Search Results

Search found 9954 results on 399 pages for 'mean'.

Page 77/399 | < Previous Page | 73 74 75 76 77 78 79 80 81 82 83 84  | Next Page >

  • Why is a network ID not needed to connect to an IP address?

    - by baddogai
    I know how IP basically works, and knows that an IP address composed of a network ID portion and a host ID portion, but when I type a IP address, say 8.8.8.8 into the web browser, I didn't supply any subnet mask information. So, how does the browser know where the dividing line is between the network ID and host ID? Since 8.8.8.8 may mean 8.8.8.8/8, 8.8.8.8/24 etc. In a nutshell, the IP address I supplied is ambiguous.

    Read the article

  • I keep getting a Java incoming connections pop up

    - by 1.21 gigawatts
    I keep getting the following message, "Do you want the application “java” to accept incoming network connections?" First of all, what application? Second, if it's part of the browser, which sometimes the browser isn't open, it doesn't show me what page is requesting it. "Application" is very generic. Third what does that mean? Is it asking if anyone on the internet can make connections to my computer?

    Read the article

  • Postrouting rule in NAT table

    - by codingfreak
    Hi I have a strange question regarding NAT using iptables. When I do SNAT in a postrouting chain in NAT table at the end of the rule should I give -J ACCEPT? I see counters on the postrouting rule getting incremented but no packet leaving the machine. So does it mean the packet is DROPPED automatically?

    Read the article

  • Unable to locate existing XP system partition during Windows 7 upgrade install.

    - by glenneroo
    I have Windows XP 32-bit installed on this computer. I just purchased a Windows 7 64-bit as an ISO download upgrade version which I promptly burned to DVD and attempted to perform an upgrade installation. Here is the error message I am getting: Firstly, where are these "Setup log files" located? Second, does this mean I need to find compatible (64-bit?) drivers for the Mainboard and put them on floppy?

    Read the article

  • X Error of failed request: BadMatch (invalid parameter attributes) ffmpeg error

    - by Evan Carroll
    I'm getting the following error message in ffmpeg: X Error of failed request: BadMatch (invalid parameter attributes) Major opcode of failed request: 140 (MIT-SHM) Minor opcode of failed request: 4 (X_ShmGetImage) Serial number of failed request: 11 Current serial number in output stream: 11 I turns up when I run the bash function mentioned in a forum post about streaming in Linux. What does it mean and how can I fix it?

    Read the article

  • How (in terms of which parameters) is a "professional-grade" broadband connection different from a "consumer" one?

    - by odemarken
    By "professional" I mean here: The kind you can get at a datacenter for your server The kind you can get at an office that would be good enough for hosting web and mail server with low to medium traffic. (Please ignore other aspects of "the self-hosting problem" and focus only on broadband connection quality). Another way to frame this question would be "what parameters should office broadband have to compare to a datacenter-provided one for the purposes of self-hosting". The knowledge I have gathered so far is in answer format below.

    Read the article

  • Are there any issues with using an ATI 5870 on an nVidia motherboard?

    - by Liam
    I have an Alienware machine, so I'm not entirely sure on the make of motherboard, however, I do know it's got nforce on it and allows me to use nVidia cards in SLI. My 8800GTX has recently died and I'm looking to buy a replacement - I'm considering the ATI 5870, but what I want to know is, if I choose this card, does it mean I will need to change motherboard just to change graphics card vendor or does it not matter?

    Read the article

  • How does /burnmemory=XXX boot.ini switch work?

    - by user371602
    I know what the /burnmemory switch does on Windows, but I'd like to understand what Windows is doing under the hood to support it. It's described on msdn as the "amount of memory, in megabytes, that Windows cannot use". Does this mean simply that the kernel does not allow user virtual memory mapping into this area? How is this accomplished in the kernel, and are there other restrictions that the kernel will make when burnmemory is set?

    Read the article

  • Adjust Subtitles track

    - by CodingTales
    How do you adjust the subtitles track? I have a video and I downloaded the subtitles from somewhere. It is a few seconds after the video. I mean can you push the track a few seconds forward or pull it backward in either VLC or Windows Media Player?

    Read the article

  • setting up static ip on linux

    - by user64908
    I understood the interface file in linux needs to be edited and the corresponding lines added. I don't understand what network and broadcast are for, it seems extra versus a windows static ip configuration. In my case my gateway is 192.168.5.1 and my machine ip is 192.168.5.101, what would be my network and broadcast address, is the below correct and what exactly do they mean? iface eth0 inet static address 192.168.5.101 gateway 192.168.5.1 netmask 255.255.255.0 network 192.168.5.0 broadcast 192.168.5.255

    Read the article

  • creating new application in IIS 7 can cause other applications running on same IIS to log out?

    - by mokokamello
    Hi Experts I am new to IIS 7 and i am running a 16 user Application Server i received complains from my colleagues that their application log out suddenly and not saving edits. i compared the time of complains and they match the time when i was trying to install a new asp.net application or modify an existing one (of course not the very one they complained from) does this make sense? i mean are these events (application crash and installing new application on IIS) related together. note that i did not restart IIS

    Read the article

  • source command in Linux

    - by Rodnower
    My question is: why if I run some file with name aliases for example with content such as: alias lsa="ls -a" directly: $ ./aliases it don't create the alias (may be only in script context). But if I run it with command "source": $ source aliases it do the work? I mean after execution the alias "lsa" existing in context of command shell? "man source" give: "No manual entry for source", and in google I just found that it runs Tcl, but why Tcl influence shell context and bush not?

    Read the article

  • Sql Server huge tables with no rows

    - by Mike Gates
    I have a Sql Server database that has a few tables with zero row count but take up a combined 10 GB of space. I can see this by doing right-click/properties on the tables in question (data space is huge, between 1 and 6 GB, and row count is zero on these tables). I have no clue what could be causing this as I would assume zero rows would mean nearly zero space taken. Any ideas?

    Read the article

  • An device with an unknown MAC address is connected to my router

    - by Yar
    There is a computer that is not mine that is accessible on my network. I can even access its filesystem via AFP. What I want to know is how the computer could get on my network. My network is secured like this: Does that mean that they've used password cracking tools? The pass is not easy to guess but not hard to figure out via brute-force hacking, I guess. If I am being hacked, should I switch to WPA?

    Read the article

  • An unknown Mac is connected to my router?

    - by Yar
    There is a computer that is not mine that is accessible on my network. I can even access its filesystem via AFP. What I want to know is how the computer could get on my network. My network is secured like this: Does that mean that they've used password cracking tools? The pass is not easy to guess but not hard to figure out via brute-force hacking, I guess. If I am being hacked, should I switch to WPA?

    Read the article

  • Booting a virtual os on a physical environment

    - by Nrew
    Is there an application that allows you to add a virtualized version of your operating system into the mbr? By virtualized, I mean that if you boot this one, any changes made in it will not be committed to the disk. Just like how deepfreeze, returnil, and shadow user works. Is it possible to do that? Because the applications mentioned above requires you to reboot if you want that changes will not be retained.

    Read the article

< Previous Page | 73 74 75 76 77 78 79 80 81 82 83 84  | Next Page >