Search Results

Search found 15266 results on 611 pages for 'young people'.

Page 183/611 | < Previous Page | 179 180 181 182 183 184 185 186 187 188 189 190  | Next Page >

  • how to report some illegal website to FBI or crime department [closed]

    - by steve
    hello all I asked this question on stackoverflow and they suggested this I dont know whether i can ask this question here or not I am finding many web forums supportingstealing of personal info like creditcards and they selling at 2$ each and thye making gift vouchers of main auction websites and selling them 500$ at 10$ (these guys looping people hardwork ) where can i report these type of sites if i found in internet ? can anyone please tell me exactly where can i report regards steve

    Read the article

  • What can be done in Windows 7 that can't be done in Windows XP?

    - by emddudley
    In Jeff Atwood's latest blog entry on Windows 7 he talks about getting people to move off Windows XP. What, specifically, can be done in Windows 7 that cannot be done in Windows XP? I'm not looking for usability or GUI improvements, unless they happen to significantly reduce the time that it takes to perform tasks that were previously prohibitively time consuming.

    Read the article

  • Power supply for HP Workstation xw4100

    - by Nathan Adams
    Does anyone know if the HP Workstation xw4100 takes a "special" power supply? I know there was a time when everyone was using their own PSs with different pinouts, but I was under the impression that enough people complained and all the companies switched to standard power supplies.

    Read the article

  • Your favorite open source tool (that is not very famous)

    - by sucuri
    I believe every system admin is used to open source by now. From Apache to Firefox or Linux, everyone uses it at least a little bit. However, most open source developers are not good in marketing, so I know that there are hundreds of very good tools out there that very few people know. To fill this gap, share your favorite open source tool that you use on your day by day that is not very famous. *I will post mine in the comments.

    Read the article

  • How do you google bad reviews? [closed]

    - by zlog
    The first thing I like to do before I make technology choices or gadget purchases is find bad reviews of the things. That way, taking into consideration of the potential biases of the reviewer, I can evaluate the product/service for the worse it can be. How do people google (or search in general) for bad reviews? I usually just try googling "bad review [product/service]" or "[product/service] sucks", but I'm sure there are better ways.

    Read the article

  • Does PS3 browser handle gzipping?

    - by Yegor
    Not sure if this would be a correct place to post, but here it goes. Ive been getting reports form people who try accessing my site from a PS3, that every page appears like a jumble of random characters on a white background, sorta like echoing out a gzipped string as plain text. Im using nginx. Does the PS3 browser not support gzipping? Anything I can do except disabling it?

    Read the article

  • How to make new copied file always 777 permission

    - by Master
    I have one Linux ext3 partition shared on network. Now when some one copy files from MAc , then other people can't change the file dute to permission problem. Is there any way that ane new file which is copied will always have 777 permission and some specific user as owner of file not the default user thanks

    Read the article

  • How much did it cost our competitor to DDoS us at 50 Gbps for two weeks?

    - by MiniQuark
    I know that this question may sound like an invalid serverfault question, but I believe that it's quite valid: the amount of time and effort that a sysadmin should spend on DDoS protection is a direct function of typical DDoS prices. Let me rephrase this: protecting a web site against small attacks is one thing, but resisting 50 Gbps of UDP flood is another and requires time & money. Deciding whether or not to spend that time & money depends on whether such an attack is likely or not, and this in turn depends on how cheap and simple such an attack is for the attacker. So here's the full story: our company has been victim to a massive DDoS attack (over 50 Gbps of UDP traffic, full-time during 2 weeks). We are pretty sure that it's one of our competitors, and we actually know which one, because we were the only two remaining competitors on a very big request for proposal, and the DDoS attack magically stopped the day we won (double hurray, by the way)! These people have proved in the past that they are very dishonest, but we know that they are not technical at all, so we believe that they simply paid for some botnet DDoS service. I would like to know how much these services typically cost, for such a large scale attack. Please do not give any link to such services, I would really hate to give these people any publicity. I understand that a hacker could very well do this for free, but what's a typical price for such an attack if our competitors paid for it through some kind of botnet service? It is really starting to scare me (if we're talking thousands of dollars here, then I am really going to freak off: who knows, they might just hire a hit-man one day?). Of course we filed a complaint, but the police says that they cannot do much about it (DDoS attacks are virtually untraceable, so they say), and our suspicions are not enough to justify them raiding our competitor's offices to search for proofs. For your information, we now changed our infrastructure to be able to sustain such attacks: we now use a major CDN service so that our servers are not directly affected by DDoS attacks. Requests for dynamic pages do get proxied to our servers, but for low level attacks (UDP flood, or Syn floods, for example) we only receive legitimate trafic, so we're fine. If they decide to launch higher level attacks (HTTP flood or slowloris attacks for example), most of the load should be handled by the CDN... at least I hope so! Thank you very much for your help.

