Search Results

Search found 21778 results on 872 pages for 'stewart may'.

Page 223/872 | < Previous Page | 219 220 221 222 223 224 225 226 227 228 229 230  | Next Page >

  • is it possible for a host to maintain a tcp connection with two hosts with the same IP?

    - by wenzi
    I have two hosts A and B and a host(called client here) C C will establish a tcp connection with A, and send http requests to A then A will relay the HTTP requests to B (the relaying may be seconds of delay) and B will spoof its IP address as the IP of A and send http response to C I know there is sequnce number inconsistency problem, but is it possible to trick the TCP protocol to make the connection viable? thanks!

    Read the article

  • Skype works without problem on you ?

    - by Freshblood
    Today and few days ago i have tried to connect by skype and i couldn't any .So i thought that i can remember wrong password and changed but result was same .It try to connect always and can't connect.Other person who was waiting me on skype has said on email that skype hardly connect on me too.It looks skype dead.it may just problem on me . please can u tell me it works on you ?

    Read the article

  • Open Source Excel training documentations?

    - by William
    I'm a trainer, basically. I'd like to find some sort of Excel-based training that's under the creative commons, or another awesome license. I want to use it to train others, and make it better. If this doesn't exist, I may have to write it. Because it should.

    Read the article

  • How to get linux to stop asking "There are # rows, list them anyway? [n/y]" for auto-completing

    - by Michael
    How do I get tcsh to stop asking if I want to list files in a directory that may have a lot of auto-completes? For example, if I do: xemacs ../"TAB" to get the list of files it asks: There are 371 rows, list them anyway? [n/y] I don't want it to ask this, just list them.. it's getting tiresome. (Or how to at least set the tolerance to a higher number of auto-completes before it asks) Thanks.

    Read the article

  • How to run Hyper-V Virtual Machine Management Service using a domain account

    - by Selhoum
    I have an Domain account with admin priviliges and I need to use that account to run the Hyper-v Machine Management Service. my goal is to use that domain account to create VMs using ISO files that are in a different server within the same domain. I was told that if I use the local account to do this things may not work. How do I run the Hyper-V Virtual Machine Management Service under a domain account?

    Read the article

  • Nginx proxy with SSL Authentication

    - by Dustin Oprea
    I need to proxy an SSL-authenticated connection to another server that requires an SSL authenticated connection. I realize that the incoming and outgoing connections of the proxy may have different certificates, but is it possible to call proxy_pass and tell it to use a certificate/private key for connection to the proxied system? Based on the documentation, it doesn't seem possible. Maybe with another module?

    Read the article

  • How to wipe free disk space in Linux?

    - by Alex B
    When a file is deleted, its contents may still be left in the filesystem, unless explicitly overwritten with something else. "wipe" can securely erase files, but does not seem to allow erasing free disk space not used by any files. What should I use to achieve this?

    Read the article

  • Apache: scope for environmental variables

    - by Anonymous
    While there's documentation available on Apache environmental variables, I can not find answer to one important question. Imagine I use rewrite rules to set environmental variable RewriteRule ... ... [E=something:1] What is the scope of "something" - global Apache server (this means "something" will be available for other request transactions), this request (means that "something" is only valid for THIS http request (and its related processing - but what's about internal redirects and other internal stuff - are they considered as THIS request, or another one?), and may be set differently within another (concurrent) request?

    Read the article

  • system is not Starting correctly when Booting windows

    - by sharza
    This menu allows you to select a hardware profile when Windows is started If your system is not starting correctly, then you may switch to a previous system configuration, important: system configuration changes made since the last successful start up will be discarded. Profile 1 If I choose Profile 1 (the only choice) Windows loads normally. This menu always appears when I turn on the computer. Is there any can solve it?

    Read the article

  • Why Windows Live Photo Gallery stopped displaying thumbnails, and how to fix it?

    - by Alex R
    I now get this instead, for most (but not all) photos. This is the icon which represents the WLPG application, I think. Some observations: I can see the thumbnails fine in Explorer, which is where a lot of other people have this problem. My C:\ drive may have temporarily filled up at some point recently, but then was cleaned up. Double-clicking on the photo will display it fine, so I know it's not file corruption or permissions issues. Thanks

    Read the article

  • What would be a quick fix in case of server downtime due to sudden high traffic?

    - by PMoubed
    Let's consider a scenario like below: A small web blog build based on LAMP stack and deployed on a shared hosting. Suddenly it becomes popular in one day and it gets million hits per day. Since the developer have not consider high traffic, it caused server downtime and crashes. What would be a quick fix for such a scenario? BTW I know on cloud Servers I may be able to add more RAM or CPU to avoid that like in Amazon EC2.

    Read the article

  • How to destroy a CD/DVD rom safely?

