Search Results

Search found 95527 results on 3822 pages for 'the curious one'.

Page 489/3822 | < Previous Page | 485 486 487 488 489 490 491 492 493 494 495 496  | Next Page >

  • Is there a way to combine multiple TextMate windows?

    - by yahelc
    After files have already been opened in separate windows, is there a way to combine them in TextMate 1.5.9? Or, is there a way to get CyberDuck to open group files edited at the same time as TextMate projects? If you open a folder of files in TextMate, it groups them all in one window like such: But, if I open multiple files separately (as my FTP forces), they appear in multiple windows. Is there any way to combine multiple TextMate windows into one, so they appear grouped like in the screenshot above?

    Read the article

  • Windows 7 Remote Desktop Connection Rendering Each Frame?

    - by TheDarkIn1978
    When connecting to my work computer over VPN and Remote Desktop Connection, images and videos are sent back one frame at a time, which really slows things down. I'm familiar with the "Experience" tab while connecting and the only options I have checked are "Visual styles" and "Persistent bitmap caching". Isn't it possible to work remotely that is more similar to screen sharing over Skype, where there is a lag but not every single frame has to be rendered and passed back to me one at a time? Both computers are running Windows 7 Professional.

    Read the article

  • Deploy Windows 7 Backup set to Windows 8

    - by Matthias
    Situation: We have a laptop here that's completely fubar. I.e: The hard drive is filled to the brim with bad sectors. Luckily, backups have been made using the built-in Windows 7 backup feature. This produces folders named Backup Set 2012-11-09 003009, containing folders like Backup Files 2012-11-09 003009, containing zip-files like Backup files 1, 2, 3,... Our brand new laptop comes with Windows 8. Now: Can we, using the standard back-up and restore feature in Windows 8, restore all the documents, music, etc. using the Windows 7 backup files? Thanks. (FYI: We also took a normal backup of all the documents just to be sure of course. I'm just curious what would happen. I would test it out, but the new laptop hasn't arrived yet and I wanted to make sure my efforts would not be in vain.)

    Read the article

  • Best way to block a country by IP address?

    - by George Edison
    I have a website that needs to block a particular country based on IP address. I am more than aware that IP-based blocking is not a foolproof method for blocking visitors, but it is a necessary step in the right direction. Since I'm using PHP, what I would do is use a GeoIP database like geoplugin.net. However, I'm curious to know if there's a better way of doing this. The website is on a shared webserver (I don't have root access) and it is running Apache on centOS. I guess my question is "can an .htaccess file be configured to block by IP using an external source to lookup IP addresses."

    Read the article

  • What are the effects of the L root server now publishing DURZ?

    - by brent
    I'm curious what the actual effects of the L root server publishing DURZ today will be. On the nanog mailing list, someone said it's important to evaluate the systemic effects of root name servers publishing signed zones, even when not using DNSSEC. Meanwhile, RIPE's own published information on their changes to the K root server say there's no issue if your resolvers don't use DNSSEC. Can someone please clear this up? DNSSEC seems to be a messy, tangled web. If not enabling DNSSEC on my resolvers, do I have anything to worry about with the upcoming changes to the root servers?

    Read the article

  • The good and the bad: Coda or Espresso?

    - by Kriem
    For my semi-professional web development studio, I'd like to use a more dedicated piece of software in stead of plain text editors. Both Coda as Espresso seem interesting, but I can't seem to choose which one to buy. Any thoughts on which one to choose?

    Read the article

  • how to check open ports of bunch of website at once with nmap/linux?

    - by austin powers
    hi , I want to use nmap in such a way that I could check bunch of server's port at once for checking whether their particular port is open or not? right now I have 10 ip addresses but in future this could be more . I know the very basic command in linux like cat/nano/piping but I don't know how can I feed to nmap the list of my servers to open them one by one and return the result.

    Read the article

  • How much did it cost our competitor to DDoS us at 50 Gbps for two weeks?

