Search Results

Search found 9244 results on 370 pages for 'thinking sphinx'.

Page 143/370 | < Previous Page | 139 140 141 142 143 144 145 146 147 148 149 150  | Next Page >

  • Receiving faxes on printer even while computer is shut down?

    - by Supporter13
    I normally send faxes with a very old fax machine and I was thinking it takes so much time for every fax to be scanned for all the numbers so I would like to send faxes with a printer. I already have an all-in-one printer, it can scan and print, but I have the document I want to fax on my computer already, so there is no need to scan. Now, the question is if I buy a fax capable printer, will it receive my faxes even when the computer is shut down or do I need to keep the computer on? What I really want is a way to send a lot of faxes to a lot of numbers as fast as possible (the document already in the computer through scan or sending) to be able to receive the fax in my computer (even while off) so I can print it with my printer If both are possible then what requirements do I need? Also, I could not find any info on the internet about receiving faxes on the computer.

    Read the article

  • Windows: Should I install Server or stick with regular?

    - by stalker92
    I hope somebody can help me solve my dilemma. I have my home PC (using Windows 7) which I use for both work and leisure (gaming, surfing, movies etc.) I tend to never turn it off, only when I must reboot because some installation requires me to or when the power gets lost. But, sometimes Windows starts acting weird (usually after the long period of system uptime), per example eats up randomly all the space on my system partition etc. which is solved after the reset by itself. I was thinking to switch to Windows Server, I guess that it is more optimized for long uptime, well, obviously it is meant for use on servers. Can somebody with more experience with this help me decide is it worth it, will it solve these issues connected with long uptime periods? Thanks in advance.

    Read the article

  • Re-encoding a video file and increasing the size -- does this improve the quality?

    - by Josh
    If I have a video file at 320x240 resolution which I want to re-encode (because I don't like the encoding it's in now) and I also want to play it at double size (640x480), will I get higher quality if I scale it up to 640x480 when I convert it to a new format, verses keeping it at 320x240 in the new format and playing it at double size? This probably depends on the program used to convert, and if so, please let me know any program which might increase the quality. Here's my thinking. If I play a 320x240 file at double size, the system has to scale up each frame in real time, whereas if I scale up while recompressing the system may be able to use a more intensive algorythm like Bicubic interpolation . However I am not sure if this is true or not.

    Read the article

  • just another apache to nginx rewrite question

    - by Brandon
    I have the following Apache rewrite directives: RewriteCond %{REQUEST_URI} ^/proxy(/|$) [NC] RewriteCond %{QUERY_STRING} (^|&)uri=(.*?)(&|$) [NC] RewriteRule .* /api/vs1.0/%2 [NC,L] And I'm trying out nginx, so trying to move the rewrites over. I came up with... rewrite ^/proxy(/|$) /api/vs1.0/$2 last; rewrite (^|&)uri=(.*?)(&|$) /api/vs1.0/$2 last; Which is probably grossly incorrect. I'm just a mere web developer, so I was wondering if anyone could lend a hand here. I would be much obliged. I see that I am ignoring the query string specification, but I'm thinking that it shouldn't matter. I only have a vague idea of what the original rewrite is accomplishing, so I haven't much hope here in coming up with something decent, despite reading the relevant documentation for both servers.

    Read the article

  • Weblogic Class-Path Dependencies EAR

    - by user18287
    I am deploying an EAR in a WebLogic node with many jars defined in the bootstrap (startWeblogicServer.bat) class-path. The problem is that my ear and the bootstrap contain different versions of the same jars, not only that but certain jars contain extracted third party libraries which also differ in version from the WebLogic bootstrap jars causing all kinds of classpath errors. I know you can set preferred jars in the EAR application xml but, this can be very tedious to resolve with regards to jars which include extracted third party libraries in terms of understanding all the dependencies.. Is there a correct approach that i need to be taking here? Am i thinking about this in the wrong way? Any help would be greatly appreciated! So far prefer-web-inf-classes has been recommended but wont work because i'm not deploying a WAR, also prefer-application-packages is what we are currently using but still has the issue described above... Anymore advice out there?? Thanks!

    Read the article

  • Using DNS entries to determine location

    - by Raphink
    I'm trying to think of a clean way to determine the location of machines (mainly, which datacenter they belong to) based on their network settings. I would like it to be dynamic, and I'm thinking of using special DNS records that would be specific to the DNS server in each datacenter. For example, you could have: root@machine1# dig TXT mysite ... mysite 3600 IN TXT "DC1" ... root@machine2# dig TXT mysite ... mysite 3600 IN TXT "DC2" ... etc. I know that DNS has a special LOC record for location, but it takes coordinates, so it doesn't help in my case. Is there a standard way of addressing this issue, another special type of record for it, or some standard entries in TXT records?

