Search Results

Search found 5185 results on 208 pages for 'just asking'.

Page 86/208 | < Previous Page | 82 83 84 85 86 87 88 89 90 91 92 93  | Next Page >

  • Do any filesystems support multiple forks / streams on directories?

    - by hippietrail
    Apple's HFS+ supports multiple forks such as the old data and resource forks. NTFS supports alternate data streams. I believe some *nix filesystems also have some support for multiple file forks or streams. Given that directories (folders) are just a kind of file at the filesystem level, I'm wondering if any of the filesystems which support this feature support it for dirs as well as files? (Or indeed directories in the alternate forks / streams?) I'm mostly asking out of curiosity rather than wanting to use such a feature. But one use it would have would be additional metadata for directories, which seems to be the most common use for these streams for files currently.

    Read the article

  • Is it possible to get a google voice number without already having a phone number?

    - by boost
    I'm sorry if this is the wrong place to post this, but I couldn't find a more suitable website in the stackexchange network. I currently have no phone number; I can make outgoing calls via the widget in gmail, but I cannot receive calls (as far as I know). I know that you can set up a google voice number to forward to google chat, and this is exactly what I want. The problem is, I can't get a google voice number in the first place, because it first requires that I have an existing phone number, even if I wouldn't use it. So, it is possible to skip providing an existing phone number, and just get a google voice number that forwards to google chat? Alternatively, is there any free phone service that can be used without a phone and lets you receive calls from any number? I realize I'm kind of asking for free candy, but, if it's out there, I'd be a fool

    Read the article

  • SSL certificates and whether a wildcard common name will support domain.com

    - by timpone
    Sorry, if this is very vendor specific but I purchased an inexpensive SSL Cert from GoDaddy. Right now everything on production is hosted off of www.domain.com. When specifying the common name would a wildcard (ie *.domain.com) cover the case of a lack of a third-level domain such as domain.com? Just to be sure, I made it for www.domain.com rather than a wildcard. If it matters, I will be using with nginx and a mod_passenger. If I want to cover everything including domain.com and staging.domain.com, www.domain.com etc, would a wildcard be the proper cert? Does the inexpensive godaddy cert (12.99 / year) cover wildcard certs (it didn't seem to for me)? Again, sorry for asking vendor specific questions and thx in advance. thx

    Read the article

  • SSRS report on SharePoint Web Part

    - by MicroSumol
    I have this configuration: DBK- SQL/SSRS/SSAS (includes SharePoint databases) SPK- SharePoint I created a SharePoint Site with an SSL certificate. Then on DBK I setup the SSRS with an SSL. Finaly went back to SharePoint and setup a webpart on a subsite to connect to the SSRS report. The problem comes that the user is asked 2 times to authenticate. Once when he logs into sharepoint, then when he wants to see the SSRS report. Since I am not an expert on SSRS, I am asking is there an easy way to pass the SharePoint credentials to the SSRS report. Would it be easier to install SSRS on SPK? Would that even work or solve my problem?

    Read the article

  • Autoplay for USB drive keeps popping up

    - by Adam Haile
    I have a Seagate external 2TB USB drive that when I leave it plugged in, the Autoplay dialog asking what to do with the drive pops up about once every 30-60 minutes. No matter how many times I tell it to go away, it keeps coming back. I have tried multiple power supplies, USB cables, and all the USB ports on my machine...but it keeps doing the same thing. Also, this does not happen with the same drive on a different computer. Could this be some power or configuration setting that is causing this? I'm running Windows 7 x64 (the computer it works on is x86)

    Read the article

  • Why is "chmod -R 777 /" destructive?

    - by samwise
    This is a Canonical Question about File Permission and Why 777 is "destructive". I'm not asking how to fix this problem, as there are a ton of references of that already on Server Fault (reinstall OS). Why does it do anything destructive at all? If you've ever ran this command you pretty much immediately destroy your operating system. I'm not clear why removing restrictions has any impact on existing processes. For example, if I don't have read access to something and after a quick mistype in the terminal suddenly I now have access well... why does that cause Linux to break?

