Search Results

Search found 15339 results on 614 pages for 'on a serious note'.

Page 120/614 | < Previous Page | 116 117 118 119 120 121 122 123 124 125 126 127  | Next Page >

  • Windows 7 Start Menu: Height does not adapt

    - by bioslime
    Since a couple of days my start menu has a big blank space and just does not collapse. I played around with Store and display recently opened programs in the Start menu as well as Number of recent programs to display as is depicted at sevenforums.com. Note that doing so clears your list of recently opened programs. Anyway, my start menu still looks like: At least the space marked with a red rectangle should collapse.

    Read the article

  • Is it possible to use a PC as a external drive via USB?

    - by homemdelata
    I have a bluray player that has a USB interface that allows me to plug external hard drives and pendrives for me to play movies or music files. I was wondering if it's possible to have the PC or notebook or any other computer-like device using a USB-USB cable and make the bluray player detects this as an external drive. Note: I'm using a bluray player as example but it can be the same for DVD players, TV or sound sytems.

    Read the article

  • Enterprise Wireless Authentication without Active Directory

    - by ank
    We are in the process of redoing our wireless access network and would like to know if there is any method to get Windows clients/users access to the network using 802.1x WITHOUT having an Active Directory server for authentication and WITHOUT installing additional software on each and every client. Note that we already use Radius servers, LDAP servers (all on CentOS). Users employ a variety of clients including Windows, Mac, Linux, Android, iOS.

    Read the article

  • IIS6 Log time recording problems

    - by Hafthor
    On three separate occasions on two separate servers at nearly the same times, 6.9 hours seemingly went by without any data being written to the IIS logs, but, on closer inspection, it appears that it was all recorded all at once. Here's the facts as I know them: Windows Server 2003 R2 w/ IIS6 Logging using GMT, server local time GMT-7. Application was still operating and I have SQL data to prove that Time gaps appear in log file, not across two # headers appear at gap Load balancer pings every 30 seconds No caching Here's info on a particular case: an entry appears for 2009-09-21 18:09:27 then #headers the next entry is for 2009-09-22 01:21:54, and so are the next 1600 entries in this log file and 370 in the next log file. about half of the ~2000 entries on 2009-09-22 01:21:54 are load balancer pings (est. at 2/min for 6.9hrs = 828 pings) then entries are recorded as normal. I believe that these events may coincide with me deploying an ASP.NET application update into those machines. Here's some relevant content from the logs in question: ex090921.log line 3684 2009-09-21 17:54:40 GET /ping.aspx - 80 404 0 0 3733 122 0 2009-09-21 17:55:11 GET /ping.aspx - 80 404 0 0 3733 122 0 2009-09-21 17:55:42 GET /ping.aspx - 80 404 0 0 3733 122 0 2009-09-21 17:56:13 GET /ping.aspx - 80 404 0 0 3733 122 0 2009-09-21 17:56:45 GET /ping.aspx - 80 404 0 0 3733 122 0 #Software: Microsoft Internet Information Services 6.0 #Version: 1.0 #Date: 2009-09-21 18:04:37 #Fields: date time cs-method cs-uri-stem cs-uri-query s-port sc-status sc-substatus sc-win32-status sc-bytes cs-bytes time-taken 2009-09-22 01:04:06 GET /ping.aspx - 80 404 0 0 3733 122 3078 2009-09-22 01:04:06 GET /ping.aspx - 80 404 0 0 3733 122 109 2009-09-22 01:04:06 GET /ping.aspx - 80 200 0 0 278 122 3828 2009-09-22 01:04:06 GET /ping.aspx - 80 200 0 0 278 122 0 2009-09-22 01:04:06 GET /ping.aspx - 80 200 0 0 278 122 0 ... continues until line 5449 2009-09-22 01:04:06 GET /ping.aspx - 80 200 0 0 277 122 0 <eof> ex090922.log #Software: Microsoft Internet Information Services 6.0 #Version: 1.0 #Date: 2009-09-22 00:00:16 #Fields: date time cs-method cs-uri-stem cs-uri-query s-port sc-status sc-substatus sc-win32-status sc-bytes cs-bytes time-taken 2009-09-22 01:04:06 GET /ping.aspx - 80 200 0 0 277 122 0 2009-09-22 01:04:06 GET /ping.aspx - 80 200 0 0 277 122 0 ... continues until line 367 2009-09-22 01:04:06 GET /ping.aspx - 80 200 0 0 277 122 0 2009-09-22 01:04:30 GET /ping.aspx - 80 200 0 0 277 122 0 ... back to normal behavior Note the seemingly correct date/time written to the #header of the new log file. Also note that /ping.aspx returned 404 then switched to 200 just as the problem started. I rename the "I'm alive page" so the load balancer stops sending requests to the server while I'm working on it. What you see here is me renaming it back so the load balancer will use the server. So, this problem definitely coincides with me re-enabling the server. Any ideas?

