Search Results

Search found 30556 results on 1223 pages for 'internet security'.

Page 118/1223 | < Previous Page | 114 115 116 117 118 119 120 121 122 123 124 125  | Next Page >

  • How to install programs downloaded from the internet?

    - by Rosamunda Rosamunda
    I've downloadad the latest XAMPP file, to install it into Ubuntu 13.04. After downloading the file, I just can run it. I've double click it (and I've tried right click and clicking "open", whith the same result). All the answer I get is this message: Could not display “xampp-linux-1.8.3-1-installer.run”. There is no application installed for “executable” files. Do you want to search for an application to open this file? I've tried searching for an application, with no result... Also, I haven't found any questions related to this issue with the 13.04 Unity version... I've tried this solution, with no result. Please note that this isn't a Xampp question, the same happened to me when I tried to install Skype. UPDATE: I've tried this solution: cd ~/Downloads chmod +x myfile.run sudo sh myfile.run And I've got this error: Syntax error: "(" unexpected What should I do? Thanks!

    Read the article

  • Data Source Security Part 4

    - by Steve Felts
    So far, I have covered Client Identity and Oracle Proxy Session features, with WLS or database credentials.  This article will cover one more feature, Identify-based pooling.  Then, there is one more topic to cover - how these options play with transactions.Identity-based Connection Pooling An identity based pool creates a heterogeneous pool of connections.  This allows applications to use a JDBC connection with a specific DBMS credential by pooling physical connections with different DBMS credentials.  The DBMS credential is based on either the WebLogic user mapped to a database user or the database user directly, based on the “use database credentials” setting as described earlier. Using this feature enabled with “use database credentials” enabled seems to be what is proposed in the JDBC standard, basically a heterogeneous pool with users specified by getConnection(user, password). The allocation of connections is more complex if Enable Identity Based Connection Pooling attribute is enabled on the data source.  When an application requests a database connection, the WebLogic Server instance selects an existing physical connection or creates a new physical connection with requested DBMS identity. The following section provides information on how heterogeneous connections are created:1. At connection pool initialization, the physical JDBC connections based on the configured or default “initial capacity” are created with the configured default DBMS credential of the data source.2. An application tries to get a connection from a data source.3a. If “use database credentials” is not enabled, the user specified in getConnection is mapped to a DBMS credential, as described earlier.  If the credential map doesn’t have a matching user, the default DBMS credential is used from the datasource descriptor.3b. If “use database credentials” is enabled, the user and password specified in getConnection are used directly.4. The connection pool is searched for a connection with a matching DBMS credential.5. If a match is found, the connection is reserved and returned to the application.6. If no match is found, a connection is created or reused based on the maximum capacity of the pool: - If the maximum capacity has not been reached, a new connection is created with the DBMS credential, reserved, and returned to the application.- If the pool has reached maximum capacity, based on the least recently used (LRU) algorithm, a physical connection is selected from the pool and destroyed. A new connection is created with the DBMS credential, reserved, and returned to the application. It should be clear that finding a matching connection is more expensive than a homogeneous pool.  Destroying a connection and getting a new one is very expensive.  If you can use a normal homogeneous pool or one of the light-weight options (client identity or an Oracle proxy connection), those should be used instead of identity based pooling. Regardless of how physical connections are created, each physical connection in the pool has its own DBMS credential information maintained by the pool. Once a physical connection is reserved by the pool, it does not change its DBMS credential even if the current thread changes its WebLogic user credential and continues to use the same connection. To configure this feature, select Enable Identity Based Connection Pooling.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/EnableIdentityBasedConnectionPooling.html  "Enable identity-based connection pooling for a JDBC data source" in Oracle WebLogic Server Administration Console Help. You must make the following changes to use Logging Last Resource (LLR) transaction optimization with Identity-based Pooling to get around the problem that multiple users will be accessing the associated transaction table.- You must configure a custom schema for LLR using a fully qualified LLR table name. All LLR connections will then use the named schema rather than the default schema when accessing the LLR transaction table.  - Use database specific administration tools to grant permission to access the named LLR table to all users that could access this table via a global transaction. By default, the LLR table is created during boot by the user configured for the connection in the data source. In most cases, the database will only allow access to this user and not allow access to mapped users. Connections within Transactions Now that we have covered the behavior of all of these various options, it’s time to discuss the exception to all of the rules.  When you get a connection within a transaction, it is associated with the transaction context on a particular WLS instance. When getting a connection with a data source configured with non-XA LLR or 1PC (using the JTS driver) with global transactions, the first connection obtained within the transaction is returned on subsequent connection requests regardless of the values of username/password specified and independent of the associated proxy user session, if any. The connection must be shared among all users of the connection when using LLR or 1PC. For XA data sources, the first connection obtained within the global transaction is returned on subsequent connection requests within the application server, regardless of the values of username/password specified and independent of the associated proxy user session, if any.  The connection must be shared among all users of the connection within a global transaction within the application server/JVM.

