Search Results

Search found 6328 results on 254 pages for 'anonymous person'.

Page 109/254 | < Previous Page | 105 106 107 108 109 110 111 112 113 114 115 116  | Next Page >

  • Raid0 setup - What should 'my computer' say?

    - by superexsl
    Hey, I'm not a hardware person, so maybe someone here could help me. I ordered a PC from Dell that has "Serial ATA Raid 0 "Stripe"(7200RPM)Dual HDD" (2x500gb). However, I've just noticed that there's only one HD of 1TB (which is the default option when ordering). Should I be seeing two HDDs in "My Computer" or does the Raid0 setup simply improve performance rather than have (and display) two individual HDDs? How can I check if my computer does have a 'raid0' setup? Thanks

    Read the article

  • restrict views of custome list by group in sharepoint

    - by Crash893
    Im pretty new to sharepoint and what i would like to do is create a huge master list of all our employees and then make diffrent "views" on that person depending on the persons group for example a new employe might have sallery info security info personel info contract info i would like to have all that in on row (per employee) but then when someone from the hr group logs in they can only see personel and salery or something like that If that is not an option is there a way to link tables across different lists?

    Read the article

  • excel - generate a username from a full name field

    - by mheavers
    I'm trying to generate a username using a single name field in excel which has the person's first name and last name. I'm open to what the username would be, as long as its intuitive for the user. The name fields can be tricky, as the data looks like this: Albert Abongo (2 names) Stephen Michael Essuah Ackah (4 names) Alhaji Iddrisu Abdul-KArim (3 names) I guess my ideal usernames for these people would be aabongo sackah aabdul-karim

    Read the article

  • How to send mail to my mailing list

    - by xrobot
    I have a landing page to collect email from person interested in my event. So now I don't know how can I send email to this mailing list ( there are about 5000 email and is growing 10-20 per day ). Could you help me ? P.S. I use LINUX

    Read the article

  • making "Untraceable"-like calls

    - by infoquad
    In the movie Untraceable(http://www.imdb.com/title/tt0880578/), the killer(Joseph Cross as KillWithMe.com's webmaster) makes a telephone call with a computer and using some software(that convert's the actor's voice to female) fakes himself as a girl. While the converting part may be technologically difficult to accomplish at this time, I wanted to ask whether it is possible to make calls with a computer, record the conversations and play an mp3 file so the other person hears it? How can this be done?

    Read the article

  • Another domain name pointing to my server IP?

    - by Tom
    Hi guys, I was checking out my reverse-DNS entry of my domain the other day which is run from a dedicated server. I noticed that another person/company had their domain pointing to my server? I have no idea who this company is or why they are pointing their domain at my server IP? How can I go about stopping this or forcing them to change?

    Read the article

  • Can I rename a file that is open on Windows XP?

    - by Radek
    I want to programatically rename a file and it could be open. It's a log file. When I was testing my code the rename part didn't work because the log file TestPro.log was open by the TAF (Test Automation Framework). When TestPro is running and I try to delete the file I get the error "Cannot delete because is being used by another person or program." Is there any way how to rename a file (programatically) that is open the way the log file was?

    Read the article

  • Insertion of rows without changing formulas on anohter sheets

    - by julie
    I have two separate spreadsheets which feed each other (one person completes the main one so all others autofill). I have set up formulas so it autofills but when I insert new lines into the main spreadsheet the other spreadsheet takes information from the wrong line, even though the new data was put in the place of the old data. (The new inserted lines were put in where the data was before). can anyone help me to "protect" the formulas from movement? I will appreciate any help.

    Read the article

  • How can I make skype calls in Linux?

    - by Grzenio
    Hi, Today I spent more than an hour trying to get Skype set up on my Linux box (Debian testing), but I couldn't make my microphone to work correctly. So I hear the other person talking, but they can't hear me. I am running KDE 4.3 and Skype 2.1 Beta. What do I need to do to get it working?

    Read the article

  • LDAP users as OU

    - by vpereira
    Hi, i'm facing a strange LDAP configuration. Some admin, just created users as OU in OpenLDAP. To do it, the admin, changed some attributes in the OU like posixAccount, inetOrgPerson, organizationalPerson and person.. my question is what is the advantage to do it? It works, but i would like to know the drawbacks about it.

