Search Results

Search found 4931 results on 198 pages for 'burnt hand'.

Page 78/198 | < Previous Page | 74 75 76 77 78 79 80 81 82 83 84 85  | Next Page >

  • Mysterious "media" volume mounted on desktop Mac OS X

    - by Allen
    I have a mysterious volume mounted on my desktop that I can't seem to forcibly unmount. I've tried using umount and also diskutil, but it seems to automatically remount itself. I've copied my hdd with Time Machine, and copied it onto a new computer, and it also has the drive mounted on it. It's not pointing to anything and I can't open it, nor can I forcibily remove it by hand with rm -Rf. Any ideas? I noticed this problem after I upgraded to Mountain Lion from Lion. It causes problems because when I try to select a file using the built in Finder dialog box, it freezes for a few minutes because it tries to cache or read into the "media" mounted volume.

    Read the article

  • Taking two actions in monit

    - by Oddthinking
    My monit script works to detect an outage with a process and inform me when the rule is: IF DOES NOT EXIST THEN ALERT My monit script works to detect an outage and automatically fix it when the rule is: IF DOES NOT EXIST THEN START But, what I want it to do is inform me AND fix it. Two rules in a row seems to make it ignore all but the last: IF DOES NOT EXIST THEN ALERT IF DOES NOT EXIST THEN START # No alert given. I could use a custom script that does both, and IF DOES NOT EXIST THEN EXEC "my_handwritten_script" but I was trying to move away from a mess of hand-written scripts towards a clean Monit configuration. Can I configure Monit to take two actions?

    Read the article

  • What does the term 'overinstallation' mean?

    - by Kent Pawar
    I came across this term here: "11882875 -- Essbase Server does not start after an overinstallation." I know that a clean install is a software installation in which any previous version is removed. Googling 'overinstallation' turned up nothing, and I don't like to just assume it simply means 're-install'. UPDATE: So my understanding now is - the term "re-install" can be a bit ambiguous as it could either signify an installation after an uninstallation or otherwise. On the other hand the term "over-installation" specifically talks about installing something over an existing installation, that involved no uninstallations.

    Read the article

  • Is Exchange protected from/allow back dated emails?

    - by David
    Does Exchange Server adequately protect against backdating items in a mailbox folder? I want to determine from an auditing perspective what level of risk exists/what trust can be put into Exchange database records. Is there a (mis)feature that allows end point users to modify the sent/recieved date fields on their own messages? Is there a reasonable way short of hand editing the files for an Exchange Server admin to make such a change? And most importantly: Is there any kind of "sequence number" that we could use to audit Exchange records for evidence of date manipulation (ex. msg100 = Dec 15, msg101 = Dec 10, msg102 = Dec 16)

    Read the article

  • Picasa 3 - All 88 'people' folders are empty - can I restore the files?

    - by rogerbid
    My wife uses Picasa 3 on her laptop, and has a problem. She has no idea how it happened but somehow the left hand panel in the Picasa 3 window shows "People (88)" but listed below it are the 88 names each with "(0)" alongside. No thumbnails show up for any of the 'people'. I have looked through all the menus and can see nothing that seems relevant and a search on this website has been fruitless too. Can anyone please tell me how I can correct this situation? FYI I backed up the laptop to a portable hard drive a few days ago (using Windows Backup and Restore) and wonder if this can be used to restore the database.

    Read the article

  • Maintaining a set of (virtual) windows XP machines

    - by Frank Meulenaar
    I have a small set (currently 3, going to 6, not going to be more than 10) of (virtual, vmware workstation) windows XP machine's. They are similar but not exactly the same. I'm currently rolling out windows updates etc by hand: start machine 1, update, close, etc; I'd like to review the updates first before the clients can install them. Incidentally there are also other updates to be performed: changes some files on all machines, install new Java versions, etc. What's a good way of doing this automatic? I tried to search for this but things like Active Directory seem overkill to me.

