Search Results

Search found 12083 results on 484 pages for 'general purpose'.

Page 142/484 | < Previous Page | 138 139 140 141 142 143 144 145 146 147 148 149  | Next Page >

  • Two way SSH authentication

    - by Saif Bechan
    I have installed ASL and it recommends me that I implement a two way SSH authentication. I have some questions about it. I understand the general idea that you need to login with both a key and a password. I am working from a laptop, what will happen if my laptop get's stolen. Will I never be able to login again??

    Read the article

  • Can't play ANY video or MP3 in NONE of my players!!

    - by user30533
    I can't play ANY video or listen ANY mp3. I got the Windows 7, and I was watching vids on youtube until yesterday, but today, NONE of my players in general works (youtube, WMP, Real Player, etc...)! Also, it doesn't help if I use another browser.... HELP! What happens is, I press 'play' on the video and then the window freezes and I just can press the 'x' to close it. Help, thanks A LOT!

    Read the article

  • External WiFi Adapter for Eee PC 1000?

    - by Peter M
    I have an original Eee PC 1000 running the stock Xandros. I have run into problems where the internal WiFi card does not seem to have enough sensitivity to connect to a lot of access points. Although the computer will report APs in the area, unless the signal strength is over 80% (as reported by the Wireless networks application) I cannot seem get a connection. So is there a recommended USB WiFi adapter that is known to work with the Eee PC/Xandros system or in general with a Debian based system?

    Read the article

  • In utf-8 collation, why 11- is less then 1- ?

    - by ???
    I found that the sort result in ASCII: 1- 11- and in UTF-8: 11- 1- I feel it's so counter-intuitive, and it's not dictionary order. Isn't the character '-' (002d) is always less then [0-9] (0030-0039)? What's the general rule in UTF-8 collation? And how to bypass it, just make - be less then [0-9] while keep other characters unchanged for UTF-8, in Linux? (So it can affects the result of ls --sort, sort, etc. )

    Read the article

  • Memory upgrade for Toshiba P20 S203?

    - by pjc50
    I've had an offer of a 256MB PC2700 SODIMM, apparently from an iBook, to upgrade a Toshiba laptop. Is that suitable? I've seen "DDR 266 SODIMM" on sale as the official upgrade memory. How in general should I work this out? I've long since lost track of what memory goes with what system.

    Read the article

  • Is it possible upgrade to Windows 8 from Windows OEM?

    - by Drake
    In a Microsoft's post about Windows 8 upgrade it is written: We set out to make it as easy as possible for everyone to upgrade to Windows 8. Starting at general availability, if your PC is running Windows XP, Windows Vista, or Windows 7 you will qualify to download an upgrade to Windows 8 Pro for just $39.99 in 131 markets. I am now interested in understanding if this upgrade options are available also for Windows XP/Vista/7 OEM versions. Do you have any idea?

    Read the article

  • File shares for Mac users

    - by Generic Error
    The main file shares on our network are currently hosted by old Apple XServes. I had planned to replace some of these with Windows shares as I have better hardware available but have been told this is likely to cause issues with some of our Mac users. What sort of issues am I likely to run into and what are the recommended ways of hosting general file storage in a mixed OS (Windows, OSX, occasionally linux) environment?

    Read the article

  • Clean install vs disk image

    - by Thanos
    Once a year I am making a clean install on windows, in order to keep my system fast. After posting a question on making a bootable windows usb with exe programs where I was adviced to make a disk image, a new question rose. What is the difference in making a disk image and performing a clean install on windows? Which is better in terms of speed, general performance, value for time and transfering between different computers?

    Read the article

  • Is the guideline: don't open email attachments or execute downloads or run plug-ins (Flash, Java) from untrusted sites enough to avert infection?

    - by therobyouknow
    I'd like to know if the following is enough to avert malware as I feel that the press and other advisory resources aren't always precisely clear on all the methods as to how PCs get infected. To my mind, the key step to getting infected is a conscious choice by the user to run an executable attachment from an email or download, but also viewing content that requires a plug-in (Flash, Java or something else). This conscious step breaks down into the following possibilities: don't open email attachments: certainly agree with this. But lets try to be clear: email comes in 2 parts -the text and the attachment. Just reading the email should not be risky, right? But opening (i.e. running) email attachments IS risky (malware can be present in the attachment) don't execute downloads (e.g. from sites linked from in suspect emails or otherwise): again certainly agree with this (malware can be present in the executable). Usually the user has to voluntary click to download, or at least click to run the executable. Question: has there ever been a case where a user has visited a site and a download has completed on its own and run on its own? don't run content requiring plug-ins: certainly agree: malware can be present in the executable. I vaguely recall cases with Flash but know of the Java-based vulnerabilities much better. Now, is the above enough? Note that I'm much more cautious than this. What I'm concerned about is that the media is not always very clear about how the malware infection occurs. They talk of "booby-trapped sites", "browser attacks" - HOW exactly? I'd presume the other threat would be malevolent use of Javascript to make an executable run on the user's machine. Would I be right and are there details I can read up on about this. Generally I like Javascript as a developer, please note. An accepted answer would fill in any holes I've missed here so we have a complete general view of what the threats are (even though the actual specific details of new threats vary, but the general vectors are known).