    - by MiniQuark
    I know that this question may sound like an invalid serverfault question, but I believe that it's quite valid: the amount of time and effort that a sysadmin should spend on DDoS protection is a direct function of typical DDoS prices. Let me rephrase this: protecting a web site against small attacks is one thing, but resisting 50 Gbps of UDP flood is another and requires time & money. Deciding whether or not to spend that time & money depends on whether such an attack is likely or not, and this in turn depends on how cheap and simple such an attack is for the attacker. So here's the full story: our company has been victim to a massive DDoS attack (over 50 Gbps of UDP traffic, full-time during 2 weeks). We are pretty sure that it's one of our competitors, and we actually know which one, because we were the only two remaining competitors on a very big request for proposal, and the DDoS attack magically stopped the day we won (double hurray, by the way)! These people have proved in the past that they are very dishonest, but we know that they are not technical at all, so we believe that they simply paid for some botnet DDoS service. I would like to know how much these services typically cost, for such a large scale attack. Please do not give any link to such services, I would really hate to give these people any publicity. I understand that a hacker could very well do this for free, but what's a typical price for such an attack if our competitors paid for it through some kind of botnet service? It is really starting to scare me (if we're talking thousands of dollars here, then I am really going to freak off: who knows, they might just hire a hit-man one day?). Of course we filed a complaint, but the police says that they cannot do much about it (DDoS attacks are virtually untraceable, so they say), and our suspicions are not enough to justify them raiding our competitor's offices to search for proofs. For your information, we now changed our infrastructure to be able to sustain such attacks: we now use a major CDN service so that our servers are not directly affected by DDoS attacks. Requests for dynamic pages do get proxied to our servers, but for low level attacks (UDP flood, or Syn floods, for example) we only receive legitimate trafic, so we're fine. If they decide to launch higher level attacks (HTTP flood or slowloris attacks for example), most of the load should be handled by the CDN... at least I hope so! Thank you very much for your help.

    Read the article

  • Show command prompt on reboot

    - by LinuxPenseur
    Hi, In one of my linux machines, when i give reboot command at the shell command prompt then press enter, i get another command prompt and then the system reboots. $reboot $ But in one of my office Linux machines, when i give the reboot command, it suddenly reboots without showing another shell command prompt What could be the reason for this? I need the first behavior to be present in my office machine also. Kindly tell me where i should tweak my office machine. Thanks

    Read the article

  • Is this video card good for 3 monitors? [on hold]

    - by Brian Briu
    Video card: http://www.amazon.de/Zotac-NVIDIA-GeForce-Grafikkarte-Speicher/dp/B00D4KCSHG/ref=sr_1_11?ie=UTF8&qid=1408575042&sr=8-11&keywords=grafikkarte 3 Monitors like this: http://www.mediamarkt.de/mcs/product/ASUS-MX-239-H,48353,462790,951629.html?langId=-3 If yes how can I connect them? If no, i'll buy one more video card like that. Also tell me what motherboard should I buy for these things + 32 ram and i7 (remember that in the future i'll buy one morre video card (to have 2). Power supply also?

    Read the article

  • What technologies allow bidirectional streaming of video?

    - by Roman
    Wikipedia says that Flash allows "bidirectional streaming of audio and video". Is it possible to do that with other technologies (for example with JavaScript)? In other words, I want to transfer video from one user of web-site to another one in real time. I want to have something that is already installed by many users or easy to install (Flash fulfills this requirements). And I want to have something free.

    Read the article

  • How do i mitigate DDOS attacks on static servers?

    - by acidzombie24
    Here is a slightly different take on DDOS attacks. Rather than a server with dynamic content being attack i was curious how to deal with attacks on servers with STATIC CONTENT. This means cpu tends to not be an issue. Its either bandwidth or connection problems. How would i mitigate a DDOS attack knowing nothing about the attacker (for example country, ip address or anything else). I was wondering is shorting the timeout and increasing amount of connections is an acceptable solution? Or maybe that is completely useless? Also i would limit the amount of connections per IP address. Would the above help or be pointless? Keeping in mind everything is static checking for multiple request of the same page (html, css, js, etc) could be a sign of a attack. What are some measures i can take on a static content server?

