Search Results

Search found 13652 results on 547 pages for 'full'.

Page 145/547 | < Previous Page | 141 142 143 144 145 146 147 148 149 150 151 152  | Next Page >

  • What is it that kills laptop batteries?

    - by Mala
    There are many superstitions on what you must never do lest your battery become worthless - and by worthless I mean hold about 16 - 24 seconds of charge. This has happened to every laptop I have ever owned, and I just got a new one, so please help me sort out fact from fiction. Here are some of the things I've heard: Do not keep your laptop fully charged. You must run it completely down every so often. Do not use your laptop plugged in to the wall. Only plug it in when it needs charge. If you will not be using your laptop for a long period of time, don't leave it at full charge. Do not leave your laptop running 24/7. The first two I know to be complete fiction: this was true of old batteries such as you might have had in an iPod in 2003, but modern batteries function better when kept at or near full charge. Devices even have circuitry to prevent you from completely depleting your battery, as this is dangerous. The third point sounds probable, and I'd be interested to know if it was true. However, it doesn't really apply to me because I'm not really the type to leave my laptop alone for a day, much less a "long period of time" The fourth seems most likely of the above, but only because of causality: I have always done this, and my batteries have always crapped out on me. I've generally treated a laptop like a desktop with a battery backup, and that I can move from one room to another if necessary. The fact that my batteries tend to last less than 30 seconds has further entrenched this behavior. Should I be trying to break this habit? Are there any other things that ruin laptop batteries? I love that I can actually use my new laptop unplugged :) I'd like to keep it that way. Update: Additional question: If the computer will be used for an extended period of time plugged in, does it make sense to remove the battery first? Update 2: I know people with laptops older than mine, who actively use their laptops as much as I do, and their batteries still hold about an hours' charge while mine holds less than 30 seconds, hence my belief that something I'm doing kills them.

    Read the article

  • MySQL: table is marked as crashed

    - by DrStalker
    After a disk full issue one of the MySQL DBs on the server is coming up with the following error when I try to back it up: [root@mybox ~]# mysqldump -p --result-file=/tmp/dbbackup.sql --database myDBname Enter password: mysqldump: Got error: 145: Table './myDBname/myTable1' is marked as crashed and should be repaired when using LOCK TABLES A bit of investigation shows two tables have this issue. What needs to be done to fix up the damaged tables?

    Read the article

  • How can make rsync use sudo

    - by Bryan M.
    I use rsync to mirror a number of folders on our failover server. However, some of our files, such as thumbnails or full-text indexes, are generated by our applications under the web user (named 'nobody'), and default to restrictive permissions. Also, I'm doing this over ssh, where root access is disabled, and I'd like to keep it that way, if possible. Is there any reasonable way I can tell rsync to run as sudo? Or should I look into changing the file permissions? Thanks

    Read the article

  • Unable to use BootCamp to Install Windows 7 on my Macbook Pro

    - by Sheehan Alam
    I get the error: cannot complete the partitioning because some files cannot be moved. I have more than enough space (250GB harddrive, 150GB free) I have tried doing a full defrag with iDefrag I don't want to reformat my drive I have tried partitioning in safe mode I have repaired all Disk Permissions using Disk Utility Any suggestions? NOTE: I am installing Windows 7 64-bit I am trying to create a 32GB partition

    Read the article

  • How to make MAMP PRO secure enough to serve as webserver, if possible?

    - by Andrei
    Hi, my task is to setup a MAMP webserver for our website in the easiest way so it can be managed by my colleagues without experience in server administration. MAMP PRO is an excellent solution, but some guys don't suggest to use it for serving external requests. Could you explain why it is bad (in details if possible) and how to make it secure enough to be a full-scale and not-only-local webserver? Is there a better solution?

    Read the article

  • How to make MAMP PRO secure enough to serve as webserver? Is it possible?

    - by Andrei
    Hi, my task is to setup a MAMP webserver for our website in the easiest way so it can be managed by my colleagues without experience in server administration. MAMP PRO is an excellent solution, but some guys don't suggest to use it for serving external requests. Could you explain why it is bad (in details if possible) and how to make it secure enough to be a full-scale and not-only-local webserver? Is there a better solution?

    Read the article

  • User not able to change permissions on folder in network share for Windows Server 2003

    - by Ishmael
    I have a user that has rights to change permissions within a certain folder on a Windows Server 2003 network share. Although I grant this person the rights to change permission and ownership this person cannot change any permissions. The network share is also set to allow everyone full control. (I understand it is bad practice yet this is how it was first configured) Is there any reason why this domain user cannot modify permissions on the folder and files they create?

    Read the article

  • Network connection thou a wall

    - by BCS
    I have a place where I want to set up a network connection thou a normal residential wall where I can't cut any holes. I don't want to just set up a wireless system. Does anyone make a device that you place on either side of a wall to hook up a connection? Preferably something that can do 100Mb full duplex and can't be eavesdropped on with common hardware?

    Read the article

  • Mail server Backup script

    - by Paul Stevens
    Hello, Im looking for the best way to accomplish a full backup of our "vmail" accounts on our mail server (CentOS "iRedMail" 5.1). I also need to split on 4GB parts the resulting tar or bzip compressed backup, and get this DVD-RW burned, on same server. The idea is to get this procedure to running overnight, once a week. Our mail server holds about 45GB of information. I will appreciate any advise or help on this topic. Thanks.

    Read the article

  • Will iPad 4.0 support video out for Safari?

