Search Results

Search found 47679 results on 1908 pages for 'web admin'.

Page 1222/1908 | < Previous Page | 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229  | Next Page >

  • Separating portion of website to its own server

    - by Brett
    So my job is to take the homepage (or maybe I should say "homesite" because it encompasses a few interrelated pages) and drag this onto its own Apache server. The problem I'm having right now is being able to weed out jumbled/bundled files (such as folders of js, css, and other files that i cant even identify) and knowing what is necessary to keep the homesite running. I'm new to this stuff (I'm an intern) so feel free to ask questions if I'm leaving vital information out. What I'm asking of you guys here is basically any pointers or tips you may be able to give me in order to get the job done. I could use some advice from people with a little more experience in web development. btw: This question may appear as though I have not completed any prior research and that is, for the most part, true. But the problem is I really am not sure how to research this. If you guys could throw me some keywords to play with that would really be helpful. Thanks!

    Read the article

  • Working on the search

    The one thing I've always like working on and about this site, is the full text search engine and spider. Bascially it goes out and spiders all the major development blogs on the web, and then indexes them. The engine uses Lucene for it's index. Lucene is another open source project and it works really fast. Currently the directory is indexed, and the rss feeds are underway. We're talking about a lot of content, but once it's done you'll be able to pull podcasts, and videos as they get posted to...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Selenium-Nunit Program Structure

    - by Jacobm001
    My office has a suite of web reporting engines written in VB. All in all there's about 300 reports with varying displays depending on the data being input into them. I'm trying to establish an efficient way to deal with such a major diversity, but am struggling with creating a system that won't be a nightmare to code/maintain. What I've considered doing is: On program launch, read the steps required for each test page. This may have multiple tests for the same page with varying inputs. Write each iteration of the test in XML file under $env:temp/testname Use the TestCaseSource attribute of Nunit to funnel every related xml file as a source. My major stumbling block has been how to get that data to the Nunit framework. Is Nunit really appropriate for what I'm trying to do, or is it too static?

    Read the article

  • The White Screen of Death

    - by TATWORTH
    A few days ago I was browsing a particular commerical web site, the site crashed and I encountered the "White Screen of Death". The detailed dump showed me what the site was using:zendMySqlPHPMageMagentoBesides all this detailed information of use to a hacker, the copyright on Magento cited a date of 2009.  Does this means that out of date software was in use?There is a more basic point - in your site please ensure that fatal errors are trapped and redirected to a page that gives away no information useful to a hacker. I suggest also that you provide a means for an administrator to simulate an error to check the error handling.

    Read the article

  • Static IP breaks Network connection

    - by Pasquale Tedesco
    I am somewhat new to Linux. I am setting up a Web server and installed Ubuntu server 14.04 on an vSphere ESXi 5.5 host. I am connecting perfectly fine to the internet when using DHCP but when I apply my Static settings I loose the ability to connect to websites. Whats weird is I can Ping google.com but if I try wget gooogl.com it hangs at connecting to google.com (google.com):173.194.43.32:80 and I get "failed: connection refused" But if I am set to DHCP the connection resolves perfectly. Thanks # This file describes the network interfaces available on your system # and how to activate them. For more information, see interfaces(5). # The loopback network interface auto lo iface lo inet loopback # The primary network interface auto eth0 #iface eth0 inet dhcp iface eth0 inet static address 10.1.2.25 gateway 10.1.2.2 netmask 255.255.255.0 search tsig.com dns-nameservers 10.1.2.13 10.1.2.30

    Read the article

  • Passing variable from SharePoint to external website

    - by TechDaddyK
    My company has a SharePoint site that is administered by the IT department (versus the Web Developer... go figure!). We have partnered with a vendor that has built a site for our staff to order customized stationery, etc. I need to create a link on the SharePoint site that will take the user to the external site but identify them individually. The vendor is suggesting this format: https://www.VENDORSITE.com/UI/Profile.hcf?id=a02b8106-4115-47cd-bca7-ce4dd447ef89&username=<user name>&password=<password>&name1=<first name>&name2=<last name>&email=<email> Here's the problem: I don't know how to pass that info, or even a single variable, from the SharePoint site to the external site. I would appreciate ANY suggestions.