    - by HaLaBi
    I have old CDs/DVDs which have some backups, these backups have some work and personal files. I always had problems when I needed to physically destroy them to make sure no one will reuse them. Breaking them is dangerous, pieces could fly fast and may cause harm. Scratching them badly is what I always do but it takes long time and I managed to read some of the data in the scratched CDs/DVDs. What's the way to physically destroy a CD/DVD safely?

    Read the article

  • How much audio latency is noticeable by human brain?

    - by Borek
    I am choosing a wireless headset for my PC (I hate cables) and am looking at Sennheiser RS 170 / 180. They supposedly sound great, however, there is a 25ms audio latency. I've heard that this is OK when watching TV or listening musing but is bad for games. The question is - has there been any research / hard data that would show how much of a delay is noticeable by human brain? 25ms doesn't sound like a lot but I may be wrong.

    Read the article

  • TrueCrypt partition will no longer mount

    - by sparkyuiop
    I am hoping for some advice to help me out of my situation, with luck. I have a computer running Windows 7 Ultimate x64 with 3 hard disks installed. On my 2TB hard disk 2 (non-system disk) I have 4 partitions. One is for music, another for video, a downloads partition and a 500GB RAW Truecrypt encrypted partition / volume that I had setup to mount with 4 photographs used as keyfiles. The 4 photographs are located in my 'Documents' partition which is one of four partitions on my 1.5TB hard disk 1 (non-system disk) When I setup the disk encryption I did not (I'm 99% sure) create a password, I only used the 4 photograph keyfiles to mount the volume. Recently my 1TB hard disk 0 (system / boot) started to fail so I decided to replace it. I was going to clone the old disk to a new disk but decided that a fresh installation would be more beneficial. Once I had transferred all the required 'User Data' from my old hard disk 0 (C: disk) I discarded it. I reinstalled Truecrypt, pointed to the partition, selected my 4 keyfiles photographs and I mounted my encrypted volume with no issues. In fact I mounted it several times after re-installing Windows and after reboots. Now all of a sudden when I try and mount it I get the message "incorrect keyfile(s) and/or password or not a Truecrypt volume". Now I am not sure why this happened as I do not recall exactly what I did between last mounting the volume successfully and it not mounting. Here are some of the possible things I may have done to cause it to stop working but I am at a loss as to where to start to try and resolve the problem. 1. I had swapped the drive letters to a preferred order. 2. I possibly swapped the physical SATA connectors on the mainboard. 3. I enabled 'Hot Plugging' for the two non-system hard disk SATA ports and the DVD SATA port in the BIOS. I have tried changing the encrypted partition drive letter as suggested in another post but this does not help. On my old system the encrypted drive was drive "X". I have about tried it with all the other free drive letters but alas nothing changes. I do not recall what drive letter was allocated to the encrypted partition before I changed them all. I have not tried to change the letter back to what it possibly was to start with as I am happy with the current layout. I will try this is anyone thinks it would be worthwhile though. I do hope I have managed to convey my situation in an understandable manner and live in hope someone could help me recover years of personal files. Thank you very much for taking the time to read my post and for any suggestions you may offer. Regards Phillip Thorne (UK) Anyone???

    Read the article

  • optimizing a windows server 2003 storage capacity

    - by Hosni
    I have got a windows server 2003 with partitioned Hard drive 10Go and 80Go, and i want to improve the storage capacity as the little partition 10Go is almost full. So i have got choice between partition the hard drive to equal parts, or set up a new hard drive with better storage capacity.knowing that the server has to be on service as soon as possible. Which one may be the better solution that takes less time and less risks?

    Read the article

  • FTP script needs blank line

    - by Ones and Zeroes
    I am trying to determine the reason for some FTP servers requiring a blank line in the script as follows: open server.com username ftp_commands bye Refer to blank line required after username credentials. Example from: FTP from batch file another reference to the same: http://newsgroups.derkeiler.com/Archive/Comp/comp.sys.ibm.as400.misc/2008-05/msg00227.html Also discussed here: archive.midrange.com/midrange-l/200601/msg00048.html "The behavior I'm observing is the same as if I didn't specify the password to login." with an answer referring to our same fix... archive.midrange.com/midrange-l/200601/msg00053.html and archive.midrange.com/midrange-l/200601/msg00065.html Note: It is my experience that FTP questions attract uncouth responses. Admittedly FTP is outdated, but many clients still have legacy systems, which they cannot upgrade or replace. The reason thereof should not be discussed here. The intention of this question is to invite a positive response. Please do not respond if you disagree with the above. If you have never encountered this same issue, please do not respond. I suspect this may be limited to FTP scripts executed from Windows machines, but have been told that this happens often and with many different servers. My specific interest is to understand what may cause this as I have a real world example of a production system suddenly requiring this as a workaround fix, after running for many years without issue. The server belongs to a third party who claims no change on their end. Server details unknown and cannot be determined. Any help or encouragement from someone who has come across the same, would be appreciated. ps. Sorry for the many words and references to painful responses, but I have asked similar questions on serverfault and elsewhere and unfortunately got back kneejerk responses to FTP and respondents debating the validity of the question. I would truly not ask, or re-post this question online if I had a better understanding of the issue. I know of people who have seen this issue, but don't know what causes it. I am wary that this question would again turn into another irrelevant discussion. Please, I ask very nicely: Please do not respond if you have not encountered a similar issue. FURTHER EDIT: Please do not suggest changing the product. The problem is not the blank line requirement. We know this fixes the issue. The problem is not being able to explain the reason for the blank line in the first place. Slight difference, but a critical point to note wrt the answering of this question.

