Search Results

Search found 24267 results on 971 pages for 'source energy'.

Page 622/971 | < Previous Page | 618 619 620 621 622 623 624 625 626 627 628 629  | Next Page >

  • How can I push a git repository to a folder over SSH?

    - by Rich
    I have a folder called my-project inside which I've done git init, git commit -a, etc. Now I want to push it to an empty folder at /mnt/foo/bar on a remote server. How can I do this? I did try, based on what I'd read: cd my-project git remote add origin ssh://user@host/mnt/foo/bar/my-project.git git push origin master which didn't seem right (I'd assume source would come before destination) and it failed: fatal: '/mnt/boxee/git/midwinter-physiotherapy.git' does not appear to be a git repository fatal: The remote end hung up unexpectedly I'd like this to work such that I don't have to access the remote host and manually init a git repository every time ... do I have to do that? Am I going down the right route at all? Thanks.

    Read the article

  • How do I force an exchange database to become "active"?

    - by makerofthings7
    We had a catastrophic failure where all that remains is a single edb file. No backups. No log files. The database that remains is on the "passive" copy. The "active" copy is missing, but the server is active. The Exchange console reports that the edb file needs to be reseeded, however there is no source to reseed from. How do I make the "invalid" database file (missing logs) valid? How do I make exchange recognize this as a valid database to use as a primary?

    Read the article

  • remove "items 1-9 of X" from google result

    - by OSdave
    the results of my Magento based website's categories includes "items 1 - 9 of X" before the actual description of the category. How can I get rid of this? In this snapshot, what I want to delete is the red rectangle edits: @Su, these are the reason: Having text like (Items 1 - 9 of 144 –) appear in a Google listing uses up the 25 word limit that Google allows us. More importantly, the first few words of the description can persuade or dissuade someone from visiting my site. This text will not positively influence people to visit my site. @DisgruntledGoat this information shows up in the source code of that page, like this: <table class="toolbar" border="0"> <tr> <td class="pager" style="width: 414px;"> <table class="pager" cellspacing="0"> <tr> <td>Items 1 to 9 of 144 total</td> </tr> </table> </td> </tr> </table>

    Read the article

  • Is it possible to create a full "encrypted worried about privacy" VPS, but still being externally us

    - by Somebody still uses you MS-DOS
    I've been reading a lot of things about privacy, "being in control of your data" and everything, and now a project called diaspora* is trying to be an OSS Facebook alternative. Fact is: you still have to use a server. Even if you use a VPS somewhere, they still have access do your data, so diaspora* isn't that protective shell people are looking for absolute power over your data unless you create a server on your basement. My question is: is it possible to create a really encrypted usable server using a VPS? From database to source files? If not, what it can be "obfuscated" or encrypted? (And just a mention, not really my question, do you think is diaspora* really possible to be made?) (I know if you really want privacy you shouldn't be even using these services and being social, but I'm asking if it's possible to at least avoid companies using your data)

    Read the article

  • How to enable Integrated Load Balancing in Windows 8

    - by intodevelopment
    One of the cool new features many sites mention is "Integrated Load Balancing" in Windows 8. It is supposed to do the following: If you have multiple active network connections, Windows 8 will intelligently balance the network traffic between them for performance Source: Short: Some of what Microsoft didn’t show of Windows 8 I would love to see this feature in action. I am connected to a WiFi access point and to a different network by cable. Yet I don't see the operating system 'intelligently' balance the network load when for instance downloading multiple files. Is there any way to enable it or should I adjust my expectations?

    Read the article

  • Does Citrix XenServer have storage Migration [closed]

    - by Entity_Razer
    I'm trying to find out. I can't seem to find a defenitive yes / no answers so I thought I'd ask the ServerFault community this simple question: Does XenServer (in any version) support Storage migration such as VMWare's Storage VMotion capability, or Hyper-V's storage migration ? I'm trying to do a comparative study of all platforms but I can't find a website (preff. Citrix supported or any other "legit" source) where it say's a defenitive yes or no. Anyone able to answer this one for me ? Cheers !

    Read the article

  • Transfer using linux ssh and maintaining permissions

    - by jbolt
    I need to transfer files across ssh to another server. The file structures are identical on both sides. I have used scp -r but that does not retain the orginal file/dir permissions. rsync does the job of keeping the permissions in tact but does not delete the files on the destination side if I want to overwrite them because of changes. I know rsync will write the changes when the source files are newer but I need it to just copy everything reguardless of the date (ie replace destination directory with the one I am moving) without having to shell into the destination first and manually delete the dir. I heard tar can do this but I can not seem to get it to work without errors. The syntax is tar -cf - /directory/directory | ssh host.name tar -xf - C /destination_directory Any help would be appreciated.