    Read the article

  • Apache mod_proxy dynamic filter

    - by jrhicks
    How can I configure Apache to ProxyBlock content based on something dynamic such as time-of-day or max-use. Basicly I'm curious about the scriptability of Apache. My web-stumbling leads me to believe I can combine mod-proxy and mod-perl in interesting ways to do dynamic filtering. But I'm pretty lost. What are some general instructions, tutorials, books, technologies to begin scripting Apache (or any suitable proxy).

    Read the article

  • Network connection on Linux

    - by Kevin
    A general question about network connection on Linux : once a network connection goes into time_wait, is it still tied to the process ? Does it still use resources like say filehandle ? Reason I ask is because once it goes into time_wait, lsof does not report it anymore. I guess that means that the network connection is no longer tied to the process and hence does not count against filehandle limit. Would like to confirm though.

    Read the article

  • Are there any known issues with Windows-8 installed on a VHD?

    - by Richard
    I installed Windows 8 preview on a VHD image and it seemed to work until I actually started using it. I´m seeing terrible performance. Installing anything makes everything else "stutter" or freeze for up to a couple of seconds at a time. I looked up hard disk performance in the task manager and this is what I found: It doesn't seem right it has 2500ms response time while reading/writing at those speeds. Is this an issue with my drive, installation or VHDs in general?

    Read the article

  • Programmatically reconnect to wifi network

    - by ya23
    Sometimes I work with frequently-dropping wifi connections. I can either reconnect manually or wait some time (varies from few seconds to few minutes) before windows attempts to reconnect. Is there a simple way to trigger reconnect immediately after the connection was dropped? Bonus question: In this particular case I'd blame hardware, but how can I diagnose the reason of dropping connection in general?

    Read the article

  • Does chunk size affect the read performance of a Linux md software RAID1 array?

    - by OldWolf
    This came up in relation to this question on determining chunk size of an existing RAID array. The general consensus seems to be that chunk size does not apply to RAID1 as it is not striped. On the other hand, the Linux RAID Wiki claims that it will have an affect on read performance. However, I cannot find any benchmarks testing/proving that. Can anyone point to conclusive documentation that it either does or does not affect read performance?

    Read the article

  • Database server size

    - by David
    I received a recommendation from my hosting provider noting that a general rule in production server management is to ensure that the memory on your database server is larger than the size of your total database. Our database is 1800mb (and growing) and we're being told to purchase a 2GB server. This didn't sit right with me, but I'm not an expert in production server management. We're running a MySQL db with mostly InnoDB tables and some MyISAMs. Thanks!

    Read the article

  • More RAM vs. more servers

    - by user357972
    I was recently asked "Do you know when to decide between going for more RAM or more servers?" (in the context of scaling data mining applications). I had no idea, so what are some ways to decide? I have very little knowledge of architecture and scaling (my understanding of computer memory and what a server does is limited to the high-level basics), so tips on learning more about these things in general are also very welcome.

    Read the article

  • Sygate personal firewall causing trouble

    - by sabo
    Since some reinstalls my Sygate Personal Firewall is beginning to make trouble: It loooves to fully block/extremely delay POST HTTP requests and some random sites in general. It slows everything down, generally Reinstall doesn't work. What could cause the problem? Is there a really leightweight firewall as an alternative out there? Thanks

    Read the article

  • Is there any way to change the VirtualBox "snapshot" folder for an existing virtual machine?

    - by Richard J Foster
    I have a virtual machine which is currently using a folder on the C: drive to store its snapshots. I have copied the contents of the "Snapshots" folder to an alternate drive, but whenever I go into the General / Advanced settings section for that virtual machine and change the snapshot folder to the new location it resets back to the original location. What do I need to do to get VirtualBox to recognize the new location for the snapshot files?

    Read the article

< Previous Page | 138 139 140 141 142 143 144 145 146 147 148 149  | Next Page >