Search Results

Search found 23427 results on 938 pages for 'christopher done'.

Page 167/938 | < Previous Page | 163 164 165 166 167 168 169 170 171 172 173 174  | Next Page >

  • What is the difference between "load" and "fetch"?

    - by DragonLord
    I often encounter the words load and fetch in contexts where data are being read from some source, and they seem to have slightly different meanings. What's the difference? I've done some research and couldn't find any specific technical difference in general usage. While the term fetch can refer to one stage in CPU instruction execution, I've seen it used in contexts not related to CPUs, and I'm looking for an answer that is not specific to CPUs.

    Read the article

  • SSH Connection Refused - Debug using Recovery Console

    - by olrehm
    Hey everyone, I have found a ton of questions answered about debugging why one cannot connect via SSH, but they all seem to require that you can still access the system - or say that without that nothing can be done. In my case, I cannot access the system directly, but I do have access to the filesystem using a recovery console. So this is the situation: My provider made some kernel update today and in the process also rebooted my server. For some reason, I cannot connect via SSH anymore, but instead get a ssh: connect to host mydomain.de port 22: Connection refused I do not know whether sshd is just not running, or whether something (e.g. iptables) blocks my ssh connection attempts. I looked at the logfiles, none of the files in /var/log contain any mentioning on ssh, and /var/log/auth.log is empty. Before the kernel update, I could log in just fine and used certificates so that I would not need a password everytime I connect from my local machine. What I tried so far: I looked in /etc/rc*.d/ for a link to the /etc/init.d/ssh script and found none. So I am expecting that sshd is not started properly on boot. Since I cannot run any programs in my system, I cannot use update-rc to change this. I tried to make a link manually using ln -s /etc/init.d/ssh /etc/rc6.d/K09sshd and restarted the server - this did not fix the problem. I do not know wether it is at all possible to do it like this and whether it is correct to create it in rc6.d and whether the K09 is correct. I just copied that from apache. I also tried to change my /etc/iptables.rules file to allow everything: # Generated by iptables-save v1.4.0 on Thu Dec 10 18:05:32 2009 *mangle :PREROUTING ACCEPT [7468813:1758703692] :INPUT ACCEPT [7468810:1758703548] :FORWARD ACCEPT [3:144] :OUTPUT ACCEPT [7935930:3682829426] :POSTROUTING ACCEPT [7935933:3682829570] COMMIT # Completed on Thu Dec 10 18:05:32 2009 # Generated by iptables-save v1.4.0 on Thu Dec 10 18:05:32 2009 *filter :INPUT ACCEPT [7339662:1665166559] :FORWARD ACCEPT [3:144] :OUTPUT ACCEPT [7935930:3682829426] -A INPUT -i lo -j ACCEPT -A INPUT -p tcp -m tcp --dport 25 -j ACCEPT -A INPUT -p tcp -m tcp --dport 993 -j ACCEPT -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT -A INPUT -p tcp -m tcp --dport 143 -j ACCEPT -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -p tcp --dport 8080 -s localhost -j ACCEPT -A INPUT -m limit --limit 5/min -j LOG --log-prefix "iptables denied: " --log-level 7 -A INPUT -j ACCEPT -A FORWARD -j ACCEPT -A OUTPUT -j ACCEPT COMMIT # Completed on Thu Dec 10 18:05:32 2009 # Generated by iptables-save v1.4.0 on Thu Dec 10 18:05:32 2009 *nat :PREROUTING ACCEPT [101662:5379853] :POSTROUTING ACCEPT [393275:25394346] :OUTPUT ACCEPT [393273:25394250] COMMIT # Completed on Thu Dec 10 18:05:32 2009 I am not sure this is done correctly or has any effect at all. I also did not find any mentioning of iptables in any file in /var/log. So what else can I do? Thank you for your help.

    Read the article

  • Does putting the XFS log on an SSD significantly improve performance?

    - by Paul Wagland
    I have a five disk array running XFS in RAID5, and I would like to improve it's performance. I have seen some hints that putting the log onto a separate device can help, does putting the log onto an SSD help dramtically? In theory, it should, but I have not been able to find any case studies where someone has actually done this, and buying an SSD and then having it not work well would be inconvenient at best…

    Read the article

  • SQL Server database on an external hard disk drive

    - by Achilles
    Due to some security problems, My boss has asked me to store all sensitive data in external/removable storages like USB stick or external HDD and this specially includes the MDF/NDF/LDF files of SQL Server 2008 we're running. I've been reading for these last three days with no luck to find a solution. Is there any solution at all? Has ever anybody done such thing?

