Search Results

Search found 9051 results on 363 pages for 'apply templates'.

Page 130/363 | < Previous Page | 126 127 128 129 130 131 132 133 134 135 136 137  | Next Page >

  • icacls batch file multiple directories with wildcards help needed

    - by user153521
    I have written the following batch file that does a great job combing through all folders beginning with the number 3 and applying folder permissions to any 2010 subfolder. Example of the batch filesis below: for /D %%f in (D:\Data\3*) do icacls "%%f\2010" /inheritance:r /grant:r "Domain Admins":(OI)(CI)F Question : How can I improve this script to allow for me to apply the permissions to a specific folder below ANY folder within the folders beginning with 3? here is an example of my failed attempt: for /D %%f in (D:\Data\3*) do icacls "%%f*\specificfolder" /inheritance:r /grant:r "Domain Admins":(OI)(CI)F

    Read the article

  • How to reset outlook 2010 options to default settings

    - by Jake
    How can I reset the outlook 2010 default options that are accessed via the orange Ribbon File Tab Options (left navi bar)? Searching online gives many step-by-stepp instruction in creating an Outlook Profile, which lets you add email accounts, data files etc. but does not seem to reset the Outlook options. Another popluar and more acucrate search result goes along this line https://kb.wisc.edu/wiscmail/page.php?id=9357 but it does not apply to Outlook 2010.

    Read the article

  • Dell Inspiron 1525 - internal hard drive not detected

    - by GingerT
    Others have asked about this issue but had intermittent access to their HD, therefore their results did not apply to this situation. I have tried reseating the HD to no effect. I also tried booting from the Internal HD to no effect. Next step get a connector cable and move the data to a different HD, or send in for HD recovery? Any suggestions?

    Read the article

  • Tool or script to detect moved or renamed files on Linux prior to a backup

    - by Pharaun
    Basically I am searching to see if there exists a tool or script that can detect moved or renamed files so that I can get a list of renamed/moved files and apply the same operation on the other end of the network to conserve on bandwidth. Basically disk storage is cheap but bandwidth isn't, and the problem is that the files often will be reorganized or moved around into a better directory structure thus when you use rsync to do the backup, rsync won't notice that its a renamed or moved file and re-transmission it over the network all over again despite having the same file on the other end. So I am wondering if there exists a script or tool that can record where all the files are and their names, then just prior to a backup, it would rescan and detect moved or renamed files, then I can take that list and re-apply the move/rename operation on the other side. Here's a list of the "general" features of the files: Large unchanging files They can be renamed or moved around [Edit:] These all are good answers, and what I end up doing in the end was looking at all of the answers and will be writing some code to deal with this. Basically what I am thinking/working on now is: Using something like AIDE for the "initial" scan and enable me to keep checksums on the files because they are supposed to never change, so it would aid on detecting corruption. Creating an inotify daemon that would monitor these files/directory and recording any changes relating to renames & moving the files around to a log file. There are some edge cases where inotify might fail to record that something happened to the file system, thus there is a final step of using find to search the file system for files that has a change time latter than the last backup. This has several benefits: Checksums/etc from AIDE to be able to check/make sure that some media did not get corrupt Inotify keeps resource usage low and no need to re-scan the filesystem over and over No need to patch rsync; If I have to patch things I can, but I would prefer to avoid patching things to keep the burden lower, (IE don't need to re-patch everytime there is an update). I've used Unison before and its really nice, however I could've sworn that Unison does keep copies around on the filesystem and that its "archive" files can grow to be rather large?

