Search Results

Search found 5623 results on 225 pages for 'prevent deletion'.

Page 80/225 | < Previous Page | 76 77 78 79 80 81 82 83 84 85 86 87  | Next Page >

  • Where does Tomcat cache my taglib .jar files?

    - by NogginTheNog
    I'm deploying a .jar file to a tomcat instance (we're running 6.0.18 on Redhat linux) and according to the log output the old .jar is still being used. I've restarted everthing I can think of, have deleted the work directory etc.etc. but to no avail. I'm no tomcat expert, so here's my question: where should I look for to ascertain if tomcat is using a cached jar and how should I prevent it from doing so?

    Read the article

  • Glassfish V3 using up all available memory

    - by Mannaz
    I have a Virtual Server with 1GB of RAM. When i start glassfish with asadmin start-domain it instantly allocates all available memory, although i defined -Xmx128m in my domain.xml. Am I missing an option here? How can I prevent glassfish from using all free memory?

    Read the article

  • How to reliably keep an SSH tunnel open?

    - by Peltier
    I use an SSH tunnel from work to go around various idotic firewalls (it's ok with my boss :)). The problem is, after a while the ssh connection usually hangs, and the tunnel is broken. If I could at least monitor the tunnel automatically, I could restart the tunnel when it hangs, but I haven't even figured a way of doing that. Bonus points for the one who can tell me how to prevent my ssh connection from hanging, of course!

    Read the article

  • How to check if windows has automatic updates waiting from the command line?

    - by Lee
    If a Windows server (2k3/2k8) is set to "download but not install" updates, is there a way to check from the command line.. perhaps a log file or something I can check with powershell, to see if there are any updates actually waiting to be installed? I'm trying to prevent having to manually log on to each server to check, even though they want the "trigger" pulled manually. We have an automation system in place I can use (CA Autosys) - just not sure what to have it look for.

    Read the article

  • Where to find a list of bad passwords?

    - by Steve Morgan
    I need to implement a 'stop list' to prevent users selecting common passwords in a new online service. Can anyone point me to such a list online anywhere? Edited: Note that I'm only trying to eliminate the most common passwords, not an exhaustive dictionary. And, of course, this complements a reasonably strong password policy (length, use of non-alpha characters, etc.) Thanks.

    Read the article

  • Preventing folders from being moved in Outlook folder list

    - by ipaulo
    In the Outlook "folder list", it is quite easy to accidentally pickup a folder and move that into another folder. There is no undo for this, and I have not found a way to prevent this. I thought it was just me, but I recently saw a coworker do the same thing while filing mail via drag and drop. We are using Exchange 2003 and Outlook 2007.

    Read the article

  • Feasible to use a laptop as a Digital Media Receiver/Extender?

    - by philosaur
    Since the price of many dedicated hardware Digital Media Extenders is only slightly lower than that of a cheap laptop, is there any reason you couldn't use a laptop as a Digital Media Extender? I'm looking for specific reasons that might make this unworkable. For instance, would the small screen/low-power video card of the laptop prevent the movie from playing well on the TV?

    Read the article

  • What's the max Windows 7 access possible to restrict tampering with single service?

    - by Crawford Comeaux
    I'm developing an ADHD management system for myself. Without going into detail (and as silly as it may sound for a grown man to need something like this), I need to build a me-proof service to run on my Windows 7 Ultra laptop. I still need fairly complete access to the system, though. How can I set things up so that I'm unable to "easily" (ie. within 3-5 mins without rebooting) stop the service or prevent it from running?

    Read the article

  • Question about RewriteRule and HTTP_HOST server variable

    - by SeancoJr
    In evaluating a rewrite rule that redirects to a specific URL and say the rewrite condition is met, would it be possible to use HTTP_HOST as part of the URL to be redirected to? Example in question: RewriteRule .*\.(jpg|jpe?g|gif|png|bmp)$ http://%{HTTP_HOST}/no-leech.jpg [R,NC] The motive behind this question is a desire to create a single htaccess file that would match against an addon domain (on a shared hosting account) and an infinite amount of subdomains below it to prevent hotlinking of images.

    Read the article

  • How to implement a secure authentication over HTTP?

    - by Zagorax
    I know that we have HTTPS, but I would like to know if there's an algorithm/approach/strategy that grants a reasonable security level without using SSL. I have read many solution on the internet. Most of them are based on adding some time metadata to the hashes, but it needs that both server and client has the time set equal. Moreover, it seems to me that none of this solution could prevent a man in the middle attack.

