Search Results

Search found 47335 results on 1894 pages for 'find'.

Page 521/1894 | < Previous Page | 517 518 519 520 521 522 523 524 525 526 527 528  | Next Page >

  • Change the default browser which Kopete opens when you click a link?

    - by HorusKol
    I have FireFox as my desktop's default browser (Ubuntu/Gnome 9.10) and most applications open links into FF readily enough, including Choqok (a KDE twitter client). But Kopete insists on opening Konqueror - which is annoying as it takes an age to load, while FF is almost always open an simply needs a new tab. I've checked though the preferences of Kopete, and can't seem to find anything to make it use FF.

    Read the article

  • Different background images in Conemu tabs

    - by jasper
    Is it possible to assign different background images to tabs in Conemu? Console2 supports custom backgrounds per tab, and I'd like something similar to the functionality it provides. Perhaps I can set this in Startup - Tasks or via the command line of a running tab, but I can't find any information on it. e.g. Tab1 cmd "cmd.png" Tab2 powershell "ps.png" Tab3 Visual Studio Command Prompt "vs.png" Tab4 Admin:cmd "warning.png"

    Read the article

  • Memcache on MAMP 1.9

    - by Gautam
    Hi, I am trying to make memcache work on MAMP 1.9. In the process I have successfully installed memcached and tested it. But I can't find a way to install memcache.so on my MAMP. Any suggestions. Thanks

    Read the article

  • Reset Windows user domain password

    - by Jan Zich
    Is there a way to reset a user domain password remotely without login to a remote desktop to the domain controller? I could not find any MMC plugin in non-server Windows (Window 7 Ultimate in this case) to manage Active Directory which is understandable.

    Read the article

  • Location of truetype fonts

    - by StackedCrooked
    I would like to create a small script that installs a few truetype fonts on the user's system. On my Ubuntu machine the truetype fonts are located at /usr/share/fonts/truetype. However, I'm not sure if this location is the same on all machines. Is there a way to find out where truetypes fonts are stored on any Linux system?

    Read the article

  • How can I reconnect a NX session?

    - by netvope
    Server: neatx-server 0.3.1+svn59-0~ppa1~lucid1 Client: NX Client for Windows 3.4.0-7 Sorry if this is a stupid question, but I googled and couldn't find any documentation on this topic... How can I reconnect to a disconnected NX session? I can see sessions in NX Session Administrator, but there is no way to reconnect to them. The NX Client seems to ignore any existing sessions and create new ones.

    Read the article

  • Checking the configuration of two systems to determine changes

    - by None
    We are standing up a replicant data center at work and need to ensure that the new data center is configured (nearly) identically to the original. The new data center will be differently addressed and named than the original and will have differing user accounts, but all the COTS, patches, and configurations should be the same. We would normally ghost the original servers and install those images onto the new machines, however, we have a few problematic pieces of COTS that require we install them outside of an image due to how they capture the setup of the network during their installation and maintain it within their configuration information (in some cases storing it in various databases). We have tried multiple times and this piece of COTS cannot be captured within a ghost image unless the destination machine will have an identical network setup (all the same IPs, hostnames, user accounts, etc across the entire network) as the original. In truth, it is the setup of these special COTS that I want to audit the most because they are difficult to install and configure in the first place. In light of the fact that we can’t simply ghost, I’m trying to find a reasonable manner to audit the new data center and check to see if it is setup like the original (some sort of system wide configuration audit or integrity check). I’m considering using something like Tripwire for Servers to capture the configuration on the source machines and then run an audit on the destination machines. I understand that it will still show some differences due to the minor config changes, but I’m hoping that it will eliminate the majority of the work. Here are some of the constraints I’m working under: Data center is comprised of multiple Windows and Linux machines of differing versions (about 20 total) I absolutely cannot ghost or snap any other type of image of these machines … at least not in their final configuration I want to audit the final configuration to ensure all of the COTS, patches, configurations, etc are installed and setup properly (as compared to the original data center) I would rather not install any additional tools on these machines … I’d much rather run it from a standalone machine or off a DVD Price of tools is important but not an impossible burden, however, getting a solution soon is important (I can’t take the time to roll my own tools to do this) For the COTS that stores the network information, I don’t know all of the places it stores the network information … so it would be unlikely I could find a way in the near future to adjust its setup after the installation has occurred Anyone have any thoughts or alternate approaches? Can anyone recommend tools that would be usable for system wide configuration audits?

    Read the article

  • Integrated Windows Authentication not working in IE only

    - by CoreyT
    In my site I have one folder that does not allow anonymous access. It is set up to use Integrated Windows Authentication as it is on an AD domain. The login works fine in Firefox, Chrome, even Safari, but not IE8. Has anyone encountered this before? I can't seem to find anyone else with a similar issue, except for where the login fails in all browsers of course.

