Search Results

Search found 9008 results on 361 pages for 'undocumented feature'.

Page 186/361 | < Previous Page | 182 183 184 185 186 187 188 189 190 191 192 193  | Next Page >

  • What are the differences between MBR vs GPT vs any other partition scheme?

    - by Safran Ali
    Can anyone tell me what the main differences between i.e. MBR vs GPT or any other partition scheme are? Why would one choose one over the other? I am not an expert but from new release of Mac OS X which includes a feature called Time Machine, which I find highly useful. GPT is the requirement for Mac OS X Lion ... so on this basis I would say that GPT is more useful than MBR. What other partition schemes are there and which one should be used in which situation?

    Read the article

  • Turn off tap-to-select on IBM UltraNav keyboard

    - by gworley3
    I have an IBM UltraNav USB keyboard with a trackpoint and a touchpad. Using xinput I've gotten a number of things working how I would like, but I've got one remaining problem. I can't find a way to turn off tap-to-select on the touchpad. I've searched around and everyone describes how to do it using the synaptics driver, but for some reason I can't seem to get this installed and working correctly on my Ubuntu 10.04 install. What can I do to turn this feature off without having synaptics? I'm about to lose my mind from all the accidental clicks.

    Read the article

  • How to set up port forwarding and firewall settings for torrents using Transmsission on Mac OSX 10.5

    - by Liz
    I have picked up bits of advice here and there on the internet and got someway through this tortuous exercise (after it took 18 hours to download the first torrent I tried yesterday - magnet-link for a film). Where I have got stuck is with configuring the firewall on the Netgear Router but I am not sure if I have caused the problem myself by something else I have done configuring the Mac System Preferences for Security or Networking. I have been following the sections of these instructions that seem to apply, although they are written for a different OSX version (don't know which one, but the screen shots do not match what I see) and I am not wanting to set up my Mac as a server and attending to the parts that apply to port forwarding for Netgear rather than LinkSys: http://homepage.mac.com/car1son/static_port_fwd_intro.html I have been trying to follow these instructions: Instructions for DG834, DG834G, DG824M, FR114W, FM114P, FR114P, FR328S, FVL328, FVS328, FVS338, FVX538, FWAG114, FWG114P, or FVS318v3 These routers do port forwarding by assigning port numbers to a "service" associated with the application you want to run. "Rules" are set for particular services. Rules block or allow access, based on various conditions such as the time of day and the name of the service. To Create a New Inbound or Outbound Rule 1. Submit the router's address in an Internet browser. (The default is 192.168.0.1). 2. Enter the router's username and password. 3. From the main menu, click Security > Rules. 4. Click Add for inbound or outbound traffic, as appropriate to the application you are planning to run. 5. Select the Service. The services the router knows about are listed in the drop down. If the service you want is not listed, add it as described in the next section. 6. Select the Action, for example ALLOW always. 7. For Send to LAN Server, enter the IP address of the local server. Note that this is also the IP address the computers on your LAN will access. 8. For WAN User choose Any, or limit access to particular IP addresses. 9. For Log selection it is reasonable to turn logs on, especially at the beginning when you are unsure of the result of the changes you are making. Later, you may want to set logs to "Never" for performance reasons. 10. Click Apply. As noted in user manual for some models: * Consider using the Dynamic DNS feature on the Advanced menu, so that external users can find your network when the DHCP lease is renewed by your ISP. * If your own LAN server uses DHCP, and your IPs change on rebooting, consider using the Reserved IP Address feature in the LAN IP menu. To Add a Service for These Routers 1. Click Security > Services > Add Custom Service. 2. Enter any name you choose for the service. 3. Select whether the service is to use TCP or UDP. If you are unsure, select both. 4. Enter the lowest port number used by the service. 5. Enter the highest port number used. If the service uses only one port number, enter the same number. 6. Click Apply. There is no "Security - Rules" submenu in the Netgear page, so I have been trying to access "Security - Firewall Rules". I can access everthing else in the Netgear settings as Admin but I cannot get the "Firewall Rules" section to open up. (I am not 100% sure I will know exactly what to do if and when I do get it opened up!) I haven't managed to find though searching the internet any instructions that would seem to apply specifically to what I am trying to achieve, so would be very grateful if someone could either point me in the right direction or give me some advice directly. Best wishes, Liz

    Read the article

  • Move flag for follow of a specific color to a folder in Outlook 2003

    - by Campo
    I have a user request to be able to create a rule that would move an email in outlook 2003 that the user flagged for follow up to a specific folder. That seemed simple enough till he requested that depending on the flag color they were to be moved to a specific folder. Issue is that in outlook 2003 that's not an option when creating a rule. I know that this is very straight forward in outlook 2007 and 2010 and using the categories feature is very convenient as it displays as a list when you right click.... Though in 2003 categories are not so convenient. as an example the user will flag for follow up as so... Red Flag for sales Blue Flag for requests Green Flag for personal They want a rule that will move all items with a red flag to the sales folder, Green flag to the requests folder and so on.... Thank you for your suggestions.

