Search Results

Search found 1203 results on 49 pages for 'jack marchetti'.

Page 16/49 | < Previous Page | 12 13 14 15 16 17 18 19 20 21 22 23  | Next Page >

  • vmware problems - networking - no packet response

    - by jack
    XP is my host. Ubuntu is my Guest in VMware. When I do the following commands, I should get SMTP respones but now get no response. I use wireshark to analayze it. Also in wireshark shows nothing. root@vmware:~# netcat 192.168.1.2 25 220 762462a8c4d Microsoft ESMTP MAIL Service, Version: 6.0.2600.5949 ready at Fri, 12 May 2010 18:04:20 +0800 EHLO SAYHELLO VRFY TEST@LOCALHOST test \ sdfsafsd How can I fix it?

    Read the article

  • Recording with audio input MacBook Air

    - by Milla Well
    I'm trying to record analogue stereo sound with my MacBookAir. The external mic is plugged to the headphones jack, but it is not being shown in the System Preferences. I did a little bit of research, and there is some rumor, that the headphone jack only supports digital-in for mics. Is there a built-in way to use the analogue stereo sound without purchasing an external converter or a new mic? With my old MacBook 2,1 it was usual for me to do this, but with my new MacBook Air 4,1 it seems to be a tough task.

    Read the article

  • How to send Bluetooth audio to non-Bluetooth speakers?

    - by wonsungi
    In short, I am looking for a Bluetooth-3.5 mini stereo converter. What is this type of device called, and what are some of the best models (is there a difference in audio quality/lag)? I wish to connect some speakers (Altec Lansing inMotion IM7), which does not support Bluetooth, to my laptop (Lenovo X301) wirelessly. Currently, I can connect my laptop's headphone jack to the AUX jack on my speakers via a mini stereo cable. How do I replace this cable with some type of Bluetooth setup? I am not sure what this Bluetooth device is called. I thought I found something, but it actually does the opposite of what I need (3.5 mini stereo-Bluetooth). (My OS is Vista Enterprise, if that matters)

    Read the article

  • Du Meter Log file

    - by Jack
    Where can I find the Du Meter Log file? I tried searching C:\ProgramData\Hagel Technologies\DU Meter but the folder is empty. I also tried C:\Users\Username\AppData\Roaming and Local and LocalLow but none of them even have a Du Meter or Hagel Technologies folder. I even tried searching the temp folder but still nothing. I have a NetMeter.csv log file that I want to try and replace over the Du Meter log file cause I can't seem to find any other way to import data into Du Meter.

    Read the article

  • Mostly offsite asset management (laptops/smartphones) - what is a good SaaS based solution?

    - by Jack T
    Most of our company assets are offsite. Everyone either works at home or onsite at a customer. Most asset management/audit/remote control software concentrate on company LAN based assets. We don't need an NMS as we use OpenNMS in the internal network. I was thinking of something like Altiris Client Management Suite but since everything is connected to the internet a SaaS based solution sounds like the ways to go. LogMeIn Central looks ok but not that comprehensive. What do you guys use?

    Read the article

  • Install anonymous proxy on Ubuntu

    - by jack
    How to install an anonymous proxy in Ubuntu 9.10 server which listens on every public network ethernet interfaces? I have other service like Nginx, MySQL running on that server so I hope the proxy server wont conflict with them.

    Read the article

  • How to make changes in linux maintence mode

    - by Jack
    I notice when Linux boots in maintenance mode the filesystem is read-only. Is there a way to change this, perhaps remounting as writable? An example of this being a problem is that I was unable to open vi because there were too many session files.... Not to mention it would be nice to actually fix problems.... What are you meant to be able to do if you can't make any changes to the filesystem? What kind of maintenance can be expected?

    Read the article

  • How to delete files on the command line with regular expressions?

    - by Jack
    Lets say I have 20 files named FOOXX, where XX is the number of the file, eg 01, 02 etc. At the moment, if I want to delete all files lower than the number 10, this is easy and I just use a wildcard, eg rm FOO0* However, if I want to delete specific files ina range, eg 13-15, this becomes more difficult. rm FPP[13-15] does not work, and asks me if I wish to delete all files. Likewse rm FOO1[3-5] wishes to delete all files that begin with FOO1 So, what is the best way to delete ranges of files like this? I have tried with both bash and zsh, and I don't think they differ so much for such a basic task?

