try it). i got everything installed, upp and running and decided to go back to ubuntu (for obvious reasons lol) but when i boot back into ubuntu my internet connection will not connect. i booted into a live cd of ubuntu and it still would not work. i thought i blew up my onboard port so i booted back into win8 and the internet worked without flaw. so i booted back into my ubuntu install and i have a usb to ethernet adapter that im using but i still cant get my onboard to connect. any ideas?

    Read the article

  • Couldnt find a way to open blender software

    - by sapphirebox001
    I am new to Ubuntu. I downloaded the latest version of Blender (2.70a) from official blender.org site as an tar.bz2 file. My Ubuntu OS is 14.04 LTS amd64 bit os, and I am sure that I have downloaded the correct version of blender. I have read that for security reasons, Ubuntu does not allow executing exe files. Since the downloaded package contains blender as an executable/x-executable type, it is not able to execute. I do not have an internet connection in that computer too. Also the "Allow executing file as program" checkbox is checked by default. Still double clicking it does not execute the file. Can anyone say how to open this file? P.S: Wine also checked but requires active internet connection, which I dont have.

    Read the article

  • VDC Research Webcast: Engineering Business Value in the IoT with Java 8

    - by tangelucci
    Date: Thursday, June 19, 2014 Time: 9:30 AM PDT, 12:30 PM EDT, 17:30 GMT The growth of the Internet of Things (IoT) opens up new service-driven opportunities, delivering increased efficiencies, better customer value, and improved quality of life. Realizing the full potential of the Internet of Things requires that we change how we view and build devices. These next-generation systems provide the core foundation of the services, rapidly transforming data to information to value. From healthcare to building control systems to vehicle telematic systems, the IoT focuses on how conneted devices can become more intelligent, enhance interoperability with other devices, systems and services, and drive timely decisions while delivering real business return for all. Join this webcast to learn about: Driving both revenue opportunities and operational efficiencies for the IoT value chain Leveraging Java to make devices more secure How Java can help overcome resource gaps around intelligent connected devices Suggestions on how to better manage fragmentation in embedded devices Register here: http://event.on24.com/r.htm?e=793757&s=1&k=4EA8426D0D31C60A2EDB139635FF75AB

    Read the article

  • Microsft Targets Graymail and New Patch Tuesday

    The first critical bulletin will patch a vulnerability contained within Windows and Internet Explorer. Microsoft said that if the vulnerability was exploited, it would give hackers an avenue to spread malicious code on a remote basis. The bug affects the Windows XP, Windows Vista, and Windows 7 operating systems, plus Internet Explorer versions 6, 7, and 8. The Windows Server 2003 and 2008 platforms have been identified to be affected by the bug as well. The second critical bulletin addresses a .NET and Silverlight bug that makes remote code execution possible. With the vulnerability in pl...

    Read the article

  • How to set up dual wired and wireless connections?

    - by Col
    My laptop has both wireless and a wired connection capabilities. Can I connect to a router A using wireless and a separate router B using wired ethernet at the same time without having to switch back and forth? Thanks for replying so quickly. I wish to connect to two separate networks. The wireless connection is to router A which is connected to broadband internet. The wired connection is to router B which I wish to share files and a printer on 1 or 2 other desktops also using wired connections on B and maybe using synergy to have only one keyboard and mouse for 2 desktops. The wireless laptop is the only one required to have internet access.

    Read the article

  • Google Chrome continue de gagner des parts de marché en Europe, le "ballot screen" de Microsoft n'au

    Mise à jour du 07.05.2010 par Katleen Google Chrome continue de gagner des parts de marché en Europe, le "ballot screen" de Microsoft n'aurait aucun lien avec ce succès D'après les chiffres communiqués par l'AT Internet Institute en mars 2010, Internet Explorer a perdu 7.5 points sur le marché européen. Autrement dit, 57.1% des internautes l'utilisent. Cette chute fait un heureux : Google, dont le navigateur Chrome progresse en passant de 1.4% en mars 2009 à 5.3% actuellement. Il faut dire que la firme de Mountain View n'a pas lésiné niveau publicité pour promouvoir son logiciel. L'Espagne, l'Italie, la Belgique et le Royaume-Uni sont les pays de notre continent faisant le plus de place au...

    Read the article

  • Microsoft se réjouit de la future fonctionnalité "Tracking Protection" d'IE 9, et espère que ses concurrents "feront pareil"

    Microsoft se réjouit de la future fonctionnalité "Tracking Protection" d'Internet Explorer 9, et espère que ses concurrents "feront pareil" Vendredi soir, après le CES de Las Vegas, Dean Hachamovitch, Directeur de l'activité Internet Explorer chez Microsoft, a tenu une conférence de presse. Devant les journalistes qui y étaient conviés, il a évoqué la fonction "Tracking Protection", qui n'est actuellement pas présente dans IE9 bêta, mais qui fera son entrée dans la mouture définitive du navigateur. Elle permettra d'« identifier et bloquer toutes les formes de traçage sur le web », via la « tracking protection list ». Grâce à ce mécanisme, un internaute pourra savoir exacte...