    Read the article

  • Do I still need to send the "Expires" header, or can I assume that web caches understand "Cache-Cont

    - by chris_l
    I want to reduce the overhead caused by HTTP headers to a minimum, so I'd like to avoid the "Expires" header, and use "Cache-Control" only - or maybe the other way around (I'm planning to send very short HTTP responses to browsers, so the answer to this question doesn't fully apply here: My headers account for a significant percentage). AFAIK, the "Cache-Control" header was standardized in HTTP 1.1, but are there still web caches/proxies, that don't understand it? Note: This is a sub-question to my stackoverflow (bounty) question

    Read the article

  • Windows 7duplicate in boot menu

    - by Mick
    I deploy my Windows 7 with imagex.exe. I do this by means some batch script : Win7_install.bat: cls Diskpart /s Win7_install.txt Imagex /apply Win7_October.wim 1 C: Bcdboot C:\Windows Exit Win7_install.txt: SELECT DISK 0 CLEAN CREATE PARTITION PRIMARY SIZE=102400 SELECT PARTITION 1 FORMAT fs=ntfs LABEL=”SYSTEM” quick ASSIGN LETTER=C CREATE PARTITION PRIMARY SELECT PARTITION 2 FORMAT fs=ntfs LABEL=”DATA” quick SELECT PARTITION 1 ACTIVE EXIT Then after restart I have duplicate entries in boot menu. Anybody have some idea how fix it? Regards

    Read the article

  • Automatic hyperlink in Excel

    - by developer
    Hi All, Is it possible to hyperlink a url in excel automatically. I mean when the cell starts with something like http or www can I hyperlink that. Currently, I have to hit enter in the cell value in the formula bar to make the link as clickable. Also if I change the value in the cell, the link doesnt get refreshed until I hit enter. Is there a way in excel where it will automatically detect and apply a hyperlink.

    Read the article

  • Can rdiff do incremental backups

    - by Mirage
    I am new to ubuntu , i have installed rdiff-backup. I have folder called sqlfiles on remote ftp server.The sql filesa are stored for last three days and then deleted. But i want to download the all copies to local computers I want to have incremental backups on my local server so that 1)If file is same then it should not be copied 2)if different , then overwrite it 3)If file is in local directory and not in FTP , then leave as it is How can i apply those rules to r-diff

    Read the article

  • Is it important to reboot Linux after a kernel update?

    - by lfaraone
    I have a few production Fedora and Debian webservers that host our sites as well as user shell accounts (used for git vcs work, some screen+irssi sessions, etc). Occasionally a new kernel update will come down the pipeline in yum/apt-get, and I was wondering if most of the fixes are severe enough to warrant a reboot, or if I can apply the fixes sans reboot. Our main development server currently has 213 days of uptime, and I wasn't sure if it was insecure to run such an older kernel.

    Read the article

  • Vim conceal feature is applied to active line

    - by akxlr
    I am using MacVim with the vim-latex plugin. There is a conceal feature turned on by default that converts LaTeX symbols to unicode in vim itself so the source is easier to read. I think this is supposed to turn off on the active line (under the cursor) but this isn't happening, meaning I can't edit the code in parts. Is there a way to make the conceal feature only apply for inactive lines? Otherwise, how do I turn it off?

    Read the article

  • Matching ID3 Tags to Existing Files

    - by SLaks
    I have a collection of ripped CDs that were transcoded to a very low bitrate. (and I lost the original MP3s) I'd like to re-rip the CDs to a higher bitrate, and apply the ID3 tags from the existing rips to the new files. (These are custom tags; they will not be found in online databases) Is there any way to automatically copy ID3 tags by length and track number, or do I need to write one myself?

    Read the article

  • Renicing complex multithreaded applications in Linux

    - by Vi
    Applications (especially big Java and C++ ones) often shows up as multiple lines in htop, each have separate PID and separate nice level. Also application can spawn a lot of child processes (like as in aptitude update), so I need to affect both parent one (to make new children have new priority) and child ones (to bring the effect immediately, not after the child terminates) How can I apply "renice" or "ionice" or "schedtool" to already launched big application?