    Read the article

  • I used "autoconf6" (used to configure IPV6) on an AIX 6 target and I don't know how to change it back.

    - by newtoaix
    So I got curious and ran autoconf6 and now I can't figure out how to undo the changes that were made. I have tried using smitty to modify the en0 interface but have had no luck getting it back to it's old configuration. The old configuration of the aix 6 box was: en0: flags=5e080863,c0 inet 10.10.30.212 netmask 0xffffff00 broadcast 10.10.30.255 tcp_sendspace 131072 tcp_recvspace 65536 lo0: flags=e08084b inet 127.0.0.1 netmask 0xff000000 broadcast 127.255.255.255 inet6 ::1/0 tcp_sendspace 131072 tcp_recvspace 131072 rfc1323 1 then I ran autoconf6 and it was changed to: en0: flags=5e080863,c0 inet 10.10.30.212 netmask 0xffffff00 broadcast 10.10.30.255 inet6 fe80::214:5eff:fe96:b806/64 tcp_sendspace 131072 tcp_recvspace 65536 sit0: flags=8100041 inet6 ::10.10.30.212/96 lo0: flags=e08084b inet 127.0.0.1 netmask 0xff000000 broadcast 127.255.255.255 inet6 ::1/128 tcp_sendspace 131072 tcp_recvspace 131072 rfc1323 1 Any help would be awesome.

    Read the article

  • Connect Outlook to our Exchange Server 2003 over the Internet

    - by Sharon Cook
    We have a one mail server here on site running Exchange 2003, however we are part of a large exchange group - there are some 10 outlook mail servers around the world and we are just one of the administratove groups. We can access email via OWA and I have checked our server and is a RPC-HTTP Back end server and RPC is installed. We can connect via VPN, on lan, and OWA but I cannot get it to work via the internet. Any suggestions

    Read the article

  • Possible to write an implement of RAIDZ or RAIDZ2 for the MD driver in the Linux kernel?

    - by Pharaun
    I am curious on if it is possible to have an implement of RAIDZ and/or RAIDZ2 in the MD driver in the Linux kernel? From my understanding of it is that the RAIDZ version is equivalent to a RAID 5, and that a RAIDZ2 is equivalent to a RAID 6. The main difference is that the stripe size can be variable for RAIDZ as opposite to RAID 5/6 from my understanding, which helps performance. So what I am wondering is would it be possible to add this performance enhancing technique to RAID 5 & 6 in the MD driver in the kernel? Or is it tied too closely to how the ZFS works?

    Read the article

  • Creating zoom-pan video from a picture in Linux

    - by Pavel
    I would like to make a six second video using six images. Each second is sliding over one image from its top to its botom. Or some other motion effect – I would like to try several. I tried kdenlive Imagination Videoporama PhotoFilmStrip The first one has not enough settings (don't remember what exactly) and all those have rather poor quality – the resized picture is very "aliased" (like no quadratic filter was applied during resizing).

    Read the article

  • How to prepare WiFi for an on-stage demo?

    - by Jeremy White
    Today at WWDC, Steve Jobs gave his keynote and ended up having a failure on-stage when connecting to WiFi. Google had a similar issue a few weeks ago in the same conference center. Please reference the following article for more information. http://news.cnet.com/8301-31021_3-20007009-260.html I am looking for information on how to best prepare a demo which uses a closed wireless network in front of a large audience. Note that the network will be closed, and will not require internet access. What steps can I take to prevent interference from existing WiFi, Bluetooth, etc? How can I best prevent curious/malicious people from trying to intrude on my WiFi network? I am open to recommendations on specific models of routers.