    Read the article

  • Is this too much to ask for a game programming and developing enthusiast? Am I doing this wrong?

    - by I_Question_Things_Deeply
    I have been a computer-fanatic for almost a decade now. I've always loved and wondered how computers work, even from the purest, lowest hardware level to the very smallest pixel on the screen, and all the software around that. That seems to be my problem though ... as I try to write code (I'm pretty fluent at C++) I always sit there enormous amounts of time in front of a text-editor wondering how every line, statement, datum, function, etc. will correspond to every Assembly and machine instruction performed to do absolutely everything necessary for the kernel to allocate memory to run my compiled program, and all of the other hardware being used as well. For example ... I would write cout << "Before memory changed" << endl; and run the debugger to get the Assembly for this, and then try and reverse disassemble the Assembly to machine code based on my ISA, and then research every .dll, library file, linked library, linking process, linker source code of the program, the make file, the kernel I'm using's steps of processing this compilation, the hardware's part aside from the processor (e.g. video card, sound card, chipset, cache latency, byte-sized registers, calling convention use, DDR3 RAM and disk drive, filesystem functioning and so many other things). Am I going about programming wrong? I mean I feel I should know everything that goes on underneath English syntax on a computer program. But the problem is that the more I research every little thing the less I actually accomplish at all. I can never finish anything because of this mentality, yet I feel compelled to know everything... what should I do?

    Read the article

  • How to setup a fake SMTP server to catch all mails?

    - by Richo
    I'm looking for an smtp service that essentially obeys the RFC, except rather than sending mail it simply logs to a file [date] sent mail to <address> Or whatever. I can bash this together with the bare minimum of functionality I need in python in about half an hour I reckon but if there's an existing project that works better I'd rather use that. The reason for needing it is debugging an app that keeps sending 7* the amount of mail it's supposed to. Slightly offtopic, but if there isn't already such a project, and I write it, is this something other people would use? If I publish the source will it get used? EDIT: And already asked: http://stackoverflow.com/questions/1006650/dummy-smtp-server-for-testing-apps-that-send-email

    Read the article

  • Mac Terminal - Color Co-ordinated

    - by Biscuit128
    I would like to create a couple of short cuts on my iMac which ssh on to my dev box and on to my prod box. I would like my dev connection to use the settings something similar to home-brew (green text black background) and my prod connection to use red text black background) - How can this be configured so that this is possible. Would I need multiple bashrc files one for prod and one for dev and source individually? If this is the case, how can i get the profiles to be sources as soon as i double click the shortcuts? Thanks

    Read the article

  • Manually Editing iptables

    - by JamesB41
    I'm using CentOS. What I'm wondering is, what happens if I manually edit /etc/sysconfig/iptables and save it? Is that the definitive source? When I type iptables -L I get something that doesn't match the contents of that file. Is there a way I can just edit the chains directly without adding/removing rules one at a time? i.e. open VIM and get everything set up the way I want it and then save. Along those lines, when I do something like iptables -A INPUT , where does that go in the immediate sense? Is it not applied until I do an iptables-save? I feel like I'm just missing an a-ha moment here and I can't seem to find the answer in a search.

    Read the article

  • compromised site

    - by pinniger
    So, I have a web site that has been compromised twice in two weeks. every index.php and .js file gets a script injecting into the source code of the file. The problem is that I have no idea how they're doing it. I've seen this done via sql injection before, but I don't know how they are actually writing to the file. I've dug through the Apache logs but didn't find anything interesting. The site is built using the cakephp framework on a godaddy shared server. Anybody know what secturity settings or log files to check to see how they are doing this?

    Read the article

  • Excel: #NAME? apppearing when linking/referencing other spreadsheets/workbook cells

    - by Mike
    I'm updating a spreadsheet that refers to data in another worksheet =NameofWorksheet for some reason I get #NAME? in some of the cells, even when the actual path is correct. The only way to overcome the problem is to open up the source spreadsheet and then recalculate the destination spreadsheet. But, if I then close the workbooks; open up just the destination workbook the #NAME? issue comes back. I've even created a test destination spreadsheet and it doesn't suffer from the #NAME? problem. Any reason for this? Should I be worried about the integrity of some Sheets? Any advice greatly appreciated. Michael.

