Search Results

Search found 8593 results on 344 pages for 'regular expression'.

Page 178/344 | < Previous Page | 174 175 176 177 178 179 180 181 182 183 184 185  | Next Page >

  • How to swap the "fn" use of Function keys on al Apple Keyboard in Linux

    - by jfmessier
    I have an apple slim keyboard (USB) and if I want to use one of the Function Key as-is, I also have to press "fn " key first. Otherwise, it will try to perform the other function of the key, such as increasing or decreasing the display intensity, change the volume/mute, etc.... As well, the fn key is actually in the position of the "insert" key for regular keyboards. How can I fix all of that ? I really like this keyboard, as it make my typing much easier, and much more silent too. But some of those mappings that are different sometime bug me. Thanks :-)

    Read the article

  • What’s the password for my FileVault 2 boot volume?

    - by cbowns
    Apple’s support document for FileVault 2 (a.k.a. “full disk encryption” or “FDE”) has lots of information about enabling FDE and what it means for booting the machine. However, it doesn’t cover one very important thing I’m trying to do: mount the drive in the Recovery HD environment to reinstall OS X on it. The Recovery HD environment asks me for the volume passphrase so it can mount my drive and try to install OS X onto it. If this were an external drive which I’d manually enabled FDE on with diskutil, or an external Time Machine volume, I’d know it because it makes you pick one (just like a regular login password), but FileVault 2 never asked me for a volume passphrase (I assume it selects one behind the scenes). I’ve tried my main user’s password, but that doesn’t work, and neither does the recovery key set for the volume. Keychain Access doesn’t have anything that I could find. How do I unlock this volume?

    Read the article

  • VPN for a small organization

    - by user24091
    I am in charge of a small office network that has < 10 users. I want to be able to offer them access to the network from their home internet connections. At the moment we have a regular ADSL-router-firewall to provide local network access and a fixed IP address. I know there are enterprise-level VPN solutions, but these obviously won't be available to us because of the cost and complexity. What small-scale solutions are around that you could recommend, what would we need to deploy on the client side, and what would the clients need to do to access the VPN? Simplicity and low cost need to be the keys here. Thanks

    Read the article

  • Unable to resolve FQDN, hostname works

    - by HannesFostie
    We are having an issue where computers who are not part of the domain cannot resolve the FQDN of a server (but regular hostname and ip do resolve). The strange thing is that this does work when the computer is added to the network. Our domain name is rather long, its something along the lines of "team.dept.company.com", could that be it? DHCP server passes along the proper DNS, Name and WINS servers, as well as the domain name. I thought that should've solved the problem, but apparently not really. Our domain is still windows2003 EDIT: I am starting to believe I can narrow this down to a problem either with the vmware tools NIC drivers that are embedded in my winPE boot image, or to the fact that I'm trying to do this from inside a VM. Pinging a FQDN at the same time when using a different task sequence on a physical machine works.

    Read the article

  • grep is inconsistently defaulting to grep -P?

    - by Sammitch
    I have a script that does some housekeeping that works perfectly well when invoked from an interactive shell, but did nothing when invoked by cron. To troubleshoot this I started a shell with a 'blank' environment with the command: env -i /bin/bash --noprofile --norc Using this blank env I've dug into my script and found that the following grep will not match any files: grep -il "^ws_status\s*=\s*[\"']remove[\"']$" However, when run from an interactive shell the command will return the filenames of the matching files. As a note, the expression is matching lines like: WS_STATUS = "remove" Through trial-and-error I discovered that adding -P to the options [Perl regex] the command started working normally in the 'blank' shell. However, I have no idea why my login shell appears to be defaulted to grep -P. There is only one grep binary, /bin/grep There are no aliases defined for grep=pgrep or grep="grep -P" There is no env variable GREP_OPTIONS defined. What's the deal here? Note: OS is RHEL v5.10, Bash is v3.2.25, grep is v2.5.1

    Read the article

  • iPhone App to Remotely Control Windows Media Center

    - by Barry-Jon
    Can anyone recommend an iPhone app, for non-jailbroken devices, that can be used to remotely control Windows (7, if it matters) Media Center from outside the home WiFi network? The objective is to be able to connect to the Media Center box during the day when I am not home. For instance, if I realise that the new series of [insert very trendy new show here] is starting tonight and I hadn’t set up a series link I could fire up the app and set my machine to record it. Solutions could include native iPhone apps, iPhone optimised web apps or regular web apps.