    Read the article

  • Binding services to localhost and using SSH tunnels - can requests be forged?

    - by Martin
    Given a typical webserver, with Apache2, common PHP scripts and a DNS server, would it be sufficient from a security perspective to bind administration interfaces like phpmyadmin to localhost and access it via SSH tunnels? Or could somebody, who knew eg. that phpmyadmin (or any other commonly availible script) is listening at a certain port on localhost easily forge requests that would be executed if no other authentication was present? In other words: could somebody from somewhere in the internet easily forge a request, so that the webserver would accept it, thinking it originated from 127.0.0.1 if the server is listening on 127.0.0.1 only? If there were a risk, could it be somehow dealt with on a lower level than the application, eg. by using iptables? The idea being, that if someone found a weakness in a php script or apache, the network would still block this request because it did not arrive via a SSH-tunnel?

    Read the article

  • Using m0n0wall in a VM for testing.

    - by tombull89
    I'd like to use m0n0wall inside a (VirtualBox) VM to play about with and see what it can do. Ultimately the goal is to have a number of virtual machines connected to a internal virtual network which goes through to the m0n0wall VM, and then the m0n0wall box connected to the internet through NAT or a bridged addaptor on my host machine. I can find out how to set the LAN and WAN addresses, but this seems to be only for using m0n0wall as a router intead of attached to another router. Let's see if I can diagram this: [Virtual Machine]---Internal (VM Only) Network ---[m0n0wall VM]---Bridged/NAT Addaptor---["real" router]---Internet. Can anybody suggest how I should do this or am I thinking m0n0wall isn't meant to be used like this?

    Read the article

  • Munin "Available entropy" when using adress space layout randomization

    - by clawspoon
    Having just configured munin for statistics logging on my gentoo server (hardened profile), I am noticing that my "Available entropy" is consitently in the 200-300 range. This seems way to low, so I checked it manually using the command $ cat /proc/sys/kernel/random/entropy_avail 3544 Odd. Consistently very low values in Munin and practically filled up when checking manually. After thinking about the problem for a while I came to the conclusion that the problem is probably that I'm using Adress Space Layout Randomization which is using the entropy when running commands/programs. Since Munin runs a whole slew of programs all the entropy is used up, and Munin then measures how much entropy there is, resulting in the low values. Does anyone have any experience with this? How can this be avoided?

    Read the article

  • Can you set up a Linode VPS as a reseller type scenario?

    - by MAZUMA
    First, I'm a fairly green on this subject. So, go easy. I do web design and development and would like to set up a way to be the central host so to speak for my clients. Currently they are scattered across multiple hosting companies. I've looked at some the cheapy options like a LunarPages and some of the more robust options like RackSpace Cloud and Linode. RackSpace has a reseller program, but it's managed and more at the top end on cost. I'm not seeing any type of reseller program in place for Linode. Can I purchase a higher Linode plan and use Apache2's VirtualHost configuration to handle multiple domains (about 8 domains, but hopefully will grow.). Or, am I not thinking about this correctly?

    Read the article

  • Can't use HTTPS with ServerXMLHTTP object

    - by Imraan
    I am supporting a Classic ASP application that connects to a payment gateway via HTTPS. Up until recently there have been no issues. A few days ago this broke without the code, IIS config or anything local changing. Its broken on at least 3 separate servers. The last run of Windows Updates was in late November, but bringing the servers' updates up date has not resolved the problem. A code snippet is below. Dim oHttp Dim strResult Set oHttp = CreateObject("MSXML2.ServerXMLHTTP") oHttp.setOption 2, 13056 oHttp.open "POST", SOAP_ENDPOINT, false oHttp.setRequestHeader "Content-Type", "application/soap+xml; charset=utf-8" oHttp.setRequestHeader "SOAPAction", SOAP_NS + "/" & SOAP_FUNCTION oHttp.send SOAP_REQUEST Below is a dump of the error object :- Number: -2147012852 Description: A certificate is required to complete client authentication Message: A certificate is required to complete client authentication I initially posted the question on Stackoverflow (http://stackoverflow.com/questions/9212985/cant-use-https-with-serverxmlhttp-object) thinking it was a code issue, but further investigation seems to point to a server issue.