    Read the article

  • Advantages / disadvantages of having DynDNS access on a computer vs the router

    - by Margaret
    I have a shiny new toy, a Cisco Wireless-N Gigabit Security Router with VPN (WRVS4400N). While looking through the instruction manual, I discovered that it had support for DynDNS built-in. We've currently got the DynDNS client running on one of the servers (that people SSH to, as documented in this question); but the reason for the router update is to move away from SSH to VPN. To that end, is there any difference in behaviour/functionality/maintainability to run it off the computer, as opposed to the router? Thus far, DynDNS has more or less a set-and-forget setup, but since the feature was there, I wanted to know if it was a better location for the process...

    Read the article

  • Firewall issue with multiple SIP PROXY / REGISTRAR servers

    - by MikeBrom
    Hi We have a pair of Internet-facing SIP PROXY/REGISTRAR servers (for resilienced and load-balancing). When a SIP phone registers, it will be handled by one of the REGISTRAR servers (round-robin DNS) - and since this registration is renewed, the firewall port/address translation is maintained. Therefore, when a call is to be sent back to the phone the INVITE message passes successfully through the firewall. However, it is likely that the phone may register with one of the two servers, but the INVITE may come from the other. In this situation, the call fails since there is no translation in place on the firewall. Is there a feature in the SIP protocol to facilitate this? Any other ideas? As our traffic grows, we will no doubt end-up with more than two servers - so the problem will escalate. Thanks, Mike

    Read the article

  • How safe is locking the screen?

    - by D Connors
    So, both windows and linux have a pretty useful feature that allows you to leave everything running on the PC while also keeping invaders away by locking the screen. My question is: Say I leave my laptop with the screen locked while I go get a donnut, and then it gets stolen. Assuming the thief has access to whatever software he needs, how easy/hard would it be for him to access my (currently logged-in) account? Now let me be clear. I'm not asking if he can access the data on the harddrive. I know he can, and that issue would go under data encryption, which is not my question here. I'm focusing on how hard would it be to get around the "Insert Password" screen, and have full access to my account. I'm looking for answers regarding both OS's; but, if needed, assume Ubuntu. Thank you.

    Read the article

  • Recycle Bin for Windows Server 2003 File Shares

    - by Joseph Sturtevant
    One of the networks I administrate uses Windows Server 2003 File Shares to provide network storage for users. To prevent against accidental deletion, I use Shadow Copies to create snapshots twice a day. This method is only effective, however, for files which were on the share during the last snapshot. When users accidentally deleted files recently placed on the share, I have no recourse except to remote desktop into the server and attempt retrieval with an undelete utility (this is only effective if the file has not been overwritten). Is there a feature like the Windows Recycle Bin for Windows Server 2003 File Shares? What is the best way to protect my users against accidental file deletion in this scenario?

    Read the article

  • Redirecting subsite on same domain to other IIS using HTTPS

    - by Alberto
    I've seen many similar questions (and answers) on this subject, but none seem to be on exactly the same situation I am facing. Which is weird since I don't think it is that special, so forgive me if I haven't searched enough. Anyway. I have two websites which are on two IIS7, one facing WAN and one in the LAN. The WAN facing is already HTTPS-only. I want to add the second website, but on the same HTTPS domain and SSL certificate, so that it becomes a subsite like: https://www.domain.com/subsite How can I do a redirect or rewrite on the first IIS to the second one to make this work? I don't think there is a standard IIS feature that can do this. ISA server is not an option currently. But maybe another extension to IIS exists? Done this numerous times on Apache, and am about to ditch IIS for Apache.

    Read the article

  • How to subscribe to a youtube feed from linux command line?

    - by Tim
    I want to subscribe to a youtube channel and automatically download new videos to my linux machine. I know I could do this e.g. with miro, but I will not watch the videos using Miro, want to choose the quality and would like to run it as a cronjob. It should be able to: know which feed entries are new and not download old entries resume (or at least redownload) failed/incomplete downloads from older sessions Are there any complete solutions for this? If not it would be enough for me (maybe even preferable) to just have a command line rss reader that remembers which entries have already been there and writes the new video urls (e.g. http://www.youtube.com/watch?v=FodYFMaI4vQ&feature=youtube_gdata from http://gdata.youtube.com/feeds/api/users/tedxtalks/uploads) into a file. I could then accomplish the rest using a bash script and youtube-dl. What would be programs usable for this purpose?

    Read the article

  • What desktop chipsets support AMD's Rapid Virtualization Indexing?

