Search Results

Search found 9954 results on 399 pages for 'mean'.

Page 73/399 | < Previous Page | 69 70 71 72 73 74 75 76 77 78 79 80  | Next Page >

  • Exchange 2003 calendar's "far" future is blank when scheduling

    - by wfaulk
    If a user tries to schedule a meeting in the "far" future, where ""far" future" seems to mean "seven or more weeks into the future", no existing meetings show up, and resources (at least) frequently (if not always) show up with the white-with-black-hatching "No Information" indicator in the meeting creation window, but shows up fine if you look at the actual calendar from the main Outlook window. Is this expected behavior? If so, is there any way to extend how far out Exchange/Outlook will look?

    Read the article

  • Does GoogleBot respect User-agent: *

    - by rkulla
    I blocked a page in robots.txt under User-agent: *, and tried to do a manual removal of that URL from Google's cache in the webmasters tools. Google said it wasn't being blocked in my robots.txt, so I then blocked it specifically under User-agent: GoogleBot and tried removing it again and this time it worked. Does that mean Google doesn't respect User-agent: * or what?

    Read the article

  • how to generate random numbers under OpenWRT?

    - by user62367
    With a "normal" (i mean "full") linux distro, it works just fine: sleep $(echo "$[ ($RANDOM % 10 ) ]") ok, it waits for about 0-9 sec but under OpenWRT [not using bash, rather "ash"]: $ sleep $(echo "$[ ($RANDOM % 9 ) ]") sleep: invalid number '$[' $ and why: $ echo "$[ ($RANDOM % 9 ) ]" $[ ( % 9 ) ] $ So does anyone has a way to generate random numbers under OpenWRT, so i can put it in the "sleep"? Thank you

    Read the article

  • Looking for a free Morphing - Ageing program for Mac OS X.6.

    - by waszkiewicz
    Hi! I'm looking for a free morphing and/or ageing software for Mac OS X.6, not too hard to use, with the kind of Mac "one click" function, if you know what I mean. Cheap programs are also welcome, I paid for a Photoshop license, so why not another software... My goal is to be able to modify faces, make them look older or younger, add some piercing or other, funny stuff. Thanks for your tipps.

    Read the article

  • Do proxies really provide anonymity?

    - by Somebody still uses you MS-DOS
    Do web proxies really provide anonymity? I mean, without someone asking for logs in a web proxy server for who/when connected, is it impossible to know who was behind that IP address? I'm asking this because I heard somewhere that some technologies (like "flash") bypass personal IP information for requests or something like that. (I'm a noob in server configuration and concepts like DNS and proxies. Thanks!)

    Read the article

  • SMTP Server: '421 unable to verify sender domain'

    - by Tim
    I have recently setup a new SMTP server on my new webserver (win 2008). The server sends mail from a number of domains hosted on the website, everything seems to work OK but I am getting a number of undeliverable reports which state '421 unable to verify sender domain' What does this mean and what should I do about it?

    Read the article

  • how to give read access to logs

    - by skomak
    Hi, How can i give read access to logs for other users? Perhaps the solution is to set group for this files and add some users there. But how to do that for /var/log/maillog? I mean, logrotate will reset perms? If i change group from root to another won't it generate any problems? Actual state: -rw------- 1 root root 337M kwi 22 15:40 maillog

    Read the article

  • Apple font question

    - by creocare
    So I just bought a new macbook pro 15'. This is my first mac. I really hate the apple font in dreamweaver or when I'm doing any kind of coding. I can't read it. I should buy glasses but in the mean time is there any way to change the font and font size of dreamweaver? Thanks.

    Read the article

  • Is segfault signal always sent to application

    - by noonex
    My application usually crashes and prints stack to log if received segfault signal. But in some environment the 'dmesg' shows segfault messages related to my application, but application uptime is much older. Can segfault be suppressed and application doesn't receive signal? Or what errors from dmesg can mean ?

    Read the article

  • "An unknown error occurred" while downloading documents

    - by Scarlet Riley
    I have a 3 year old MacBook Pro and lately I've been getting an error message when I try to download something to my machine, this is what it says: Download error /Users/scarletriley/Downloads/the name of document goes here- no spaces of course! could not be opened, because an unknown error occurred. Try saving to a disk first and then opening the file. What does this mean, and what should I do to fix it?