    Read the article

  • how to restrict null session

    - by jack
    Hi I've changed the following things in regedit and restarted PC to restrict null session: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA Value Name: RestrictAnonymous Data Type: REG_DWORD Value: 1 Value Name: RestrictAnonymousSam Data Type: REG_DWORD Value: 1 Value Name: EveryoneIncludesAnonymous Data Type: REG_DWORD Value: 0 However, I can still run and get null session. net use //IP /u:"" "" command completed successfully I've also done "Disable NetBios over TCP/IP" but it didn't help. Any ideas?

    Read the article

  • How OS comunicates with HW?

    - by Jack
    Hi, how can program runnig on CPU (mostly OS) acess other PC hardware? Such as Graphic card, HDD and so? From what I read, In DOS, this was done using BIOS calls, specifically INT instruction. But, int instruction should only jump to the certain space in RAM. So, how can some program stored in RAM acess other computer HW, when CPU can acess only RAM, and reeive interrupts? And, does windows use int instructions as well, or is there any new way to communicate with HW? Thanks.

    Read the article

  • Use GRUB/GRUB2 to PXE boot OS image

    - by Jack
    Asked this in stackoverflow but they recommended I post this here: Here is the situation I am in: I currently have a Windows drive that boots XP. The BIOS does not support PXE booting so this is out of the question. Therefore, I was thinking I could install a customized GRUB bootloader on it instead such that it will have the option to PXE boot an image from a DHCP server connected to it and have the option to load Windows as it normally does (two items in menu). The catch is it may need to be automated (meaning no keyboard), so is there any way to run a script pre-boot during GRUB loading that determines if DHCP / TFTP servers are running and attempt to PXE boot an image from the network (and if not, say timeout of 10 seconds, regularly boot from Windows drive)? If this is not possible, what are some other options / suggestions? I was reading up on grub4dos as well but I'm not sure that is what I need. FWIW, I'm free to do whatever I want to the drive. I'd really appreciate some help on this as I'm not sure where to start. Thanks!

    Read the article

  • [linux] preventing access in shared hosting

    - by jack
    Hi Linux Admins I set up a small shared hosting that contains some sites. For each site, there is a user. I mean, for abcd.com, I created abcd.com user and put htdocs for web hosting. I have no idea on how to prevent abcd.com from accessing xyzd.com's data. I have chmoded by changing 0 to others permission, which makes access defined by Apache when I view it with browser. How can I secure access? Thanks.

    Read the article

  • Laptop powering off after 10 mins or so

    - by Jack
    I have no OS installed, and I am trying to use a linux boot disc. However it is not a linux problem....if I just leave the computer on at the no operating system found message, it still turns off. I thought maybe it was overheating, but I am 90% sure that is not the problem. What else could cause this? I should have mentioned, it's a laptop.

    Read the article

  • Free duplicate music finder for Mac.

    - by Jack M.
    I'm trying to clean up an mp3 folder which has a plethora of duplicate files in it due to accidentally dragging my music folder into iTunes and having it re-import songs which were already in the play list. I tried writing a quick Python app to md5 all of the files, and delete exact duplicates. This took out ~2gb of files. Unfortunately, however, this does not work on all of the duplicates because of an iTunes feature. iTunes has changed the ID3 title on some of the duplicate songs, which means the md5 of the entire file is different from the same song with a different ID3 tag. Are there any free applications out there (for the mac) which can compare the data of the actual song (ignoring ID3 tags) and determine if duplicates exist?

    Read the article

  • Pre-set OS X dock icon positions for non-permanent apps?

    - by Jack Sleight
    Is it possible to have OS X always place certain app icons in specific places (eg. position "two") in the dock, when they're not permanently docked apps? At the moment every non-permanent app is added to the end (far right), but, for example, if I have my mail and todo list apps open, I want them to pop up in positions one and two. I know this can easily be achieved by permanently docking icons, I'm specifically looking for a solution for non-permanent apps. I suspect OS X has no built in facility for this, perhaps there's a 3rd party app or script/command line trick?

    Read the article

  • Computer powering off after 10 mins or so

    - by Jack
    I have no OS installed, and I am trying to use a linux boot disc. However it is not a linux problem....if I just leave the computer on at the no operating system found message, it still turns off. I thought maybe it was overheating, but I am 90% sure that is not the problem. What else could cause this?