    Read the article

  • Change windows default path or last used path for saving files? Is that possible?

    - by Mark
    I'm trying to change the default saving path to my specfied path for example if the file is picture (.jpg .gif etc..) and using google chrome I save an image the path can be anything from default or last used so I want it to be mine specfied for example I choose "C:\SaveHerePics" I don't know how you can change it maybe Registry? Dll? I would like to create vb.net program with textbox you choose the new location to be located every time for example "C:\SaveHerePics" and it should not have anything to do with this program even if you close the program the default location for pictures saved via any program or source saved to "C:\SaveHerePics" Thanks a lot for your help!

    Read the article

  • What is the best appliance you've used?

    - by phuzion
    Post your favorite appliances or "all-in-one" programs. Whether it runs in a virtual machine, or on its own hardware, it all goes. My submission is Untangle. It's an open source network gateway (their term). Essentially, it can run a plethora of things that you may otherwise end up buying another appliance for: Web filtering logging mail spam filtering phishing monitor spyware blocking VPN You name it, it's all there. Best of all, it's mostly free. A few appliances have annual costs due to inherent licensing or subscription costs. If you are looking for a new network perimeter device, definitely check it out. The underlying OS doesn't matter, because it's the application we want to praise, not the OS beneath it.

    Read the article

  • Replacement for Picasa [closed]

    - by January
    Possible Duplicate: What is the best alternative to Picasa? I use Picasa not because it is a great photo manager -- it's not, the manager is "sort of OK" for my taste. However, it combines a passable photo manager with a good "quick and dirty" image editor. It has the basic functions like cropping, resizing, contrast and color adjustment, and the one great feature -- "I'm feeling lucky" button, that works in 90% of the cases. Also, from time to time, I use one or two of the effects (like saturation or sharpening). GIMP is great and I use it on a regular basis, but in most cases I just want to go quickly through the photographs of my kids birthday and make them more presentable without much fuss. I'm looking for a native, open source replacement, something that would not miss the editing capabilities of Picasa and would allow me to quickly go through a collection of photographs and make basic edits. A function similar to "I'm feeling lucky" (automatic adjustment of contrast, color and brightness) would be most welcome. EDIT: Yes, I have already tried a number of alternatives, if it is necessary I can produce a detailed list here, along with the problems I found. I'm posting that question because I hope to see a new name.

    Read the article

  • RAID1: Which disk will be mirrored?

    - by tmelen
    How does a RAID1 system determine which disk to use as the source and which disk to use as the destination when mirroring? Assume for instance the following scenario: A RAID1 array is created with two disks A and B. A is replaced by disk C, which is added to the array. Files are beeing modified as time goes by. Now B is removed and A is reinserted. Will the RAID1 system realize that A and C are out of sync? And that C is more up-to-date than A? And if not, is there a safe way to avoid the mirroring process to start immediately when disk A is inserted?

    Read the article

  • Password correct? then redirect [migrated]

    - by RevCity
    So I have this code and I need it to only redirect when the correct password is added. Only problem is that I dont know what to add that will make it only redirect if the password is "hello" I understand that using "view-source" would reveal the password, I don't mind that, its the way I want it. I basically just need to know what to add and where to add it. Sooo: Redirects if "hello" is typed into password field. Does nothing if anything else is put into the password field. <div class="wrapper"> <form class="form1" action="http://google.com"> <div class="formtitle">Enter the password to proceed</div> <div class="input nobottomborder"> <div class="inputtext">Password: </div> <div class="inputcontent"> <input type="password" /> <br/> </div> </div> <div class="buttons"> <input class="orangebutton" type="submit" value="Login" /> </div> </div> I hope this was clear and could be understood.