    Read the article

  • Brightness Controls not working on HP Dm3t

    - by Karim
    i have an HP dm3t notebook which normally comes with windows 7. after some time i figured out how to install Windows XP on it. but now i am facing a problem that the brightess controls dont work so i am unable to change the brightess. the strange thing is that all the other buttons (sound volume, mute, sleep , etc... ) works but not the 2 brightess controls. i already downloaded the "HP Quick Launch Buttons" so i am asking about suggesitions how can i enable these two buttons in windows XP or even if i can change the brightess using some kind of software. thanks

    Read the article

  • How does the process of disk partitioning actually work on most HDD's?

    - by Dark Templar
    From what I know of most laptops, you are able to "partition" your disk into as many other drives as you please. The more you cut it up, the smaller your partitions are, but from an organizational point of view, this may be desirable... I was wondering how the filesystem itself becomes partitioned underneath the partitions visible to the user. For instance, a laptop disk is usually divided into platters, each with two surfaces. The surfaces are further divided into "tracks". I guess what I am asking is, is it possible to identify how the disk itself keeps track of partitions? (whether each partition has its own platter? each partition has its own set of adjacent tracks? or some other configuration, or whether the data from different partitions are just randomly interleaved and scattered throughout the disk?)

    Read the article

  • Running a VM off of an external HD via USB

    - by Nelson LaQuet
    Is it viable to run (i.e. reference the vmx/vhd directly from the mounted drive) a VM (vmware running Windows Seven) off of an external HD via USB? I mean, I know it's possible, but I guess I'm asking if USB provides enough bandwidth for normal usage... If so, are there any particular brands that may be better or worse? I know that ESATA would be a more viable setup, but my laptop doesn't have an ESATA port. Currently I use the VM to segregate all of my work development servers and software from my main machine; so I will be running all development servers and tools on the VM directly.

    Read the article

  • Zip files way larger on a Mac using Finder than the 'zip' command.. 2x larger.

    - by user33947
    I have a directory of JPEG's. Each one is roughly 90k, as reported by Photoshop when saving, and also reported by the command line function 'ls'.. When I get the properties for the file with Finder, it's double that, over 220k. Zipping it with finder will also package this bulk as well. Doing the "zip -v test.zip ./dir" command will make a MUCH smaller zip file. Zipping the files on windows also results in a much smaller file size as well, roughly the same to that of the unix zip command. File sizes are also reported correctly on windows. I can't find any mention of this anywhere, so I'm asking here.

    Read the article

  • How to measure startup time and order of Windows services on boot?

    - by djangofan
    I am not asking how to measure server startup time here. I am wondering if anyone knows of a tool that can measure and show a graph of the startup time and order of all the windows services during system startup. I saw a software program shown on my local Portland news last week that does this but I am unable to remember what it was called or anything else about it. All I remember is that it was a "tech" news story to help computer users with their computers. So, I know the software exists and I am trying to find it.

    Read the article

  • Prevent Java application from accessing/monitoring/altering clipboard contents

    - by mcstrother
    I'm a student using a service that provides practice questions for standardized tests. The service requires that I access the questions by downloading and running a Java application. If I try to copy anything from any window of my computer (including applications unrelated to the question bank) while the application is running, the copied item is replaced with an obnoxious message asking me to not pirate their copyrighted material. I find this obnoxious, and I also really don't like the idea that any application can slurp up any and all potentially sensitive information that I happen to copy while it's running. Is there are a way to limit the privileges of this application to stop it from doing this? Thank you!

    Read the article

  • How can you convert audio (3.5mm) to S/PDIF?

    - by SSumner
    I have a monitor that I want to use as my 'TV' for my gaming system. I connect it via HDMI, so sound and video go through the monitor, but I want sound to my headphones, which travels via optical (S/PDIF) cable. The monitor (Dell U2713HM) has a 3.5mm audio jack on it for line out, but I couldn't find anything that simply plugs in an converts the analog audio signal to a digital one so I can plug in a S/PDIF cable. What sort of device do I need to do this? (I am not asking for shopping recommendations, merely what options allow this conversion. I would prefer the smallest option, as space is limited).

