Search Results

Search found 12083 results on 484 pages for 'general purpose'.

Page 191/484 | < Previous Page | 187 188 189 190 191 192 193 194 195 196 197 198  | Next Page >

  • How to invoke a command using specific proxy server?

    - by Xiè Jìléi
    Some applications support proxy (http proxy or socks proxy), and some are not. For browsers, I can specify proxy server in the preferences/options dialog, and other applications may be able to configure proxy servers in config files. For general purpose, can I invoke a command using a specific proxy? Like following: $ proxy-exec --type sock5 --server 1.2.3.4:8000 -- wget/ftp ... I'm using Ubuntu Maverick. P.S. In win32, it can be implemented by hijacking the socket dlls, maybe, I'm not familiar with Linux programming, but I guess it's possible in Linux. though.

    Read the article

  • Is Zabbix the right tool for me?

    - by hortitude
    I just want to monitor a small handful of servers (less than 10). From reading various places it sounds like the top leading contenders (for open source at least) are: nagios munin zabbix From what I have read a lot of people tend to use munin and nagios together -- munin for history and graphs, and nagios for alerting. On the other hand it sounds like Zabbix is a more complete solution and easier to configure than either of the other two. So I was thinking of going that route. My thoughts right now are: What are the general disadvantages of Zabbix? Does Zabbix have a small footprint on boxes it is monitoring? Do I really need to setup an entire other server for it? I currently have a server that is under very light load -- can I dual purpose it?

    Read the article

  • chroot for unsecure programs execution

    - by attwad
    Hi, I have never set-up a chroot-jailed environment before and I am afraid I need some help to do it well. To explain shortly what this is all about: I have a webserver to which users send python scripts to process various files that are stored on the server (the system is for Research purpose). Everyday a cron job starts the execution of the uploaded scripts via a command of this kind: /usr/bin/python script_file.py All of this is really insecure and I would like to create a jail in which I would copy the necessary files (uploaded scripts, files to process, python binary and dependencies). I already looked at various utilities to create jails but none of them seemed up-to-date or were lacking solid documentation (ie. the links proposed in How can I run an untrusted python script) Could anyone guide me to a viable solution to my problem? like a working example of a script that creates a jail, put some files in it and executes a python script? Thank you very much.

    Read the article

  • how to combine multiple setup files into one big setup file?

    - by Black
    I am looking for a FREEWARE which combine multiple setup to one setup file so that when i install one setup file. it'll install all the setup file one by one. && no need to watch over it, till it install each & every programs inside it. Basically the purpose is whenever the OS is reinstalled, every time have to install each programs one by one & have to sit there until all are finished installed. There are some online programs which i do not want. Anybody has idea?? I am using windows 7 ultimate.

    Read the article

  • Does anyone use the PL/SQL Web Toolkit?

    - by colinjameswebb
    Does anyone use the PL/SQL Web Toolkit at all? We use it for internal reporting where I work. However, does anyone have any experiences of it for producing client-facing websites? General advantages/disadvantages compared to other web languages, such as JSP, PHP etc

    Read the article

  • Can processor cores thrash each other's caches?

    - by Jørgen Fogh
    If more than one core on a processor is accessing the same memory address, will they thrash each other's caches or will some snooping protocol allow each to keep the data in L1-cache? I am interested in a general answer as well as answers for specific processors. How many layers of cache are invalidated? Will accessing another address within the same cache-line invalidate the entire line? What can you do to alleviate these problems?

    Read the article

  • How to sync my PDA (outlook, no wifi) with my Google Calendar?

    - by Peter
    Hey Everybody, We have an old PDA that is not networked (Mio 168). It's main purpose is to serve as an agenda for which we use the outlook that came with it. Now, as my wife usually has the PDA and I want to be able to check and update our agenda too, I'm looking for a way to sync it with Google Calendar by hooking it to my PC via USB. I found a tool to sync outlook with Google Calendar. However, I would need outlook on my PC to be able to use that and I don't have outlook on my PC, nor do I want to buy it just for this sync. So, does anybody here now if and how I can sync my outlook on my PDA with Google Calendar without the go between of a PC version of outlook? Cheers.

    Read the article

  • Is there a recommended logging path/folder for ASP.NEt applications?

    - by the-locster
    Currently we use log4net and create a new folder (usually below C:) with write and create access rights for the worker process user. Is there perhaps a standard windows folder we should or could be using such as LOCALAPPDATA? I'm guessing that LOCALAPPDATA is a bad choice in the general case because IIS users tend to be non-interactive users and thus I don't think they have the usual user folder structrues available.

    Read the article

  • Connecting guest OS to host os internet connection hyper-v

    - by autrevo
    Hyper-V internal switch and VM OS interfacing with Guest OS and IP Cofiguration When configuring hyper-v internal switch, Apart from physical lan adapter (say adapter 1), I see another LAN adapter (say adapter 2) added in host os. And we already have one virtual lan adapter in guest os, (say adapter 3) . adapter 1 is connected to internet with defaulty gateway say, 192.168.0.254 and uses class C IP. By con configuring adapter 2 and 3, I need to acheive two purpose - Access internet in guest os. seemlessly share files & folders between guest and host OS. Please, suggest, What is the best way to configure IP of these three adapters ?