    Read the article

  • Move /var directories to to /mnt on an EC2 instance

    - by Geoff Lanotte
    I am trying to work on a standard configuration for a set of EC2 instances running ubuntu 12.04. These servers are going to be primarily web servers for a Ruby on Rails application. When you configure a new large instance, you are given a primary of 8GB and then ephemeral storage of 400 GB that is mounted to /mnt. It seems logical to me to move some directories that have a potential for growth off to the /mnt directory, I was specifically thinking of /var/www and /var/log. My question is two-fold: Is this a good idea or are there pitfalls that I cannot see? If this is a good idea, how should I go about configuring this. I do have the ability to configure new instances and down our old instances. My concern is over long term, doing this in such a way that it prevents downtime. I am a developer with some experience in devops, but mounting drives is something I have not faced before, so explicit directions would be greatly appreciated.

    Read the article

  • Advice for outdoor wifi hardware and topology

    - by Robot
    I haven't setup any wifi networks other than an access point or two at any single location, so I'd like advice on how to setup an outdoor/weatherproof network in an area approximately 150 feet by 200 feet. The interesting thing is there are a pair of pools in the middle of the coverage area. Here is a picture: blue is pool, green is coverage area, yellow is building with wired access. Can anyone advise me on weatherproof APs, antennas and placement for best coverage of the pool deck? I've looked at the Meraki stuff, but I'm thinking it's overkill.

    Read the article

  • How's the latency with Mac VNC on Windows PC using a crossover cable?

    - by Vadoff
    I use a Windows 8 PC as my main system, and do some programming with Xcode which I use a virtual machine for. However, it doesn't run as smoothly as I would like, so I'm thinking about purchasing a Mac Mini. My question is if I connect my PC to the Mac Mini directly (via crossover cable, firewire, or usb), would I be able to control the Mac using VNC with almost no latency? If not, is there any other way I'd be able to use both my PC and the Mac Mini simultaneously (using the same peripherals)?

    Read the article

  • Running ubuntu 10.04 without a laptop's primary display

    - by riteshmnayak
    I have an IBM thinkpad(R50e) whose display is broken. I would still like to use the laptop by connecting it to an external monitor and keyboard/mouse. This is what I did: Removed the hard disk from the broken IBM Put the hard disk in the working IBM and installed 10.04 on it. It booted fine and I installed many packages and stuff. I put the hard disk back into the broken display IBM thinking I could use it by connecting it to an external monitor that I own. Well, it turns out that while booting, the display shows up but because the display shifts from the VGA display to the primary display mid-boot, the laptop does not boot. Is there a way in which I can force the laptop to not use its primary display while booting. I looked at Randr and also grub.conf settings but nothing seemed to work. Please help!

    Read the article

  • Windows Vista Backups?

    - by skaz
    I am trying to configure a Windows Backup on Vista but don't see some capabilities I would expect to be there. For one, it looks like I can only select a Local Drive or a network share. I want to use a local drive, but I want to use a sub folder of one of the drives. Must I really pick the root? As a work-around, I made a network share to the local drive, thinking I could then pick network share. However, when I do this, I am prompted for credentials to hit the share, and none work. However, the share works Explorer, and it works from other computers, so the access is configured correctly. Is there any way to do what I am trying to do? Thanks.

    Read the article

  • Running Coldfusion Commands inside an HTML File?

    - by KM01
    Hello, Is it possible to run CF commands inside an HTML file by updating Apache configs/htaccess file? When I searched online, I didn't come across any answers for CF, saw several posting for PHP (perhaps I am not searching for the right terms ... ?). Specifically, we have CF 6 (I know, don't say it) on Solaris, and Apache 2, and was thinking of using this line: AddType application/x-httpd-coldfusion .html so we can use cfinclude inside the HTML files, but this did not work. Your time, ideas and thoughts are much appreciated! KM

    Read the article

  • VPN/Proxy server to bypass work proxy

    - by Trevor
    Here is my dilema, I am at work and can not set up a VPN connection to my VPN account in the USA. So what I would like to do is somehow have my "IE" at work connect to my home network and route any internet requests through my home PC to my VPN account, so I can access my USA Contents? So what I was thinking and I am not sure if this will work, but set up a proxy server at home on my home computer, that then routes all requests to my VPN Tunnel to the USA. Have my work computer use my home computer as the proxy and viola I have unrestricted internet access? Does that sound feasable? Thanks.

