Search Results

Search found 6619 results on 265 pages for 'gnome activity journal'.

Page 129/265 | < Previous Page | 125 126 127 128 129 130 131 132 133 134 135 136  | Next Page >

  • How can I debug what's slowing down new session logins?

    - by David Planella
    For a while, I've had an issue whereby it takes up to 5 minutes from the moment I enter my password in Lightdm's login screen until I can do anything with my computer. That's on Ubuntu 12.04. During that time, I see there is disk activity, but I'm not sure how to figure out what's causing it and whether that is the real cause. I've played around with Bootchart unsuccessfully. Any ideas on what the best way to debug this issue is?

    Read the article

  • Still prompted for a password after adding SSH public key to a server

    - by Nathan Arthur
    I'm attempting to setup a git repository on my Dreamhost web server by following the "Setup: For the Impatient" instructions here. I'm having difficulty setting up public key access to the server. After successfully creating my public key, I ran the following command: cat ~/.ssh/[MY KEY].pub | ssh [USER]@[MACHINE] "mkdir ~/.ssh; cat >> ~/.ssh/authorized_keys" ...replacing the appropriate placeholders with the correct values. Everything seemed to go through fine. The server asked for my password, and, as far as I can tell, executed the command. There is indeed a ~/.ssh/authorized_keys file on the server. The problem: When I try to SSH into the server, it still asks for my password. My understanding is that it shouldn't be asking for my password anymore. What am I missing? EDIT: SSH -v Log: Macbook:~ michaeleckert$ ssh -v [USER]@[SERVER URL] OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 debug1: Reading configuration data /etc/ssh_config debug1: /etc/ssh_config line 20: Applying options for * debug1: /etc/ssh_config line 53: Applying options for * debug1: Connecting to [SERVER URL] [[SERVER IP]] port 22. debug1: Connection established. debug1: identity file /Users/michaeleckert/.ssh/id_rsa type -1 debug1: identity file /Users/michaeleckert/.ssh/id_rsa-cert type -1 debug1: identity file /Users/michaeleckert/.ssh/id_dsa type -1 debug1: identity file /Users/michaeleckert/.ssh/id_dsa-cert type -1 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_6.2 debug1: Remote protocol version 2.0, remote software version OpenSSH_5.5p1 Debian-6+squeeze3 debug1: match: OpenSSH_5.5p1 Debian-6+squeeze3 pat OpenSSH_5* debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-ctr hmac-md5 none debug1: kex: client->server aes128-ctr hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: Server host key: RSA [STRING OF NUMBERS AND LETTERS SEPARATED BY SEMI-COLONS] debug1: Host ‘[SERVER URL]' is known and matches the RSA host key. debug1: Found key in /Users/michaeleckert/.ssh/known_hosts:2 debug1: ssh_rsa_verify: signature correct debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: Roaming not allowed by server debug1: SSH2_MSG_SERVICE_REQUEST sent debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey,password debug1: Next authentication method: publickey debug1: Trying private key: /Users/michaeleckert/.ssh/id_rsa debug1: Trying private key: /Users/michaeleckert/.ssh/id_dsa debug1: Next authentication method: password [USER]@[SERVER URL]'s password: debug1: Authentication succeeded (password). Authenticated to [SERVER URL] ([[SERVER IP]]:22). debug1: channel 0: new [client-session] debug1: Requesting [email protected] debug1: Entering interactive session. debug1: Sending environment. debug1: Sending env LANG = en_US.UTF-8 Welcome to [SERVER URL] Any malicious and/or unauthorized activity is strictly forbidden. All activity may be logged by DreamHost Web Hosting. Last login: Sun Nov 3 12:04:21 2013 from [MY IP] [[SERVER NAME]]$

    Read the article

  • Stairway to SQLCLR Level 3: Security (General and SAFE Assemblies)

    In the third level of our Stairway to SQLCLR, we look at the various mechanisms in place to help us control Security. In this Level we will focus on SAFE mode and see how secure SQLCLR is by default. Free eBook - Performance Tuning with DMVsThis free eBook provides you with the core techniques and scripts to monitor your query execution, index usage, session and transaction activity, disk IO, and more. Download the free eBook.

    Read the article

  • UML Receptions and AcceptEventActions

    - by Silli
    What shall be the relationship between the receptions of a class (was classifier before Aadaam correction) and the AcceptEventActions in the activity describing the behavior of its instances? I understand the former is related to signals reception of the type while the latter is related to runtime ReceiveSignalEvent events of the class instances (objects). But it is not totally clear to me how to express consistency among these constructs.

    Read the article

  • Taking requests!

    - by marc dekeyser
    Hi there!   Out there at Premier Field Engineering we have been very, very busy for the last couple of months and, as you can obviously see, this has been reflected in my activity here on the blog. Since I want to keep writing articles that keep you, as a reader,  entertained and have at least some level of value for you I am kindly requesting you to send me any subject you would love to see explained and I will address it to the best of my possibilities .   Cheers!

    Read the article

  • The Secrets of Using SEO - Friendly Directories

    In a Search Engine Optimization campaign the most time-consuming part is link-building and preparing the content containing the anchor text links to your pages. Despite the lip service given to this activity by run-of-the-mill optimizers, it makes sense that success over other sites will come with quality relevant content and a mammoth linking effort; this is necessary to reach the Top Five. The long hours and elbow grease of submitting to hundreds of differently-formatted directories pays off when you check the rankings.