    - by netvope
    Rapid Virtualization Indexing (RVI) is a hardware virtualization feature that can potentially give significant performance improvement. Intel's equivalent is Extended Page Tables. See http://en.wikipedia.org/wiki/Rapid_Virtualization_Indexing for more details. My question is: Does RVI require motherboard or chipset support? If yes, what desktop chipsets support it? I've ordered a Phenom II CPU (which supports RVI) but I haven't bought the motherboard. I'll install XenServer or VMware ESXi (which both support RVI) on the new computer.

    Read the article

  • Cannot WMI Query root\MSCluster namespace as Local Admin

    - by Matt Zuberko
    I'm trying to use WMI Explorer to query the root\MSCluster namespace on various hosts to obtain cluster resource group and resource object data. I can access the namespace with no issue on Win2K3 cluster nodes but am getting an access denied error attempting to connect to Win2K8 and Win2K8R2 nodes. I can access the root\cimv2 namespace with no issue, just the MSCluster namespace even though I am a local Admin. Is there a feature setting, local security policy or server role I have to be a member of to access the namespace? Thank you!

    Read the article

  • Apache Error Log - "Web Path" instead of Filesystem Path

    - by Craconia
    Hello everyone, I'm running Apache on Linux and I'm using OpenSSH to provide SFTP access to some customers so they can upload their pages and also look at their respective site logs (access & error). I'm using the new feature in OpenSSH to chroot their SFTP access and so far so good. My problem is that on the error_log, every reference for "File not found..." is given using the OS filesystem path as opposed to the "Web" path. I'd rather have the web path on the error log in order not to reveal the OS path. Since I'm already chrooting the users, I don't want to reveal WHERE on the OS their files are actually located... Is it possible to change this behaviour via any directive? I tried looking for it but couldn't find anything :( Thanks, Craconia

    Read the article

  • Must I have Exchange to use Blackberry Enterprise Server Express?

    - by John Spaz
    In the past I've setup BES (not express) for a company that just wanted their users on the corporate network, they didn't care for email or any other enterprise feature, they just wanted to push a policy that the phones internet should be routed through the corporate network. I want to setup BES Express now for a customer that also just wants the phones on his network but wherever I look, it says that BES Express requires Exchange. Is there a way to install BES Express without Exchange and without a AD Domain? Basically what the customer wants to accomplish is to be able to filter and log the internet access on the phones.

    Read the article

  • What is the keyboard shortcut to clear formatting on Office 2008 Mac?

    - by Laurent Bourgault-Roy
    I recently switched from a PC to a brand new Macbook Pro. I was happy to see that most of the keyboard shortcuts in Word 2008 where the same or almost the same than in Word 2007. However, there is one keyboard shortcut that I dearly miss : the clear formatting shortcut (ctrl + space on Windows). I know the feature exists since it's in the formatting bar, but I can't find the keyboard shorcut. I tried cmd + space but that is the system keyboard shortcut to switch the keyboard type. alt + space delete the text without deleting the formatting. ctrl + space doesn't seem to do anything. Does anyone know what the keyboard shortcut for the clear formatting command may be? I hope there's one because it's really painful to reach for the mouse everytime I put a title and I want to switch to a normal paragraph style...

    Read the article

  • Installing VS2010 components with SP1 beta

    - by Jesus Rodriguez
    Hello, I hope this is the place for this kind of question. I have VS2010 ult with the Service Pack 1 beta installed. I want to play with F# and I need to install it. The problem is that because I have the SP1 installed, the VS DVD can't install the F# compiler. I click on add new feature, I click on F#, the installer says: "A selected drive is not longer valid. Please review your installation path settings before continuing with setup." Of course the path is correct and I can't change it anyway... I think that problem is because I have the SP1. I had the same problem in the past with VS2008 + SP1. What can I do? Uninstalling VS2010 is not an option, it take ages. Thank you.

    Read the article

  • Changing Firefox Tab Cycle Order

    - by Mark Roddy
    When you use Ctrl-Tab in Firefox, you move through tabs in the order that they are listed in the tab bar at the top of the window. I would prefer that when I use Ctrl-Tab the next tab that I switch to is the most resently used tab. That way if I have two tabs I am using frequently I can easily switch between them without having to manually modify the ordering of the tabs via drag/drop. This is a feature that Opera has which I find to be very productive. Does anyone know of a setting or plug-in that will accomplish this for me?