    Read the article

  • Security for LDAP authentication for Collabnet

    - by Robert May
    In a previous post, I wrote about how to get LDAP authentication working in Collabnet. By default, all LDAP users are put into the Users role on the server.  For most purposes, this is just fine, and I don’t have a way to change this.  The documentation gives hints that you can add them to other roles, but for now, I don’t have the need. However, adding permissions to different repositories is a different question. To add them, go to the repositories list, select Access Rules and then you can enter in their username, as it sits in Active Directory to the lists for the repositories or for the predefined groups that you have created.  To my knowledge, you cannot use the Active Directory groups in collabnet, which is a big problem.  Needing to micromanage users really limits the usefulness of the LDAP integration. Technorati Tags: subversion,collabnet

    Read the article

  • Small Business Websites and the Internet High Street

    Most professionals, running their small businesses from high street premises, rightly expend huge amounts of time and effort on finding the right site to trade from; a wealth of consideration is given to every detail of the work place, from the colour of the carpets to the style of chair; professional designers are enlisted and marketing specialist consulted and a great deal of thought is given by all as to just how attractive the place will be to potential customers. With the beautiful new signs in place, all that's left to do is await passing trade, of course other marketing will be done and business also comes from word of mouth, but it is this visual presence on the high street that is all important to such firms.

    Read the article

  • Link Building As an Effective Internet Marketing Strategy

    People do not look anywhere else except the online portals to get details about the products and services. The search engine ranking for your site should be such that a lot of visitors come searching for the content of your site. Most of them look for either products or services on major search engines like Google, Yahoo or MSN.

    Read the article

  • Start & Stop internet connexion without broking Network Manager

    - by user3634569
    I am on Precise. I used this command (with an alias), to close the network, dbus-send --system --print-reply --reply-timeout=120000 --type=method_call --dest=org.freedesktop.NetworkManager /org/freedesktop/NetworkManager org.freedesktop.NetworkManager stop it worked, now I have to use dbus-send --system --print-reply --reply-timeout=120000 --type=method_call --dest=org.freedesktop.NetworkManager /org/freedesktop/NetworkManager org.freedesktop.NetworkManager.Sleep boolean:true it work but not so well, sometimes I can't restart the network and NetworkManager is blocked too and strange errors even GUI freeze . What I need is a command line which close the network and don't mess with Network Manager, maybe with the routing table or what else.

    Read the article

  • Windows 2003 Server, can't connect to an SSL Site from IE.

    - by JL
    I am trying to connect to connect to www.czebox.cz using internet explorer on Windows 2003 server. If you have a server to test from please do, and you'll notice that it does not connect instead returns - Internet Explorer cannot display the webpage. From Firefox it works fine on the server. From Windows 7 it works fine in Internet Explorer. How can I get it to work in Windows 2003 Server using IE?

    Read the article

  • No internet - please help?

    - by All
    I just got Ubuntu and I am really really really a linux novice. I can't get the wireless to work? I played around with it until I saw it says "wireless firmware missing" - Hardware address 00:14:A5:6A:17:C2. On my laptop there is a button that looks like a little antenae that means the wireless is on. The funny thing is that this button does not seem to do anything right now - the light is not lit up and does not light up. Any thoughts you have on getting this going are appreciated!

