Search Results

Search found 16455 results on 659 pages for 'hosts allow'.

Page 226/659 | < Previous Page | 222 223 224 225 226 227 228 229 230 231 232 233  | Next Page >

  • Obtaining Second WAN - Want to keep

    - by ndavis
    My business is growing so I've decided to purchase a second DSL line, to separate two departments to allow for more bandwidth usage. Previously I had a network printer that served both departments. With the addition of the second DSL line, I'm potentially going to have two separate LANs. How can I set it up so that the new LAN still has access to the Network Printer, but ensure that they are still using the new DSL line?

    Read the article

  • Does a HP MDS600 fit in a HP 10636 G2 rack?

    - by Jasmine Lognnes
    In the Quick Installation Giide to the MDS600/D6000 storage server it says IMPORTANT: Some racks other than the HP Rack 10000 Series rack do not allow full access to hard drive bays 29-35 in hard drive drawer 2. I have a HP 10636 G2 19" Rack 36U (PN: AF011A). Question It is temping to think that the rack is supported, but can anyone comfirm that 10000 Series to HP means 10xxx, so my rack is supported?

    Read the article

  • How to make mounted external drive writable over SFTP

    - by Brandon
    I have a user that I log in with over SFTP to my Ubuntu box. They have permission to write to the home directory of course. The external hard drive gets mounted to /media folder but I can't write to it over SFTP while logged in with that user. How would I set the permissions to allow me to write to the drive?

    Read the article

  • How to filter RSOP to show only modified policies?

    - by guest
    Is it possible to view only those elements of GPO that are actually modified/specified? For example, when looking at RSOP for an OU, I have loads of options which are mostly not specified - can I automatically filter it to show only e.g. that it doesn't allow to use control panel or install software, instead of looking through all options? I am using Win2003 and I have only the default tools. Thanks in advance!

    Read the article

  • WinDirStat Save Report Option

    - by Josh R
    When running WinDirStat against a drive, I'd like the option to save the report so that I can look at it later while "offline" away from the system it was run on. I've looked around the program and can't see this option. Am I missing something, can this be done with WinDirStat? If it can't be done, is there a way similar to WinDirStat that will allow me to save the results of a drive space scan to delve into them at a later date?

    Read the article

  • How to map to Windows Server shares in Linux (Ubuntu) easily?

    - by TheCleaner
    I know how to get connected to a Windows share easy enough, and I've read how to change the fstab file to get it to mount at boot. The real question here is...can I create a few shortcuts on a common user desktop so that regardless of who logs into Ubuntu machine they can open that shortcut and it will open the Windows share? I would also need to allow AD credentials during login, so a link to that will help as well, but I'm sure I can search google for that part.

    Read the article

  • Software to create folder structure

    - by Arthor
    When we create a project, company or whatever we use a folder structure. Is there a software that can allow us to create a folder structure like that of visio and then export the folder structure out and also update existing folder structure with an NEW folders that are added to the folder structure? I do not want to just copy and paste, but rather a use a software to help and create a few templates. Thanks

    Read the article

  • Apache: Limit the Number of Requests/Traffic per IP?

    - by Ian Kern
    I would like to only allow one IP to use up to, say 1GB, of traffic per day, and if that limit is exceeded, all requests from that IP are then dropped until the next day. However, a more simple solution where the connection is dropped after a certain amount of requests would suffice. Is there already some sort of module that can do this? Or perhaps I can achieve this through something like iptables? Thanks

    Read the article

  • Web-based IMAP client with support for multiple mailboxes

    - by Nils
    I would like to switch from desktop-based e-mail software (Thunderbird) to a web-based solution that I run on my own web server. I have already tried out Roundcube and while it does work reasonably well so far there is one great feature from Thunderbird that seems to be missing - it doesn't allow me to have a unified mailbox for multiple IMAP accounts. Can anybody recommend a web-based IMAP client that has this feature?

    Read the article

  • restrict directory listing linux

    - by brainle55
    Hello. I want to restrict access to certain directories to my ssh users but allow them to read files by known path from there(mostly it's meant to be done by applications). How is that possible? Are there easy ways? Thank you.

    Read the article

  • How can I trick ssh to connect using different configurations based on current location?

    - by Sorin Sbarnea
    Here is the following use case: wanting to ssh server1 in 3 scenarios: server1 is on current network, go for it server1 is not on current network and you need to use a gateway (gw1) to access it, not a big problem as you can use ~/.ssh/config to define tunnelling for this you are on a network that does not allow you to access the first gw1, so you'll use gw2 for that. Desired outcome: be able to use the same command and be able to connect to the server.

    Read the article

  • Enabling Squid delay pool eats up the entire memory

    - by Supratik
    I am using "squid-3.1.8-1.el5" in my CentOS 5 32 bit system. In normal condition Squid uses 85m - 90m, but when I enable the delay pool parameters the memory usage suddenly rise up 2GB. The memory keeps on increasing until the system is out of resource. The following are my delay pool settings: delay_pools 1 delay_class 1 1 delay_access 1 allow all delay_parameters 1 192000/192000 Is there anything I am missing here or is it a bug with Squid ?

    Read the article

  • Control iTunes from Spotlight (or similar)

    - by joshhunt
    Is there some sort add on or program that lets me easily change (and choose) songs using keyboard shortcuts (or perhaps Spotlight)? The ideal program would add iTunes indexing to Spotlight and allow me to change songs by searching for them in Spotlight (but then not switch the focus to iTunes). I do believe that there was a plugin for Launchy on Windows to do a similar thing. Is such a program available?

    Read the article

  • recommend a host for .NET+ffmpeg+MySql+UrlRewrite?

