Search Results

Search found 40602 results on 1625 pages for 'event based components'.

Page 701/1625 | < Previous Page | 697 698 699 700 701 702 703 704 705 706 707 708  | Next Page >

  • Is it possible to get a list of running processes with a Cloudwatch Alarm?

    - by jtalarico
    We have an EC2 instance (Ubuntu) that has a few java-based applications and lately we're getting hit with high CPU utilization spikes that trigger one of our Cloudwatch alarms. By the time we get into the server to look at the cpu utilization, things have calmed down. What we'd love to see in one of the alarm emails is a list of running processes and their cpu utilization(%) at the time of the alarm. Is this even possible?

    Read the article

  • Is it possible to open server ports on TUN devices?

    - by JosephH
    If I make a VPN connection to a server (say myvpn.com; assume this server is not behind any router/firewall) via a TUN device and open a port (say 5555), will someone else be able to connect to me via myvpn.com:5555? If not, is there a tunneling software that does exactly this in a transparent manner? i.e. run any TCP/UDP-based server instance behind a router without NAT using another remote server.

    Read the article

  • Taking over locked user sessions in XP

    - by hurfdurf
    What's the best way to allow an administrator access to a locked user XP session, preferably with a logged event? The goal is to allow admins to cleanly shutdown/save existing work when work needs to be done on the PC. I am aware of the various VNC software flavors, but that only works when the PC is unlocked. Resetting the user password on the DC doesn't work either since the unlock password is cached locally, which means you still have to log the user out and possibly lose work.

    Read the article

  • What might cause the Save and Open dialog windows to just not work?

    - by Nick Bolton
    In several applications, the Save and Load dialog windows are just not showing. And in notepad (which obviously handles the return code) is reporting an out of memory issue, which I'm sure is not the case; I think it's assuming it's out of memory as it can't get the window handle. In any case, there's something definitely wrong with Windows, but there's nothing in the event log. Any idea why this might happen?

    Read the article

  • A feed scanner that reads data

    - by kylex
    I don't know if this is the right place to ask this question, but... I need a scanner (paper feed scanner) where depending on either a barcode, or number, or some identifier on the paper being scanned, creates a PDF file with a name based on that identifier. For example: If I scanned a page with the number 12345 on the top-left of the page, a PDF file named 12345.pdf would be created. Any suggestions at all would be greatly appreciated!

    Read the article

  • Setting the secure flag on cookies from Outlook Web Access

    - by Cheekysoft
    I'm running Exchange 2007 SP3 which is exposing outlook web access over only HTTPS. However the server delivers the sessionid cookie without the secure flag set. Even though I don't have port 80 open, this cookie is still vulnerable to being stolen over port 80 in the event of a man-in-the-middle attack. It also contributes to a PCI-DSS failure Does anyone know if I can persuade the web server/application to set the secure flag?

    Read the article

  • Have Excel's Correlation Function Respect Filtering

    - by Dave
    I've got a cell that's using the CORREL function to return the correlation of two rows of data in my spreadsheet. The issue is that I'd like this to update based on the filter that I have applied. I'm using the SUBTOTAL function to do this for other functions such as SUM and AVERAGE. How can I get my correlation function to do the same thing and respect the filter that I have applied?