    Read the article

  • Windows 7 - Static DHCP server address with dynamic IP Address

    - by mkstreet
    Is this possible? On my LAN, I would like to setup the network properties such that the DHCP server's address is static. However, I want that server to hand out the IP Addresses and DNS addresses dynamically. The reason is that some devices on the LAN will try to behave like a DHCP server. For example, we use software to push images to computers on the LAN (our computer software configurations are centrally managed). When that imaging distribution software happens to be running, the machines being imaged will get confused as to which device is the DHCP -- the real one or the machine that is sending them the image. So, to remove the confusion, I would like to setup my Windows 7 images such that the DHCP server address is statically assigned. And then that server would assign the IP Addresses and the DNS addresses dynamically.

    Read the article

  • Backup all plesk MySQL Databases to individual files

    - by Michael
    Hy, Because I'm new to shell scripting I need a hand. I currently backup all mydatabases to a single file, thing that makes the restore preaty hard. The second problem that my MySQL password dosen't work because of a Plesk bug and i get the password from "/etc/psa/.psa.shadow". Here is the code that I use to backup all my databases to a single file. mysqldump -uadmin -p`cat /etc/psa/.psa.shadow` --all-databases | bzip2 -c > /root/21.10.2013.sql.bz2 I found some scripts on the web that backup each database to individual files but I don't know how to make them work for my situation. Here is a example script: for db in $(mysql -e 'show databases' -s --skip-column-names); do mysqldump $db | gzip > "/backups/mysqldump-$(hostname)-$db-$(date +%Y-%m-%d-%H.%M.%S).gz"; done Can someone help me make the script above work for my situation? Requirements: Backup each database to individual file using plesk password location.

    Read the article

  • Ubuntu Linux -- create custom burnable/bootable DVD image?

    - by ashgromnies
    I recently developed some kiosk software that runs on Ubuntu Linux, and my client needs me to set up ten more computers with the complete software package(and that number will only grow in the future). So I'm looking for a way to make this less of a pain in the neck and prevent me from shooting myself in the foot -- I had to disable some things on the installations of the operating systems like screensavers, automatic updates, etc. that would pop up and disrupt the kiosk operation. I don't feel comfortable doing that by hand across 10 computers, it seems stupid. Does anybody have recommendations for software that would let me burn an installable DVD with a complete image of the hard drive from one of the devices? I've looked at Clonezilla, G4L, and PartImage and I'm still not quite sure if any of them offer what I need. I know PartImage for sure won't work, because it doesn't support Ext4.

    Read the article

  • How can I cut a line in TextWrangler?

    - by Ian Henry
    Trying out TextWrangler since my TextMate trial is about to expire and I'm not sure it's worth the cash to keep using it. The main thing I'm missing is the ability to cut the entire line that the cursor is on without having to select it (which I could accomplish through a TextMate macro). Yeah, I can hit ?L ?X, but I'd like to map this sequence to ^X so I can do it purely with my left hand. Seems like this should be easy, but it's beyond me. What's the best way to get this functionality?

    Read the article

  • Documenting software-updates semi-automatically in MacOS X by parsing log files?

    - by Martin
    I'd like to document changes I made to my computer (running MacOS 10.6.8) to be able to identify the sources of eventual problems. Mostly I install updates when a software notifies me about a newer version and offers me a dialog to download and install the update. Currently I'm documenting those updates "by hand" by noting in a text file, when I have e. g. installed a Flash-Player update or updated another 3rd party software ... I wonder if I could achieve that easier and semi-automatically by parsing system logfiles for certain texts like "install" and that way directly get the relevant information: what has been installed (Software and version) when has been installed where has it been installed/what has changed Is there a way to extract such information by a script from the existing logfiles?

    Read the article

  • Splitting an archive on multiple media

    - by Robert Munteanu
    I'm generating archives which are larger than my current physical media ( DVD ). I'd like to split those archives: automatically - instead of generating mini-archives by hand; consistently - so that an archive can be extracted independently of another. For instance for a tree of 24GB which would be archived into 10GB I would get 3 archives, all of them < 4.7 GB and each of them being able to be extracted without the other 2. I'm using dirvish so I'm archiving a filesystem tree. Update: I'm using Linux.