    Read the article

  • How to Create a Skin Object from an OWS Configuration - 2 Videos

    In this video tutorial we walk you through how to create and place Open Web Studio skin objects directly into your DotNetNuke skin.We cover how to create an OWS menu and feedback form and how to convert those modules into DNN Skin Objects.The videos contain:Video 1 - Building the New OWS Configuration and Creating the Menu SystemVideo 2 - Placing the OWS Skin Object within the Skin File and Creating a Feedback Skin ObjectHow to Create a Skin Object from an OWS Configuration - 2 Videos Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Redesigning foreign website for my portfolio and offer it?

    - by BeatMe
    I've had an interest in web design for a long time and am constantly trying to learn something new. I do not have any references in my portfolio, but would like to start freelancing. Is it bad practice to redesign a website from a local company and use it for my portfolio? Do I infringe any copyright? What if I offer the redesign to the company? Has someone done this before? If so, share your experiences.

    Read the article

  • The Best Websites for Listening to Podcasts and Learning How to Create Your Own

    - by Lori Kaufman
    Podcasts, or webcasts, are shows about many different topics that are broadcast over the web and broken up into parts, or episodes.  You subscribe to podcasts and new episodes are automatically delivered to you as they are released. We’ve collected the best websites for finding many different types of webcasts and for finding resources to help you in creating and producing your own podcasts. In the coming weeks, we will be publishing other articles about the best websites for educating and entertaining yourself online, such as sites for eBooks, audiobooks, movies and TV shows, documentaries, user-made videos, free online courses, news and information, and music (downloads, streaming, and radio). How to Make Your Laptop Choose a Wired Connection Instead of Wireless HTG Explains: What Is Two-Factor Authentication and Should I Be Using It? HTG Explains: What Is Windows RT and What Does It Mean To Me?

    Read the article

  • Reasons to use C++ ?

    - by RodH257
    I've read here and in other places that learning C++, C or other low level languages are a must to get a more low level perspective on development. I agree with this, but I find it hard to find a reason to use C++ over C# or similar languages. Most of the work I do is web based, so there's no need for C++ there. Other work is windows based, and most things work fine in C# there, so what sort of situation could I use C++? I don't do any high performance stuff, nor do I create games, mostly business applications. I'm looking for an excuse to expand on my C++ knowledge but I need some motivation other than 'because the internet said I should'.

    Read the article

  • SSH not working from outside network

    - by alexander7567
    Ok.. First off my ISP does not block ports. I run web server just fine from another machine. I have port forwarded port 22. I can access within network but not out of.. I.E. my android. I get "The Operation Timed Out" on ConnectBot. Oh and I have allowed 22 on UFW. To answer what exactly happened was my ISP blocks port 22, even though a while back they told me they do not block any ports.. I changed it to port 27 and it worked without a problem.

    Read the article

  • New Blog Location

    - by Kelly Cassidy
    It's been almost 4 years since I last logged into this site, but when I search my name I still rank high for people searching for me! I didn't realize I was so popular!Well, I've obviously since abandonded this blog and don't really want to maintain a blog in 2 locations now that I am getting back into it. (At least, not at this time - if I can figure out how to cross-post things may change...) I can instead be found at http://mindfulsanity.com where I have posted more frequently in the last few months on a few things web and other experiences and will continue to do so. I hope to do 2 posts per week, time permitting, and topic permitting. Enjoy!

    Read the article

  • Coding an IQ Test with Conditionally Driven Event Handlers in ASP.NET 3.5

    This is the second part of a tutorial series on developing conditionally-driven event handlers in ASP.NET 3.5. In part one you started learning how to build an online IQ test with ASP.NET 3.5 the creation of web forms and setting of objectives were discussed. In this second part we ll really sink our teeth into using conditionally-driven event handlers to make the test work.... Business Productivity Online Suite From $10 per user per month. Includes a 12-month subscription. Min 5 seats.

    Read the article

  • I'm a premature optimizer

    - by Matthew Day
    I work in a small sized software/web development company. I have gotten into the habit of optimizing prematurely, I know it is evil and promotes bad code... But I have been working at this firm for a long while and I have deemed this as a necessary evil. It has never caused me an issue so far in the past, but it might if I get partners or a successor. The point of this long-winded speech is that, should I change my evil practices to 'save face' and to help out in the future?

    Read the article

  • Are there any off the shelf solutions for feature use analysis?

    - by Riviera
    I write a set of productivity tools that sells online and have tens of thousands of users. While we do get very good feedback, this tens to come from only the most vocal users, so we fear we might be missing the big picture. We would like to know if there is any off the shelf (or nearly so) solution to capture usage of different features and to report usage patterns and trends over time. Note: These tools are native apps, not web-based. I know about Google Analytics and the like. They're great, but I'm looking for native code solutions.