    Read the article

  • Problems with MGCP proxy creation

    - by Popof
    Hi, I'm trying to bypass my ISP router with my FreeBSD server (I've an optical connection so I've a RJ45 used to connect the box to WAN) Internet and TV are working fine (Using igmpproxy to forward TV stream) but I've a problem with phone. ISP's box is connected to the server which gives it a LAN address. The problem is that when the box builds MGCP packets (and especially SDP ones) it uses its LAN address. So I've think of writing an UDP proxy to handle MGCP and SDP packets in order to replace LAN address with server WAN address and then forward packet to WAN. Before starting coding I've captured stream packets using my server as a bridge between WAN connection and the ISP's box. And, in order to see if my solution is viable, I've tried to send those packets to the box using nemesis. I tried to send a packet (found in capture) containing an endpoint audit: AUEP 1447 aaln/[email protected] MGCP 1.0 F: A In the wireshark capture the box replied: 200 1447 OK A: a:PCMU;PCMA;G726-16;G726-24;G726-32;G726-40;G.723.1-5.3;G.723.1-6.3;G729;TELEPHONE-EVENT, fmtp:"TELEPHONE-EVENT 0-15,144,149,159", p:10-30, b:4-40, e:on, t:00, s:on, v:L;M;G;D, m:sendonly;recvonly;sendrecv;inactive;confrnce;replcate;netwtest;netwloop, dq-gi But when I use nemesis, I got an ICMP error: Port unreachable (Type 3, Code 3). To build this packet, WAN source address of the capture is replaced with my server LAN address, using the mgcp-callagent port (2727) and the packet is sent to the LAN address of the box at mgcp-gateway port (2427). The command I use is nemesis udp -S 192.168.2.1 -D 192.168.2.2 -x 2727 -y 2427 -P packet_to_send. I also tried an UDP scan to the box on callagent and gateway port: PORT STATE SERVICE 2727/udp open|filtered unknown 2427/udp closed unknown I found those results a little bit strange because it should be the 2427 port opened, as it was in capture. Internet Protocol, Src: <ISP MGCP Server>, Dst: <My WAN Address> User Datagram Protocol, Src Port: mgcp-callagent (2727), Dst Port: mgcp-gateway (2427) Does someone has any idea about how having my box responding to my requests ? Thanks in advance and sorry for my english.

    Read the article

  • What is the best IIS tracing tool you have used?

    - by Vivek
    I have spent majority of my career using and troubleshooting IIS Web Server. According to me the best thing happened to a Web admin is FRT (Failed Request Tracing) in IIS 7.0.I have used Event Tracing for Windows as well and FRT is as much helpful.Is there any such tracing tool which can give such good in-depth and greater understanding on request flow through the pipeline?

    Read the article

  • What presentation software should I use for a five minute talk.

    - by Chas. Owens
    I am giving a lightning talk shortly and need to put together some slides. It is a technical talk about Perl documentation. I will be using a OS X machine to run the presentation software. I would like something that is minimalistic easy to publish to the web simple to control (forward and back should do it, but hotkey access to individual slides would be nice) simple to create slides for (preferably purely text based and doesn't require much in the way of markup)

    Read the article

  • Utility for extracting MIME attachments

    - by tripleee
    I am looking for a command-line tool for Unix (ideally, available in a Debian / Ubuntu package) for extracting all MIME parts from a multipart email message (or the body from a singlepart with an interesting content-type, for that matter). I have been using the mimeexplode tool which ships with the Perl MIME::Tools package, but it's not really production quality (the script is included as an example only, and has issues with what it regards as "evil" character sets) and I could certainly roll my own script based on that, but if this particular wheel has already been innovated, perhaps I shouldn't.

    Read the article

  • Photo organization software

    - by Aaron
    I am looking for photo organization software for family albums that meets the following requirements: Online Gallery Synchronized Searchable Access Controls Local Copies Synchronized Searchable Multiple individuals Multiple people have local copies All can contribute to tagging It syncs additions/changes/tags to the online gallery, which in turn syncs to other local copies Powerful Tagging Entity based (support multiple people with the same name) Multiple Types of Tags (People, Pets, Things) Coordinate or Full Image Tag can focus on certain area in picture, or reference the full picture Facial Recognition Does anyone know of a piece of software like this? I will pay!!!

    Read the article

  • Redirection and SSL

    - by Kobus Myburgh
    I hope I am asking this at the correct forum. I have a client from whom I have developed a PHP based Facebook project, who is hosting their site on IIS with ASP and no access to PHP, so they have created a sub domain to point to my server to host the site. I have an SSL on www.mydomain.com, but their sub domain does not have SSL (app.theirdomain.com). Would redirection from their side be possible to SSL on my side so that the FB app works?