    Read the article

  • Silverlight and Search Engines

    - by Ben
    Hi, I have recently started learning SilverLight (and Web developement in general) and have been advised by a friend that SilverLight isn't Search engine friendly (because Silverlight isn't HTML). Is there any way of getting around this and getting my site onto the Search engine lists (without paying)? (Any advise on getting my site on search engines lists would be greatly appreciated). Thanks

    Read the article

  • How can I quickly set the iPhone deployment target in Xcode?

    - by nevan
    I was reading this great article about Base SDK and Deployment targets and decided to try it out myself. The Deployment target seems to be buried in the Build settings, and not that easy to access compared to the Base SDK target (which is right there in the General tab of the project settings). To get to the Deployment settings now I have to Get Info, go to the Build tab, then search for "Deployment". Is there a quick way to check and access the Deployment target in Xcode that I'm missing?

    Read the article

  • Samsung TV connected to PC for Powerpoint

    - by Skaughty
    I have a 42" Samsung LCD TV connected to a Dell computer with a PCI Radion 9000 via a 35' VGA cable. It's purpose is to run power point presentations over the TV for our retail store. I have tried every combination of button clicking on the video card options, and everything on the TV, and I still get black bars on the top and bottom of the image. It looks like I am watching a old wide screen movie on a full screen TV. The TV's suggested resolution is 1024x768, and that is what the output is set to. I have tried this with a nVida PCI card as well with the same results.

    Read the article

  • How do i run the Android command line tools?

    - by fordays
    I'm still pretty new to Android and programming in general, and I can't seem to get the command line tools packaged with the Android SDK to work. I'm running Mac OSX and each time I try to run layoutopt, for example, the terminal returns, *-bash: cmd: command not found * Also, is it okay to have my SDK located in the Developer directory and my android project in some unrelated directory when using these tools?

    Read the article

  • Use of ebay API

    - by Hab
    I am given a task to R& D ebay api. As i have tried to explore on net i still have no clear idea that how and why to use it in my apps. Also are there many ebay api's for different purposes? Any sample code available using this api in objective c for iPhone. Any doc available providing general info about it.

    Read the article

  • server performance metrics report and practicality

    - by Anjesh
    I have a need of preparing web server (apache-php) performance report containing important metrics like CPU usage, disk io, memory usage on user basis. Couple of domains are hosted in the same server and they run from separate users using fcgi. The reason being sometimes some hosted applications take lots of cpu usage, making the server slow for other applications (running as separate users). i am planning to develop scripts for this, as i can't seem to find any simple utilities for this purpose. This script will take snapshots of the user wise metrics at defined periods say 15 minutes and record it. Any abnormalities will be reported via emails. How practical is that? also would be interesting to know what else need to be recorded.

    Read the article

  • What is the best way to organize object oriented code?

    - by Adam
    I haven't coded in java for a long time, and after coding in C, I'm having issued organizing my code for OOP. More specifically I'm not sure when to create a new method, and when to create a new class, and when to just lump everything together. Are there some general rules or guidelines on how it should be done?

    Read the article

  • Is there an encrypted write-only file system for Linux?

    - by Grumbel
    I am searching for an encrypted file system for Linux that can be mounted in a write-only mode, by that I mean you should be able to write/append files, but not be able to read the files you have written. Access to the files should only be given when the filesystem is mounted via a password. The purpose of this is to write log files and such, without having the log files themselves be accessible. Does such a thing exist on Linux? Or if not, what would be the best alternative to create encrypted log files? My current workaround consists of simply piping the data through gpg --encrypt, which works, but is very cumbersome, as you can't get easy access to the file system as a whole, you have to pipe each file through gpg --decrypt manually.

    Read the article

  • Can gems be used by ruby code compiled with macrubyc

    - by sal
    MacRuby 0.5 includes a ruby compiler built on LLVM called macrubyc. Does anyone know if it would be possible to dynamically load gems from compiled code? Or compile the gems and link them in? Is this planned? Or how compiled code will be able to make use of gems in general.

    Read the article

  • Exploring the Factory Design Pattern

    - by asksuperuser
    There was an article here: http://msdn.microsoft.com/en-us/library/Ee817667%28pandp.10%29.aspx The first part of tut implemented this pattern with abstract classes. The second part shows an example with Interface class. But nothing in this article discusses why this pattern would rather use abstract or interface. So what explanation (advantages of one over the other) would you give ? Not in general but for this precise pattern.

    Read the article

  • Simple PHP form Validation and the validation symbols

    - by Cool Hand Luke UK
    Hi have some forms that I want to use some basic php validation (regular expressions) on, how do you go about doing it? I have just general text input, usernames, passwords and date to validate. I would also like to know how to check for empty input boxes. I have looked on the interenet for this stuff but I haven't found any good tutorials. Thanks

    Read the article

< Previous Page | 187 188 189 190 191 192 193 194 195 196 197 198  | Next Page >