    Read the article

  • Unable to access published programs on TS web access - win server 2008 OS

    - by varun
    I am using the TS Web Access feature provided by windows server 2008 to publish programs so that they can be accessed over internet using RDC client. I am able to access the programs from the intranet domain . However, when i try from outside the college network, i am only able to see the published programs but not connect to them as i get an error saying "Remote computer cannot be connected. The certificate subject name and the gateway address requested do not match." . pls note that i have created a self -signed certificate and installed on server myself. Also, i am using the direct IPAddress of the server as the gateway address. Since i am able to access programs from with domain , i suspect it to be a simple setting with gateway or certificate. Please let me know if any further info is required on this..any help is appreciated..

    Read the article

  • router w/ WOL out-of-the-box, or is known to work with open firmware

    - by Jaroslav Záruba
    I'm looking for a new WiFi router, and one key feature for me is WOL. Seems like many routers won't do this w/ factory firmware. Given my last router (Asus WL-520g) turned into a disco-brick couple hours after flashed to dd-wrt I'd prefer if the new one supported WOL out-of-the-box. other required features would be: dyndns service support port forwarding sometimes it is called "virtual server" I guess NAT loopback so I can access services running in my own network using dyndns hostname or public IP w/o getting too old (for example DIR-615 with factory firmware lets you wait literally minutes) did I mention WiFi? preferably w/ some range extending technology, if such stuff works at all

    Read the article

  • Troubles with MSVC++ redistributable

    - by Karolis Juodele
    A friend of mine is trying to install AutoCAD. In the install log it is written Install Microsoft Visual C++ 2005 Redistributable (x86) Failed Installation aborted, Result=1603 I've found a site which (hopefully) explains how to solve this: here However, my friend has not been able to uninstall the redistributables. The error message says The feature you are trying to use is on a network resource that is unavailable I've already suggested running this but that didn't help much. Only some of the redistributables could be uninstalled. What can be done? Do you think running some other cleanup tool could work? Or will we have to uninstall manually (how exactly would we do that)?

    Read the article

  • How to change contact picture in People app for linked contacts?

    - by Sergey
    I link contacts together in people app. Very usefull feature for me. But how can I change picture of contact? For example I link together Skype, Facebook and Gmail accounts of somebody and People app show me picture for example from Facebook for this contact. But I want set picture from Skype or Gmail. Or remove picture completely for example. Is it possible? I easily can do it on my Windows Phone 7.5, in same People app. Does Microsoft forget about this functional in windows 8?

    Read the article

  • How do I keep second monitor (HDTV) from auto-disabling in XP when it is turned off?

    - by ThantiK
    I have a new 32" TV that I hooked up to the HDMI port on the back of my video card to use as a second monitor. I used an HDMI/DVI cable to hook it to the TV, and whenever I turn my TV off, XP disables the device tied to the TV so each time I want to use the TV as the monitor, I have to go into my display properties and enable it; it gets pretty annoying. How do I turn this 'feature' off? -- I have an NVidia card should it be specific to the nvidia control panel.

    Read the article

  • Office 2011 Mac, Sync calendars with google apps and iPhone

    - by Vincent
    Our office will be using Office 2011 for email contacts and calendar. Currently we are using apple mail/ical and address book. My primary concern is syncing calendars with google apps. That said our primary feature that we use google apps calendar for is sharing calendars. Best way to using office 2011... To sync calendars with an iPhone? To sync/share calendars between users? To sync contacts with an iphone? To sync/share contacts with between users? Users are on other computers and mostly work from home Needs to be fool proof once setup :-) I am not fond of the idea of syncing outlook with Mac address book and ical then to the iphone.

    Read the article

  • What is a good hosted email service?

    - by rhooligan
    I am looking for a hosted email service for a handful of email accounts. It needs to be very reliable and provide a nice web mail interface. I would like an admin where I can manage accounts. I've used Communigate before, it's functional but ugly. Exchange web mail is feature rich enough, but isn't as performant as the later two contestants. I am currently paying $50/yearly for hosted Gmail through Google. The features of the web email client are fine for personal use, but not flexible enough for professional use. The administration tools also suck. In short, I want a hosted service with a better experience than gmail or Communigate but is still speedy.

    Read the article

  • Database checksum features - redundant? useful?

    - by Eloff
    Just about every mainstream DB has a feature to calculate checksums per page, per sector, or per record. Now for a DB that does full recover after any crash, like PostgreSQL, is a checksum even useful? There will be no data loss as long as the xlog is ok, no matter what kind of corruption happened to the data itself, as the redo log is replayed every committed transaction will be restored. So checksums are useless on restore. Doesn't the filesystem or disk keep checksums anyway to detect corruption? So unless the checksum is per record, all it does is tell you there is corruption - which the OS should be yelling at you the minute you try to read it - so useless in operation? I can't imagine how a checksum can be helpful in any sane database - but since they all use them - I'd say that's just failure of imagination on my part. So how is it useful?

    Read the article

< Previous Page | 182 183 184 185 186 187 188 189 190 191 192 193  | Next Page >