    Read the article

  • lan extension over wide area

    - by avinash
    when we use technology like leased line to extend a lan over a wide area(like when connecting two offices such that hosts in both offices use private ip addresses) , why do we use encapsulations like ppp or hdlc...what can't we use the ethernet header to communicate because mac addresses are unique and can easily be used to identify hosts just like a small area lan... this question may seem a bit absurd but it has been bugging me...so plz explain

    Read the article

  • what are the components you can install on RHEL?

    - by user16654
    I just got a question from a customer(actually from a customer to my manager then to me) and he is asking the following question: What are the components that were installed with RHEL? It may sound like a silly question but to me it sounds vague. The main thing I am thinking about now is during install you can select three components: webserver software development and virtualisation. Could they be asking fro something else?

    Read the article

  • source command in Linux

    - by Rodnower
    My question is: why if I run some file with name aliases for example with content such as: alias lsa="ls -a" directly: $ ./aliases it don't create the alias (may be only in script context). But if I run it with command "source": $ source aliases it do the work? I mean after execution the alias "lsa" existing in context of command shell? "man source" give: "No manual entry for source", and in google I just found that it runs Tcl, but why Tcl influence shell context and bush not?

    Read the article

  • Cheap NAS for connecting a USB drive to the network

    - by olaeld
    I am looking for a cheap way of hooking up a USB drive to the LAN. This could be a router with a USB port, or possibly a more regular NAS device with a USB port. I am hoping to find something below $200. But if there is a device with "magical properties" I may be interested to hear about it anyway.

    Read the article

  • unable to install visual studio 2005 on windows 7

    - by div
    after downloading vs2005 sp1 and vs2005 upgrade for vista to install vs 2005 on windows 7,when i tried to intall firstly the vs2005 sp1 i got this error message"The up patch cannot be installed by the windows installer service because the program to be upgraded is missing,or the upgrade patch may update a different version of program.verify that the program to be updated exist on your computer and you have correct upgrade patch"....i have saved VS80sp1-KB926601-X86-ENU (1) and VS80sp1-KB932232-X86-ENU in d: drive...pls help...what shud i do to install vs 2005 on windows 7

    Read the article

  • How to upgrade windows 2008 to 2012

    - by Jerry2
    I may seem retarded but I searched internet extensively, also: http://download.microsoft.com/download/0/4/B/04BD0EB1-42FE-488B-919F-3981EF9B2101/WS2012_Licensing-Pricing_Datasheet.pdf I hve yet to find HOW MUCH is the upgrade and where to buy upgrade licence and if I can upgrade "in place" or not. I just found that I CAN upgrade from 2008 Web edition to 2012 standard edition but the rest I can not find any info on prices. Can anybody point me to the right direction, please?

    Read the article

  • What do the "ALL"s in the line " %admin ALL=(ALL) ALL " in Ubuntu's /etc/sudoers file stand for?

    - by sri
    What does each ALL mean? I understand that the whole line indicates that the admin group members get admininstartive privileges, but would like to know more info about the position of the ALLS and if they each refer to a different set of permissions or something like that? $sudo cat /etc/sudoers ... # User privilege Information root ALL=(ALL) ALL #... %sudo ALL=(ALL) ALL # #includedir /etc/sudoers.d #Members of the admin group may gain root privileges %admin ALL=(ALL) ALL # If it matters: OS: Ubuntu : 10.4

    Read the article

  • Why does Windows 7 change the properties of my shortcuts?

    - by JimDel
    I've got a shortcut on my desktop for an executable on a mapped drive. Lets say the Z: drive. If I change the mapping of the drive from say Z: to S: and then double click on that shortcut, my executable will open because Windows changed the properties of that shortcut to run from the S: drive. While this may be handy in some circumstances, its NOT for me. How can I prevent Windows from modifying my shortcut to what it thinks I want. Thanks

    Read the article

< Previous Page | 219 220 221 222 223 224 225 226 227 228 229 230  | Next Page >