    Read the article

  • Wireless is connected, but can't browse the Internet (or connection goes completely)

    - by user261007
    I'd like some help with this, please. Will be very glad is anyone will point me in the right direction. Thank you in advance! This is when the connection is present and browsing: eth0 Link encap:Ethernet HWaddr 50:46:5d:4a:9e:4f UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:65536 Metric:1 RX packets:2666 errors:0 dropped:0 overruns:0 frame:0 TX packets:2666 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:228844 (228.8 KB) TX bytes:228844 (228.8 KB) wlan0 Link encap:Ethernet HWaddr dc:85:de:1c:91:f9 inet addr:192.168.1.147 Bcast:192.168.1.255 Mask:255.255.255.0 inet6 addr: fe80::de85:deff:fe1c:91f9/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:18780 errors:0 dropped:0 overruns:0 frame:0 TX packets:12817 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:21198762 (21.1 MB) TX bytes:1746891 (1.7 MB) When connection goes: wlan0 Link encap:Ethernet HWaddr dc:85:de:1c:91:f9 UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:209503 errors:0 dropped:0 overruns:0 frame:0 TX packets:132560 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:268811733 (268.8 MB) TX bytes:15479814 (15.4 MB)

    Read the article

  • Git, auto updating, security and tampering?

    - by acidzombie24
    I was thinking about hosting my private project on my server (i may use 'gitolite') and have a copy on my local machine as backup (git clone then automated git fetch every few minute). I want to know what happens if there is a bug gitolite or somewhere else on my server and the source code and git repository has been tampered with? Will my backup also be corrupted? will i easily be able to revert the source using the history?

    Read the article

  • Internet Marketing and PR Strategies - The Invisible Business

    Imagine for a moment a directory containing nearly half a billion entries (this is close to the truth, assuming we count both websites and blogs). Your goal is to have your business appear on the first page of that directory under an appropriate heading such as 'printer' or 'accountant'. How would you do that? That is what search engine optimization is all about.

    Read the article

  • Ubuntu 12.04 - PPTP VPN is the only Internet Access

    - by user212553
    I know this has been covered. I've read dozens of posts but still have questions. I have a work server whose traffic should never leave my house without encryption. The VPN is PPTP. Currently I have a cron job that checks the status of the ppp0 adapter each minute. If the connection drops, which it does fairly often, it shuts key components down. It's fairly easy to restart PPTP with "nmcli con up id 'myVPNServer'" but there's no assurance it will reconnect and I need a better way to stop traffic (other than killing apps) when ppp0 is down. The two options I've seen discussed are the firewall (UFW, Firestarter, IPTables) or the route tables. I could be easily swayed to consider the firewall option but I focused on the route tables since no new function needs to be started. My questions involve the way the route tables change and then specifics on rules. When I start the PPTP VPN the route tables change. That suggests that if the VPN drops, the table will change back, defeating my stated intent of preventing external traffic. How can I make "sticky" changes to the route table that will persist even if the VPN connection drops? Perhaps the check boxes "Ignore automatically obtained routes" or "Use this connection only for resources on it's network" (which are part of the VPN configuration options)? It would seem that, if I can force the active VPN route table to stay in effect, even when the VPN drops, that this will effectively kill any external traffic should the VPN drop. This will give me the latitude to run a routine to restart the VPN from the command line (assuming the route table rules don't prevent me re-establishing the connection). My route table, with the VPN active is (ip route list): Any comments on what 10.10.1.1 is? $ ip route list default dev ppp0 proto static 10.10.1.1 dev ppp0 proto kernel scope link src 10.10.1.11 VPN_Server_IP_Address via 192.168.1.1 dev eth0 proto static VPN_Server_IP_Address via 192.168.1.1 dev eth0 src 192.168.1.60 169.254.0.0/16 dev eth0 scope link metric 1000 192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.60 metric 1

    Read the article

  • .NET Rocks! Internet Audio

    - by Editor
    NET Rocks! is a weekly talk show for anyone interested in programming on the Microsoft .NET platform. The shows range from introductory information to hardcore geekiness. Many of their listeners download the MP3 files and burn CDs for the commute to and from work, or simply listen on a portable media player.  Download .NET Rocks! audio.

