Search Results

Search found 25182 results on 1008 pages for 'ask'.

Page 804/1008 | < Previous Page | 800 801 802 803 804 805 806 807 808 809 810 811  | Next Page >

  • Will my laptop be ok with this different laptop charger?

    - by tidbits
    So the original laptop charger broke and I switched to a charger from a laptop that I no longer use. The specifications from each are: Original Input:AC 100-240V 1.5A 50-60Hz Output: DC 19V 3.42A Other Charger Input: AC 100-240V 1.5A 50-60Hz Output: 20V 3.25A Yes, the polarity is the same. Also, the wattage has a difference of .02 from what I understand. Is wattage ever important, and more specifically, a wattage difference of that size. Feel free to ask me any other questions about the chargers and I'll answer them to the best of my ability.

    Read the article

  • can't add sharepoint users from trusted domain

    - by user22215
    I have a very strange problem with our Sharepoint 2007 implementation. I went in today to grant access to a user and was greeted with "The user does not exist or is not unique." Let me start off by saying that this user is not on our domain we have a 2 way trust connecting to one of our subsidiaries. I can see the users in the people pick but can't add them into Sharepoint. This problem flared up after we had some trust issues last two days ago. So I must ask has anyone came across this error and if so what steps did you take to resolve it? This link further highlights my problem: http://social.technet.microsoft.com/forums/en-US/sharepointgeneral/thread/41265a91-191c-4952-9c8c-1e0129b9fd3a

    Read the article

  • rsync to windows (cygwin)

    - by abergmeier
    We have a windows file storage (don't ask) and now I want to rsync with the machine from Windows, Mac and Linux. So I installed freeSSHd (login shell is set to C:/cygwin64/bin/sh.exe), set up certificates and testing from Linux the test.dat has 0 bytes: ssh myuser@winmachinename "C:/cygwin64/bin/true.exe" > test.dat Even double checking with actual output works fine: ssh myuser@winmachinename "C:/cygwin64/bin/ls.exe" > test.dat Now, when I call rsync: rsync --progress -avz -e ssh myuser@winmachinename:/c/Users ~/test it fails with: protocol version mismatch -- is your shell clean? (see the rsync man page for an explanation) rsync error: protocol incompatibility (code 2) at compat.c(174) [Receiver=3.1.0] As far as reading the docs, this should not happen, when the first test is successful!? I am by now out of ideas - any recommendations how to debug this? EDIT: | OS | rsync version | |:--------------|:------------------------------------------| | Windows | rsync version 3.0.9 protocol version 30 | | Linux | rsync version 3.1.0 protocol version 31 |

    Read the article

  • Mysql table Crashed during Optimize, table repair taking too long

    - by hellohellosharp
    One of my vital tables was being optimzied and MySQL crashed in the middle of it. It then said the table was corrupt. I am running repair but it is taking over an hour, I need this table up ASAP (I will even truncate it if necessary). Please help me get this solved. The table has about 54 million rows. This is a MyISAM. Any additional information needed, just ask. Here are the contents of my my.cnf: [mysqld] max_connections = 850 max_user_connections = 850 query_cache_size = 128M skip-external-locking key_buffer_size = 64M max_allowed_packet = 8M table_open_cache = 256 sort_buffer_size = 4M net_buffer_length = 16K read_buffer_size = 1M read_rnd_buffer_size = 1M myisam_sort_buffer_size = 32M innodb_file_per_table tmp_table_size = 100M max_heap_table_size = 64M thread_cache_size = 8 wait_timeout=25 interactive_timeout=25 table_cache=600 innodb_buffer_pool_size = 4G innodb_thread_concurrency = 8 innodb_flush_method = O_DIRECT # This setting allows the use of asynchronous I/O in InnoDB. # The following files track usage of this resource: # - /proc/sys/fs/aio-max-nr # - /proc/sys/fs/aio-nr # Default limit is 65536, of which a single instance of mysql uses 2661 out of the box innodb_use_native_aio = 1

    Read the article

  • Why does iTunes make 2 copies of my music when adding to library?

    - by NoCatharsis
    I set iTunes to "Keep iTunes Media folder organized" and to "Copy files to iTunes Media folder when adding to library" because I prefer to keep my music consolidated, organized, and consistent. However, when I have MP3s that are external to iTunes, then try to add via File Add Folder to Libary, iTunes creates 2 copies of the file in the iTunes folder - one with the original song name and another with the original song name followed by the number 1. Here is what I thought would happen, and I hope is possible: 1) Click File Add Folder to Library 2) Select folder external to iTunes 3) Click OK 4) iTunes creates a clean new folder in the iTunes Music directory with exactly 1 of each file 5) Only 1 of each song is shown within iTunes Is this too much to ask? I am not an iTunes fan at all after 2 years dealing with the poor programming of this application. I hope someone can help me find the faith...

