Search Results

Search found 3466 results on 139 pages for 'saturn research'.

Page 62/139 | < Previous Page | 58 59 60 61 62 63 64 65 66 67 68 69  | Next Page >

  • Restrict Applications access to Device

    - by Dboy1612
    I have a PC that has the ability to handle running multiple game clients at once (specifically Tera Online). What I'd like to do is assign and/or restrict each clients access to a device (Gamepad) so that the actions from each device only effects the client I specify. After doing some research with Python's PyGame, I can see that a Gamepad essentially works like a Keyboard does by sending global key events to the entire system, and then the application reading those events. Question is, how can I make it not global? ONly have one application read one controller? Any help is appreciated!

    Read the article

  • I installed DKIM and SPF. Do I need to install Domain Keys as well?

    - by johnlai2004
    I have linux apache mysql and php server. My website uses the php mail() function and the server's postfix server to email other people. I successfully installed SPF and DKIM on my server to reduce the likelihood of my website's email-outs from ending up in people's spam boxes. In my research, I stumbled on Domain Keys which seems to be a "historical" version of DKIM. Do the big web mail services like Google, Yahoo and Hotmail still use Domain Keys? If not, then maybe I don't need to install it?

    Read the article

  • My BrowserHelperObject is detected by avg as a malware, what is going wrong.

    - by BHOdevelopper
    Hi i'm building a BrowserHelperObject in c++ for Internet Explorer 8. It is a friendly add-on that gives you fonctionalities in a sidebar. The thing is that when you download the add-on executable from the web, AVG (AntiVirusGuard) detects the executable file as a malware. I did a lot of research and i can't find a way to not being seen as a bad malware. I know that BrowserHelperObject are often seen as malware, but mine is just a good and friendly add-on. Does anyone as info on how antivirus detection works and what can i do to prevent being seen as a malware. What has to be done to the BHO to pass avg detection ? Thank you.

    Read the article

  • Finding Academic Papers in Computer Science

    - by Ender
    I'm not sure whether this is the right place to be asking such a question, but here goes... I'm a final-year Computer Science student looking towards researching a project idea. However, when it comes to finding academic papers and relevant journals every single website I come across seems to be restricted apart from the Citeseer one (PSU?). I want to find relevant journals and papers within certain areas of Computer Science. Can anyone here provide me with some tips for finding suitable research material for a Computer Science project?

    Read the article

  • How do I pick a motherboard?

    - by EpsilonVector
    When building your own computer one part was always a mystery to me: the motherboard. Picking a CPU/GPU/memory is easy- you just figure out where the various chips are in the low end to high end scale, do a little market research on what current games demand, and pick the parts from their respective continuums of low-to-high-end models. A mother board is more complicated though. Its features are not as obvious as "this motherboard is faster than that motherboard". Now you need to deal with part compatibilities, bus speeds, maybe power management stuff, etc. I'm interested in a short guide for selecting a motherboard, especially- what pitfalls to avoid (for example, can bus speed become a bottleneck?). To clarify: I'm not looking for motherboard recommendations. I'm looking for guidance regarding how to evaluate the fitness of a motherboard given the rest of the computer parts.

    Read the article

  • Can't connect to Internet through WiFi, but can with cable

    - by aldy505
    I'm using Windows 7 32-bit, Toshiba Portege laptop. I want to connect to the WiFi, usually I can do that easily. But, I don't know.. maybe when I tried to install a Microsoft Research: Mesh Virtual WiFi that could connect more than 2 wireless networks. I wanna try in connecting both Wireless router and my personal Ad-Hoc. Now, my laptop don't recognize my WiFi, well, I can connect to the WiFi but it says: "Limited access" and doesn't really connect to the internet. But when I plug the LAN cable, it works. I know the problem is in the laptop's wireless connection or in the properties. Any help for this? UPDATE: The IP and DNS settings, I set to automatic, and when I ran diagnostic, Windows tells me that the wireless network adapter is the problem, but they told me to insert the LAN cable, so how to fix the wireless? They didn't tell me how to fix that.

    Read the article

  • How SmartDNS Works

    - by Emad
    If you travel outside the US you'll notice that most of the streaming services like Netflix, Pandora, hulu etc are blocked, usually by the service providers themselves. To get around that, people use VPN services. They basically tunnel your traffic through a US server so your requests seem like they are originating in the US. These VPN services fix this blocking problem, but make your connection slower than the normal unVPNed connection. Recently however I've come across something called SmartDNS provided by overplay.net. You pay $5 a month and you get access to their DNS servers. After you change to their DNS you get access to the blocked streaming sites, without slowing down your normal traffic like email and browsing. What I'd like to know is the technical details of how this SmartDNS works. I've done some quick research but that didn't turn up anything of substance. Anybody out there knows?

