Search Results

Search found 46053 results on 1843 pages for 'thinly veiled question mark'.

Page 570/1843 | < Previous Page | 566 567 568 569 570 571 572 573 574 575 576 577  | Next Page >

  • Varnish on Debian - libvarnish.so.1 not found

    - by Jannemans
    I'm trying to install Varnish on Debian 6.0.3 and am getting the following error when I try to start the server /usr/sbin/varnishd: error while loading shared libraries: libvarnish.so.1: cannot open shared object file: No such file or directory Runnig ldd 'which varnish' tells me this: libvarnish.so.1 => not found libvarnishcompat.so.1 => not found I also found this question on the same topic, but my problem is that the file really is missing...

    Read the article

  • AD group authentication to view wordpress posts?

    - by Mahriman
    I'm trying to set up a wordpress site using active directory authentication. One question that has come up is the ability to limit category/post/blog reading to specific AD groups. I've never seen this done and I haven't been able to find any plugins that seem to promise this functionality. It would seem that the best option is to just give a bunch of users a role with the read_private_posts capability, but I'm not sure this will do the trick.

    Read the article

  • Wireless Disabled:HardBlock

    - by wisdom
    Really I don't know where can I solve my problem.....I'm searching for ages everyone has solved it but me not yet ! It's Wireless HardBlock problem... I posted this question when I was using ubuntu 11.10 on askubuntu and no hope ! here are some solved problems which I tried but mine not solved ! (1,2,3) I'm using now Fedora17 beside Xubuntu where no problem with wireless card ! Anyone can give me hope to solve it ? thanks in advanced

    Read the article

  • linux + dialog bin tool

    - by Diana
    I used the dialog binary tool to create some msgbox on Linux screen as the following example dialog –colors –title “test” –msgbox “type <ENTER> 8 50 My question how to kill the dialog process in order to clear the screen without dialog BOX , there no dialog process , I check with ps –ef , I also try to dialog –clear this isn’t clear the screen and the dialog box still exist Please advice?

    Read the article

  • Should I join technicians' laptops to our domain?

    - by TooFat
    I have been charged with distributing about a dozen laptops to technicians at our company that will spend almost all of their time in the field not connected to our network. They may come in for quarterly meetings and may or may not connect their laptops to the network. My question is what are the benefits or disadvantages of joining these laptops to our domain and under these circumstances (given what I describe above) what would you do?

    Read the article

  • localhost as hostname confusion [duplicate]

    - by Baboon
    This question already has an answer here: localhost as hostname confusion 1 answer I have a basic understanding about hostname and FQDN. Now I am confused, do I really have to specify a name for my hostname? So for example: Hostname: somename Domain: mydomain.com FQDN: somename.mydomain.com Now, I see something that the hostname is localhost. What is the difference and impact of that? So my FQDN if localhost is my hostname would be localhost.mydomain.com, right?

    Read the article

  • Drive system file size

    - by rezx
    When i made a new drive it take some space for system file FAT32 take the less space, then NTFS, then ext4 my question how to know the space will be taken for the system before make the drive, if the drive 1giga or 100giga for FAT32, NTFS, ext4. Edit: when make 10MB drive with FAT32 the size shown 9.9 when make 10MB drive with ext4 the size shown 8.1 the same thing with the bigger size there always some space used and there is no files on the drive, so where this space go, if it for the filesystem how i can calculate the space that will be taken before format the drive

    Read the article

  • Configure APC for maximum hit rate

    - by Steven De Groote
    I'm currently running php5 with APC, the latter with default configuration. However after setting up munin to monitor APC, I'm surprised by the results: apc.shm_size: 30 apc.gc_ttl: 3600 apc.ttl: 0 Used: 14MB Request rate: 100 requests/second Fragmentation: 0 Hit ratio: 80% (dropping to 0 a few times per hour) So the obvious question: how can I adapt the configuration to achieve a higher hitrate. I find it very strange that the available memory is not fully used which the hitratio is still below what I would expect. Thank for any hints!