    Read the article

  • Apache default NameVirtualHost does not work

    - by Luc
    Hello, I have 4 Name Virtual Hosts on my apache configuration, each one using proxy_http to forward request to the correct server. They work fine. <VirtualHost *:80> ServerName application_name.domain.tld ProxyRequests Off ProxyPreserveHost On ProxyPass / http://server_ip/ ProxyPassReverse / http://server_ip/ </VirtualHost> I then tried to add a default NameVirtualHost to take care of the requests for which the server name does not match one of the four others. Otherwise a request like some_weird_styff.domain.tld would be forwarded to one of the 4 VH. I then added this one: <VirtualHost *:80> ServerAlias "*" DocumentRoot /var/www/ </VirtualHost> At the beginning it seemed to work fine, but at some point it appears that the requests that should be handed by one of the 4 regular hosts is "eaten" by the default one !!! If I a2dissite this default host, everything is back to normal... I do not really understand this. If you have any clue... thanks a lot, Luc

    Read the article

  • Queston about torrents

    - by c0mrade
    Why do my torrents go at rate 25/30 kb/s and my regular http downloads rate up to 300 kb/s .. is my ISP to blame for this, I meant torrents have like thousand seeders and again its very slow.How are they blocking torrent speed, can I bypass it? @gekkz Results : * There's no indication that your ISP rate limits all downloads at port 6881. In our test, a TCP download on a BitTorrent port achieved at least 392 Kbps while a TCP download on a non-BitTorrent port achieved at least 223 Kbps. You can find details here. * There's no indication that your ISP rate limits all uploads at port 6881. In our test, a TCP upload on a BitTorrent port achieved at least 314 Kbps while a TCP upload on a non-BitTorrent port achieved at least 191 Kbps. You can find details here.

    Read the article

  • Immutable hard links on ext3/4?

    - by shovas
    In my research on file versioning at the fs level, snapshotting, and related ideas, I took a look at hard-links and exactly what they are and how they behave. Using rsync you can get a pretty slick poor man's snapshotting system up and running on file systems that don't natively support it. But, can you get immutable hard links on ext3/4 or any other file systems for that matter? My definition for immutable hard link is: A hard link which, when changed on one location, becomes a regular copy and no longer a hard link. I would like this because it would enable snapshotting use of the source data to link against instead of a copy of the data (in the case of the rsync snapshotting technique). I have gigabytes of data that can't be duplicated due to space restrictions but I have enough room if I can intelligently snapshot individual changed files with the rest linked to the source not a copy. Given all that, is there some other technique, feature or technology I'm really looking for?

    Read the article

  • Question regarding the SELinux type enforcement file

    - by Luke Bibby
    In my SElinux te file, I define two new types called voice_t and data_t which certain directories will be classified in the fc file (/data/ will be of type data_t and /voice/ will be of type voice_t). I would like the one SELinux policy to be used for all servers in my network, but, some servers will log VoIP data and other servers will be used to log IP data. I only want the voice_t type to be defined on some servers and data_t to be defined on the others - is this possible? I have tried using an if statement with a boolean expression, and then defining the type when the condition is true but this does not seem to work (it tells me there is a syntax error at 'type data_t'' or 'type voice_t;'). Example: if (data_logger) { type data_t; } else { type voice_t; } Any help would be greatly appreciated. Cheers, Luke

    Read the article

  • Ghost application error

    - by yaar zeigerman
    Back story for better understanding: I have a ghost made by someone else and toady some one I worked with made a new ghost in the same folder with the regular ghost I work with. I am trying to run the ghost now but get a 1808: Ghost Decompression Error and after aborting I get this message "Application Error 19225: Ghost has detected corruption in the image file. Please perform an integrity check on the image. If this problem persists, contact Symantec Technical Support at http://service.symantec.com" I would like to now if him making a new ghost could have ruined the old ghost and if not where did my problem come from and how do I fix it ?

    Read the article

  • Windows 7 won't recognize backup set can I script extracting the files in some other way?