    Read the article

  • Want 2 external monitors with a 13' MacBook - is this possible?

    - by kevinburke
    I've got a 13' white MacBook from 2008 and I'd like to run one or two external monitors, my budget is $500. I've tried to do research and this is what I was going to get - will these work OK? Two Diamond BVU195 HD USB Display Adapters (DVI and VGA with included DVI to VGA adapter) to plug into the USB port Two Dell ST2310 monitors One external USB hub so I don't use up both of my USB ports Will this work? I've read some people say it does and some people say it doesn't, but I don't know enough to say either way. Also do you have recommendations for a better monitor than the dell sd2310? what's the best setup I can buy for $500? Thanks very much for your help, Kevin

    Read the article

  • Organize code in Chef: libraries, classes and resources

    - by ColOfAbRiX
    I am new to both Chef and Ruby and I am implementing some scripts to learn them. Now I am facing the problem of how to organize my code: I have created a class in the library directory and I have used a custom namespace to maintain order. This is a simplified example of my file: # ~/chef-repo/cookbooks/mytest/libraries/MyTools.rb module Chef::Recipe::EP class MyTools def self.print_something( text ) puts "This is my text: #{text}" end def self.copy_file( dir, file ) cookbook_file "#{dir}/#{file}" do source "#{dir}/#{file}" end end end end From my recipe I call both methods: # ~/chef-repo/cookbooks/mytest/recipes/default.rb EP::MyTools.print_something "Hello World!" EP::MyTools.copy_file "/etc", "passwd" print_something works fine, but with copy_file I get this error: undefined method `cookbook_file' for Chef::Recipe::EP::FileTools:Class It's clear to me that I don't know how to create libraries in Chef or I don't know some basic assumptions. Can anyone help me, please? I am looking for a solution of this problem (organize my code, libraries, use resources in classes) or, better, a good Chef documentation as I find the documentation very deficient in clarity and disorganized so that research through it is a pain.

    Read the article

  • What does the the reconstruction process of mdadm do exactly on raid10

    - by Azrael
    I've got a system with 4 disks set up as raid10. All disks are usable, and mdadm all states them with UUUU. Due to a recent system crash, the raid is currently reconstruction the raid as it was marked as "not clean," and a reconstruction process was started. On a closer look smartctl shows problems on one disk: sd 0:0:0:0: [sda] Unhandled sense code sd 0:0:0:0: [sda] Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE sd 0:0:0:0: [sda] Sense Key : Medium Error [current] [descriptor] Descriptor sense data with sense descriptors (in hex): 72 03 11 04 00 00 00 0c 00 0a 80 00 00 00 00 00 24 cd 78 d4 sd 0:0:0:0: [sda] Add. Sense: Unrecovered read error - auto reallocate failed sd 0:0:0:0: [sda] CDB: Read(10): 28 00 24 cd 75 1e 00 04 00 00 With a research about the reconstruction process, I only found information concerning raid5 but nothing for raid10. Can I replace this problematic disk during the reconstruction process, or will I kill the raid with this?

    Read the article

  • chroot for unsecure programs execution

    - by attwad
    Hi, I have never set-up a chroot-jailed environment before and I am afraid I need some help to do it well. To explain shortly what this is all about: I have a webserver to which users send python scripts to process various files that are stored on the server (the system is for Research purpose). Everyday a cron job starts the execution of the uploaded scripts via a command of this kind: /usr/bin/python script_file.py All of this is really insecure and I would like to create a jail in which I would copy the necessary files (uploaded scripts, files to process, python binary and dependencies). I already looked at various utilities to create jails but none of them seemed up-to-date or were lacking solid documentation (ie. the links proposed in How can I run an untrusted python script) Could anyone guide me to a viable solution to my problem? like a working example of a script that creates a jail, put some files in it and executes a python script? Thank you very much.

    Read the article

  • How can we tell what driven the Private bytes spiking.