    Read the article

  • Finding privacy sensitive keywords

    - by user69914
    I have a list of about 80,000 unique words or short phrases. These words and short phrases are associated with other data. I'm trying to create a blacklist so I won't use any of the data associated with privacy sensitive words or short phrases. Example sensitive words or short phrases might be associated with sexual or illicit activity. I know that privacy and sensitivity are in the eye of the beholder, but I'm looking for any established list or solutions of this nature.

    Read the article

  • Cannot boot normally, without restarting lightdm (or gdm)

    - by leventov
    I had a problem precisely described here: http://www.webupd8.org/2013/01/ubuntu-lightdm-black-screen-when-using.html, black screen with blinking cursor instead of login screen. I've switched to gdm using sudo dpkg-reconfigure gdm -- but faced the same problem, now loading process stops on "red-white Ubuntu dots" (without activity under this splash). And to login, I still need to restart display manager: Ctrl+Alt+F1 and sudo service gdm restart. How to make Ubuntu to boot normally?

    Read the article

  • Which swing testing frameworks are well suited to TDD?

    - by Niel de Wet
    I am trying to follow a BDD/TDD approach to developing an IntelliJ IDEA plugin, and in order to do a full acceptance test I want to exercise my plugin through the GUI. I know that I can do it using Window Licker, but looking at the commit log there hasn't been any activity since 2010. I see there are several other frameworks, but which are current and suited for TDD? If you have any experience with swing and TDD, please share those as well.

    Read the article

  • SAF Deployment What to do when the architecture seems stable?

    The last activity of SAF is deployment of the architecture. This step can make the difference between an ivory-tower architect and one whose designs are actually used in real software projects.Deployment of the architecture actually means two thingsVerification and feedback loop. – making sure the architecture is actually the right one.Governance – making sure that [...]...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Great Websites Are the Windows of Your Online Success

    The World Wide Web is continuing to expand unabated at phenomenal rates, even in recent times, when many conventional businesses and individuals are suffering from the worst economic downturn in decades. The reason behind this amazing explosion of activity is quite clear. More and more people are turning to the internet as a means of earning either a second income stream, or indeed, making the internet their main source of income, and creating new websites is the premier choice of "shop window" for most online businesses.

    Read the article

  • SQL Performance Analyzer

    Any activity that may impact a statement's execution plan is a candidate for using SPA to investigate the possible consequences - both good and bad. Steve Callan discusses the workflow and provides a working example.

    Read the article

  • Traits of a DBA - Part One – The Technical Side

    What does it take to become a database administrator, or what kinds of traits should I be looking for when I am hiring a DBA. Those traits can be summarized it two categories: Technical and Personal. In this article, Greg Larsen discusses the technical traits a DBA should have. Free eBook - Performance Tuning with DMVsThis free eBook provides you with the core techniques and scripts to monitor your query execution, index usage, session and transaction activity, disk IO, and more. Download the free eBook.

    Read the article

  • html5 video source code [closed]

    - by Jeeva Nandhan
    !DOCTYPE html This is my vid.html file and my video1.js file is given below the .java file is public class MyWebAppActivity extends Activity { @Override public void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.main); WebView myWeb=(WebView) findViewById(R.id.webView1); myWeb.getSettings().setJavaScriptEnabled(true); myWeb.setWebChromeClient(new WebChromeClient()); myWeb.loadUrl("file:///android_assets/www/vid.html");}} Am receiving an error in emulator that Web page not available in the file:///android_assets/www/vid.html

    Read the article

  • Why Doing SEO "The Right" Way Works

    Online searching has been found to be the third most frequent activity for people who log on to the net. This is why it is important to stay on top of the search engine result pages, as this will help the users to find the website, thus increasing qualified traffic.

    Read the article

  • How to avoid lawsuits for a website that could enable illegal actions by users?

    - by Richard DesLonde
    How do you avoid getting into trouble with the law or lawsuits for a website that could enable illegal or potentially harmful activity by its users. The only thing I can think of is to make the content wholly user-generated, and thereby I have no control or say or responsibility for what goes on there. As an example, a website that shows great ski and snowboarding locations...well people could get hurt, or ski and snowboard on land where they are tresspassing, etc. Thoughts?

    Read the article

  • Is there any logical relation between different types of UML diagrams?

    - by user363295
    I'm trying to find out ,that is there any relation between different types of UML diagrams, for example, once you developed a use case, should it be an event for each of them in a sequence diagram, or is there any exact relation between the use case and class diagrams. By the way my main focus is on the below diagrams: Use case class diagram activity sequence event if you think I need any extra diagram to be included so it can be used to connecting the above diagrams to each other, please mention it too. Thanks In Advance

    Read the article

  • Web Analytics For Your Website

    The process of analyzing, gathering and measuring the behavior and activity of every user on different websites is termed as web analytics. Although it sounds like some complex configuration, it is of great use to amateur retailers and web page developers.

    Read the article

< Previous Page | 125 126 127 128 129 130 131 132 133 134 135 136  | Next Page >