    Read the article

  • Create an image of a CentOS system

    - by Grant unwin
    I provide a server (and site) to a client via Rackspace Cloud Hosting, and my client wants to now host the entire thing within his own account. Since it's not possible to just transfer the ownership, I need to somehow create an image of the machine via SSH which I can then use on a new server. Is this possible, and does anyone know of a way of doing this. Note I am talking about virtualised machines here, but I only have access to the virtualised partition and not the system as a whole.

    Read the article

  • creating new application in IIS 7 can cause other applications running on same IIS to log out?

    - by mokokamello
    Hi Experts I am new to IIS 7 and i am running a 16 user Application Server i received complains from my colleagues that their application log out suddenly and not saving edits. i compared the time of complains and they match the time when i was trying to install a new asp.net application or modify an existing one (of course not the very one they complained from) does this make sense? i mean are these events (application crash and installing new application on IIS) related together. note that i did not restart IIS

    Read the article

  • [Notepad++] delete rest of line after specific string

    - by nixdagibts
    I'm looking for a way to search for a specific string e.g. '=UUID:' and delete it and all following characters per line. I would prefer a way/macro/addon for notepad++. But all other tools or scripts are welcome :) Before ://81.88.22.6/=UUID:63969B2469B7A94EBBDBD7CB5B9C00BA ://-ad.cgi*=UUID:3C8EFF48B674CC42BF5B6E2B7BA820E7 ://-ads/*=UUID:0D6CF7D5BE3F034C8A136CC99A074406 Note that the numbers are always different per line so you couldn't do a search 'n replace with them. Should look like this after ://81.88.22.6/ ://-ad.cgi* ://-ads/*

    Read the article

  • Cross platform, gmail compatible email client for Emacs

    - by Zubair
    I spend alot of my time in Emacs, and move between Windows, Linux, and Mac OS at least once a day since these are the machines my company has available to use. I spend alot of time in gmail using gmail folders too, and would like to find a cross platform email client for emacs which can support gmail too. Note: I would like to find a client which is "stable", and has good support and documentation.

    Read the article

  • What is the fastest way to type an en dash in Windows 7?

    - by Geoff Olynyk
    Simple question: What's the quickest way to get an en dash (–, Unicode U+2013 EN DASH) in Windows? Note that this question is for all programs, not just Microsoft Word. Even better if it can be copied to the clipboard as a pure Unicode character, with no formatting information (typeface, etc.) so that when I paste it into Word or Excel or other rich text editors, it doesn't carry its format with it.

    Read the article

  • Partial Client Certificate request for Apache HTTP

    - by Joshua
    I have an Apache HTTP Server with SSL enabled and requesting a Client Certificate. How do I set up Apache to only request the certificate when a user hits a certain part of the website? Example: /myapp/ should not request the cert /myapp2/ should request the cert Note: These applications are being served using the mod-jk

    Read the article

  • How to set Standby server

    - by lasko
    I have an application that connects to SQL Server 2008. What I want is to make a standby server (this standby server should be a mirror of the primary one). So that when the connection fails, the primary server should automatically switch to standby server without modifying my application. If there is way, please tell me in detail or even if there is third party product. Note that I need to set the connection in my application to one server only.

    Read the article

  • URL Based Internal Redirecting

    - by bculverscate
    Basically, we have one external IP address, several servers internally and want to redirect to each internal server based on request URL. We do not want to install another piece of hardware to do this for us but we have a firewall running Linux that currently forwards to only one of the internal servers. Example of our setup can be seen here: http://img23.imageshack.us/img23/5469/drawing1br.jpg NOTE: domain.com does not point to this box nor would we like it to. Subdomains are pointed manually to our global IP address.

    Read the article

  • Setting udev rules in Linux Mint 13

    - by user1233963
    What I'm trying to do is set up a udev rule for my HP headphones (usb) with the aid of several tutorials out there. Created a file ( 90-local.rules ) in /etc/udev/rules.d and added the following: ACTION="add",SUBSYSTEM="usb", ATTR{vendor}=="Hewlett-Packard", RUN+="sh /home/alex/Scripts/usb.sh" The problem is nothing happens when I connect the headphones! What am I doing wrong? note: I did restart udev and the script works also, so it's not that

    Read the article

  • Why doesn't the Windows command prompt window maximize to the full screen size?

    - by Antoni
    Anyone know why doesn't the Windows command prompt window maximize to the full screen size? To the best of my knowledge, even in the new Windows 7 the command prompt window(cmd.exe) doesn't maximize to the full screen size like all other windows. This behavior is quite annoying for me, and I'm sure to many others as well. Note: The size of the command prompt window can be changed, but the size remains fixed regardless of the screen size.