    Read the article

  • What's a good(affordable) business router that can limit traffic to certain machines(ips/ports)?

    - by Ryan Detzel
    We are using the basic Verizon router but it sucks so we're looking for a new one that allows us to limit users and our hadoop cluster to certain limits. Our problem is one person can start downloading something and kill the network and every hour we download logs into our cluster but it floods the network unless we rate limit it. Ideally we want to be able to say: total: 35 mbps Hadoop Cluster (15 mbps) Phones (1 mbps) Office(25 people) (19mbps but no one machine can have more than 5mbps)

    Read the article

  • Make windows XP ask for password

    - by daramarak
    We have software that have some features that are so sensitive that we want to verify the identity of the user. Instead of using a own user/password scheme we would really like to either test the password against the user password in XP, or even make Windows self reauthenticate the user so we can make sure that it is an authorized person that accesses the function. Or software is only running on windows XP embedded. I do not know if this is possible at all, does windows have any such features?

    Read the article

  • Prevent Concurrent File Changes: Windows Server 2003

    - by ThinkBohemian
    I have a program installed that writes configurations to disk installed on Windows Server 2003. When two administrators log into the machine at the same time, the last admin to save will persist their configurations, while the first admin's saves will be lost. Is there any way I can restrict access to a only this program so that only one person can edit it at a time? If not, is it possible to restrict user access to only one program?

    Read the article

  • Windows 64bit Sandboxing software alternatives

    - by Pacifika
    As you might know sandboxing software doesn't work in 64bit Windows due to patchguard. What are the alternatives for a person looking to test untrusted / temporary software? Edit: @Nick I'd prefer an alternative to VMs as I'm not happy with the extended startup time, the extra login sequences and the memory overhead that accompanies booting a VM solution to test something out ocassionally as a home user. Also it's another system that needs to be kept secure and up to date.

    Read the article

  • Mac internal mic not working with Xlite

    - by Pablo Fernandez
    I've used xlite for a while now but all of the sudden the internal mic from my mac stopped to work with it. It does call, and you can see the red bar rising but the other person can't hear a thing. The mic does work when using Skype so I think it's a problem with Xlite Things I've already tried: Reconfigure Xlite Reinstall Xlite Install Xlite Beta (After every step I rebooted the macbook) Obviously none of them worked. Thanks

    Read the article

  • Switch User in RedHat like XP

    - by rd42
    In our cluster, RedHat4 & 5 machines, if someone locks the computer and walks away no body can use it. Is there a feature in RedHat5, Gnome, KDE etc that would allow for the option of switching users at the lock screen, so more than one person can be logged in? Thanks, rd42

    Read the article

  • Text to speech during IPhone call

    - by Jonathan
    Is there way to be able to type instead of speak during an iPhone call. For example when you text a landline (in the uk at least) the text message will be converted to speech. I would like to be able to do a similar thing in real time on my iPhone to another mobile. For example it would be useful for a mute person who can not speak to be able to "participate" in phone calls.

    Read the article

  • Resources for a new Windows Small Business Server administrator?

    - by 80bower
    I've recently taken over management of a Windows 2003 Small Business Server and network for a small, less than ten person company. I have some (antiquated) sysadmin experience, but I've little experience with Exchange. The documentation of the existing infrastructure leaves much to be desired, and I was wondering if there's any sort of "So you've just become sysadmin" guides that anyone could recommend.

    Read the article

  • Resources for a new SysAdmin? (Emphasis on Windows SBS, Exchange, networking and general SysAdmin in

    - by 80bower
    I've recently taken over management of a Windows 2003 Small Business Server and network for a small, less than ten person company. I have some (antiquated) sysadmin experience, but I've little experience with Exchange. The documentation of the existing infrastructure leaves much to be desired, and I was wondering if there's any sort of "So you've just become sysadmin" guides that anyone could recommend.

    Read the article

< Previous Page | 105 106 107 108 109 110 111 112 113 114 115 116  | Next Page >