    Read the article

  • Facebook verify account

    - by dman
    I can't login to Facebook because they think someone tried to hack my account. To verify it's really me they present me with photos that my friends have been tagged in and ask me to give them the correct names of who is tagged in the photos. Now because alot of my friends think it's funny to tag themselves in random photos of others, or tag themselves as objects in photos, I can't successfully get all 10 correct. I also have alot of friends of friends that have added me that I don't know closely enough to identify the back of their head in a distant blurry photo. Facebook only allows one attempt per hour to try this. How am I supposed to restore my account when they have such a stupid method to prove identity?

    Read the article

  • Getting ROBOCOPY to return a "proper" exit code?

    - by Lasse V. Karlsen
    Is it possible to ask ROBOCOPY to exit with an exit code that indicates success or failure? I am using ROBOCOPY as part of my TeamCity build configurations, and having to add a step to just silence the exit code from ROBOCOPY seems silly to me. Basically, I have added this: EXIT /B 0 to the script that is being run. However, this of course masks any real problems that ROBOCOPY would return. Basically, I would like to have exit codes of 0 for SUCCESS and non-zero for FAILURE instead of the bit-mask that ROBOCOPY returns now. Or, if I can't have that, is there a simple sequence of batch commands that would translate the bit-mask of ROBOCOPY to a similar value?

    Read the article

  • Running complete Native Linux on phones that are bootloader-unlocked [on hold]

    - by james
    Since there are many phones (HTC, Samsung, LG, Nexus) today that have bootloader unlocked, I want to ask what's preventing them from running a complete native GNU/Linux. GNU/Linux has ARM port and we can run a command line GNU/Linux on top of Android by the method of chroot. So, what's preventing for existing bootloader unlocked Android phones from running a complete GNU/Linux natively? The device should get a long shelf life if it has one such port. My few thoughts.. Proprietary drivers for hardware that cannot be made to work when using a different OS. And the binary provider will never support any OS other than what the phone is shipped with. Application Interface. The interface for desktop apps doesn't fit to the mobile display with different PPI. Kernel. Since android devices use Linux kernel whose sources should be available, could the device kernel be modified to work with GNU/Linux. And any other reasons?

    Read the article

  • Guacamole on KVM

    - by Siem Hermans
    I currently run a deployment where I provide virtual machines to circa 25 users through ESXi over the VMWare WSX web portal. This works, no doubt about it, it is fast, stable and reliable enough for the end users. However I stumbled across the Guacamole project (Link: http://guac-dev.org/) and the KVM project (Link: http://www.linux-kvm.org/). I must say I am no genius when it comes to Linux but I am interested in replacing the ESXi and WSX combination with a Guacamole and KVM deployment. I have seen people across the internet use ESXi in combination with Guacamole (mostly prior to the release of WSX), but I have yet to see someone use it in conjunction with KVM. Considering my amount of knowledge on Linux in general I would like to ask: Is it possible at all to combine the two?

    Read the article

  • Can a virus corrupt a hard disk?

    - by sundar
    Shorter version: Hard disk corrupt, vendor claims warranty does not apply since it was "due to a virus" and "problems due to software are not covered under the warranty". Longer version: My Dell laptop recently refused to boot, and all attempts to 'repair' the Vista installation using the provided installation CD failed. I called up Dell support, and a representative took the laptop and after a day said the hard disk is corrupt. When I tried to ask for a replacement under the warranty, an official replied that the corruption was due to a virus, and "problems due to software are not covered under the warranty". Now, I get a doubt that he's trying to avoid having to provide it under the warranty. Is it possible for a hard disk to get corrupt due to a virus? If yes, is there any way we can detect it was due to a virus (as he claims to have detected)?

    Read the article

  • Disk full, du tells different. How to further investigate?

    - by initall
    I have a SCSI disk in a server (hardware Raid 1), 32G, ext3 filesytem. df tells me that the disk is 100% full. If I delete 1G this is correctly shown. However, if I run a du -h -x / then du tells me that only 12G are used (I use -x because of some Samba mounts). So my question is not about subtle differences between the du and df commands but about how I can find out what causes this huge difference? I rebooted the machine for a fsck that went w/out errors. Should I run badblocks? lsof shows me no open deleted files, lost+found is empty and there is no obvious warn/err/fail statement in the messages file. Feel free to ask for further details of the setup.