    Read the article

  • Hardware Mediaplayer display

    - by Eric Audio
    I'm looking for a keyboard or just a little display to attach on my keyboard or something like that, what will show me the music tracks i'm playing in windowsmedia player, itunes, etc. I did some research and the only thing I found are gaming keyboards, but i'm not shure if these show my music tracks. So my question: Does somebody knows a keyboard who show the music tracks or just a little display? Bye, Eric

    Read the article

  • How would you go about tackling this problem? [SOLVED in C++]

    - by incrediman
    Intro: EDIT: See solution at the bottom of this question (c++) I have a programming contest coming up in about half a week, and I've been prepping :) I found a bunch of questions from this canadian competition, they're great practice: http://cemc.math.uwaterloo.ca/contests/computing/2009/stage2/day1.pdf I'm looking at problem B ("Dinner"). Any idea where to start? I can't really think of anything besides the naive approach (ie. trying all permutations) which would take too long to be a valid answer. Btw, the language there says c++ and pascal I think, but i don't care what language you use - I mean really all I want is a hint as to the direction I should proceed in, and perhpas a short explanation to go along with it. It feels like I'm missing something obvious... Of course extended speculation is more than welcome, but I just wanted to clarify that I'm not looking for a full solution here :) Short version of the question: You have a binary string N of length 1-100 (in the question they use H's and G's instead of one's and 0's). You must remove all of the digits from it, in the least number of steps possible. In each step you may remove any number of adjacent digits so long as they are the same. That is, in each step you can remove any number of adjacent G's, or any number of adjacent H's, but you can't remove H's and G's in one step. Example: HHHGHHGHH Solution to the example: 1. HHGGHH (remove middle Hs) 2. HHHH (remove middle Gs) 3. Done (remove Hs) -->Would return '3' as the answer. Note that there can also be a limit placed on how large adjacent groups have to be when you remove them. For example it might say '2', and then you can't remove single digits (you'd have to remove pairs or larger groups at a time). Solution I took Mark Harrison's main algorithm, and Paradigm's grouping idea and used them to create the solution below. You can try it out on the official test cases if you want. //B.cpp //include debug messages? #define DEBUG false #include <iostream> #include <stdio.h> #include <vector> using namespace std; #define FOR(i,n) for (int i=0;i<n;i++) #define FROM(i,s,n) for (int i=s;i<n;i++) #define H 'H' #define G 'G' class String{ public: int num; char type; String(){ type=H; num=0; } String(char type){ this->type=type; num=1; } }; //n is the number of bits originally in the line //k is the minimum number of people you can remove at a time //moves is the counter used to determine how many moves we've made so far int n, k, moves; int main(){ /*Input from File*/ scanf("%d %d",&n,&k); char * buffer = new char[200]; scanf("%s",buffer); /*Process input into a vector*/ //the 'line' is a vector of 'String's (essentially contigious groups of identical 'bits') vector<String> line; line.push_back(String()); FOR(i,n){ //if the last String is of the correct type, simply increment its count if (line.back().type==buffer[i]) line.back().num++; //if the last String is of the wrong type but has a 0 count, correct its type and set its count to 1 else if (line.back().num==0){ line.back().type=buffer[i]; line.back().num=1; } //otherwise this is the beginning of a new group, so create the new group at the back with the correct type, and a count of 1 else{ line.push_back(String(buffer[i])); } } /*Geedily remove groups until there are at most two groups left*/ moves=0; int I;//the position of the best group to remove int bestNum;//the size of the newly connected group the removal of group I will create while (line.size()>2){ /*START DEBUG*/ if (DEBUG){ cout<<"\n"<<moves<<"\n----\n"; FOR(i,line.size()) printf("%d %c \n",line[i].num,line[i].type); cout<<"----\n"; } /*END DEBUG*/ I=1; bestNum=-1; FROM(i,1,line.size()-1){ if (line[i-1].num+line[i+1].num>bestNum && line[i].num>=k){ bestNum=line[i-1].num+line[i+1].num; I=i; } } //remove the chosen group, thus merging the two adjacent groups line[I-1].num+=line[I+1].num; line.erase(line.begin()+I);line.erase(line.begin()+I); moves++; } /*START DEBUG*/ if (DEBUG){ cout<<"\n"<<moves<<"\n----\n"; FOR(i,line.size()) printf("%d %c \n",line[i].num,line[i].type); cout<<"----\n"; cout<<"\n\nFinal Answer: "; } /*END DEBUG*/ /*Attempt the removal of the last two groups, and output the final result*/ if (line.size()==2 && line[0].num>=k && line[1].num>=k) cout<<moves+2;//success else if (line.size()==1 && line[0].num>=k) cout<<moves+1;//success else cout<<-1;//not everyone could dine. /*START DEBUG*/ if (DEBUG){ cout<<" moves."; } /*END DEBUG*/ }

