Search Results

Search found 9889 results on 396 pages for 'behind the compiler'.

Page 121/396 | < Previous Page | 117 118 119 120 121 122 123 124 125 126 127 128  | Next Page >

  • IIS server unable to access the file path

    - by anil namde
    I have installed web application behind IIS which access the files/directory located on the another machine. Now while developing the application using the Visual Studio 2008 then Developer Web Server it provides when build the site was able to access the location. However when the site is deployed on the IIS its saying Unable to access the file because of insufficient permissions. Can some one please help regarding what could be the issue ? any idea or pointers could be helpful. Thanks,

    Read the article

  • IIS server unable to access the file path

    - by anil namde
    I have installed web application behind IIS which access the files/directory located on the another machine. Now while developing the application using the Visual Studio 2008 then Developer Web Server it provides when build the site was able to access the location. However when the site is deployed on the IIS its saying Unable to access the file because of insufficient permissions. Can some one please help regarding what could be the issue ? any idea or pointers could be helpful. Thanks,

    Read the article

  • Need to open port in a router for two internal PC's

    - by Sergio
    I have two PC's behind a comon internet router and one service running in another network that needs to connect with both PC's through internet using a specific port. To avoid dynamic IP issues I have configured NO-IP accounts in both computers and opened the port in their respective Windows Firewalls. My problem is that when I open the port in the router it only allows me to assign it to one of the computers, but not to both of them. Is there any solution to this?

    Read the article

  • Extend volume where unallocated space lies ahead of it

    - by T3rm1
    I want to extend my volume. However the unallocated space lies ahead of the volume. Is it possible to extend this volume without converting it to a dynamic volume? I can't include images yet, so here you go: http://www.abload.de/img/unbenannttboxq.png I tried to use diskpart with the extend command but it doesn't work. Makes sense because the instructions says that the unallocated space has to be behind the volume.

    Read the article

  • Force applications to open in the foreground when launched from iexplore

    - by Earls
    I have a slight problem with my project I've working on... I have replaced explorer with iexplore in kiosk mode. iexplore loads a speeddial type of webpage for a set of windows programs. I launch those programs with PHP's system(). The problem is, when the programs launch, they launch BEHIND iexplore instead of in front of it. How can I force the programs being launched to ALWAYS load in the foreground?

    Read the article

  • Windows Mobile 7 corporate device...

    - by Toymaker
    Does anyone know of a Windows Mobile 7 device aimed at business use? I’m looking for something with bar code scanning capability. Psion, hand held, and honeywell only offer 6.5 at the moment. Granted, Windows Mobile 7 just barely came out and these sorts of devices usually lag a bit behind consumer toys...but hopefully someone can help.

    Read the article

  • Indexing Service filter daemon keeps crashing on Windows XP; something worse underneath?

    - by IVR Avenger
    The Indexing Service filter daemon keeps crashing on my Windows XP Pro machine, with the following error message: Indexing Service filter daemon has encountered a problem and needs to close. We are sorry for the inconvenience. Not a big deal, I can click "Don't Send Error Report" all day. But what's going on, here? Is this a service that I need? Is the frequent crashing indicative of something worse that's happening behind the scenes?

    Read the article

  • What are the advantages of the Windows registry?

    - by jay
    The Windows Registry is one of the biggest targets for criticism from practically everywhere. It's not too hard to find disadvantages for it's use, but MS has still kept it since Windows 95. What is the philosophy behind having a centralised database for all settings instead of lots of readable INI files? What actual advantages does the registry have over folders and sub-folders of settings files?

    Read the article

  • Checkpoint - Routing into the tunnel

    - by Fake4d
    I have a simple question for my checkpoint infrastructure. Do i have to route a net which i wanna access over a configured firewall VPN Tunnel. Explanation: I have two firewalls connected over a VPN which have several nets behind them. I need to access a new net at the other firewall and put them in their encryption Domain. Now here is the question: Do i have to route it in the operating system (SecurePlat)? Thanks!

    Read the article

  • nagios levels of escalation

    - by com
    I try to configure nagios in the following way for every service (for example "mysql seconds behind master") I need to define few levels of escalations, when level is warning I want to send only email and when level is critical I want to send email and sms . What is the right way to do this? Do be stick we the levels definition (critical or warning), if there is different way to differentiate email level and sms level of escalation? Thanks!

    Read the article

  • How to best configure IIS7 logging to capture "HTTP_X_FORWARDED_FOR" header

    - by zeroasterisk
    We have IIS7 servers sitting behind an nginx reverse proxy. The reverse proxy is sending the standard "HTTP_X_FORWARDED_FOR" header with the visitor IP address, but IIS7 logging is only logging the IP address of the nginx server (which makes sense, but it's not what I want). How can I tell IIS7 to instead log the "HTTP_X_FORWARDED_FOR" header (or additionally log it)? (note: I'm a linux admin, not a windows one, so explicit instructions & links are sincerely appreciated)

    Read the article

  • Cisco 1841 and routing /29 address

    - by Jonathan
    Could someone please explain in general terms how I'd configure a Cisco 1841 (2x ethernet ports) to route a public /29 address block (6 hosts) to my internal network. I wish to give the Cisco router one public IP and then several of my internal Windows servers will receive the other public IP addresses. Other hosts behind the router will access Internet via NAT. I'm a bit confused as I've only ever setup routers/firewalls that had a single public IP address with NAT and port forwarding to internal servers.