    Read the article

  • What is the best answer for: "my Internet is not working"?

    - by Maciek Sawicki
    Hi, I look for work in IT Support. One of interview questions is: what would you first say if user call You and tell my Internet is not working? I think about it a lot and still don't know what is correct answerer nor what answer my future employer expects. My choice would be something like: What part of Internet? (but more polite). For example I could ask for opening web page that works on my PC. Please give only serious answers. If You want BOFH or "The website is down" style answers I can create separate question for that.

    Read the article

  • What is the best answer for: "my Internet is not working"?

    - by Maciek Sawicki
    Hi, I look for work in IT Support. One of interview questions is: what would you first say if user call You and tell my Internet is not working? I think about it a lot and still don't know what is correct answerer nor what answer my future employer expects. My choice would be something like: What part of Internet? (but more polite). For example I could ask for opening web page that works on my PC. Please give only serious answers. If You want BOFH or "The website is down" style answers I can create separate question for that.

    Read the article

  • Proper way for changing MAC address in a linux VM?

    - by HappyDeveloper
    I tried to change the MAC address in a ubuntu VM (virtualbox), but after that it threw lots of errors during boot, and then I had no internet connection. Then I saw that the interface was renamed to eth1, so I edited /etc/network/interfaces to change eth0 to eth1, rebooted (didn't know how to restart the network), and boot was now faster and internet worked fine. But now after every time I log in, I get 1 or 2 error messages that say nothing, they only ask me if I want to report them. So I was wondering, is there was a proper way to change MAC address, to avoid these issues?

    Read the article

  • Which Linux book for aspiring sysadmin?

    - by Ramy
    I have a co-worker who insists that he will never buy a book unless it is considered "THE" book. So, in this vein, I thought I'd ask what the ultimate Linux book is. I wouldn't quite call myself a complete beginner since I can get around in Linux in general pretty well. But, beyond that, I'm also looking for a book with an eye towards becoming a Sys Admin someday. I saw a Junior Sys Admin position open up recently but with the requisite 2-3 years experience, I may have to wait a little while longer before I'm ready to apply for such a position. Having said all that, I'll summarize my question: What is the ultimate Linux book for someone who is ok with the basic tasks of getting around in Linux but also wants to aim towards full Sys Admin status someday? A few examples of the books I'm considering: Linux-Administration-Beginners-Guide-Fifth Linux-System-Administration Linux-System-Administration EDIT: Before you close this question as a dup, I'd like to say that I'm looking for something that goes deeper than this: Book for linux newbies I already have "Linux in a nutshell"

    Read the article

  • add presence for a remote user to a legacy telephone system?

    - by niko
    we have a small call center that uses an old nortel phone system with analog lines. one of our sales people works from home so her calls do not go through the phone system. this creates a problem at time as the receptionist does not know if she is on the phone or not. we can easily get around this by using instant messenger status but i wanted to ask if there is another way that we can do it so that calls can also be forwarded to her when she is not on the phone. i realize that we can do this with a voip system but we're not planning on upgrading to voip until next year. does anyone know if there is an inexpensive way to add this capability today?

    Read the article

  • Google Accounts

    - by Alex
    Hi all, I need to setup a bunch of accounts (~50) with Google which will later be hooked up to Analytics and the Webmaster tools and I will access them via their APIs. The problem is that Google will stop me from making accounts at a certain point because it thinks I'm spamming it. I've tried bypassing the issue by proxying through Tor, but that didn't work (I suspect the Tor nodes are already abused and blacklisted). I also drove around town with my iPhone hopping towers trying to setup accounts. Also didn't work. Phone verification also doesn't work because my phone is already linked to too many accounts... So, I figure it's time to ask. How can I continue to setup Google accounts (NOT GMail...) without being considered a spammer? If there's a service from Google to whitelist my IP, even for a fee, I would be glad to sign up for it. Any suggestions will be appreciated!

    Read the article

  • deleting old unused images

    - by Ayyash
    As we move on with our content-based websites, lots of images get dumped in our images folder, but we rarely come across self-committed monkyes that delete their files once they do not need it, which means, we end up with a huge list of images in one folder, and it is very tricky to clean it up. My question is (and i dont know if this is the right website to ask it), is there a tool that allows me to find out if an image has been requested by web in the last (n) months? my other general question is, how do you do it? how do you take control of your images folders? what policy do you enforce on developers to clean up? what measures do you take in order to decide what goes and what stays if you end up with an out-of-control situation? my suggestion was to rename the images folder, create a new one, copy the basic ones and wait for someone to complain about a broken image! :) i find this to be the most efficient.

