Search Results

Search found 17374 results on 695 pages for 'option strict'.

Page 220/695 | < Previous Page | 216 217 218 219 220 221 222 223 224 225 226 227  | Next Page >

  • Server restarted while rebuilding array, what to do?

    - by user239054
    It's a HP ProLiant DL380 Generation 7, that has four hard drives, one is dead, I suppose that another one is dead too, but is there any way to force the array to rebuild again? The server has restarted while it was rebuilding an array. My windows server(2008) that is on it won't boot, it goes directly to system recovery screen. I have an image backup, would restoring it be my only option?If I restore, it will get back to regular automatically or will I have to configure something?

    Read the article

  • Get sublime text 2 (sublimecodeintel) to parse mason

    - by user813182
    So Sublime Text 2 seems to getting a lot of love lately. I am using the Sublime Code intel plugin, https://github.com/Kronuz/SublimeCodeIntel for auto completion. The problem is, it does not recognize .mi files as MASON files. I looked into the lexer and it does have the keywords in place. How do I force it to be parsed as MASON? Running "Set Syntax: " on ctrl+shift+p, does not show a MASON option.

    Read the article

  • KeePass: use a key file or a regular password?

    - by RCIX
    I'm setting up a KeePass database and it offers the ability to use a key file, which it says is more secure because it can use a longer and more complex password but is easier to break because you only need the key file to open the database. I'll only be using the key file on 2 computers (one desktop and one laptop), wo which is the best option? Note that it's definitely more appealing to use the key file for me because i have a hard time remembering anything close to a random password.

    Read the article

  • Backup server 2008 system state without using wbadmin?

    - by Beuy
    Is it possible to backup the System State of a 2008 server without using wbamdin? The setup in question does support the requirements that wbadmin forces (all volumes are marked as critical). Third party tools are an option but I would like to keep away from the big money sinks (BE etc)

    Read the article

  • How to stop switchable graphics from switching to high-power GPU when charging the laptop?

    - by Saifallah
    I've an Acer laptop with Windows 7 64 bit and an ATI Radeon HD 6550M Graphics card. Whenever I connect the power to charge the battery it automatically switches to the high-power GPU (ATI) instead of the low-power (Intel) GPU. There's an option in the bios to stop such thing but it makes the GPU runs always on high-power and I can't switch to the low-power GPU. How can I prevent the switchable graphics from automatically using the high-power GPU when charging?

    Read the article

  • Wireless vs. Wired: which is faster?

    - by studiohack
    I have the option of hooking up my machines to the internet either wirelessly or via ethernet cable (wired). I'm curious as to which is faster; the approximate wireless signal strength (average) is about 60%. My question is, would my internet be faster if I used ethernet, resulting in a stronger connection?

    Read the article

  • How to get UAC to co-operate with synergy2

    - by Kimvais
    How do I get UAC to behave so that I can control the dimmed desktop and programs running under UAC grants with synergy client? (The kb and mouse are connected to a Linux machine, windows is running synergy client) Or is turning UAC off the only option?

    Read the article

  • Customizing Notifications in XP

    - by Wesley
    Hi all, Under taskbar properties in Windows XP SP3, there is an option to customize the notification area. However, when I'm trying to customize the past items, I see that there are nearly 100 different items, the majority of them are programs which have been uninstalled ages ago. How can I eliminate all the past items that are not installed on my computer and keep the ones that are installed on my computer? Screenie: (there are nearly 100 items, mostly nonrelevant, in the Past Items section)

    Read the article

  • When running a shell script, how can you protect it from overwriting or truncating files?