    - by ronin
    I have websites running on .Net Framework 2.0 environment. For recent every day my website becomes slow at certain time and I need to recycle my app pool. I checked the log file found that the private bytes will spike during that time slot. Through some research I already know that the managed code and unmanaged code consists of Privates and we can identify which one cause the spike based on "Bytes in all heaps" counter. But I can't find a way to dig deeper. Is there any way that I can find out what driven my private bytes spike? How can we see what the private bytes are being used for? Thanks, Ronin

    Read the article

  • IE 9 home page is hijacked by avg

    - by horace
    I definitely know how to change the home page in Internet Explorer (Tools -> Options -> General). The problem is, no matter what I put there, it never changes. Stop/restart Internet Explorer and the old home page is back. I did some research to see if there is a registry key that I could tweak to get the home page to set properly. I changed the start page registry key and refreshed the view and the start page key (without even restarting regedit) was reset back to its original value. Now I'm a little concerned. Maybe there's some virus I can't detect on my system? Internet Explorer 9.0.8112.16421 Windows 7 Pro SP 1 x64

    Read the article

  • How to open a TrueCrypt volume quickly on a Mac?

    - by ssc
    Whenever I need to access data stored in the TrueCrypt-protected volume on my MacBook, I need to start TrueCrypt from the Dock, select the volume file, click mount, enter the password and then open a Finder window and browse to the volume. I want a quicker way, e.g. double-click something on the desktop (and/or press a hotkey combination), enter the password and have a Finder window pop up. I have done an extensive research on the TrueCrypt website, Apple Automator and some other approaches, but nothing really seems come up. Has anyone realized the approach described ?

    Read the article

  • Cannot Delete an Empty Folder in Windows 7

    - by Mike Gates
    I've used this question's answer by user "Moab" to give myself permission to delete an empty folder, so that I no longer get "accessed denied". However, now when I try removing this folder, I get a message that says "The process cannot access the file because it is being used by another process." This is merely my "eclipse" (IDE) folder that I totally emptied out and am trying to delete, but for some reason cannot. I've tried quite a few things: Via Windows Explorer: Right Click - Delete Via Command Prompt RD /S /Q eclipse del /F eclipse rmdir /S eclipse I'm out of ideas, and I'd really like to delete this folder without having to install any software. I've done a bit of research and this is all I found that I could try. Does anyone have any other ideas?

    Read the article

  • Can't install software from Ubuntu software center

    - by Casbar
    I've been experimenting with Ubuntu 10.04(64bit) inside a VirtualBox VM. This isn't my first experience with Linux, but I'm still very much a Linux noob. Whenever I try to install software from the Ubuntu Software Center, the installation gets interrupted and I get a warning that this installation requires untrusted sources. I can install anything I want using apt-get, it's just the gui that doesn't work. I've done research on the issue and taken the following precautions with no result: under software sources Allowed Canonical partners Allowed source code Changed the download source to main server I get no errors when running an apt-get update. Can anyone shed some light on the issue?

    Read the article

  • What is the value/cost of enabling "spread spectrum clocking" on my hard drives?

    - by Stu Thompson
    I'm building up a biggish NAS box (10x WD RE4 2TB SATA RAID10) and ran into some problems. During the course of my research, debugging, investigations, etc, I discovered a jumper on the physical drives labeled "spread spectrum clocking". After some googling about this on teh internets, it seems to be a feature that some suggest (without reference or explanation) enabling in 'a storage configuration' that makes the drive less sussesptable to EMI. But why? I've got three core questions: Why is this feature not enabled by default? What are the actual benefits? Are there any costs?

    Read the article

  • Windows 7 with two network cards doesn't route traffic

    - by Tomek
    I have simple task to do: I have wni7 with two nics.I want to connect another comp(osx) to win7 through second nic to connect it to internet. I already changed the registry. Win7 interface with 192.168.2.1 has no gateway set (no point to do that) OSX interface with 192.168.2.2 has gateway set to 192.168.2.1 I do not add any routes on win7, every thing seems to be already there network on second nic is detected as "undefined network" (probably effect of no gateway) i can achieve any connectivity to internet from OSX only by enabling network connection sharing on nic with 192.168.2.1, but it enables NAT and I'm interested only in pure routing without nat(it's a setup for some research). firewall is off. It seems to me that win7 refuses to forward packets for some reason. Perhaps "undefined network" and NLA service is to blame, although i couldn't find any info about that. Below ascii schematics of my setup: internet<--router(192.168.1.1)<--(192.168.1.1) WIN7 (192.168.2.1)<--(192.168.2.2)OSX Thanks

    Read the article

  • Backup of whole harddrive during full operation with Acronis True Image Home 2010

    - by testing
    Currently I'm creating a backup of one of my hard drives. It's my main hard drive, where the operating system is running on. Because the backup is done during full operation I'm asking me if the backup really includes all files (registry, ...). Can I restore the backup on another hard drive and then run the operating system again without problems? Normally I would say that you have to boot from a CD (without running OS) to make a backup. I made a Google research but I didn't found my case so far.