    Read the article

  • Explain to a Jr. SysAdmin what happens when a PC joins a Windows 2008 Domain

    - by Nimmy Lebby
    An ideal answer would at least include: Critical configuration of the PC before it could join How the PC finds the Domain servers What happens when the PC cannot find any domain servers What connections are made from the PC to the domain How the AD records the connection How the PC drops the connection/AD monitors for stale connections Difference in this process between Windows 2008 R2 and previous versions of Windows Server That is all I could think of for now but I'm sure, as answers come in, I'll think of more.

    Read the article

  • IE advanced settings

    - by arwinder
    Working on a Domain network, I am having admin access over the machine , but recently found out(was in bad need for debugging), that I am not able to change the Advanced settings for the IE. Basically I need to enable the JS debugging so as to catch the grumpy JS issues. Looked out in the Group Policies but couldnt find anything substantial.

    Read the article

  • File audit in Linux: how to watch directory tree for deletions?

    - by FractalizeR
    Hello. I have a forum script running on server and somehow small number of attachments begin to get lost. I want to find out what is deleting them and at what time. How can I setup Linux auditd (auditctl) to watch directory tree (attachments are stored inside multi-level directory tree) to watch for file deletions there? May be I should use some other tool for this?

    Read the article

  • Could I get secure proxy server service free? [closed]

    - by lamwaiman1988
    It comes to my mind that when I use any proxy server, the information will be submit to the proxy server including the username/password of any website I login. This way I risk my identity. I've heard that there are some secure proxy server but can I found any with reasonable price, probably free? ( By the way, VPN is also considered but they are expensive for personal usage ). Even if I can find such service, how can I know that they won't exploit my information?

    Read the article

  • Get caller id and append to url in browser automatically

    - by timbad2021
    I am trying to find a caller id device/program that will automatically open a browser and append the incoming phone number to a url when receiving a call. For example: https://www.myphonesearchapp.com/search?q=5733655593 This would probably be a usb device that you would run a phone line through that will get caller id and allow you to set custom commands like append the number to a url and launching it in a Browser. Thanks!

    Read the article

  • Where exactly are shortcuts to the Windows Modern UI apps stored in windows 8?

    - by Journeyman Geek
    I'm trying to mess around with starting up modern UI applications from the desktop and various other wierdness. While I've been digging, I can't seem to work out where exactly the shortcuts to windows modern UI apps are stored. With my classic desktop applications they are in C:\ProgramData\Microsoft\Windows\Start Menu\Programs. The modern UI stuff dosen't turn up though. Where are the shortcuts to the modern UI apps stored so that the start screen can find them?

    Read the article

  • Postfix sendmail -bs shows no output - permissions?

    - by Tatu Ulmanen
    When I run the sendmail -bs command as root, I get the expected output: $ sudo sendmail -bs 220 mydomain.com ESMTP Postfix ehlo localhost 250-mydomain.com 250-PIPELINING 250-SIZE 15728640 250-ETRN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250 DSN But when I run the same command without sudo, I get no output at all and sendmail doesn't respond to any commands: $ sendmail -bs ehlo localhost quit wtf ^C $ How can I configure Postfix so that sendmail works for every user (or at least for some specific users)? I need this because SwiftMailer for PHP uses sendmail -bs for sending mails and fails when it can't find any output.

    Read the article

  • WmiPrvSE.exe using lots of RAM

    - by Greg B
    I've got a server running Windows Web Server 2008 SP1 (Version 6, Build 60001, SP 1). Looking in task manager I've got an instance of WmiPrvSE.exe running under the SYSTEM account using more than 400MB of RAM in its Working Set. How can I find out what this is and why its using so much RAM?

    Read the article

  • How to open the Select Users, Computers, Service Accounts or Groups

    - by Dave Rook
    The only way I know how to open the Select Users, Computers, Service Accounts or Groups is by right clicking on a folder and selecting Properties - Security Tab - Edit - Advanced. Below is a screen shot of the window I want to access: Is there any other way to view the full list (Find Now)? I am writing documentation and I want the user to check if a user exists before creating it. I would ideally like them to access this via control panel or similar.

    Read the article

  • OS X Enclosing folder shortcut?

    - by Nano8Blazex
    This may have been asked before, but I'm wondering whether there is a shortcut for navigating to the enclosing folder in OS X (Snow Leopard)? I find navigating Finder particularly frustrating since it's hard navigating back to the enclosing folder (especially when you jump to a folder and realize the back button is disabled)... I'm hoping for something other than Command+Up, since that's the key combination I use to navigate Spaces.

    Read the article

< Previous Page | 517 518 519 520 521 522 523 524 525 526 527 528  | Next Page >