    Read the article

  • ISP Couldn't Verify My HFC MAC Id

    - by Ann Rahn
    An Internet Service Provider whom I used in the past, claims to provide me with Internet service. However, when I gave his technician the Hybrid Fiber - COX MAC ID on my Modem, he could not find it on his list. Also, the Internet Service Provider doesn't even have my current mailing address. All he has is my phone number and he is demanding payment. On the other hand, I use a cable service which provide TV. At this point, the Internet Service Provider is threatening to disconnect my Internet service. My question: How can I verify if I am getting the service from him or through the cable?

    Read the article

  • Grouping data columns by shared values

    - by Lenna
    I don't know how to properly describe what I need to do, so I will give an example. A colleague has a data set in Excel like so: Col A Col B Col C aaaaa aaaaa bbbbb bbbbb ccccc ccccc ccccc ddddd eeeee The end result should be something like this: Col A Col B Col C aaaaa aaaaa bbbbb bbbbb ccccc ccccc ccccc ddddd eeeee Or even: Col A Col B Col C aaaaa Yes Yes No bbbbb Yes No Yes etc. (if it helps, the columns are protein extraction methods and the letters are protein IDs - we need to determine which proteins are extracted by which methods) My colleague is doing this by hand, but there is enough data that it would be really helpful to automate it. Is there a formula in Excel to do this automatically?

    Read the article

  • When should .local be used?

    - by hydroparadise
    So, I've set up a few Win Servs in my time and always did the .local thing when there was a router that sepearated my internal from external networks. Now that I'm setting up an *nix box for the first time, does this concept still apply? Do I still want my FQDNs (/etc/hostname) to show .local or .com for all my machines (mixed: linux servers, win workstations) inside of my network. This question comes in context of always having Active Directory hold my hand every step of the way, where now I'm setting up an DNS machine manually.

    Read the article

  • Remap Copy and Paste shortcuts on a Mac

    - by Linzdp
    I use Windows at work and a Mac at home. One of the biggest issues is the difference between the copy paste shortcuts on Windows vs the Mac i.e. Ctrl + C & Ctrl + V on Windows and on the Mac its Command + C and Command + V. Invariably its hard because of learnt motor skills where my hand always shapes itself to the Windows Ctrl + C configuration(I have been using Windows longer) I would like to remap the Copy and Paste to the Fn + C and Fn + V on the Mac. Why? Because the Fn key is actually the key that corresponds to where the Ctrl key is on Windows keyboards and since its the last edge key its easy to find. I have tried Double Command but it doesn't seem to have an option of turning Fn to the Command key.

    Read the article

  • How do I securely buy a domain from a private party?

    - by Matt
    I have a domain I want. I found the owners contact information, and negotiated a price. Is there a domain brokerage service out there that would help me with the exchange. I don't want to send off money, and never hear from him again, and I'm sure it's likewise. I've found a lot of sites that carry collections of domains for sale, but I've already found mine, and contacted the owner. I just want a service to facilitate the hand-off. Has anyone used a service like this that they could recommend?

    Read the article

  • Cannot "add to address book" in thunderbird on mac. Know a workaround?

    - by Arthur
    Runing TB 24.5.0 on Mac 10.8.5. I configure TB so that File-"Use Mac OS X Address Book" is not selected. Can open Address Book and see addresses in "COllected Addresses" & create New contact there. But in TB cannot "add to address book". I click on star to right of email address or ctrl-click correspondent and "add to address book". Nothing happens. But correspondent should be added to (some) address book. This is a major inconvenience because I use the address book to distinguish between junk mail from people who I do not know and good mail from people who I do know. Currently the only way for me to add anybody to the address book is to do so by hand, one at a time in "collected addresses". I welcome any work around that would let me add somebody to an address book with a single click. Thanks

    Read the article

  • Synergy configuration with multiple X screens

    - by Rob Drimmie
    I'm having a problem figuring out how to configure synergy to behave on a system with multiple X windows. On my desktop I am running Ubuntu 10.04 LTS. I have two monitors, setup as separate X screens by preference as well as to enable me to rotate the left-hand monitor. I also have a laptop, which I have on the desk in front of me, lower than the other two monitors. I have a very simple synergy.conf: section: screens desktop: laptop.local: end section: links desktop: down = laptop laptop: up = desktop end It works, but on the desktop only on whichever screen I run synergys from in terminal (I haven't set it up to run at startup yet because I've been playing with the configuration). I can't find any information how to reference multiple screens on one system, and would appreciate any help.