    Read the article

  • Tool to automate basic connectivity testing

    - by feicipet
    After our vendors have setup a certain test environment, we need to go in to perform connectivity testing between PC to servers and also between servers. The problem is that we run a range of tests to telnet between 2 nodes on several ports and this is a manual and rather tedious process. Does anyone know of a small tool or script that I can take input on the range of ports to be test and will run an automated range of testing against those ports? All I need to do is to validate whether a TCP connection can be established from the source PC / server to the target server IP address / port. Thanks, Wong

    Read the article

  • Could Wordpress be used/extended as a medium-size ecommerce site? [migrated]

    - by Aphelion
    Is wordpress reliable enough and could it be used with a proper plugin as a medium sized ecommerce site? We are talking around 1500 products here, estimates say around 5 to 10 costumers per day, usually returning ones. Some days none. I have a client who wants to sell online. We are situated in a country where people dont see web as something serious enough. Still, they literally have a budget of pretty much none. And 1500 products to sell online. Magento, or any other open source ecommerce platform are out of the question, there is just no resources for starting something like that. Or any time. Only way is something free, small, absolutely not resource hungry as Wordpress. I have to fight with making it work with only what i have at disposal. Also, if you can recommend any wordpress plugin for the job(WP-ecommerce?), i will be very thankful. I guess something paid, up to maximum 50$ would work too.

    Read the article

  • Starting Chrome without any window

    - by Manish
    Hi, I've a situation where I want to start Google Chrome browser without any window appearing in Linux. This might sound weird but my intention is launch it faster than it already does. I've noticed that if Chrome is already running, then opening a new windows opens in a snap!!. I thought I'll keep it running in background and when needed open a new window by clicking its icon. I've checked almost all command line switches from Chrome source but couldn't succeed. Any ideas? Thanks in advance..

    Read the article

  • One sentence descriptions of the various common software licenses?

    - by Rich
    Instead of having to read entire documentation and sift through all the legalese, can someone outline the more common licenses in language that is short and sweet and gets right to the point? Specifically, I'm using a 3rd party control that uses the Apache 2.0 license. My intention is to use this in a proprietary application that I am building for a corporation's use (not resold, but I'm being paid for my work). Does this mean I can or cannot use this control? Does it mean that I must maintain copyright/license information in my code? Does it mean that I must mention copyright/license information in a clearly visible location in the app? EDIT In response to an answer below with a link to an article by Jeff Atwood, the Apache license is described as follows: Apache License Open Permissive 9 Requires derivative works to provide notification of any licensed or proprietary code in a common location. Does this notification need to be in a "common location" in my source code or a common location visible within the app? What if this were a non GUI app (I'm assuming that could very well be my answer)? Thanks for the responses!!!

    Read the article

  • Excel: #NAME? appearing when linking/referencing other spreadsheets/workbook cells

    - by Mike
    I'm updating a spreadsheet that refers to data in another worksheet =NameofWorksheet for some reason I get #NAME? in some of the cells, even when the actual path is correct. The only way to overcome the problem is to open up the source spreadsheet and then recalculate the destination spreadsheet. But, if I then close the workbooks; open up just the destination workbook the #NAME? issue comes back. I've even created a test destination spreadsheet and it doesn't suffer from the #NAME? problem. Any reason for this? Should I be worried about the integrity of some Sheets? Any advice greatly appreciated. Michael.

    Read the article

  • Windows 7 Desktop slideshow

    - by blackmastiff
    I have my windows 7 (Home Professional if it matters) set to automatically change the background every 20 minutes with the source of the slideshow as a folder in the Pictures library. Recently, the slideshow has not been functioning. The pictures do not change while the computer is on; they only seem to change when it is shut down (i.e. there is a different desktop on each boot), or about 50% of the time when waking the computer from hibernation. I've changed the time settings, the folder location on the drive, and made sure to disable all programs that tweak the desktop with no luck. Any thoughts?

    Read the article

  • What makes Ubuntu awesome [closed]

    - by Shagun
    My question may sound stupid or inappropriate for this site in which case I apologize before hand. This thing has bothered me for quiet some time so please correct me if there is anything inappropriate: I have been using Ubuntu for past 1 year and I know how awesome it is and in what terms is it better than windows.But around 2 weeks ago some of my friends asked me to show them something on Ubuntu or tell something about Ubuntu that makes people prefer it over windows. I tried to convince them by telling things like its open-source, that most of the super-computers run on Linux, that its unaffected by virus and other stuff but they seemed unconvinced. Maybe what they we looking for was some mind-boggling feature which only Ubuntu (Linux) has. Since that day I have been thinking but yet don't have anything that will show them the true powers of Linux. Please suggest your response to such a situation as it troubles me that I am not able to explain them one thing that I myself believe in. Thank you. PS : I am not looking for a theoretical answer but would like to hear of one such application which it and only it provides.

    Read the article

< Previous Page | 618 619 620 621 622 623 624 625 626 627 628 629  | Next Page >