    Read the article

  • Is there a security concern exposing NTLM authentication over http or should it only be https?

    - by Shane
    We are setting up a SharePoint 2010 site. Don't worry, this is not a Sharepoint question, just adding it for context. Most of the site will be anonymous, but some users are able to authenticate in and edit content. They use NTLM (users exist in AD). Is there any concern about exposing NTLM login for users that can modify content over the internet via http or should that only be exposed via https?

    Read the article

  • DNS: Forward domain to another host

    - by normmcgarry
    I was hoping some expert on here could quickly answer my question. I don't know much about DNS, so bare with me. I have a domain that is hosted with XO Communications. I want to host that domain at another web host, but I want to keep the mail at XO, so I'd like to keep the DNS managed by XO. What do I need to do in the DNS to switch it the website to the other host, but leave the mail unchanged? Thank you so much.

    Read the article

  • Emergency response CMS

    - by mmcglynn
    I have been asked to do some investigation regarding an emergency website response scenario, a critical situation that would bring quintuple website traffic to 30K visits a day for a few days. No one wants to use our current CMS for this, but rather WordPress or something else. The obvious, a static HTML page is out. I have a separate research track for optimizing WP, so my question is, is there a hosted, easy to use CMS that can handle huge traffic? Like Squarespace but for enterprise.

    Read the article

  • Running Radius on a Novell Backbone

    - by YsoL8
    Hello I am a rookie network engineer and I've been asked to create a secure wireless system intergrated with an existing network. So far I'd decided to use 802.1x secuity with a Radius enabled server over a Novell backbone. My question is: does Novell still support this type of server setup? I heard rumours it is at the end of it's supported life and I'd like some confirmation. Also can I get some recommendations on better backbone / server providers. Cheers

    Read the article

  • Shared Hosting, UID, GUID set as Apache

    - by concerncitizen
    Hello, I'm on shared hosting and today i discovered there are some backdoor script.. in .htaccess and a php file. So i went to check via FTP, cannot edit nor delete. So i checked with direct admin.. the file permission(GUID, UID) is set by APACHE while rest of file is set by my username, So my question now is.. the trojan did this is originated from my computer or host side?

    Read the article

  • How to fix a bad case rattle

    - by C. Ross
    I have a full sized ATX case with several fans, including one on the door/removable side. This fan makes the "door" rattle or vibrate loudly when the fan runs at full speed, such as at startup. I can stop the rattle temporarily by placing my hand on the "door", or pushing an object next to it. Do you have any suggestions for a permanent solution? Note: The "door" in question is a slide out panel with two twist screws at the back to hold it in.

    Read the article

  • Maximum number of hard drives in a build-your-own NAS solution [closed]

    - by groovehunter
    My IT department has a bunch of older 160/320GB Drives. I'd like to use them in a build-your-own NAS device. What limitations exist in regards to the maximum number of drives that can be connected to typical commodity hardware that might be used in a situation like this? EDIT okay I like to specify my question is what to search for to find a storage controller which can handle many drives. I simply cannot find the right search terms.

    Read the article

  • When is a secondary nameserver hit?

    - by Evan Carroll
    Take this scenario: domain: foobar.com ns1: 2.2.2.2 ns2: 3.3.3.3 My question: Is ns2 hit just in the event that ns1 is down? Or, is ns2 hit any time that ns1 returns a miss/doesn't resolve the query? I know ns2 would be hit if ns1 ever went down; but, what if ns1 is up and just doesn't have the data?