    Read the article

  • Windows 8 on HP Laptop crashes when waking up from sleep

    - by Chris
    I always put it to sleep at night, but when I try and turn it on I hit the keyboard to activate it and a Windows screen pops up saying and error has occured. It collects data then reboots and offers to send an error report. Note this only appears to happen when I'm at home and it's hooked up to 2 monitors and 3-4 USB devices. When it's not connected to everything it looks like sleep actually works. HP DV7 XG300AV

    Read the article

  • Connect Linux machine to a windows active directory

    - by ssl
    Hi, I have a Linux machine which connected to an Active Directory on Windows server. I configured the NIC to get an IP from the DHCP (from the windows server) however, when I try to get nslookup on the Linux side it doesn't work (connection timeout), but on the same machine when I load windows and do nslookup it works. what can be wrong with my Linux configuration or Windows DNS configuration? note: I've configured my DNS to nonsecure and secure connections. 10x!

    Read the article

  • Getting a list of packages installed on CentOS (by command line and on the web)

    - by sameold
    When installing CentOS (6.2), it installs a whole bunch of packages, but the installation is often very fast, it's hard to note the names of the packages. I have a couple of questions: 1) I'm guessing I could wait for the entire installation to complete and then query for the list of installed packages on the system. How do I do that? 2) Is there a printed list somewhere on the web, so I don't have to install the OS first just to get the list?

    Read the article

  • Desktop icons change size and are aligned to the left after restart

    - by jQuerybeast
    I am trying to keep the icons size and position to the place where I've shutdown my computer. That is: Keep desktop icons to the right and at a small size. When I restart my computer, the get a medium size and are all aligned to the left. Note: Align icons on grid UNCHECKED Auto arrange icons UNCHECKED When I create a new account I dont have this problem Cleared registry with CCleaner Uninstalled all Intel Graphics Accelerator Windows updated I use only 1 monitor

    Read the article

  • Can i control my Desktop machine from Laptop if both use same internet connection

    - by ram
    Below are the resources i have: 1) Desktop(No Wireless card) 2) Internet Connection with wireless router 3) Laptop with wireless card My Question: If i choose to connect desktop to Internet via wired connection and laptop via wireless connection, Can i control my desktop from laptop.. Purpose: I want to use my desktop for downloading movies and i want to control this from laptop.. NOTE: I have only one Internet connection..

    Read the article

  • How do I program the Sparkfun Arduino Pro Micro with Linux?

    - by zeldarulez
    Sparkfun's Arduino Pro Micro was the ideal choice for me (in size and price), but I cannot figure out how to program it on anything other than Windows. Sparkfun doesn't provide any resources on how to program the Arduino Pro Micro on Linux, and there aren't any direct resources on the Internet for installing drivers/ programming it. Hoow do I program the Arduino Pro Micro with Linux? Thanks! Note: My OS is Ubuntu

    Read the article

  • Is the guideline: don't open email attachments or execute downloads or run plug-ins (Flash, Java) from untrusted sites enough to avert infection?

    - by therobyouknow
    I'd like to know if the following is enough to avert malware as I feel that the press and other advisory resources aren't always precisely clear on all the methods as to how PCs get infected. To my mind, the key step to getting infected is a conscious choice by the user to run an executable attachment from an email or download, but also viewing content that requires a plug-in (Flash, Java or something else). This conscious step breaks down into the following possibilities: don't open email attachments: certainly agree with this. But lets try to be clear: email comes in 2 parts -the text and the attachment. Just reading the email should not be risky, right? But opening (i.e. running) email attachments IS risky (malware can be present in the attachment) don't execute downloads (e.g. from sites linked from in suspect emails or otherwise): again certainly agree with this (malware can be present in the executable). Usually the user has to voluntary click to download, or at least click to run the executable. Question: has there ever been a case where a user has visited a site and a download has completed on its own and run on its own? don't run content requiring plug-ins: certainly agree: malware can be present in the executable. I vaguely recall cases with Flash but know of the Java-based vulnerabilities much better. Now, is the above enough? Note that I'm much more cautious than this. What I'm concerned about is that the media is not always very clear about how the malware infection occurs. They talk of "booby-trapped sites", "browser attacks" - HOW exactly? I'd presume the other threat would be malevolent use of Javascript to make an executable run on the user's machine. Would I be right and are there details I can read up on about this. Generally I like Javascript as a developer, please note. An accepted answer would fill in any holes I've missed here so we have a complete general view of what the threats are (even though the actual specific details of new threats vary, but the general vectors are known).

    Read the article

  • Do 7.2k SATA drives and a hardware raid controller always end with trouble?

    - by xelco52
    I'm reading the FreeNAS userguide and came across the statement: Note that hardware RAID configured as JBOD may still detach disks that do not respond in time; and as such may require TLER/CCTL/ERC-enabled disks to prevent drive dropouts. I'm using a '3Ware 9550SX-8LP RAID Controller' and see quite a few stories of people successfully running raid5 on 7.2k consumer SATA drives without issue. Are detached disks only a theoretical problem, or should I expect this to be a common occurrence?

    Read the article

< Previous Page | 116 117 118 119 120 121 122 123 124 125 126 127  | Next Page >