    - by Greg Mills
    I noticed on the Apple store product comments regarding the iPad video out connector that only specific Apps will provide video out.... I already have a situation where I need to project Safari but only Keynote and a few other Apps support video out.... Does anyone know if the iPad 4.0 operating system will offer full video out as in mirroring?

    Read the article

  • Can Windows Essentials Remove the alescruf.c Virus from a Windows PC?

    - by jmort253
    A colleague just visited a site which had been hacked by the alescruf.c trojan virus, which infects HTML via embedded JavaScript. Windows PC's are infected by visiting the site. If my colleague has Windows Essentials, which detected and removed the trojan, is there anything else that he needs to do to make sure the virus is no longer active? Windows Essentials detected the trojan within seconds of visiting the site, and he's running a full system scan to see if it still detects anything.

    Read the article

  • File Locked on Flash Drive

    - by AtomFury
    I'm completely frustrated. I'm an owner of a OCZ 8GB Rally2 which I've used flawlessly for about 4 months now, and all of a sudden this week I begin getting errors telling me that I can't delete a file due to "make sure the disk is not write-protected, full or and the file is not in-use" dialog. Here's what I've tried: Deleting the file using FileASSASSIN (it's worked on everything else but files on this darn flash drive) Formatting the flash drive and then restoring the backed up information (I format to NTFS, FYI) Any suggestions on what to do?

    Read the article

  • Why when trying to restore a SQL DB from backup, it keeps referring to backup's original location an

    - by rm
    I've done a full DB backup to C:\Backups\MyDb.bak Then I've setup a job to incrementally back the DB up every day to that same location. Then I've moved the backup files to X:\Backups\, changing the target directory in backup job Now that I try to restore the database from backup, it keeps trying to refer to C:\Backups\MyDb.bak, but that file is no longer there. How do I fix the issue w/o having to move the backup files back to C:\Backups?

    Read the article

  • Windows 7 Aero Theme when on Battery

    - by Dan Revell
    Windows 7 has the full and basic aero themes that can be changed inside personalization. Windows used to automatically disable Windows Aero (transparency) when I unplug my laptop from the mains. I reset the theme and now it doesn't do this anymore. I can't seem to find how to enable this again. I've checked the advanced power options and control panel but turning back on this feature is eluding me. Any suggestions would be much appreciated.

    Read the article

  • Unicode support between different OS and browsers

    - by Martin Trigaux
    I would like to develop a web application that uses unicode. The problem is that I don't know if the user supports or not the full unicode set. First question : is the unicode support depends on the browser or the operating system ? Second question : how well main browsers/OS behave ? To goal is to find big subsets of mainly supported unicode characters (with the fact that I accept to not support old tech) Thank you

    Read the article

  • Network connection through a wall

    - by BCS
    I have a place where I want to set up a network connection through a normal residential wall where I can't cut any holes. I don't want to just set up a wireless system. Does anyone make a device that you place on either side of a wall to hook up a connection? Preferably something that can do 100Mb full duplex and can't be eavesdropped on with common hardware?

    Read the article

  • Windows 2003/IIS6 - Unexpected Error: C0000005

    - by Chirans
    Our event logs are full of these errors Unexpected error. A trappable error (C0000005) occurred in an external object. The script cannot continue running. We have tried in various ways but could not stop this error. After continuous errors, the IIS hangs up. We are also getting another error, Warning: IIS log failed to write entry. Please help me with the solution.

    Read the article

  • How much did it cost our competitor to DDoS us at 50 Gbps for two weeks?

    - by MiniQuark
    I know that this question may sound like an invalid serverfault question, but I believe that it's quite valid: the amount of time and effort that a sysadmin should spend on DDoS protection is a direct function of typical DDoS prices. Let me rephrase this: protecting a web site against small attacks is one thing, but resisting 50 Gbps of UDP flood is another and requires time & money. Deciding whether or not to spend that time & money depends on whether such an attack is likely or not, and this in turn depends on how cheap and simple such an attack is for the attacker. So here's the full story: our company has been victim to a massive DDoS attack (over 50 Gbps of UDP traffic, full-time during 2 weeks). We are pretty sure that it's one of our competitors, and we actually know which one, because we were the only two remaining competitors on a very big request for proposal, and the DDoS attack magically stopped the day we won (double hurray, by the way)! These people have proved in the past that they are very dishonest, but we know that they are not technical at all, so we believe that they simply paid for some botnet DDoS service. I would like to know how much these services typically cost, for such a large scale attack. Please do not give any link to such services, I would really hate to give these people any publicity. I understand that a hacker could very well do this for free, but what's a typical price for such an attack if our competitors paid for it through some kind of botnet service? It is really starting to scare me (if we're talking thousands of dollars here, then I am really going to freak off: who knows, they might just hire a hit-man one day?). Of course we filed a complaint, but the police says that they cannot do much about it (DDoS attacks are virtually untraceable, so they say), and our suspicions are not enough to justify them raiding our competitor's offices to search for proofs. For your information, we now changed our infrastructure to be able to sustain such attacks: we now use a major CDN service so that our servers are not directly affected by DDoS attacks. Requests for dynamic pages do get proxied to our servers, but for low level attacks (UDP flood, or Syn floods, for example) we only receive legitimate trafic, so we're fine. If they decide to launch higher level attacks (HTTP flood or slowloris attacks for example), most of the load should be handled by the CDN... at least I hope so! Thank you very much for your help.

    Read the article

< Previous Page | 141 142 143 144 145 146 147 148 149 150 151 152  | Next Page >