    Read the article

  • Proxy Server suggestions

    - by Jon Menefee
    Here is the question I have that hopefully is not too general of a question. I have a network with approximately 25 PC's, 3 servers and 25 IP cameras. I have a firewall already on the network and it works fine for what I need, but my client is asking me if there is a way to put a Proxy server on the network to monitor where his employees are going when they surf the Internet. He is not wanting to block them (at least not thru the Proxy server), but he wants to make sure that they arent going to sites that would compromise the networked PCs. I have looked at TMG and it is a little more than what I want. I hesitate adding another firewall to the system because of the security cameras that are presently on the network (IP Cameras). I just want to put a policy in AD that would make certain Users (or Computers) use a Proxy server. Any suggestions on a good proxy server are welcome. Thank you

    Read the article

  • Backup of whole harddrive during full operation with Acronis True Image Home 2010

    - by testing
    Currently I'm creating a backup of one of my hard drives. It's my main hard drive, where the operating system is running on. Because the backup is done during full operation I'm asking me if the backup really includes all files (registry, ...). Can I restore the backup on another hard drive and then run the operating system again without problems? Normally I would say that you have to boot from a CD (without running OS) to make a backup. I made a Google research but I didn't found my case so far.

    Read the article

  • Corrupt Vista Account - With a twist

    - by oldSkool-Soldier
    I have a Windows Vista system whose profile seems to have been corrupted. Many solutions seem to indicate that you create another admin account, log in as that account, and delete the offending profile information for the account that is corrupted. Here's the twist: There are two accounts on this System - 1. Administrator Account 2. Standard Account. It's the Administrator Account which has become corrupted. If you attempted to do any user managment / attempt to create a new account under the 'Standard Account', UAC prompts for a user/pass. It has the admin account come up by default, and asking for a password (of which, there is none). When you click 'OK' - nothing happens (no doubt due to the fact that the account is corrupted, so it can't verify who or what is trying to allow the administrative privilage). Can anyone think of a way of fixing this account, or creating another administrator account to resolve this issue? Many thanks in advance.

    Read the article

  • Windows 7 file explorer preview window and password protected word documents

    - by Carbonara
    When using the Windows 7 Explorer with the preview pane open you get a little preview of a file when you click on it. This includes Word, Excel spreadsheets, etc. My problem is if the Word document is password protected. Clicking on it in Explorer automatically asks for the password to display its preview. It does this if you single or double clicking on it. You then get an empty Word instance running (which allows it to display the preview) and another instance of Word with your actual file and you're asked for the password twice in total. This is annoying and untidy. Is there a way of stopping the preview pane from wanting to display password protected documents and thus not asking for the password to display a preview?

    Read the article

  • Can I disable OS X Lion Autosave and Versions?

    - by Philip
    OK I'm going there: I want to turn off a new feature in OS X that's so infuriating I could swear it was designed by Microsoft, namely, Autosave / Versions. I just don't want it. I have a workflow that involves my trigger finger on cmd-S, I use my own VCS when necessary, I save as compulsively and I open applications like TextEdit and Preview as temporary notepads without wanting any changes saved automatically and without a stupid unlock dialog that then records my changes when I only want to see the changes and not record them. So: please tell me how I can turn off Versions without rolling back to 10.6, and you will be my new personal hero. Thanks! PS: Just asking how to disable, not for a discussion of the pros and cons of the features.

    Read the article

  • What should I know before considering a VPS or dedicated server?

    - by Corey Sarnia
    I have a plan for the future for an application and web service. The client will have an application that will send requests to a server-side Java back-end that will process requests, and the server should also be able to host a website, preferably on a WAMP setup (which is what I'm used to; very little *nix knowledge). Now, I cannot provide any hard stats because this is only a plan that's in a discussion stage. However, we do fully expect it will scale enough to need some type of dedicated hosting. My question is this: what types of things should I know about before looking into getting hosting? What should I be asking the hosting providers before I decide on a purchase? When is it appropriate to switch from a VPS to a fully dedicated server?