    Read the article

  • excel truncating phone number

    - by user15586
    I have a csv file that contains cells such as "+1.8882789780". When viewed in Excel, it loses the last digit possibly due to excel truncation. Is there a way to either change the setting in Excel to prevent this from happening or change the csv file in some way? One way is to wrap single quotes around the cell contents in addition to the double quotes. "'+1.8882789780'" Is there a better way?

    Read the article

  • Preventing Thunderbird to add .txt to attachments on open.

    - by Horcrux7
    How can I prevent Thunderbird to add the extension .txt to a file when open the attachment. I have the problem with .patch files which I want look with notepad++. The problem is that notepad++ does not detect the right formating for the file because the extension is .txt. If I drag the file on the desktop an double click all is working. Why change Thunderbird the file name on opening? I am working on Windows 7.

    Read the article

  • Apache - suExec - FastCGI - PHP = seciruty issue

    - by Jari V.
    I installed Apache with FastCGI (mod_fastcgi), suExec and PHP on my local development box. Working perfectly, expecting one thing. Let's say I have two users: user1 - /home/user1/public_html user2 - /home/user2/public_html I discovered a serious security hole in my configuration: I can include a file from user2 web root in user1 file. How to prevent? Any tips? php-cgi process is running under correct user.

    Read the article

  • How do I get SQL Profiler to show statements with column names like 'password'?

    - by Kev
    I'm profiling a database just now and need to see the UPDATE and INSERT statements being executed on a particular table. However, because the table has a 'Password' column the SQL Profiler is being understandingly cautious and replacing the TextData column with: -- 'password' was found in the text of this event. -- The text has been replaced with this comment for security reasons. How do I prevent it doing this because I need to see the SQL statement being executed?

    Read the article

  • Best way to segment traffic, Vlan or subnet

    - by thebird
    We have a medium sized network of around 200 nodes and are currently in the process of replacing old daisy chained switches with stack-able or chassis style switches. Right now our network is broken up via subnet; production, management, IP, etc each on a separate subnet. Does anyone have an opinion on whether creating Vlan's instead of subnets would be more beneficial? Our general goal is to prevent bottlenecks, separate traffic for security, and to manage traffic with more ease.

    Read the article

  • How do you close a VMWare Fusion VM Window without shutting it down or suspending it?

    - by Chris
    There are a few parts to this question. The first is: I'm running a virtual machine guest using vmrun and nogui, when I open the VMWare Fusion application, the window library opens but subsequently also opens any window of a running VM. Is there a way to prevent this? Secondly, but related: Once it does pop up or I have that separate VM Window open, is there a way to close the window such that it does not suspend or shutdown the vm i.e. convert it back to nogui mode?

    Read the article

  • Making Thunderbird leave messages on server

    - by Malfist
    When I setup my GMail account with Thunderbird years ago, it had a specific option for GMail. I choose it and everything worked fine and dandy. However, whenever Thunderbird checks the mail for me, it moves my mail from the inbox (on GMail) to the "All Mail" folder. How can I prevent it from doing this?

    Read the article

  • After returning from standby mode, win7 asks for login twice

    - by Force Flow
    When a Windows 7 32-bit PC attached to a domain comes back from standby mode and has no user logged in, if I log in once, it jumps back to the login screen. If I log in for a second time, then it actually logs in. This happens on multiple PCs, and is not a hardware issue. The PCs are also free of viruses/malware, and are otherwise problem-free. Why does it do this, and is there a way to prevent this annoyance?

    Read the article

  • How can I put together services bettwen differents servers?

    - by poz2k4444
    For a schoolar project, I have to run differents services in a lab enviroment where I'll have 6 computers working as servers, what services can I put together, and what cannot be, in order to prevent security risks, and considereiting that if one service goes down, affects less possible the function of the server farm, the services are: MySql Http for intranet Https DHCP IPP SMTP LDAP VPN SSH NTP DNS NFS I'll use linux

    Read the article

  • Suppress "running out of disk space" Message (per drive) on Windows Server 2003

    - by Shoeless
    We have a database server with separate drives for OS, various data files and the transaction log. Our transaction log spills over onto other volumes as well- this is expected behavior. The problem is that we are constantly getting popups that our transaction log drive is out of space (and that I can free space by deleting old or unnecessary files). Is there some way to prevent this message from popping up for this particular drive?

    Read the article

< Previous Page | 76 77 78 79 80 81 82 83 84 85 86 87  | Next Page >