    Read the article

  • Cygwin :: mount

    - by gabriela reyna
    I'm trying to configure the cygwin to work with TWiki, I have to input this in the Cygwin bash shell: mount -b -s c:/... but it doesn't recognize the "-s", I already fixed the problem with -b, it changed the syntax and now is "mount -o binary" for the "mount -b"part. But now it says unknown option with the "-s" anyone?? help?? or what does the -s mean, so I can look it up :S

    Read the article

  • Sony Vegas: minimal audio glitches

    - by Fuxi
    When doing video-editing with Sony Vegas, I noticed that it kind of produces minimal audio glitches very often. With glitch, I mean a copied fragment of approximately 1/2 second, as if I copied it and directly pasted it again. I'm assuming it must be something with puffers. Does anyone know of this problem? I have a pretty fast Windows 7 system with fast SATA drives.

    Read the article

  • Why is GPU used for mining bitcoins?

    - by starcorn
    Something that I have not really grasped is the idea of bitcoins. Especially since everybody can mine for it using a powerful GPU. I wonder why is GPU used for this purpose? Is the work done by GPU used by some huge organization or is it just wasted resource that goes into simulated mining? I mean for example SETI uses your GPU for the purpose of finding aliens, but what I can see of bitmining it seems for no actual purpose than wasted resource.

    Read the article

  • Emulate a VPN through ssh

    - by Ian
    I have a Linux server running ubuntu 10.04 server. I would like to tunnel my iPhone traffic through this server using ssh, but that's not such an easy solution. Is there a way to simulate a VPN over ssh so that I can configure my iPhone to connect to this VPN and protect my traffic? I know I could set up a real VPN server but it looks kind of complicated and "expensive" (resources I mean). Any ideas? Thanks!

    Read the article

  • Reattaching screen (having irssi running) forces window resize

    - by eis
    Whenever I reattach to my detached screen (containing Irssi), my Putty screen is resized to something it has been at startup. If I change the window size after this, detach the screen and resize it back, window will be again resized to the original size. By window I mean the Putty window on my windows box. How can I turn this feature off? Using Windows XP as my local and CentOS 6.0 as the remote OS. Putty 0.61.

    Read the article

  • Can a process be frozen temporarily in linux?

    - by Pal Szasz
    I was wondering if there is a way to freeze any process for a certain amount of time? What I mean is that: is it possible for one application (probably running as root) to pause the execution of another already running process (any process, both GUI and command line) and then resume it later? In other words I don't want certain processes to be scheduled by the linux scheduler for a certain amount of time.

    Read the article

  • HDD,CD,DVD - how is sector id distinguishable from data?

    - by b-gen-jack-o-neill
    Hi, as titles says, how is sector id on HDD,CD-ROM and so distinguishable from data? I mean, when I want lets say sector #52, first, head goes to track where this sector should be, than it must wait some time to spin the desired sector above the reading head. But it must somehow recognize that its sector number, and not only data that say 52. So, how is this done? Thanks.

    Read the article

  • "success=n" control syntax in pam.conf / pam.d/* files ...

    - by Jamie
    After sucessfully configuring Kerberos, this is what I've found in /etc/pam.d/common-auth file: auth [success=2 default=ignore] pam_unix.so nullok_secure auth [success=1 default=ignore] pam_winbind.so krb5_auth krb5_ccache_type=FILE cached_login try_first_pass auth requisite pam_deny.so auth required pam_permit.so Does the success=2 control value mean that if the pam_unix.so fails, the authentication skips to the auth requisite pam_deny.so line or to the last line?

    Read the article

  • Windows Home 7 and virtualization

    - by progtick
    so apparently, you can't use VirtualBox etc with Windows Home 7. because you would be using two licenses instead of one. So other users that tried virtualization with Windows Home Premium 7, did you just end up using another OS like Ubuntu etc? Did you find a workaround for using Windows? When I say virtualization, I mean virtual machine of sort - where dangerous websites can be visited, nasty applications can be tried etc.

    Read the article

< Previous Page | 69 70 71 72 73 74 75 76 77 78 79 80  | Next Page >