    - by Joseph Garvin
    If while an application is running one of the shared libraries it uses is written to or truncated, then the application will crash. Moving the file or removing it wholesale with 'rm' will not cause a crash, because the OS (Solaris in this case but I assume this is true on Linux and other *nix as well) is smart enough to not delete the inode associated with the file while any process has it open. I have a shell script that performs installation of shared libraries. Sometimes, it may be used to reinstall versions of shared libraries that were already installed, without an uninstall first. Because applications may be using the already installed shared libraries, it's important the the script is smart enough to rm the files or move them out of the way (e.g. to a 'deleted' folder that cron could empty at a time when we know no applications will be running) before installing the new ones so that they're not overwritten or truncated. Unfortunately, recently an application crashed just after an install. Coincidence? It's difficult to tell. The real solution here is to switch over to a more robust installation method than an old gigantic shell script, but it'd be nice to have some extra protection until the switch is made. Is there any way to wrap a shell script to protect it from overwriting or truncating files (and ideally failing loudly), but still allowing them to be moved or rm'd? Standard UNIX file permissions won't do the trick because you can't distinguish moving/removing from overwriting/truncating. Aliases could work but I'm not sure what entirety of commands need to be aliased. I imagine something like truss/strace except before each action it checks against a filter whether to actually do it. I don't need a perfect solution that would work even against an intentionally malicious script. Ideas I have so far: Alias cp to GNU cp (not the default since I'm on Solaris) and use the --remove-destination option. Alias install to GNU install and use the --backup option. It might be smart enough to move the existing file to the backup file name rather than making a copy, thus preserving the inode. "set noclobber" in ~/.bashrc so that I/O redirection won't overwrite files

    Read the article

  • How to antialias trendline in Excel?

    - by user23122
    I have created a couple of line charts in Excel 2011 for Mac. The actual data line looks good and is antialiased in a nice way but when I then add a trendline it is jagged and ugly: I have tried "all" options available under Format Trendline, to no avail. There is an option "Soft Edges" but it doesn't seem to work as expected: when I increase the value there the trend line gets more and more narrow until it disappears.

    Read the article

  • How to export a brochure into PDF with each layout as a page?

    - by nhj
    I have created a 3-fold brochure in Mac iWork - Pages. If I print the brochure then I can 3-fold it and everything is fine. But if I want to export as PDF then I get a 2-A4 size pages, and this distorts the user the order of the pages, I would like to export each layout as a separate page. The 'Layout Break' option is diabled and I don't know how to enable it? Any ideas? Thanks.

    Read the article

  • Manage internet connection for a programm

    - by michel
    I'am using a Windows 7 pc with 2 networkcards one for public line and one for internal line behind proxy. is there a way or a software programm where i can manage wich programm(outlook, WM) use wich internet connection or networkcard use the option of interface metric is not where i was looking for. someone also suggest me Zonealarm. but i dislike this programm. thx

    Read the article

  • Windows 8 Fails to resume from sleep

    - by AnonymousAppDev
    I have this weird issue. When I put the computer to sleep by pressing the power button, or using the sleep option in Charms, I can wake it up normally. However, if I close the lid, and later reopen it, all the fans come on, but nothing appears on the screen. I didn't have this issue using Windows 7. Here are my system specs: HP G60-235DX Notebook PC Intel Pentium Dual Core T4200 at 2.00Ghz 3 GBS of RAM Intel Graphics Media Accelerator 4500MHD with 1309MB of video memory Windows 8 Pro 64 bit

    Read the article

  • VS 2003 Application Hang

    - by Vijay Bobba
    have installed VS 2003 in my XP VM, which was shared from a remote drive, after installing, when I tried to open new windows application, the IDE freezes, I have tried it many times, repairing, uninstalling .net 1.1 and VS 2003 and again install, mapping the share drive to my local, etc., After all these trials I was left with no option I know... Any help on this is highly appriciated. Thnaks, Vijay.

    Read the article

  • How do I allow programs that generate "high" or "severe" alerts in MS Security Essentials?

    - by Alex O
    Microsoft Security Essentials seems to allow only quarantine or delete actions for program that it deems to have "high" or "severe" risk. However, it also assigns these levels to what it considers to be "hacking tools". Is there a way to override this nanny behaviour and force programs on the allowed list? Thank you. EDIT: Here's a screenshot showing the lack of an "Allow" option in the drop-down list: http://img820.imageshack.us/img820/3870/msse.png

    Read the article

  • Convert word to "JPEG-like" pdf file

    - by Chheang
    I've got a word document I'm trying to save to an uneditable, unselectable PDF file. Essentially, I'd like it to look like a JPEG, but in PDF format. I'm trying to avoid "printing to tiff, THEN printing to PDF." I'd prefer to go directly from Word to PDF. Additionally, I don't want to add a Password or anything. Does an option exist for this? Thanks!

    Read the article

< Previous Page | 216 217 218 219 220 221 222 223 224 225 226 227  | Next Page >