    Read the article

  • Allowing an user to execute just something

    - by Jack
    Hello, which is the best way to allow a new user that I just created on ubuntu linux 9.04 to execute a script that requires some sudo without allowing him to the sudoers? The fact is that I want to give the user just the ability to execute that script, without letting him to do anything more. Is there a simple way to do it?

    Read the article

  • How to call a program and exit from the shell (the caller) when program is active?

    - by Jack
    I want to run a program with GUI, by typing into konsole: foo args … and exit from the shell (that's the caller) when the program (foo) is active. How do I this? Is there a Linux/Unix built-in command/program to do it? I'm not a shell-man, really. I know that it's possible by writing a small program in C or C++ (any other programming language with small I/O interface on POSIX) programming language with the fork() and one-of exec*() function family. It may take some time; I'll do it only if there is no native solution. Sorry for my bad English; it's not my native language. Also, not sure on tags, please edit for me, if I'm wrong. If it matters, I'm using OpenSUSE 10.x.

    Read the article

  • recommendations for a lightweight linux distribution for a test server

    - by Jack
    I'm planning on setting up a test server to experiment with some application servers (tomcat/jboss/...) and with some portals. Now the machine I've set aside for this is lightweight CPU/GPU wise(Atom D510, 4 gigabyte ram, 500 GiB hdd, onboard GPU). But it should suffice for most things, I'm more interested in the stability of JBoss/Tomcat for my purposes than the stability. However I'm having a bit of trouble picking an appropriate distribution size/performance/setup time wise/security wise since it seems I can't sneeze without another distribution popping up. I've been thinking about going for Fedora since I've read that that distribution has been optimized for Atom, but I'm not really familiar with it. My experience with Linux has mostly been limited to Ubuntu and some tinkering with puppylinux. I'm not afraid to get my hands dirty using the command line. I'm not planning on starting a discussion per se, mostly the pros/cons that people have encountered with some distributions

    Read the article

  • Can I limit remote desktop to a particular network card?

    - by Jack Mills
    I have two routers/internet connections connected to my PC. One is a slower connection with a fixed IP that I use for business, the other is a faster connection I use for day to day surfing. I have to use the fixed IP connection to log onto certain servers (due to security) to work but I'm finding that often my PC will try to use my other internet connection to connect which will get rejected (as it doesn't have the fixed IP). Can I limit remote desktop to use a particular network card to get around this problem. Note: I'm running Windows 7

    Read the article

  • Use GRUB/GRUB2 to PXE boot OS image

    - by Jack
    Asked this in stackoverflow but they recommended I post this here: Here is the situation I am in: I currently have a Windows drive that boots XP. The BIOS does not support PXE booting so this is out of the question. Therefore, I was thinking I could install a customized GRUB bootloader on it instead such that it will have the option to PXE boot an image from a DHCP server connected to it and have the option to load Windows as it normally does (two items in menu). The catch is it may need to be automated (meaning no keyboard), so is there any way to run a script pre-boot during GRUB loading that determines if DHCP / TFTP servers are running and attempt to PXE boot an image from the network (and if not, say timeout of 10 seconds, regularly boot from Windows drive)? If this is not possible, what are some other options / suggestions? I was reading up on grub4dos as well but I'm not sure that is what I need. FWIW, I'm free to do whatever I want to the drive. I'd really appreciate some help on this as I'm not sure where to start. Thanks!

    Read the article

  • Preventing my postfix to send my local users spam

    - by Jack
    I have a postfix/dovecot mail server with 100 different users. When they send an email they need to be authenticated. I successfully use saslauth to achieve this. Few days ago I had a problem. One specific user, probably with a virus or a spam-bot installed in its computer, started to send out through my server thousands of emails in few hours. As result, my ip has been blocked by many isp provider (@aol, @yahoo, and others) and has been listed in many blacklist, making all my 100 users unable to send any email to anyone. What is the best practice to avoid this problem? It would be great if my server could recognize a spamming user and automatically block it. Also, have a limit of, say, 30 emails per hour could be a partial solution. Any idea how to face this problem? Thank you

    Read the article

< Previous Page | 12 13 14 15 16 17 18 19 20 21 22 23  | Next Page >