    Read the article

  • Lyrics on mp3 ID-tag

    - by puchrojo
    Since a few years ago I stopped listening to CDs and began to listen to mp3 only. At the begining I continued to buy the CDs to support the artist, but later I started to buy the album direct online as mp3. The problem is, that by this, I don't have the lyrics for the songs. For the "commercial" or popular music it is not a big problem, but for others there are no lyrics on the Internet. How can I make use of the ID3-tag for the lyrics? Is there a music store that adds lyrics to the mp3 files sold? Can this be done with Ubuntu One? Another alternative would be to have an Internet lyrics databases like musixmatch.com supported.

    Read the article

  • Google Apps : fin du support d'IE8, dernière version du navigateur qui soutient Windows XP, le prochain Photoshop sera incompatible avec l'OS

    Fin du support d'IE8 pour Google Apps dernière version du navigateur qui soutient Windows XP, le prochain Photoshop sera incompatible avec l'OS Windows XP reste encore l'un des OS de la famille Windows le plus populaire. Mais, son support par les éditeurs de logiciels est de plus en plus en baisse. Google a annoncé qu'il ne prendra plus en charge le navigateur Internet Explorer 8 pour ses services Web et Cloud Google Apps. Dans un billet de blog, l'éditeur fait savoir qu'il mettra fin au support du navigateur pour Google Apps le 15 novembre prochain, soit une quinzaine de jours après la sortie grand public de Windows 8 et Internet Explorer 10. Après cette date, les ...

    Read the article

  • L'emploi cadre continue de se tasser dans l'IT, d'après l'Apec : maîtrise d'ouvrage et informatique de gestion sont les plus touchées

    L'emploi cadre continue de se tasser dans l'informatique D'après l'Apec, maîtrise d'ouvrage et informatique de gestion particulièrement touchées Plus de 55 000 offres d'emploi cadre ont été publiées à l'Apec en octobre 2012. Soit une croissance de l'emploi cadre de +10% par rapport à octobre 2011? mais qui redevient nulle si l'on considère le nombre de jours ouvrables comparables. Quant aux offres Internet, elles sont en net repli. D'après l'agence, les fonctions les plus en recul sont les Ressources humaines (-45 points sur son indice Internet), la Gestion/Finance/Administration (-38 points) et l'Informatique (-35 points). Néanmoins, le nombre global d'offres dans l'IT con...

    Read the article

  • What Are the Best Ways to Get Traffic From Search Engine Optimization Consultant?

    Every internet based business needs to go through a well planned and thought out process before it actually gets established and achieving its purpose. Obviously, the process is totally different from how a brick-and-mortar business is started and established but the basics remain the same. One of the key ingredients of the process of establishing an Internet based business is getting your website search engine optimized. Depending upon the size and complexity of business, search engine optimization may turn out to be a very detailed process if you really want it to be effective and useful.

    Read the article

  • Squid 2.7 Stable 8 on Windows 2008

    - by Sadish
    Hi all, I have a Windows 2008 SP2 Active Directory Domain, which has clients of Vista, Win 2000 XP and Windows 7 as members. I installed Squid 2.7 Stable 8 on Windows 2008 SP2 trying to configure NTLM based authentication when surfing Internet. Basically have defined 2 groups for internet allow and deny based on authorization Internet access is allowed. But after trying for over 3 weeks, seems that the authentication does not happen. The browser keeps on asking for user name & password. I would like to know if there is any solution for this. I’m totally frustrated and unable to move forward. My configuration as below from the modifying the default squid.conf Line 292 auth_param ntlm program c:/squid/libexec/mswin_ntlm_auth.exe auth_param ntlm children 5 Line 626 acl localnet proxy_auth REQUIRED src 10.0.0.1/255 acl InetAllow external win_domain_group InternetUsers acl InetDeny external win_domain_group InternetDenyGroup http_access allow InetAllow http_access deny InetDeny Comment any "acl localnet src" Line 294 external_acl_type win_domain_group ttl=120 %LOGIN c:/squid/libexec/mswin_check_lm_group.exe –G My Windows 2008 server is running on 192.168.0.203 and clients are of subnet 10.0.0.x for which I need authentication. Pls help !!!

    Read the article

< Previous Page | 413 414 415 416 417 418 419 420 421 422 423 424  | Next Page >