    Read the article

  • Do most "normal" people use metro or desktop in Windows 8

    - by ihateapps
    Just curious since I don't fit the definition of a "normal" computer user nor have my friends or relatives upgraded to Windows 8 yet. Are most people in the "wild" (i.e. the "guy in starbucks" or "your friend who works as an auto tech". not you since you are on SU) using metro apps regularly to the point where the desktop is pointless or are they sticking with the desktop? I've gotten mixed statistics from Google. I'm asking for your personal anecdotal opinion based on what you notice in the wild.

    Read the article

  • Intermediate certificates on NLB load balanced servers

    - by MrVimes
    I am fairly sure I know how to install the 'main' certificate on load balanced servers (install on one, export, import to the others) but I'm not quite sure what to do about the intermediate certificate (the one you install using the certificates snap in in mmc) Do I manually install it using mmc on each server? or is there a similar process involved to the main cert (install, then export, then import on the others?)

    Read the article

  • Is it possible to host a website in the 'ether' of the Internet -- not on a server -- so that it can

    - by Chris Altman
    This is a theoretical problem I am curious about. Websites are hosted on servers. Servers can be taken offline. Is it possible to host a website in the 'ether' of the Internet -- not on a server -- so that it cannot be taken down? One example, is that the website is hosted on other websites, like a parasite. Another is that it is assembled through storing pieces on DNS machines, routers, etc., so that it get assembled on the fly. The purpose is that this website could live forever because no one person can remove it. The answers I am looking for are plausible idea/approaches on technically how this could be built.

    Read the article

  • Screen refresh rate in Ubuntu

    - by user24224
    I am having problems with the refresh rate if the screen . In the the refresh mode of the monitor in the monitor options have only one option 60Hz. I have LG 24 + ATI Radon 3870, and have already installed the ATI driver via Ubuntu download center. Any idea how I solve that one? Thanks.

    Read the article

  • How do I perform commands in another folder, without repeating the folder path?

    - by Valter Henrique
    Is there a clever way to do copy and move operations or a command to duplicate a file, without having to do a cd, then mv after, at the same folder? For example, I have to run the following: mv /folder1/folder2/folder3/file.txt /folder1/folder2/folder3/file-2013.txt Note that the directory to where I'm moving the file is the same, but I have to put the whole path again and sometimes it gets annoying. I'm curious to know if there's another way to do that without having to put the whole path again, because the operation would be done in the same path.

    Read the article

  • Multiple Domains on an Exchange Server

    - by William
    When I create a new user in exchange, it asks me to provide the User Logon Name. There is a dropdown box that supposedly allows you to select a domain for the user's login. What is this referring to? How can I make it so that I can create users with different domains in their user logon name? p.s. I am very aware of 'Accepted Domains' in Exchange allowing one user to have several email addresses in different domains. I am just curious how I can modify the user's Logon name specifically.

    Read the article

  • Weird console problem in linux, usually right before OOM

    - by Kevin Quinn
    So I've noticed this happen more than once. If I remember correctly, this usually happens right before OOM, and/or kernel panic that if you type into a tty and then try to backspace it, the same characters are printed back in reverse. This has been merely an interesting oddity to me in the past, but it happened again recently, and I've gotten more curious about what's actually causing that. (Is it sending the characters back to STD_OUT or something?) Does anyone have any idea? I have a feeling the answer will be interesting. Just so I'm clear, if you typed hello world, then tried to backspace it: hello world..dlrow olleh

    Read the article

  • Duplicate mails in unread mail view of Windows Live Mail

    - by EpsilonVector
    When I get new mail and go to the "unread email" quick view I always see two version of the email, even though I definitely have only one such version in the inbox itself. Further, viewing the message via inbox usually marks only one of these copies as read, or sometimes none at all. I have no custom filters defined that could cause duplication. Any idea what's going on? PS This is the new version (2011).

    Read the article

< Previous Page | 485 486 487 488 489 490 491 492 493 494 495 496  | Next Page >