    Read the article

  • a couple of questions about proxy server,vpn & how they works

    - by Q8Y
    I have a couple of questions that are related to security. Correct me if i'm wrong :) If I want to request something (ex: visiting www.google.com): my computer will request that then it will to the ISP then to my ISP proxy server that will take the request and act as a middle man in this situation ask for the site (www.google.com) and retrieve it then the proxy will send it back to me. I know that its being done like that. So, my question is that, in this situation my ISP knows everything and what I did request, and the proxy server is set by default (when I ask for an internet subscription). So, if I use here another proxy (lets assume that is a highly anonymous and my ISP can't detect my IP address from it), would I visit my ISP and then from my ISP it will redirect me to the new proxy server that I provide? Will it know that there is someone using another proxy? Or will it go to another network rather than my ISP? Because I didn't get the view clearly. This question is related to the first one. When I use a VPN, I know that VPN provides for me a tunneling, encryption and much more features that a proxy can't. So my data is travelling securely and my ISP can't know what I'm doing. But my questions are: From where is the tunneling started? Does it start after I visit the ISP network (since they are the one that are responsible for forwarding my data and requests)? If so, then not all my connection is tunneled in this way, there is a part that is not being tunneled. Since, every time I need to do anything I have to go to my ISP and ask to do that. Correct me if I misunderstand this. I know that VPN can let my computer be virtually in another place and access its resources (ex: be like in my office while I'm in my home. This is done via VPN). If I use a VPN service provider so that I can access the internet securely and without being monitored by my ISP. In this case, where is my encrypted data saved? Is it saved in my ISP or in the VPN service provider? If I use a VPN, does anyone on the internet know what I'm doing or who I am? Even the VPN service provider? Can they know me? I think they should know the person that is asking for this VPN service, am I right?

    Read the article

  • How to view history of Yum commands (update, install, remove)?

    - by Chris
    I'm seeing some errors in my apache logs and they may (or may not) be related to some packages that I recently installed/removed using Yum. Is there a way to view the history of Yum packages that have been updated/installed/removed ? I could use the "history" command from unix, but some installations may have been done with different accounts. I've tried searching the web and reading the man page too but haven't found anything.

    Read the article

  • Let putty watch for specific output in stdout and notify

    - by GrzegorzOledzki
    Do you know any way to introduce a notification feature to putty client? I would like to setup some regular expressions or simply text strings and be notified (by sound or some tooltip) when this content appears in stdout. If not specific in putty, how can I get it done? There used to be a similar feature in older version of KDE's konsole terminal, but even now I can't see it.

    Read the article

  • How to process requests twice in Apache

    - by Pieter
    In order to perform realistic tests for a new backend server, I'd like to process all Apache requests twice. So simply handle all the live requests with the old server, as it's done right now, but then also 'duplicate' the requests to a different virtual host, where the new backend is deployed, which will process the request and log the response. What's the best / most simple way to achieve this in Apache? (the backend is a FastCGI process)

    Read the article

  • Taking over locked user sessions in XP

    - by hurfdurf
    What's the best way to allow an administrator access to a locked user XP session, preferably with a logged event? The goal is to allow admins to cleanly shutdown/save existing work when work needs to be done on the PC. I am aware of the various VNC software flavors, but that only works when the PC is unlocked. Resetting the user password on the DC doesn't work either since the unlock password is cached locally, which means you still have to log the user out and possibly lose work.

    Read the article

  • can I consolidate a multi-disk zfs zpool to a single (larger) disk?

    - by rmeden
    I have this zpool: bash-3.2# zpool status dpool pool: dpool state: ONLINE scan: none requested config: NAME STATE READ WRITE CKSUM dpool ONLINE 0 0 0 c3t600601604F021A009E1F867A3E24E211d0 ONLINE 0 0 0 c3t600601604F021A00141D843A3F24E211d0 ONLINE 0 0 0 I would like to replace both of these disks with a single (larger disk). Can it be done? zpool attach allows me to replace one physical disk, but it won't allow me to replace both at once.

    Read the article

  • Making Puppet manifests/modules available to a wide audience

    - by Kyle Smith
    Our team rolled puppet out to our systems over the last six months. We're managing all sorts of resources, and some of them have sensitive data (database passwords for automated backups, license keys for proprietary software, etc.). Other teams want to get involved in the development of (or at least be able to see) our modules and manifests. What have other people done to continue to have secure data moving through Puppet, while sharing the modules and manifests with a larger audience?