    Read the article

  • x86 Router Benchmarks?

    - by Kevin
    I have grow to prefer x86 based router OS's like Vyatta and pfSense over their competitors Cisco and Juniper (Well, I never really used Juniper, but still.). However, they feel "fake" to me, like "Frankenstein" routers. I think my greatest worry is that I am missing out on something by not using the main contenders. Are there any benchmarks out there that compare the main metrics (throuput, etc.) of x86 router operating systems to their proprietary counterparts?

    Read the article

  • Trying to install an old program on Windows XP and getting an error message

    - by computergeek
    Hello I'm trying to install an older application named headline.exe. I'm getting an error message saying the the program has to end and asking if I want to notify Microsoft. The event logs says "Faulting application _untitled.exe version 1.0.0.1591, faulting module flash6.ocx, version 6.0.88.0, fault address blah blah blah. I uninstalled flash and installed version 6 of Flash and nothing changed. Any thoughts? Thanks

    Read the article

  • How to implement a secure authentication over HTTP?

    - by Zagorax
    I know that we have HTTPS, but I would like to know if there's an algorithm/approach/strategy that grants a reasonable security level without using SSL. I have read many solution on the internet. Most of them are based on adding some time metadata to the hashes, but it needs that both server and client has the time set equal. Moreover, it seems to me that none of this solution could prevent a man in the middle attack.

    Read the article

  • How to monitor streaming servers

    - by pcdinh
    Hi all, I have had a bunch of Linux based streaming servers that employed lighttpd web server to provide video streaming via port 80. Recently, our service is very slow. Therefore, I would like to ask if there is a good software package that helps us monitor and record our bandwidth usage, lighttpd established connections, TCP sync connections, disk I/O ... over time. Any suggestions? Regards, Dinh

    Read the article

  • Undo Ctrl-w in Vim

    - by user18151
    Hi, I'm a pro user of vim, however, somehow I don't seem to have definitively figured out the use of time based undo, or maybe I don't really like it. Is there a way I can undo a deletion caused by Ctrl-w W3I will be really grateful for the help. Thanks.

    Read the article

  • Computer class or home teaching for kids?

    - by JMarsch
    I want to teach my son to be a strong PC user. I could try to strike out on my own for this, but I was wondering if there is a good online (or book based) course for this. Like most kids, he's proficient with Google, YouTube, and Minecraft, but he's very curious, and I would like to teach him more. Even some basic excercises, like working with the file system would be good for him (i would need some help to not make it boring).

    Read the article

  • Hide non printable characters in vim

    - by knittl
    Vim shows non-printable characters prefixed with a ^ (for instance ^@ for a NUL byte). I have a column based file containing both printable and non-printable characters which is difficult to read, since each non-printable character shifts all remaining columns one character to the right. Is there a way to hide non-printable characters or simply display a placeholder char instead? I also don't mind having every character be represented by two characters.

    Read the article

  • Problems downloading Full Magento install via purely FTP on shared server

    - by optician
    I'm currently trying to download a full magneto install from a ftp server. The connection keeps failing, it seems as if there are too many files and folders to scan through? Can anyone shed any light on how to resolve this? The shared platform seems to b e a standard platform based on Plesk 8.6. As this is a shared server, there is no option for me to really do anything, apart from contact the hosting company (who have offered to zip up all the files for me, but this is not ideal)

    Read the article

  • How do you put clips from a DVD into a website?

    - by Nathan DeWitt
    I have a promotional DVD from a client, and they want to put clips from it on their website. I'm in a Windows environment, so I'm looking for a decent video editor program, free would be preferred. Then I guess I'd have some kind of flash-based player to embed in the website... What do you recommend?

    Read the article

< Previous Page | 697 698 699 700 701 702 703 704 705 706 707 708  | Next Page >