    Read the article

  • How would I know if my OS is compromised?

    - by itsols
    I had opened a php folder from a friend's web host. I run it on mine to fix some bugs. Then I tried attaching the code to be emailed and GMAIL stated that the attachment was infected by a virus. Now I'm afraid if my Apache or OS (12.04) is infected. I checked the php files and found a base64 encoded set of code being 'eval'd at the top of each and every php file. Just reversing it (echo with htmlspecialchars) showed some clue that there were sockets in use and something to do with permissions. And also there were two websites referred having .ru extensions. Now I'm afraid if my Ubuntu system is affected or compromised. Any advice please! Here's my second run of rkhunter with the options: sudo rkhunter --check --rwo Warning: The command '/usr/bin/unhide.rb' has been replaced by a script: /usr/bin/unhide.rb: Ruby script, ASCII text Warning: Hidden directory found: /dev/.udev Warning: Hidden file found: /dev/.initramfs: symbolic link to `/run/initramfs'

    Read the article

  • Broadcasting webinars to and from Ubuntu

    - by Chris Wilson
    I've recently attended an online workshop using Citrix GoToWebinar, a service that allows someone to broadcast their desktop and audio out to all members connected to the presentation as well as receive audio and screencasts from those attendees , and the experience was unbelievable, and I was wondering if there was any such service/software available on Ubuntu. Points to consider include, but are not limited to: Web services or local applications. Free (as in beer) or paid. Free (as in speech) or proprietary. Ease of use Ease of setup Any other point that anyone can thing of

    Read the article

  • Print Problem: Page Squeezed in Half

    - by iam
    I've just managed to successfully set up my printer (Canon MX320) using the Printing app on Ubuntu 12.04. However the only 1 remaining problem is that each time I tried to print it will only print the file on the top half of the page only: meaning that for some reason, the printer "squeezes" the whole content of each page in the file to fit into the top half of the page only (so the proportion in the print-out is not correct vertically). This happens with every type of file I tried to print (Documents, Images, Web pages). I checked the Printing's setting & properties and couldn't find anything related to this issue yet and I've already made sure to set all the information correct (paper size, source etc.). The Print Preview always display correctly on the screen, but it's only the actual print-out that shows this problem. I also tried with several different types of papers (A4, photos etc.) but the result is always the same: the printer keeps putting the content in the top half of the paper only.

    Read the article

  • Référencement : Google déploie un nouvel algorithme qui pénalise les sites utilisant des noms de domaine avec des mots clés

    Référencement : Google déploie un nouvel algorithme qui pénalise les sites utilisant des noms de domaine avec des mots clés Via un message sur son compte Twitter, le spécialiste de l'équipe anti WebSpam de Google, Matt Cutts, a annoncé le déploiement d'un nouvel algorithme sur le moteur Google. Ce nouvel algorithme vise à affiner les résultats de recherche du moteur Google en pénalisant les sites ayant un contenu de faible qualité malgré que le nom de domaine du site corresponde aux termes de la recherche. En effet, la firme a constaté que des sites Web ont recourt à des noms de domaines qualifiés de « exact-match domain » qui reprennent des termes de recherche susceptibles...

    Read the article

  • Windows 8 : fuite d'une nouvelle capture d'écran, concernant le panneau de contrôle des langues

    Windows 8 : fuite d'une nouvelle capture d'écran, concernant le panneau de contrôle des langues Une nouvelle fuite concernant Windows 8 a fait son apparition, et a généré la propagation d'un screenshot sur le Web. Sa provenance n'est pas claire, mais il semble authentique. Il montre le "langage explorer" du futur OS de Microsoft, qui est logiquement une nouvelle page du panneau de contrôle des langues. Ces dernières sont classée par ordre alphabétique (réglage par défaut), mais peuvent aussi être ordonnées par région ou type de caractères (latins, etc.) grâce à un menu déroulant. Rien ne permet toutefois de dire que ce design sera celui du Windows Explorer que l'on trouvera ef...

    Read the article

  • Deferent ways of solving problems in code.

    - by Erin
    I now program in C# for a living but before that I programmed in python for 5 years. I have found that I write C# very that most examples I see on the web. Rather then writing things like: foreach (string bar in foo) { //bar has something doen to it here } I write code that looks like this. foo.ForEach( c => c.someActionhere() ) Or var result = foo.Select( c => { //Some code here to transform the item. }).ToList(); I think my using code like above came form my love of map and reduce in python while not exactly the same thing the concepts are close. Now it's time for my question. What concepts do you take and move with you from language to language. That allow you to solve a problem in a way that is not the normal accepted solution in that language?