    Read the article

  • iTunes Home Sharing with VPN

    - by Philip Crumpton
    I'm trying to set up a VPN on a Windows machine that contains my iTunes library, then connect my iPhone ot it, wirelessly, using Home Sharing (remotly). I have read that this can easily be set up if the iTunes library is on a Mac (Network Beacon and YazSoft ShareTool are two products I found). I can't find anyone who has had success on a Windows machine, though. In my thinking, there are a few options to getting this done. Find a utility that takes care of this for me (like the Mac-only options listed above) and is compatible with iPhone (Hamachi is NOT compatible with iPhone VPN). Manually configure a VPN to allow Bonjour multicast (I'm not sure what this really is...) Emulate a Mac on my Windows PC. FYI my router is a Linksys WRT54GL running Tomato 1.28 Note question is related to this

    Read the article

  • Reliability of VMware ESXi for backup

    - by Laurent
    Currently, I'm using a server as an online backup and to run some VMs with VMware Server. I'm interested in converting it to VMware ESXi but have some concerns about the possible corruption of my VMDKs if I choose to store my data on them. I was also thinking of storing the data directly on the datastore but can't find any way to mount a VMFS volume with a LiveCD if ESXi is unable to start. What are my options? Is continuing to use VMware Server is a good idea, knowing that I DO want to use the server for both virtualization and backup purposes. Thanks.

    Read the article

  • Mark packets across computers?

    - by eudemo
    I use Transmission on Ubuntu and I'm having this issue, which basically says that QoS is broken because there is no way to limit which outgoing ports uses. I was thinking of doing a dirty and ugly hack and create an interface alias and define QoS based on source address, but was wondering if is there another way. Is it possible to mark the packets on the original machine in some way, using the owner and mark modules of iptables and sending this to the router who does the QoS? From what I understand, mark on iptables only applies to the local machine, so this will not work, but is there another way?

    Read the article

  • Can you boot/install/restore a MacBook Pro with a MacBook Air USB stick?

    - by zekel
    The new MacBook Airs don't have optical drives, so you can't install or restore the OS via DVD. They include a little USB stick for this purpose. I have a MacBook Pro and a MacBook Air. Does anyone know if it will work with my MacBook Pro? I'm thinking about removing my optical drive to put in another HD. The only sticky situation I might get into is if I need to do an install or restore on the road without an external DVD drive. (Good article on replacing optical drive with hard drive enclosure: remiel.info/post/1601242301/making-the-leap-to-ssd-on-a-macbook)

    Read the article

  • IIS and Apache on the same machine?

    - by MLS
    I have a Windows 2003 Server running IIS (due to an ASP Site needing to be hosted). I wanted to add some non ASP sites (HTML, PHP and MySQL) so I was thinking I could just run apache on 8080. What confuses me a bit is if someone hits DomiainA.com, IIS intercepts it and forwards it to DomainA.com:8080 where apache is running. I could do this by putting a server side javascript re-direct in the IIS www-root for the domain. What else can I do that might be more proper?

    Read the article

  • Strange ports on default install of W7

    - by Sabre
    I have a base new install of windows 7, and when I went to look for something else I saw the attached netstat output. What concerns me is that this is Windows + Truecrypt + drivers, nothing else installed. The sequential high ranged ports belonging to several different seemingly not out of place services seemed odd. So I torched the install, used Active@ to scrub the disk, re-downloaded the ISO from MSDN, and did a fresh reinstall, viola, they are there again. It just seems out of place, I have seen a many netstats over the years, this one just strikes me as odd, so I started thinking rootkit? (JUst FYI, when I reloaded I named the machine "Error" so that is why the task manager reads the computer name as such.) So I would like to know if anyone else could explain it, and therefore is may be normal, or would they be worried as well, and should I start considering I have some very strange thing occuring on my network?

    Read the article

  • Putting a whole linux server under source control (git)

    - by Tobias Hertkorn
    I am thinking about putting my whole linux server under version control using git. The reason behind it being that that might be the easiest way to detect malicious modifications/rootkits. All I would naively think is necessary to check the integrity of the system: Mount the linux partition every week or so using a rescue system, check if the git repository is still untempered and then issue a git status to detect any changes made to the system. Apart from the obvious waste in disk space, are there any other negative side-effects? Is it a totally crazy idea? Is it even a secure way to check against rootkits since I most likely would have to at least exclude /dev and /proc ?

    Read the article

< Previous Page | 139 140 141 142 143 144 145 146 147 148 149 150  | Next Page >