Search Results

Search found 10052 results on 403 pages for 'mutation testing'.

Page 168/403 | < Previous Page | 164 165 166 167 168 169 170 171 172 173 174 175  | Next Page >

  • How do I prevent apache from serving the .git directory?

    - by Shoan
    I have started using git for deployment of websites for testing. How do I prevent apache from serving the .git directory contents? I tried <Directorymatch "^/.*/\.svn/"> Order deny,allow Deny from all </Directorymatch> with no success. I know that I can create a .htaccess file in each .git directory and deny access, but I wanted something I could put into the main config file that makes this global across all websites.

    Read the article

  • Sharing VirtualBox snapshots

    - by JesperE
    Is it possible to "share" a VirtualBox snapshot? I have a "baseline" VirtualBox machine, and I would like to be able to take a snapshot, and send it to another user which has the same baseline machine. The scenario is that the baseline machine is used for testing, and I want to allow testers to create snapshots which describe a certain system state, and send that snapshot to developers to further examination. EDIT: To clarify, I would like to be able to export snapshots "incrementally" without having to export the entire machine as an appliance.

    Read the article

  • How can I install a Windows 8 application for another user and pin it on their Start screen?

    - by Simon Campbell
    I am trying to create a locked down Windows 8 account using Group Policies with no tiles on the start screen except for one for the purposes of a Kiosk PC. How can I (as an administrator account) install a custom application (side-loading) for another user and pin it to their start menu? This application is still in development so will need to be updated frequently on the locked account for testing.

    Read the article

  • blocking hotlinking with .htaccess only works for plain domain, when preceeded by www no block

    - by casualprogrammer
    Having tried all sorts of suggestions popping up from google, I am at my wit's end. Presently I use a solution created with htaccesstools.com/hotlink-protection/ RewriteEngine on RewriteCond %{HTTP_REFERER} !^$ RewriteCond %{HTTP_REFERER} !^http://(www\.)?mydomain.tld/.*$ [NC] RewriteRule \.(gif|jpg|jpeg|png|js|css)$ - [NC,F,L] Checking it out with altlab.com/htaccess_tutorial.html testing facility (near bottom of page ) shows no image if mydomain.tld/mypic.jpg is entered, while if prefixed with www (www.mydomain.tld/mypic.jpg) the pic is displayed. Any helpful comments welcome.

    Read the article

  • Ubuntu 12.04 crash analysis - strange binary data on all open files at the moment of crash

    - by lanbo
    A couple of hours ago we got a system crash on Ubuntu 12.04. We checked all the log files and there is nothing suspicious to blame to. Last stuff that was logged was some dovecot activity. There are no kernel panic messages. Nothing. It is a new server (new hardware) we are testing before production. And because it is new hard, I'm suspicious the problem may be due to some faulty hardware. We already run memtester with no problem detected. I'll be happy to hear from other hardware testing tools (the machine has SSD). Anyway, the thing I wanted to ask you is a different one. The strange thing is on every open file at the moment of the crash we found the next sequence of symbols was written into them: "@^@^@^@^@^@^@...". For example, on the syslog log file we got: Apr 16 15:53:56 odyssey dovecot: pop3-login: Aborted login (auth failed, 1 attempts): user=<info>, method=PLAIN, rip=46.29.255.73, lip=5.9.58.177 ^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^ [these continues for about 1000 chars...] ^@^@^@^@Apr 16 15:55:12 odyssey kernel: imklog 5.8.6, log source = /proc/kmsg started. We got all these symbols in all open files. These include: syslog, mail.log, kern.log, ... But also on some logs that are output by php scripts run in CRONs from user accounts (not root). So, any idea why all open files got these characters written during the crash? This is pretty bad since the crash corrupted many files (we don't even know which other ones may be affected). We are suspicious that all open files (in write mode maybe) at the moment of the crash got all these symbols inserted. Why is that? BTW [in case it helps], the system automatically rebooted after the crash but Apache did not start. There were not traces in /var/apache2/*log why apache did not start. After running a "service apache2 start" it started with no problems. Also, we rebooted the machine manually and Apache also started on reboot. But it did not start after the crash and no errors were reported. Thanks guys!

    Read the article

  • 550 relay not permitted

    - by Nick Swan
    We are using Fogbugz on our server to do customer support emails. Occasionally we get errors coming back when sending emails which say: 550 relay not permitted This seems to happen at random though, sometimes sending an email to a person works, next time to the same person it'll bounce back. I've tried setting up reverse DNS with the server host and creating the SPF record in GoDaddy but we still get some of these errors. Is there anything else I can do, and is there a way of testing these are actually configured correctly?

    Read the article

  • Nginx: Maintenance page and localhost access

    - by ian.evans
    As I prepare to test some changes, I thought I'd set up a maintenance page block so I could do the testing. Just realized though that the maintenance block examples for nginx take the site down for everyone. How do you serve the maintenance page to visitors will still allowing localhost access. Should I just create a new server block listening on another port and deny all, allow 127.0.0.1?

    Read the article

  • MongoDB: ReplicaSet slower than a corresponding Master/Slave config

    - by SecondThought
    Is it true that a mongoDB configured as a replicaset (lets say two nodes + an arbiter) will always be slower than the same DB and server specs but configured as a Master? I've run some tests and found out that for a fresh DB, RS is a little quicker than Master/Slave config but when the DB is getting bigger than ~100k records the latter is getting much snappier. am I missing something here? PS: I was testing it with mongoid driver for ruby.