    Read the article

  • Google propose une version professionnelle de son App Engine et des services en Cloud privé grâce à

    Google propose une version professionnelle de son App Engine Et ses services en Cloud privé grâce à une collaboration avec VMWare D'une pierre deux coups ? comme on dit. Lors du Google I/O, VMWare et Google ont annoncé un partenariat qui risque de faire du bruit dans le monde du développement web. Pour tout dire, il en fait déjà beaucoup. Cette collaboration va en effet permettre à Google d'étoffer encore un peu plus son offre de services Cloud spécialement dédiée aux développeurs d'entreprise. Jusqu'ici Moutain View proposait ses produits en mode « Cloud public », autrement dit hébergés sur ses propres serveurs. Mais de nombreus...

    Read the article

  • Access Control Lists for Roles

    - by Kyle Hatlestad
    Back in an earlier post, I wrote about how to enable entity security (access control lists, aka ACLs) for UCM 11g PS3.  Well, there was actually an additional security option that was included in that release but not fully supported yet (only for Fusion Applications).  It's the ability to define Roles as ACLs to entities (documents and folders).  But now in PS5, this security option is now fully supported.   The benefit of defining Roles for ACLs is that those user roles come from the enterprise security directory (e.g. OID, Active Directory, etc) and thus the WebCenter Content administrator does not need to define them like they do with ACL Groups (Aliases).  So it's a bit of best of both worlds.  Users are managed through the LDAP repository and are automatically granted/denied access through their group membership which are mapped to Roles in WCC.  A different way to think about it is being able to add multiple Accounts to content items...which I often get asked about.  Because LDAP groups can map to Accounts, there has always been this association between the LDAP groups and access to the entity in WCC.  But that mapping had to define the specific level of access (RWDA) and you could only apply one Account per content item or folder.  With Roles for ACLs, it basically takes away both of those restrictions by allowing users to define more then one Role and define the level of access on-the-fly. To turn on ACLs for Roles, there is a component to enable.  On the Component Manager page, click the 'advanced component manager' link in the description paragraph at the top.   In the list of Disabled Components, enable the RoleEntityACL component. Then restart.  This is assuming the other configuration settings have been made for the other ACLs in the earlier post.   Once enabled, a new metadata field called xClbraRoleList will be created.  If you are using OracleTextSearch as the search indexer, be sure to run a Fast Rebuild on the collection. For Users and Groups, these values are automatically picked up from the corresponding database tables.  In the case of Roles, there is an explicitly defined list of choices that are made available.  These values must match the roles that are coming from the enterprise security repository. To add these values, go to Administration -> Admin Applets -> Configuration Manager.  On the Views tab, edit the values for the ExternalRolesView.  By default, 'guest' and 'authenticated' are added.  Once added, you can assign the roles to your content or folder. If you are a user that can both access the Security Group for that item and you belong to that particular Role, you now have access to that item.  If you don't belong to that Role, you won't! [Extra] Because the selection mechanism for the list is using a type-ahead field, users may not even know the possible choices to start typing to.  To help them, one thing you can add to the form is a placeholder field which offers the entire list of roles as an option list they can scroll through (assuming its a manageable size)  and view to know what to type to.  By being a placeholder field, it won't need to be added to the custom metadata database table or search engine.  

    Read the article

  • Google60 Emulates Search Engine Querying with 1960s Technology

    - by Jason Fitzpatrick
    Google60 is a novel little project that mimics the interface of a 1960s-era computer and mashes it up with modern Google search queries. Take it for a spin; you’ll never appreciate the speed of even the slowest modern browser more. While playing with the actual project is enjoyable, make sure to check out the project notes below the interface for an interesting look at design choices and emulating an old machine. Google60 [via Unpluggd] Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • Is an 'if password == XXXXXXX' enough for minimum security?

    - by Prof Plum
    If I create a login for an app that has middle to low security risk (in other words, its not a banking app or anything), is it acceptable for me to verify a password entered by the user by just saying something like: if(enteredPassword == verifiedPassword) SendToRestrictedArea(); else DisplayPasswordUnknownMessage(); It seems to easy to be effective, but I certainly would not mind if that was all that was required. Is a simple check on username/password combo enough? Update: The particular project happens to be a web service, the verification is entirely server side, and it is not open-source. Does the domain change how you would deal with this?

    Read the article

< Previous Page | 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229  | Next Page >