    Read the article

  • Office 2007 Calendar Overlays - Combine meetings that everybody shares

    - by Macho Matt
    I want to display approximately 10 people's calendar in Outlook 2007 using overlays. The problem is that they all share the same meeting a couple of times a week. Thus, I see that show up 10 times on a single day, which compresses what is actually displayed. Since they are all at the same meeting(s), it would be nice to have them just display once. Is this built into Office 2007?

    Read the article

  • Reset Windows system to factory defaults

    - by carlosz
    A friend just bought a netbook (HP mini 110) with Windows XP but it was the one used for testing in the store (the last one on storage) so it's somewhat filled with stuff from people testing the machine. How should I go about restoring the system to a ? As a first step I'm going to create a new User account and delete the old one (from the store). How do we change the name It's registered to? What other things should I take in account?

    Read the article

  • SSH tunneling hangs with many connections

    - by middleofdreams
    I am forced to use SSH tunneling to access many servers (over 100) via one gateway server. To keep connection alive I am using autossh. Everything works pretty well until there is high traffic (people are connecting to most of the servers at once). then ssh process reaches 12% of cpu (which is configured maximum for separate process) and no connection is working anymore - i have to restart autossh script. What could be the possible reason for that?

    Read the article

  • How can I set the BIOS/EFI security password on IBM System x servers by script/ASU?

    - by christian123
    I want to deploy IBM System x servers (like IBM System x 3550 M2) automatically and need to set a security password in the bios (actually it's uefi). I found this nice tool named ASU: http://www-947.ibm.com/systems/support/supportsite.wss/docdisplay?brandind=5000008&lndocid=MIGR-55021 Unfortunately I cannot see an option to set the password. Forum searches only show me people who want to reset the password using this tool. Does anybody know how to automatically deploy system passwords on IBM Intel-based servers?

    Read the article

  • Why can't Windows home editions connect to domains?

    - by TyrionLannister
    The company that I work for continuously hires new people, and I'm the one who has to go and purchase new computers. The majority of them, if not all, come pre-installed with Windows Home editions. I'm noticing that the Windows 7/8 Home editions are unable to connect to domains. I'm having to buy the upgrades to the Pro editions. I'm trying to understand as to why the Home edition of the OS is unable to connect to domains?

    Read the article

  • How do I choose the number of connection for load balancer?

    - by user105196
    I want to add hardware load balancer for apache and I want to know how many people are connected to my server to to choose the type of load balancer: Local Load Balancing with SSL - 250 Connections Local Load Balancing with SSL - 500 Connections Local Load Balancing with SSL - 1000 Connections I run the following commands in the same time: netstat -nt|grep -c :443 ( all connection wait and ESTABLISHED) result : 1208 netstat -ant | grep 443 | grep EST | wc -l ( just ESTABLISHED connection) result :106 My question: Whichever is the correct value to choose the load balancer all connection or just ESTABLISHED ?

    Read the article

  • If I uninstall Bonjour and Apple Mobile Device Support will transferring songs to my ipod via itunes

    - by Kate
    I am one of those people who hate to have even one unnecessary program installed. I noticed when I downloaded and installed itunes two other components were installed and shows up in my control panel Uninstall programs screen: "Bonjour" and "Apple Mobile Device Support". Are these two necessary for itunes to work? I never buy songs via itunes, just use the program to transfer smp3s to my ipod.

    Read the article

  • Differences between how OS X Snow Leopard and Lion interface with a proxy?