    Read the article

  • Running psql in Linux Command Line

    - by Mr Shoubs
    I've just installed Postgres9 and it is up and running without any issues. There is one thing however that is confusing me: If I type /usr/local/pgsql/bin/psql test then postgres command line loads and I can use it as expected, however... If I cd /usr/local/pgsql/bin then type psql test I get the following error: The program 'psql' is currently not installed. To run 'psql' please ask your administrator to install the package 'postgresql-client-common' Does anyone know why? (please don't say install postgresql-client-common as this doesn't solve the problem)

    Read the article

  • ISA Server Route Add Question

    - by Kip
    Hi All, I have a situation where I have and ISA 2006 server (on Win2k3) that has an internal and an externaly facing NIC's. All works fine but I need to add a couple of routes for the following reason: Our monitoring software is on a different network. Our Terminal server is on a different network. Currently, access to the internet, through this proxy server, from the terminal server fails. Also, monitoring of the ISA server via a remote monitor or the installed agent talking to the remote monitor (BMC) also fails. The default enterprise rule on ISA blocks the traffic as I beleive it doesn't trust / know about those networks. Here is my routing table: I need to add a couple of address, but this one being the main one: 192.168.245.137 / mask 255.255.255.192 / gateway 192.168.245.129 But I can't get it to work. Routing is not my strong point but at the moment have no one else available to help. Can you offer any assistance? Please ask if you need more info

    Read the article

  • Is it possible to rename an open Word document without closing it?

    - by RoboShop
    I just ask this question as I do not believe that after so many versions of Word, it wouldn't exist. Usually when I'm working on a document and I realize I have to rename it, I have to close the document down, go to file explorer and then rename it, and then opening it up again. It's a procedure that's so ingrained in my usage pattern that I didn't realize until now that I'm actually having to open and close multiple windows/ applications etc. simply to rename a file. Surely, it's the year 2012, I should be able to do a simple thing like that with a few clicks right? So is there a way to just rename the file name of a word /excel / office document without having to close it first?

    Read the article

  • How to get infected with Antivirus 2010

    - by PHLiGHT
    I know that this is the exact oposite of the question most people ask as it is a royal pain to remove. I hope this isn't flagged as me wanting to infect other people. I know my mom almost installed it but it was running firefox so she unknowingly downloaded it 10 times but didn't install it. I have since deleted those files and have been wondering what to look out for on sites that carry the virus. I'd like to test out AV software in a VM environment. It has been getting past our AVG as of late. Thanks,

    Read the article

  • Downtime scheduling - can it be automated?

    - by Nnn
    When servers need to have scheduled downtime at my workplace we follow a process roughly like the following: Propose time for work to take place on specific box/s Lookup list of stakeholders for specific box/s Seek approval from stakeholders (service owners/management etc) via email Incorporate changes to proposed time if necessary, repeat step 2 until.. Now everyone is happy with the time, send out a notification via email of the time, ask Staff who care about when the box is going down manually add it to their calendars some stakeholders the staff doing the work Do the actual work Is there an OSS project that we could use to automate this process? My googling has been fruitless so far. Will we need to build something ourselves? Would anyone else be interested in something like this?

    Read the article

  • Computer bluescreen-ing with 0x7A and 0xF4 errors

    - by lcarpenter
    Hiya, This computer is locking up for around 5-30 seconds before throwing Blue Screen of Death's with 0x7A and occasionally 0xF4 errors. The log files don't really show anything informative, and Windows Update doesn't show any new drivers for the HDD. Upon restart, it shows a "A disk error has occurred /n Press Ctrl+Alt+Del to continue", and to fix this I go into WinRE via the pendrive and run "bootsect /nt60 C: /force /mbr" and that seems to fix it so it boots. And then the cycle repeats. If you want any more information please ask. Thanks, Luke Carpenter

    Read the article

  • Linux HA - Best Heartbeat hardware solution

    - by Martino Dino
    Hi all I would ask anyone what is the best layer 2 medium for heartbeat in Linux and how it's best configured. More precisely I've been thinking about a dedicated NIC for that purpose but then i thought that if a switch breaks then i would loose the heartbeat connection for most of the cluster and STONITH 'BUM'!!! Will probably loose my job after :) Distributing the heartbeat onto the main NICs of every node trough a vif sounds reasonable but im not sure if this is the best option (at least the switches are redundant to some extent). Is it possible to use heartbeat over a bonded interface and that sounds reasonable? Do you have any other tip/solution for that issue?

    Read the article

< Previous Page | 800 801 802 803 804 805 806 807 808 809 810 811  | Next Page >