    Read the article

  • Bringing TechNet licensed server into production

    - by David Heggie
    I am currently trialling an install of Windows Server 2008R2 + SQL Server 2008 R2 using license keys from my company's TechNet subscription. If the trial is successful, I'd like to bring the server into production as is (there's a lot of config needed for it that I don't want to repeat) so my question really is is it possible to change the Windows and SQL server licenses from TechNet ones to "proper" volume licenses and legally use the server in production? Or do I have to reinstall everything with volume licences?

    Read the article

  • Is it possible/safe to downgrade from Thunderbird 3.0 Beta 4 to Thunderbird 2?

    - by Palmin
    I wanted to try out the Thunderbird 3.0 Beta 4 because I have some issues with Thundebird 2 that I know are fixed in 3.0. The question is, is it possible to downgrade from Thunderbird 3.0 to 2.0 or are there any problems with the preferences or mail format (I read somewhere that Tb3 uses a sqLite database for some of its storage)? According to http://www.mozillamessaging.com/en-US/thunderbird/3.0b4/releasenotes/ it is possible to remove the application itself, but it does not say anything about data compatibility.

    Read the article

  • What should I do about this user?

    - by Tim Brigham
    What should I do about this user? The user is: Downloading pornography Attempting unauthorized access Running hacking software Sending unsolicited email Installing software / tampering with the system etc This is intended as a generic answer for employee behavioral problems, a la Can you help me with my software licensing question? I could see where acceptable use issues are a touch out of scope for SF, however it is one of those things most sysadmins will run into. I don't want to keep rewriting similar answers.

    Read the article

  • Logitech Optical Mouse Frozen In Middle of Windows XP Pro Screen

    - by Code Sherpa
    Hi. I have a Logitech Optical Mouse/Keyboard. I have been using them just fine with the system drivers for almost a year now. I recently updated my Kaspersky software and rebooted. Now the mouse is frozen in the middle of my screen. I am not able to login to the Windows XP Pro box that has the frozen mouse (because i can't work the mouse) but am able to remote desktop to this computer. Things I know / have tried: When I boot on the problem computer, I am able to use the keyboard, but not the mouse. I have installed the latest version of Logitech's SetPoint (with the updated drivers) on the problem computer (via remote desktop) and that didn't seem to matter. I bought new batteries for the mouse and that didn't matter. I have tried the mouse/keyboard on another computer and the mouse works just fine there. My suspicion is that the Kaspersky install has overwritten a driver of some sort. Things I have not done (and would appreciate detailed steps if you feel this is the way to go): 1) Uninstalled all the mouse drivers on the machine and reboot. Then, reinstall. Note: When I get to the Device Manager I don't see an option for Human Interface Devices (where the mouse device is). Here are my options: Computer, Disk Drives, DVD/CD-Rom drives, Floppy controllers, IDE ATA/ATAPI, Imaging devices, Network Adapters, Other devices, Ports, Processors, Sound, video, and gaming, System devices, USB controllers. Also, I should point out that Video Controller is the only thing under Other devices and it has a yellow exclamation mark. The same is true for all the items under Universal Serial Bus controllers. I think this means I have to update my BIOS but, since my mouse was working just fine without doing that, I don't think that is my problem. So, how do I get to my Mouse Device? 2) Update my BIOS. Note: As pointed out above, I don't think this matters as my mouse was working just fine under my computer's current BIOS version. Thanks for your help.

    Read the article

  • Can generated OpenVPN keys be used on multiple clients?

    - by Jakobud
    We are experimenting with running an OpenVPN server for our business. One question I can't seem to find the answer to is this: When we generate keys for one of our users for them to use at home, can their use the same keys on their home laptop as well as their home desktop? Or do we need to generate separate keys for each user's client machine?

    Read the article

< Previous Page | 566 567 568 569 570 571 572 573 574 575 576 577  | Next Page >