    Read the article

  • How to declutter and organize the cables on and under my desk? [closed]

    - by splattne
    Computer cables and external devices are a continuous source of frustration for everybody who likes a clean working environment. The more devices you add to your home office, the more disastrous the situation under the table becomes: cords falling behind the desk, ugly cables running along the sides and under of the desk, making it almost impossible to clean and remove the dust. This is not my office, but I've seen similar "setups:" I'm looking for good tips/products which help me in keeping the all cables somehow under control and organized.

    Read the article

  • Access Derby for CDP Server

    - by Skudd
    I am working on a project that requires accessing the Derby database behind a CDP Backup Server. From what limited research I've been able to complete, I have found that it is possible to access Derby databases over TCP, but I'm at a complete loss for this. I'm looking to connect via PHP eventually, but first I need to know if this is at all possible with an out-of-the-box CDP server. Answers are, as always, appreciated. Thanks!

    Read the article

  • Three formats? Why?

    - by Yar
    I needed to download the Ruby Source recently from here and it says, "available in three formats" which are .tar.bz2, .tar.gz and .zip. Is there any reason that we need all three formats? At least on Linux and OSX I can do any of the three easily. On Windows, only zip is built-in, I think. Is there anything behind these preferences or is this just a religious battle?

    Read the article

  • How mail tracking works?

    - by abc
    whoreadme is the web site that helps to track mail reader's location as well as it acknowledges when reader opens mail. What is the concept of detection behind this?

    Read the article

  • how can 192.168.2.10 talk to 172.18.156.65 ?

    - by steve
    from what i understand, all computers need to be in the same subnet /24 so how would i get a computer to be able to connect to another computer that is set as 172 ? one computer is behind a firewall, the other is connected to a HUGHES sat dish and has the IP of 172 would I need to setup a ROUTE in a firewall between the 2 computers, to say "if you are trying to get to 172.18.156.65 then use the ip address 192.168.2.65 and translate it to 172.18.156.65" the firewall is a netgear, if I should use a ROUTE, then I'll try to learn it from the manual thanks

    Read the article

  • how do I copy from a remote linux machine to a local linux machine?

    - by leonbnu
    I sshed to a remote machine and want to copy some files from there to my local machine. Both are running linux. My local machine is behind a firewall, so I can't do "scp file_on_remote user@localmachine". I know I can do "scp user@remotemachine:/directory/file ./", but I need to wander around on the remote server to pick some files to download to local machine, so this way doesn't seem too appealing to me.

    Read the article

  • safely remove webserver from nginx backent pool?

    - by Dean Hiller
    We have 4 webservers behind nginx being hit with 262 events/second. I would like to tell nginx to stop sending requests to that server. If I remove the server from the file and reload the file, aren't all requests in process dropped on the floor then as nginx no longer knows that server. What can I add to the config so it slowly drops that server out of the pool and I can wait for current requests to complete.

    Read the article

  • What windows licence can I purchase to run a web service in intranet? [closed]

    - by user63580
    Possible Duplicate: Can you help me with my software licensing question? One of my customers wants me to provide my web-app to be installed in his local area network, behind the firewall - it will not be accessible from the Internet. They require the server to be run on windows (linux is not acceptable). What windows licence shoud I purchase to run my web-based app for 400 users not violating Microsoft licencing terms?

    Read the article

  • Monitor Internet Traffic on a Computer

    - by metashockwave
    Recently my internet speed has slowed dramatically, I'm wondering if there's a certain process that's eating up all my traffic behind the scene without my notice. i'm wondering if there's a software that would show the process thats using my bandwidth (both incoming and outgoing) Thanks

    Read the article

  • "Ghost" UI elements

    - by adrianbanks
    Occasionally, I get part of an application lingering behind on my desktop: This is part of a context menu for an application. It is always top-most, meaning that it is always on the screen, and I cannot click on it (it just clicks through it). It has happened before, sometimes with whole windows. It remains on screen even if the application it originated from is no longer running. How do I get rid of it without rebooting?

    Read the article

  • SQL server in VMware

    - by UndertheFold
    Please provide your tips and best practices for virtualizing SQL Server in VMWare ESX I am interested in advanced configurations and settings. Please provide reasoning behind your recommendations Edit: Just to clarify, I already have over 70 Virtual SQL servers in separate clusters using an ISCSI equallogic San - What I am really looking for are those advanced configurations like: How you configured your disks / RDM's Do you make use of settings like Mem.ShareScanGHz - http://communities.vmware.com/thread/143828 - that are not well documented

    Read the article

  • How do you monitor and react when some scheduled job fails? - general question

    - by Dzida
    Hi, In many projects my team faced problems with 'silent fails' of some important components. There are lot of tasks executed behind the scenes and if somethings fails (either by errors in logic or hardware problems) in most cases responsible person is not notified (or not notified instantly). I know about heavy-weight monitoring tools that could solve some of that problems but there over-complicated and too expensive for our team. I am interested what are your solutions for such problems.

    Read the article

< Previous Page | 117 118 119 120 121 122 123 124 125 126 127 128  | Next Page >