    Read the article

  • How can I migrate lab manager VM to vCloud Director

    - by jfmessier
    A friend of mine has been asked to start experimenting with migrating VMs from Vmware Lab Manager to vCloud. We know the machines/labs have to be undeployed and consolidated, which is done for this testing lab. However, what should be the next steps to make this as efficient as possible, as we have a large number of labs to migrate. Also, the dependencies tree is huge and the consolidation process is a big thing, but we know we cannot avoid this. Thanks :-)

    Read the article

  • Determine creator of mail item in Exchange 2003 public folder

    - by John Gardeniers
    We have several users using a shared account and when messages in that account's in box have been processed they are drag and dropped into a public folder. Is there a way to determine who dropped a mail item in an Exchange 2003 public folder, so that we can have some accountability? I suspect this can't be done natively in Exchange, so if there is a scripted solution to this I'd be very interested.

    Read the article

  • Broken Motherboard Trace

    - by CoffeeBean
    When you're fairly certain that a motherboard trace is broken near the CPU (i.e.: you suspect heatsink / fan was improperly inserted) is it advisable to attempt a repair? I've heard that it can be done using a substance for repairing embedded windshield defoggers. Has anyone had any experience with this?

    Read the article

  • Replicating common Excel Functions

    - by datatoo
    I am always curious how some of the functions I use in excel were written, and think it would help at times to see how it was done. Does anyone know where there is example vba that replicates what some of these functions do? vlookup, hlookup, dsum, index, actually any or most would be interesting.

    Read the article

  • AD group authentication to view wordpress posts?

    - by Mahriman
    I'm trying to set up a wordpress site using active directory authentication. One question that has come up is the ability to limit category/post/blog reading to specific AD groups. I've never seen this done and I haven't been able to find any plugins that seem to promise this functionality. It would seem that the best option is to just give a bunch of users a role with the read_private_posts capability, but I'm not sure this will do the trick.

    Read the article

  • How to change the default terminal emulator on Windows (cmd)?

    - by alex
    Is it possible to change the default terminal emulator on Windows (7 and 8 in particular) from cmd to, for example, Console2 or ConEmu? In essence, I want all command line tools, whether launched by double clicking, from "Run" or by other processes to use the custom terminal. This is a trivial matter on Linux, is it even possible on Windows? It would be especially helpful if this could be done via a script.

    Read the article

  • Where is the Linux source kept in a Rackspace Gentoo VPS?

    - by obvio171
    I'm emerging udev and it complains it couldn't find the kernel sources under /usr/src/linux (there's nothing inside /usr/src/ indeed). As a result, it tries to take the version from the currently running kernel and messes up thinking it's an older version than what it needs (when it actually isn't). So where are the sources so that I can properly link to them? And could I have done something wrong for them not to be in the right place?

    Read the article

  • Google Analytics - Google Adwords [closed]

    - by Fiona
    Hi there, I have a number of Google Analytics accounts. I also have one adwords account. At the moment I've linked my adwords to one of my GA accounts. However I'd like to link to my other GA accounts. Can this be done? and if so how? Thanks, Fiona

    Read the article

  • Backing up thunderbird from win to linux

    - by allenskd
    I'm planning to format this laptop soon and although the e-mail is from google and all my mails is there, re-downloading is kinda out of the question since it takes hours to finish. I want to back-up my thunderbird, which folder should I back-up and where to place it in linux? Another thing is that I want to use Evolution mail, loving the progress they've done so far, is it possible to import from thunderbird to evo?

    Read the article

  • Wordpress on shared/grid hosting

    - by MarathonStudios
    I'm running a basic wordpress site on a GoDaddy Grid Hosting account, and the load times are just terrible (5-15 seconds). I'm considering moving it to an older GoDaddy account I have that still uses standard shared hosting, which seems alot faster, but all of the research I've done points to grid hosting being better. Is this just my account, or has anyone else experienced this? Grid was just as slow when I tried running PHPBB on it as well.

    Read the article

  • vim: remove previous code indentation and convert to another

    - by ramgorur
    I have a c project with multiple files (more than 100), the codes are written in Whitesmiths style, but I want to change them into K&R style indentation. Is it possible to do using vim in an automated way ? For example I have a emacs-lisp script to achieve this -- (progn (find-file "{}") (mark-whole-buffer) (setq indent-tabs-mode nil) (untabify (point-min) (point-max)) (indent-region (point-min) (point-max) nil) (save-buffer)) I was wondering if there is a similar trick that could be done with vim.

    Read the article

< Previous Page | 163 164 165 166 167 168 169 170 171 172 173 174  | Next Page >