    Read the article

  • Microsft Targets Graymail and New Patch Tuesday

    The first critical bulletin will patch a vulnerability contained within Windows and Internet Explorer. Microsoft said that if the vulnerability was exploited, it would give hackers an avenue to spread malicious code on a remote basis. The bug affects the Windows XP, Windows Vista, and Windows 7 operating systems, plus Internet Explorer versions 6, 7, and 8. The Windows Server 2003 and 2008 platforms have been identified to be affected by the bug as well. The second critical bulletin addresses a .NET and Silverlight bug that makes remote code execution possible. With the vulnerability in pl...

    Read the article

  • SEO is Still the Key to Your Internet Marketing Success

    After many years, Search Engine Optimization (SEO) is still the key to creating long term brand awareness, online visibility and attracting increased traffic to your website, enabling you to appear higher in the organic search rankings for a set of targeted, high value keyword phrases. SEO is a set of activities that will provide your website with higher Relevance and Authority, which the search engines use to determine how high your website should rank when a specific keyword phrase is searched for.

    Read the article

  • Just wondering about "Do-It Yourself Apps" on the internet versus apps written by us developers

    - by user657514
    Hi, I have been doing Objective-C programming over the past few weeks, and I have learnt a lot. However, I see that there are other Web-companies offering services to consumers directly from their website that allow consumers to create their apps through a point and click and drag features without any code. Clearly they are more cost effective and fast than having a developer write an app. I was wondering if there are any advantages then of having a developer build an app for someone, other than the obvious advantage that its got a custom look and feel. Could someone please clarify, since Im new and would like to evaluate whether it is worthwhile spending time towards learning a whole new development environment when someone could just use a webservice to make an app for multiple platforms Thanks

    Read the article

  • How would I isolate one netowrked PC to LAN only?

    - by itsraine
    I would like to have one of my PCs available to the rest of my home network for file sharing and VNC access, but I want to block any Internet traffic going to and from the PC. In other words, I want all local PCs I have connected to the router functioning as any normal LAN would, but when it comes to the Internet I want one particular PC to be "safe" from the Internet. My guess is that this is some sort of port blocking or some other router function, but I'm not quite sure.

    Read the article

  • Installed Ubuntu on a macbook pro and am running into errors with internet

    - by user209270
    I recently installed Ubuntu (64 bit, 12.04) on a mid-2012 Macbook Pro, and I've been having some really annoying issues. Chief among them is that my wireless doesnt seem to function properly. I've installed Ubuntu on this mac before, and again this time the drivers for the wireless card were missing. I, using something along the lines of sudo su apt-get update apt-get upgrade apt-get b43-fwcutter firmware-b43-installer A new problem I've been experiencing however is that none of the networks available in my home show up. I've been able to connect theto themm by going into "Connect to hidden networks" and typing in the network name and password, but when I restart the computer my network (let's just name it "Network1"), doesnt show up. I tried going into "Edit Connections" and it shows up in the wireless tab, but it is never connected to automatically or shows up in the drop-down menu. Any help?

    Read the article

  • problem in connecting Reliance booadband +

    - by Athira R
    I tried connceting reliance broadband in ubuntu. then an autorun prompt will come. when i click install another pop up coming saying autorun file not found. And when i checked in Internet connection to add connection. Reliance broadband option iteself is not there as connected device. This is Athira. I could not find any add comment option on my main question. So i created a new account and adding as new answer to ur question. athira@athira-laptop:~$ sudo lsusb Bus 007 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 006 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 005 Device 004: ID 12d1:1505 Huawei Technologies Co., Ltd. Bus 005 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 004 Device 002: ID 08ff:1600 AuthenTec, Inc. AES1600 Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 003 Device 002: ID 0421:0508 Nokia Mobile Phones E65 (PC Suite mode) Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 002 Device 002: ID 064e:a103 Suyin Corp. Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub athira@athira-laptop:~$ i got this after running it in ubuntu 10.04

    Read the article

< Previous Page | 114 115 116 117 118 119 120 121 122 123 124 125  | Next Page >