    Read the article

  • How to refresh tag list in org-mode without closing and reopening emacs

    - by Pete
    In my emacs org-mode org file I have a tag list #+TAGS: OFFICE(o) COMPUTER(c) HOME(h) PROJECT READING(r) PHOTOGRAPHY(p) At some point, I wish to add a new tag to the list, and apply it to an item (using C-c C-c). But the new tag does not show up in the list of selectable tags. In order to fix this, I close and reopen emacs. But I'm sure that isn't necessary, How do I refresh this list without restarting emacs?

    Read the article

  • Scroll modifier for mouse/trackball in windows

    - by askvictor
    I have a trackball (Logitech Trackman Marble in this case, though this could apply to any mouse or pointing device) where I would like to use one of the buttons as a middle-click when I click it, but to trigger scrolling action when I hold it down and move the ball around. I could do this quite easily in Linux by setting scroll-modifier in the X config, but the driver that comes with the trackball (Logitech) only allows one or the other. Is there any way to set this up in Windows 8?

    Read the article

  • how to use webdav with netbeans?

    - by ajsie
    i have a server i save a lot of files, i wonder how i use webdav with netbeans. eg. import a webdav folder edit the php files and save it the new changes apply immediately on the web server (cause the webdav folder is the same as the apache web root folder) i think this is a very smart solution so that you can change the website immediately, without having to download, change and upload. anyone that knows how to accomplish this? (feel free to propose other quick solutions for how to do quick edits)

    Read the article

  • How to record macro of formatting tables in Excel 2010?

    - by GIS Man
    I'm working with Excel 2010 and made over 20 tables in one sheet. I just want to work more efficiently by making a simple macro for auto formatting table. This is the style I want to apply with the macro: Font: 10, Bold, Arial Borders: All borders Text: Center Table: 3*5 (row * column) Cell tile for header table only (any colors) I've uploaded a sample table with that style, if my question is not clear enough. Thanks for any help!

    Read the article

  • What is the best way to determine what's locking up SQL Server using a query?

    - by Aplato
    Recently our SQL Server is getting bogged down by something. I was wondering what is the best way to check what could be causing the problem by querying the database. This is the best I've found so far: SELECT SPID = s.spid , BlockingSPID = s.blocked , DatabaseName = DB_NAME(s.dbid) , ProgramName = s.program_name , [Status] = s.[status] , LoginName = s.loginame , ObjectName = OBJECT_NAME(objectid, s.dbid) , [Definition] = CAST([text] AS VARCHAR(MAX)) FROM sys.sysprocesses s CROSS APPLY sys.dm_exec_sql_text (sql_handle) WHERE s.spid > 50 ORDER BY DatabaseName , loginName

    Read the article

  • Fixing BIND9 rndc error "connection to remote host closed"

    - by Josh
    I just made some changes to a DNS zone in Webmin and clicked the "Apply Changes" button. I received the error message: rndc: connection to remote host closed This may indicate that the remote server is using an older version of the command protocol, this host is not authorized to connect, or the key is invalid How can I troubleshoot / repair this? I copied parts of the BIND config from a failing server, so I suspect that's what causing it...

    Read the article

  • Active Directory - Join domain in specific OU when its a workstation

    - by Jonathan Rioux
    I would like to know how can I accomplish the following: When I join a workstation (with Windows 7) in the domain, I want that computer to be put into a specific OU. Only when its a workstation with Windows 7. This is because I have GPOs that must apply to all workstations in the domain. Can I only accomplish this using a script? Or can I set a rule like if the computers has Windows 7, put that computer into this specific OU.

    Read the article

  • How does data I/O takes place on USB Flash Memory ?

    - by user35704
    I want to know how is data I/O takes place on flash drives which are typically EEPROM's . I thought so as I was writing a C Program that involves file handling . For a normal HDD , that would involve returning the file pointer and reading or writing data to the disk which would be done by read/write HEAD . While in EEPROM's there is no read/write head , as it's works on mnemonic commands , So how come does the C file handling program works when I apply it to a file on flash drive ?