    - by Antoni
    We have a proxy at school, which requires a login/password, and blocks a certain number of sites that aren't "school related" (facebook, youtube, etc.) While I'm able to get through to most things, people who've upgraded to Lion can't get through to anything, even though I've replicated my proxy/network settings on their machines. Is it possible that the difference in OS versions is causing this? I have Snow Leopard, they have Lion.

    Read the article

  • Does overheating cause a computer to slow down?

    - by anonymous coward
    It's a pet peeve of mine that people leave the tower of their desktop computers in the small enclosed cabinet part of computer desks. I've heard that heat issues can cause problems with PCs, but is this realistic? Is leaving the desktop in a cabinet area, or above-average-room-temp, a realistic potential cause of slowdowns? (I'm completely aware that there are other contributing factors to computer 'slowness', just wondering if this is a realistic problem, or mostly mental).

    Read the article

  • 403 forbidden root on apache mac os x 10.7, but can access user directories

    - by philosophistry
    When I access http://localhost/ I get 403 Forbidden, but if I access http://localhost/~username it serves up pages. Things I've tried: - checking error logs - swapping out with original httpd conf files - changing DocumentRoot to my user directory (after all that should work if I can access ~username) I've seen 30 plus Q&A sites that all point to people having trouble with user directories being forbidden. I have the opposite problem, and so I'm tearing my hair out here.

    Read the article

  • 'less' doesn't clear screen after quit

    - by Dana
    The default behavior for 'less' is to clear the screen after quitting. This behavior stopped when I started using: export TERM=xterm Now 'less' leaves the last page I viewed on the screen, and I want to re-enable the default behavior of clearing the screen. Googling this problem I found that people use the following command in their ~/.screenrc: altscreen on I'm not sure if this is a mac-issue but I don't have this command available. I'm using bash shell on Mac terminal. Thanks!

    Read the article

  • Local admin password recovery: Windows Vista

    - by Jim Dennis
    I am faced with an unsettling situation. A friend of my father's has rather suddenly become a widower. Naturally they've taken care of the bank accounts and all the normal mundane things that people have been doing for a century or so. However, she was the computer user of the household. He was aware that they had some online banking stuff and bill paying stuff ... and that she spent lots of time on FaceBook and stuff like that. However, he doesn't know what her local passwords were (actually only vaguely aware that her couple of desktop and couple of laptop system even had passwords). He's never heard of "admin" passwords so that's no good either. In the past I've used KNOPPIX and the old LinuxCare "bootable business card" to recover NT passwords. I've never done this with MS Windows Vista. So, I'm looking for the best advice on how to do this. Naturally I do have physical access to the systems (the two laptops are charging across the room from me; and her old desktop systems are, naturally, still back at his place). Getting it right is much more important than fast or easy (I don't want to mess up those filesystems and possibly lose some photos or other stuff that he or his kids or grandkids will want). (BTW: if anyone things this is some social engineering hack to play upon the sympathies of the community to get the information I'm asking for ... think about it for a minute. I know about IRC and the "warez" boards. I know I can find this stuff out there if I dig enough. I'm just asking here because it'll hopefully be faster and, secondarily to raise awareness. As more of us put more of our lives online ... as we get older and as places like FaceBook continue to widen the appeal of computing to a broader segment of older people ... we are, as computer nerds, going to see a lot more of this. Survivors will needs us to be careful, sensitive and ethically responsible as they try to recover those bits of legacy during their bereavement. I can now tell you, first hand, it sucks!)

    Read the article

  • What's a good(affordable) business router that can limit traffic to certain machines(ips/ports)?

    - by Ryan Detzel
    We are using the basic Verizon router but it sucks so we're looking for a new one that allows us to limit users and our hadoop cluster to certain limits. Our problem is one person can start downloading something and kill the network and every hour we download logs into our cluster but it floods the network unless we rate limit it. Ideally we want to be able to say: total: 35 mbps Hadoop Cluster (15 mbps) Phones (1 mbps) Office(25 people) (19mbps but no one machine can have more than 5mbps)

    Read the article

< Previous Page | 179 180 181 182 183 184 185 186 187 188 189 190  | Next Page >