    - by datatoo
    The Windows 7 Backup/Restore created multiple backup sets and I was able to restore the oldest version, but not the most recent, which is not seen by the application. I do see all of the zip files and there are hundreds in later versions. Is there a way to extract each of these correctly outside of the regular restoration method? Perhaps scripting an extract of each day one after another? further clarifying The backup files were all made to an external drive. The original computer died completely, power supply, drives everything. I am trying to reconstruct as much as possible and the only backup set recognized is 6 months older. This was recovered over a new install, but unzipping thousands of zip files is not really a simple unzip copy project as the original paths are not a simple thing to reconstruct.

    Read the article

  • Are all bluetooth adapters the same ?

    - by ldigas
    I have a wireless bluetooth mouse which I'm not using. It used to have a bluetooth adapter with it, which I lost a long time ago ... (don't ask). Since my regular mouse just died (bad contact in cable from messing with it too much) I was thinking of buying just the new generic bluetooth adapter ? Are all those adapters the same thing ? Or can this that came with the mouse be somehow different ? Edit by ldigas: How would one find out what bluetooth standard/class/adapter one needs ? (I don't see anything useful written on the sticker on the mouse). Or to put it bluntly - will it work with this one in your opinion ?

    Read the article

  • Growing the size of a VM's disk in VMware

    - by soandos
    I have a VM that I originally gave 10 GB to (using VMware workstation, and Ubuntu 11.10 is the guest OS). I now wish to add to that. I have seen the option to expand the disk size, but all that does is create a new "partition" that Ubuntu can see. Is there a way to expand the size of the primary partition that the guest OS is using? NOTE: I have seen something regarding doing this for a regular Ubunbu OS that requires a boot disk. Is there a way that I can apply that to this VM case? Using Windows 7 64-bit as the host OS EDIT: To be clear, I am trying to resize the boot partition. Edit 2: GParted's resize option is greyed out.

    Read the article

  • Is there a Linux distro that will easily run "embedded style" on a Raspberry Pi?

    - by Dan Harper
    I need a Linux distro that will give me the following: Run on a Raspberry Pi Can reliably survive power loss (like via a read-only filesystem) I've been able to hunt down some documentation on how to change a regular Linux distro over to read-only mode. I was hoping that there would be a distro already built that was designed to run in an embedded environment. I don't need many packages or drivers, just enough to have the Pi working with USB/Ethernet. I don't need any GUI interface or anything, this will just be running a custom service built in C. Does anyone know of a distro that would fit?

    Read the article

  • MS Office Communicator: Long delays in setting up audio connection when starting a call

    - by geofftnz
    I am using Microsoft Office Communicator with a USB headset as my work phone. OCS is connected to our PABX so we can take and make calls to regular, non-OCS phones. When making an external call to a cellphone, it can take up to 5-10 seconds for audio to start flowing. eg: Work Phone Cellphone - dial cellphone (ringing) (ringing) answer cellphone (hearing nothing) speak "1" . speak "2" . speak "3" . ... . speak "14" hear "15" speak "15" hear "16" speak "16" Has anyone experienced this kind of thing with an OCS setup? Any pointers?

    Read the article

  • .htaccess - permissions forbidden

    - by user1732521
    I have an error with a new virtual host that I can't figure out.. My .htaccess doesn't have web access (403). [Thu Oct 31 17:51:01 2013] [crit] [client ] (13)Permission denied: /srv/data_disk/www /site.dev/.htaccess pcfg_openfile: unable to check htaccess file, ensure it is readable I have set the permissions for the complete htdocs folder to 755, and to owned by my regular user and group (www-data). I have other vhosts set up with the same user and lesser permissions (rw-rw---) on the .htaccess. The virtual hosts are also setup in the same way.. as far a I can tell.. Thanks!

    Read the article

  • Windows XP scheduled tasks and defragmenting?

    - by Gathris
    I am trying to set a seduled task to defrag my HDD on a regular basis and following the guide on http://www.microsoft.com/windowsxp/using/setup/learnmore/tips/gehrke1.mspx. It does not work. That process only brings a DOS window which does nothing (well it displays some text about the Microsoft defragging program). I tried using the "%SystemRoot%\system32\dfrg.msc C:" as the command path that is in the start menu but that brings up the program to start a defrag job and doesn't start automatically. What am I missing?