    Read the article

  • My server's been hacked EMERGENCY

    - by Grant unwin
    I'm on my way into work at 9.30 p.m. on a Sunday because our server has been compromised somehow and was resulting in a DOS attack on our provider. The servers access to the Internet has been shut down which means over 5-600 of our clients sites are now down. Now this could be an FTP hack, or some weakness in code somewhere. I'm not sure till I get there. How can I track this down quickly? We're in for a whole lot of litigation if I don't get the server back up ASAP. Any help is appreciated. UPDATE Thanks to everyone for your help. Luckily I WASN'T the only person responsible for this server, just the nearest. We managed to resolve this problem, although it may not apply to many others in a different situation. I'll detail what we did. We unplugged the server from the net. It was performing (attempting to perform) a Denial Of Service attack on another server in Indonesia, and the guilty party was also based there. We firstly tried to identify where on the server this was coming from, considering we have over 500 sites on the server, we expected to be moonlighting for some time. However, with SSH access still, we ran a command to find all files edited or created in the time the attacks started. Luckily, the offending file was created over the winter holidays which meant that not many other files were created on the server at that time. We were then able to identify the offending file which was inside the uploaded images folder within a ZenCart website. After a short cigarette break we concluded that, due to the files location, it must have been uploaded via a file upload facility that was inadequetly secured. After some googling, we found that there was a security vulnerability that allowed files to be uploaded, within the ZenCart admin panel, for a picture for a record company. (The section that it never really even used), posting this form just uploaded any file, it did not check the extension of the file, and didn't even check to see if the user was logged in. This meant that any files could be uploaded, including a PHP file for the attack. We secured the vulnerability with ZenCart on the infected site, and removed the offending files. The job was done, and I was home for 2 a.m. The Moral - Always apply security patches for ZenCart, or any other CMS system for that matter. As when security updates are released, the whole world is made aware of the vulnerability. - Always do backups, and backup your backups. - Employ or arrange for someone that will be there in times like these. To prevent anyone from relying on a panicy post on Server Fault. Happy servering!

    Read the article

  • List existing LVM2 tags

    - by ikso
    Adding tags to LVM volumes and showing volumes that possess that tag is easy and works like a charm; but somehow I can't find a way to list all tags in use, or to show tags that apply to a specific volume. lvdisplay -v doesn't give me details on tags, neither lvs seems to have any option for that. (I am using CentOS 5.4.)

    Read the article

  • why allow windows to disable one core? [closed]

    - by saber tabatabaee yazdi
    i teach MCITP for students and when describe about Disabling a Device Drivers , one of them ask me : why allow windows to disable drivers that windows need them? why windows allows to disable drivers, like disable cpu? like disabling graphic card? windows in many cases cant apply but allow to disabling CPU or etc. i am searching and find articles that describe how to disable CPU. but i am not Convinced WHY WE CAN DISABLE THESE drivers!!

    Read the article

  • Windows 7: "Replace All Child Object Permissions" Doesn't Stay Checked

    - by raywood
    I right-click on a top-level folder in Windows Explorer. I choose Properties Security tab Advanced Change Permissions. I check "Replace all child object permissions with inheritable permissions from this object" Apply. I get a Windows Security dialog that says, "Setting security information on" the list of objects that flashes by. But now the "Replace all child object permissions" box is unchecked. What is happening here?

    Read the article

  • Unattended Install of Zend Server license

    - by Zoop - Josh
    I have a Zend Server 5.6 development license and I wanted to know if there is a way to apply the license during install, rather than via the web interface after it has installed. I ask because I administer our server environment via Rightscale and have automated the creation of the server, however it still requires manual input for the license details. We regularly fire up a staging server to do final tests before pushing to production and it would be great if it were completely hands off.

    Read the article

< Previous Page | 126 127 128 129 130 131 132 133 134 135 136 137  | Next Page >