    Read the article

  • linux text editor for windows

    - by lego 69
    hello, can somebody recommend me good Linux text editor for Windows (if it exists), I wrote scripts for C-Shell using txt editor of windows but I have problem, it doesn't run cause windows is not UNIX, what can I do? I don't want to install linux for a few scripts, I do testing of my scripts via unix server (this server is not mine), thanks in advance

    Read the article

  • Can I rename a file that is open on Windows XP?

    - by Radek
    I want to programatically rename a file and it could be open. It's a log file. When I was testing my code the rename part didn't work because the log file TestPro.log was open by the TAF (Test Automation Framework). When TestPro is running and I try to delete the file I get the error "Cannot delete because is being used by another person or program." Is there any way how to rename a file (programatically) that is open the way the log file was?

    Read the article

  • How can I make skype calls in Linux?

    - by Grzenio
    Hi, Today I spent more than an hour trying to get Skype set up on my Linux box (Debian testing), but I couldn't make my microphone to work correctly. So I hear the other person talking, but they can't hear me. I am running KDE 4.3 and Skype 2.1 Beta. What do I need to do to get it working?

    Read the article

  • RapidSSL not trusted using the check on "why no padlock"

    - by Rippo
    On http://www.whynopadlock.com/check.php whilst testing the following url https://www.bobclubs.com/pay I get the following message:- ERROR: cannot verify www.bobclubs.com's certificate, issued by `/C=US/O=GeoTrust, Inc./CN=RapidSSL CA': Unable to locally verify the issuer's authority. I am not 100 sure why this is as all issuer is OK, all items are secure and I get a padlock on all browsers. Can any one shed some light on this?

    Read the article

  • Simulating proxy in VMware

    - by BloodPhilia
    I'm currently testing out a new proxy system that I'd like to try out on my own computer. Because I do not have an additional PC available, I though I'd do it with VMware. Here's what I'd like to do: The physical computer is to make an internet connection using the VMware proxy and not the router. Is this (1) possible and (2) if so, how am I to accomplish this? Thanks!

    Read the article

  • setup dns to redirect all http requests on a specific machine in LAN

    - by mox601
    Hello, i should set up the following configuration with 2 machines: machine A issues HTTP requests machine B serves the pages requested by A For testing purposes, i want that EVERY HTTP request issued by machine A gets served by machine B. For example, machine A browser tries to access www.website.com/article.php?1234 machine B has a folder in its http server that has the content and replies to A. How can I set up a dns on machine B to point ALL requests to itself? Thanks

    Read the article

  • How to reinstate toolbars on an embedded PDF with Firefox and Adobe Reader plugin?

    - by Grundlefleck
    Using Firefox I was viewing a PDF file embedded within a web page, with the toolbar available. After right-clicking to deselect the toolbar (I was testing something) I cannot find a way to reinstate them. Since the toolbar is enabled by right clicking on the toolbar area, when it's disabled, it's not obvious how to reenable it. When the toolbars have been disabled and no longer visible, how do you reinstate them? Version info: Firefox 3.6.3 Adobe Reader 9.3 Kubuntu 10.04

    Read the article

  • Virtual machine management on windows using vagrant and veewee [closed]

    - by Aidan
    I wish to use vagrant and possibly VeeWee to construct and maintain virtual machines to automate some testing of servers etc. I am having problems getting them up and running on windows. Is there any are there any takes-nothing-for-granted setup blog posts or instructions anywhere? I live in a Microsoft world so all this Ruby/Git is new (and exciting!) to me but it does mean that I could do with everything being spelled out to me in excruciating detail! Cheers

    Read the article

  • Exchange 2010 Setup

    - by Hemal
    Hello, I am testing MS exchange 2010 SP1 for our firm. It's new exchnage installation as we don't have any previous versions. I installed Exchange 2010 with SP1 on Windows server 2008 SP2 (64-bit) with typical settings which has 3 server roles: hub transport, mailbox server, client access. But now I got stuck how to finish basic configuaration to get email flow from/to my server. I really appreciate any response to help me with the next steps.. Thank you in advance for any replies, Hemal

    Read the article

  • VMware ESXi VMI Paravirtualization vs 64-bit OS

    - by netvope
    VMware ESXi 4 supports VMI paravirtualization for 32-bit OS but not for 64-bit OS. For performance consideration, is it better to use a 32-bit Ubuntu Server guest without paravirtualization or a 64-bit one with VMI paravirtualization? Hardware: Core 2 Quad, 8 GB RAM Workload: Software development/testing, webserver, database

    Read the article

  • How to get code of different version of a web application build on tfs 2008 server.

    - by CHAMPION
    Hi, I have been created a web project on tfs server and set a build for this application, which builds the application daily. i want to give a specific version of build to testing team, but if that version was build successfully before two or three days, how can i get the source code of that particular build which was build successfully a few days before. Thanks and regards CHAMPION

    Read the article

  • The real differences between Red Hat Enterprise Linux (RHEL) and CentOS

    - by w00binda
    I know that "the vast majority of changes made (by CentOS team ndr) will be made to comply with the upstream vendor's re-distribution policies concerning trademarked names or logos" But I'm looking for a way to measure the real differences between RHEL and CentOS. My goal is to demonstrate "scientifically" that is possibile to use CentOS for development and testing purpose and use RHEL in the production environment. Any suggestion? Thanks in advance.

    Read the article

< Previous Page | 164 165 166 167 168 169 170 171 172 173 174 175  | Next Page >