    Read the article

  • Application to handle form approval

    - by ChrisMuench
    Hello, Hopefully this is the right place for this question. I have done a fair amount of research and yet to find anything that matches what I want. What I'm envisioning is the following. Let me know if any of you know of a program that will do what I want. Also it must be web-based anom user - fills out form - email gets sent to admin saying xyz has filled out form abc with links to approve/disapprove request. admin can also login and edit form and resent results to original submitter. Also once the admin approves/disapproves request the original submitter gets an approve/disapprove email. and you can search by date submitted, specific project/form, status of request(submitted, approved, disapproved). any ideas all on where I could find this? I started to look into drupal with workflows and actions but it just doesn't flow right for this

    Read the article

  • Mac webcam photo application with access to camera settings (resolution, camera selection, color balance, focus)

    - by Pascal T.
    Does anyone know about a webcam photo application (ie an alternative to photo booth) with would allow to change the settings on the camera, such as : Select camera (I.e I want to use an external webcam) Change camera resolution (with photobooth change camera settings (I.e autofocus, aperture, color balance, etc..) I did a lot of research on the internet with no success. I am looking for a very simple app (such as wmcap.exe on Windows) What I tried so far: photo booth: it works with an external camera, however there is no way to change the resolution, or the color/focus settings manycam : a virtual webcam driver. you can add special effects to your camera and transfer those effects to any app, but not change your camera settings... iGlasses : enables you to change the camera settings inside photo booth and other apps. However you cannot control the focus, nor the video resolution macam (did not work on my Mac book Pro) Does anyone know better than me? Note : my only solution now is to launch a virtual machine (with parallels desktop) and take the pictures from there!

    Read the article

  • RS-232 vs. RS-485

    - by user60524
    Doing a little research on the two to figure out which one may better suit my purposes (communications amongst different hardware). How do they fare against one another? Im far from being a specialist and have no idea where I would even start looking for data to compare and contrast. If possible can someone please answer the following questions in regards to each of these. Can they be networked amongst each other? Can they be easily networked over ethernet? What speeds do they transfer at? (Min, Max, Etc.) Reliability? Best framework to build on top of to support the above? Any standard communications programs? Debugging capability? Any help would be very much appreciated, thanks.

    Read the article

  • How to use ssh-agent (and graphic passphrase dialog) in Kubuntu 10.10?

    - by halo
    I have recently switched from Ubuntu to kubuntu, both version 10.10. Unfortunately in KDE the ssh passphrase dialog doesn't work out of the box. Everytime my ssh private key is used I need to enter my password. This is neither secure nor comfortable. I have done comprehensive research on the net but only found out dated documentation. Several things I tried didn't work out. Current status: SSH setup working with direct passphrase input ssh-agent running in X session $SSH_AUTH_SOCK set to ssh-agent's socket in X session How to enable ssh-agent for keeping the passphrase in memory for ~15mins and as a bonus always use a graphical dialog for its input? I use asymmetric SSH key pairs for pushing/pulling in Git VCS logging remotely into different server systems

    Read the article

  • How can I run my program on a large number of computers? [closed]

    - by zenpoy
    I'm looking for a (preferably free) service for running an executable I wrote? It's not malicious, it's not a virus, it's not scam, and if this is really important I can upload the python source code instead. I wrote a small crawler to gather information regarding the style of web pages for my MA project, and I need a lot more data. EDIT Here is more information on my problem and how I approach on solving it, and where I'm stuck. As part of my research I'm trying to classify text based on it's style (font-family for now), my data is based web pages, so I wrote a client/server application - the client is a crawler that gathers this data and send it to the server. The problem is that like 99% of the internet is Arial, Verdana and Helvetica - other fonts are far more rare, so I need to spend very long time to gather enough data regarding these fonts. Hope this explains it.

    Read the article

  • Why does Oracle SQL Developer take so long to open?

    - by oscilatingcretin
    I think anyone who's used Oracle SQL Developer will agree that it's painfully slow on the load. My research has lead me to a solution that seems to have helped a little, and that's telling OSQLD not to check for updates on startup. However, it still takes several minutes to open. What could OSQLD possibly be doing during load time? Is there any way get it to open right away? Edit: Adding potentially relevant system specs: CPU: Intel i5-2520M 2.5 ghz Windows 7 32-bit RAM: 4 gb

    Read the article

< Previous Page | 58 59 60 61 62 63 64 65 66 67 68 69  | Next Page >