    Read the article

  • How do you configure recycle bins on roaming profiles?

    - by Zombian
    I copied the following from a post on the Spiceworks forum which remained unanswered: Is there any way to place the Recycle Bin back on the desktop of a Roaming Profile with the Desktop being redirected? I have used Google and can't find a straight forward answer. I am asking for people with experience in this. This is for a Windows XP machine. I saw mention of needing to use a program such as Undelete but I'm hoping that is not the case. Further explanation: I use redirected folders and whenever a user deletes something from their desktop,my documents it doesn't show up in the recycle bin. It doesn't appear in the recycle bin on the server either. Where is this data? I doubt it is permanently deleted. Is there a way to change the recycle bin on the users' desktop to display those files? Thank you!

    Read the article

  • Squid url rewrites https>>http

    - by bobfran
    I'm exploring some uses with Squid proxy 2.7 and I have seen a good number of examples for url rewrites that take urls such as: http: //somesitename.com and then the rewriter can change the url to: https: //somesitename.com And those examples work great. What I'm wondering though, is if its possible to do the reverse with a squid url rewriter. that is, to go from https: //somesitename.com to http: //somesitename.com ? Simply trying to edit the script file that handles the rewrites doesn't seem to do the trick. So I was wondering if there are some certain things I have to configure squid to do first, if its even possible to do what I am asking. I have my browser manually set up to have squid as a proxy for all requests and I can see https requests showing up in my squid access.log file (via the CONNECT method).

    Read the article

  • Why is hosted storage so expensive?

    - by Mark Henderson
    There are many questions on Server Fault asking why server storage is so expensive. e.g. Why do I have to pay 50 bucks a month per extra gigabyte of storage or Our file server is always running out of space, why doesn't our sysadmin just throw an extra 1TB drive in there? These questions usually come from people who lack an understanding of how enterprise-level storage works and what influences the price. This question is designed to be the "question to end all questions" regarding the price of enterprise storage.

    Read the article

  • Bluetooth connectivity

    - by Viniketa
    computer: Samsung All in One PC OS: Windows 7 (up-to-date) BT Radio: Broadcom I have Bluetooth speakers I have successfully used with the system in the past. In fact, I had them set as default speakers so audio would transfer when I turned them on. No longer. Now, they show as 'disconnected'. Asking for connection gives no response. Option to set as default is greyed out. Bluetooth view utility gives an error of 10049 when I try to connect (supposedly, the means an invalid device address). I uninstalled the device and re-installed. No help. Any advice? Thanks in advance.

    Read the article

  • Does my DLink DNS-323 need to reside on a "192.168.0.0/24" subnet?

    - by Raymond
    I've installed two brand new 2-tib drives in the DLink and plugged it in to my network. I set my router's static address table to include the MAC address of the device; however it doesn't ever "show up." Do I need to use the custom software to administer this device? Do I need to use a "192.168.0.0/24" network in order for this device to work (asking because it states that if DHCP isn't detected, it will default to an address in that range; and my network is not in that range).

    Read the article

  • How to access MySQL on Windows

    - by Dan
    This may sound like a really dumb question, but I normally only deal with MSSQL, no LAMP stuff, so I'm struggling to figure out what's going on. I have Windows 7 and have installed MySQL 5.1 through Web Platform Installer. I have HeidiSQL installed to manage data in MySQL, but how do I connect? In Heidi it's asking for 'Hostname / IP' which is prepopulated with 127.0.0.1. It prepopulates the user field to 'root' (which is right) and I'm entering the password I chose when MySQL was installed. However, it just errors when I connect, saying: SQL Error (1045): Access denied for user 'root'@'localhost' (using password: YES). Can anyone point me in the right direction here? Many thanks...

    Read the article

< Previous Page | 82 83 84 85 86 87 88 89 90 91 92 93  | Next Page >