    Read the article

  • What are my options for booting OSX 10.6 when my DVD drive is broken?

    - by Kev
    I'm about to completely re-pave my Mac Mini but the DVD drive has died on me which means I can't boot from the installation media. I know I can boot from a USB stick but I don't have one available, what are my options given the following hardware at hand? Netgear ReadyNAS Duo NAS (NIC or USB only, no Firewire) USB HDD (no Firewire) I've ripped an ISO of the installation disk, can I somehow get the Mini to boot from this image using one of the above? If I decide not to re-pave but just upgrade, can the Mac be upgraded just using an OSX 10.6 ISO image on its disk?

    Read the article

  • HOSTNAME environment variable on Linux

    - by infogrind
    On my Linux box (Gentoo Linux 2.6.31 to be specific) I have noticed that the HOSTNAME environment variable is available in my shell, but not in scripts. For example, $ echo $HOSTNAME returns xxxxxxxx.com, but $ ruby -e 'puts ENV["HOSTNAME"]' returns nil On the other hand, the USER environment variable, for instance, is available both in the shell and in scripts. I have noticed that USER appears in the list of environment variables that appears when I type export i.e., declare -x USER="infogrind" but HOSTNAME doesn't. I suspect the issue has something to do with that. My questions: 1) how can I make HOSTNAME available in scripts, and 2) for my better understanding, where is this variable initially set, and why is it not "exported"?

    Read the article

  • How can I migrate local users/groups from old Windows 2000 server to new Windows 2003 server?

    - by dmr83457
    On a Windows 2000 box I have setup local users and one group for the purposes of ftp sites for our clients to transfer files to their own site. We are now moving to a different server running Windows 2003. I would like to be able to transfer the users/group and related folders with permissions to the new server without setting them all back up by hand. I see tools available for migrating users to Active Directory but nothing for local to local migration. How should I go about doing this? Is there a capability already built into Windows 2000/2003 for this purpose? Thanks

    Read the article

  • Triggering GDM login on a remote machine

    - by creator
    I have to briefly describe the situation. We are planning to make a computer classroom with workstations running Ubuntu 10.04. Since making accounts for each student has not been considered reasonable, we decided to make accounts for each student group. We don't want students to share their passwords between groups so the solution would be not to give them passwords at all, but let the teacher log them in instead. Obviously he shouldn't go from one machine to another typing in credentials by hand, so we need some script that will connect to a remote machine by ssh and make GDM (or probably any other login manager if GDM cannot serve this purpose) log in specified user. I couldn't find any solutions, as well as I haven't noticed anybody in similar situation asking for help, so my question will be: can the scheme described be realized and if yes, then how? Thanks in advance.

    Read the article

  • gitosis public key

    - by mbursill
    On my client I am attempting to run: git clone gitosis@DevServer:gitosis-admin.git I get a warning: The authenticity of host '10.1.1.13 (10.1.1.13)' can't be established. RSA key fingerprint is a2:c3:fd:d7:f7:75:df:dd:49:64:ce:64:cc:98:e6:2c. Are you sure you want to continue connecting (yes/no)? It appears to be picking up the public key from: /etc/ssh/ssh_host_rsa_key.pub I want it to use the key located in: /srv/gitosis/.ssh/authorized_keys How do I get my server to hand out the correct public key?

    Read the article

  • ubuntu 10.04 notebook edition running slow

    - by Nrew
    I installed ubuntu 10.04 notebook edition inside windows 7 through wubi installation. I've installed it in a Compaq Presario b1200 laptop. But the graphics is very slow. When I choose the items in the left hand pane. It takes up to 15 seconds for the screen to react. What am I supposed to do? I tried to go to the device manager and see if there is a graphic driver that isn't installed but it said that there are no proprietary drivers available. What might be the cause of this problem, how to solve this.

    Read the article

< Previous Page | 74 75 76 77 78 79 80 81 82 83 84 85  | Next Page >