    Read the article

  • Did Firefox running in OSX get hacked

    - by z-buffer
    When I try to do a google search in Firefox, I can't click on any of the links. They're just regular black text, not hyperlinks. I even tried safe mode and disabling all the plugins. I was running Firefox 12. I installed the current version over it and it's the same thing. Other browsers have not been affected. This is what it looks like. Edit: My firewall was turned off and I had several things running which are potential security holes. I turned on my firewall and closed all unnecessary ports. I also turned off Home Sharing. Then I restarted my computer. After that, Firefox works normally again. What do you think happened?

    Read the article

  • I get Get-WmiObject : Generic Failure error on an XP Machine. What needs to be done to get rid of this?

    - by steeluser
    I am trying make an uninstall app which removes an application X on a regular basis. The starting point to access applications installed in a Windows machine is through retrieving them from a WMI Class called Win32_Product. But when I run the basic command like this, I get the below error. I have searched technet and SO, but either their workarounds did not work for me or were too technical in detail which did not make sense to me. Please help. SO Link ps$ Get-WmiObject -class win32_product IdentifyingNumber : {09959E11-AD5D-408E-96AF-E3346954D6B8} Name : Shared Add-in Extensibility Update for Microsoft .NET Framework 2.0 (KB908002) Vendor : Microsoft Version : 1.0.0 Caption : Shared Add-in Extensibility Update for Microsoft .NET Framework 2.0 (KB908002) Get-WmiObject : Generic failure At line:1 char:14 + Get-WmiObject <<<< -class win32_product + CategoryInfo : InvalidOperation: (:) [Get-WmiObject], ManagementException + FullyQualifiedErrorId : GetWMIManagementException,Microsoft.PowerShell.Commands.GetWmiObjectCommand

    Read the article

  • Windows 7 can't connect via ethernet to Airport Extreme

    - by Mr AJL
    I have an Airport Extreme router, and everything works beautifully on the Mac, but my Windows 7 computer, which is connected via a regular ethernet cable, can't see any network. The Windows computer says there's no cable connected. Any ideas? Is there some kind of setting you have to enable with the Airport utility? I looked everywhere but can't find anything. Or do I need to install that Airport utility something on the PC just to connect to the router? (Haven't tried because the PC has no CD drive)

    Read the article

  • Restrict VPN user to Remote Desktop only with Sonicwall

    - by Matt
    Basically I want him to only be able to log onto the VPN in order to use Remote Desktop to use HIS machine. Not surf the internet or do anything like that, but just use the programs on his machine that he doesn't have at home. We use a Sonicwall NSA 220 with their regular VPN client. I can create a user for him, but when I create an access rule it applies to all VPN users. How can I make something like that only apply to ONE user?

    Read the article

  • Line numbering per paragraph in Word 2007

    - by WaelJ
    How can I use line numbering in Word 2007, but for each paragraph? (By line numbering I mean the one from Page Layout/Setup, not regular list numbering) So something like this: 1 Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. 2 Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat 3 Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat

    Read the article

  • Making an apache module work only for a particular sub domain

    - by Abhinav Upadhyay
    Hi everyone. I am not a regular webmaster , I am a student working on an internship project which is an Apache2 module, so my knowledge of Apache configuration is limited. I want to configure my module for a particular sub domain of the host server. Lets say I want my module to work only for onclick.localhost , then what are the directives required ? I want the module to be invoked only for the hosts/virtualhosts for which it has been configured explicitly. I know how to setup sub domains in Apache, so that's not a problem. Thanks.

    Read the article

  • How to remap a NERDTree shortcut in VIM

    - by btelles
    Hi There, I use the Dvorak keyboard layout with VIM, and the 't' key is the 'up' motion when editing a regular file. The problem is that NERDTree remaps 't' to open files in a new tab. How can I undo that mapping and use 't' for the up motion in NERDTree? Here are the relevant lines from my vimrc file and from the NERDTree plugin. My .vimrc: no t k NERDTree plugin file: exec "nnoremap <silent> <buffer> ". g:NERDTreeMapOpenInTab ." :call <SID>openInNewTab(0)<cr>" call s:initVariable("g:NERDTreeMapOpenInTab", "t") let @h=@h."\" ". g:NERDTreeMapOpenInTab.": open in new tab\n"

    Read the article

< Previous Page | 174 175 176 177 178 179 180 181 182 183 184 185  | Next Page >