    - by acidzombie24
    I need a host that supports the following ffmpeg (for audio) + oggenc which i found online MySql server (my code doesnt like MS SQL) Url rewriting. One server i tried didnt support /path/title because there was no .aspx and they did not allow modification to server since it was shared I configured apache in the past and was clueless with win server 08rc2. I prefer not to configure my own server. Also i am trying to keep the hosting price

    Read the article

  • Creating Test Sites

    - by Robert
    I have a website running off site. When we hire someone I would like to create a test site (a copy of live site) for the new employee to tinker with. I will need to take fresh copies of the Files and Database (basically a snapshot) and allow them to access these copied files and database so they could edit and upload them to see the changes they made as if it was the live site Basically what is the best practice for creating a copy of a website for testing? Server is running Linux, PHP, mySQL

    Read the article

  • How to download torrents from the office?

    - by blitzkriegz
    I have torrents blocked in my office. Was wondering whether there are any sites which allow to download torrents to their server so that we can download them via HTTP. If I have my home system running, can I get the files downloaded from my office? EDIT: Can I setup Torrent Relay service in my domain? If so how?

    Read the article

  • What else can I do to secure my Linux server?

    - by eric01
    I want to put a web application on my Linux server: I will first explain to you what the web app will do and then I will tell you what I did so far to secure my brand new Linux system. The app will be a classified ads website (like gumtree.co.uk) where users can sell their items, upload images, send to and receive emails from the admin. It will use SSL for some pages. I will need SSH. So far, what I did to secure my stock Ubuntu (latest version) is the following: NOTE: I probably did some things that will prevent the application from doing all its tasks, so please let me know of that. My machine's sole purpose will be hosting the website. (I put numbers as bullet points so you can refer to them more easily) 1) Firewall I installed Uncomplicated Firewall. Deny IN & OUT by default Rules: Allow IN & OUT: HTTP, IMAP, POP3, SMTP, SSH, UDP port 53 (DNS), UDP port 123 (SNTP), SSL, port 443 (the ones I didn't allow were FTP, NFS, Samba, VNC, CUPS) When I install MySQL & Apache, I will open up Port 3306 IN & OUT. 2) Secure the partition in /etc/fstab, I added the following line at the end: tmpfs /dev/shm tmpfs defaults,rw 0 0 Then in console: mount -o remount /dev/shm 3) Secure the kernel In the file /etc/sysctl.conf, there are a few different filters to uncomment. I didn't know which one was relevant to web app hosting. Which one should I activate? They are the following: A) Turn on Source Address Verification in all interfaces to prevent spoofing attacks B) Uncomment the next line to enable packet forwarding for IPv4 C) Uncomment the next line to enable packet forwarding for IPv6 D) Do no accept ICMP redirects (we are not a router) E) Accept ICMP redirects only for gateways listed in our default gateway list F) Do not send ICMP redirects G) Do not accept IP source route packets (we are not a router) H) Log Martian Packets 4) Configure the passwd file Replace "sh" by "false" for all accounts except user account and root. I also did it for the account called sshd. I am not sure whether it will prevent SSH connection (which I want to use) or if it's something else. 5) Configure the shadow file In the console: passwd -l to lock all accounts except user account. 6) Install rkhunter and chkrootkit 7) Install Bum Disabled those services: "High performance mail server", "unreadable (kerneloops)","unreadable (speech-dispatcher)","Restores DNS" (should this one stay on?) 8) Install Apparmor_profiles 9) Install clamav & freshclam (antivirus and update) What did I do wrong and what should I do more to secure this Linux machine? Thanks a lot in advance

    Read the article

  • Circumvent proxy filter that disables the download of EXE files

    - by elgrego
    Do you know of a way to download exe files although the web proxy has a filter in place not to allow this? I have searched for a feature web site that does automatic file renaming. That should certainly make it possible. The solution would take a URL and then change the extension so that it would look to my proxy as I was downloading a .dat file (or similar). There are perhaps other solutions to this problem.

    Read the article

  • var/www/ permissions

    - by mk_89
    I have purchases a server today and I am almost through configuring it, I have managed to install mysql and have enabled a firewall which allows access to ports 80, 22 and 443 I am trying to test out a simple php file to see whether all is well but I get a 404 Not found error, I am certain that this file exists which was created using vi as I have confirmed it using Filezilla. What am I missing? is there another step that I must take to allow a simple php file to work.

    Read the article

  • Wired USB mouse left button stops working

    - by InNeedOfHelp
    My wired USB mouse's left button stops working properly after being plugged into the computer for about five minutes. The mouse button will become sticky and not allow me to select things or the left button is completely unresponsive. The mouse driver is up to date. I am running Windows Vista Home Premium with the Service Pack 2 on a Sony Viao laptop (Model number (VGN-NW125J). If anybody knows how to fix this your help would be greatly appreciated.

    Read the article

  • Install Windows 8 without a Product Key

    - by User
    Windows 8 setup asks for the product key at the beginning of the setup without letting you install it. I got the Windows 8 ISO from MSDN but I didn't get enough keys to install it on all my 7 computers. Also, my MSDN subscription level doesn't allow me to get the VL product key to Windows 8 Enterprise. Is there any way I can install Windows 8 for a limited time period like we used to do for Windows 7 ?

    Read the article

  • router with mixed-mode enabled - does it really cripple speeds for all?

    - by Mark C
    Hey all, If I have a router that has "mixed mode" enabled to allow b, g, and n devices, it is true that n devices will suffer in reduced bandwidth if there are any non-n devices connected? I found one article on the internet after a quick google search: http://www.wi-fiplanet.com/news/article.php/3335801 Can anyone corroborate or give their opinion on the matter? Thanks!

    Read the article

  • adding response header to Jetty config file

    - by Sam007
    I am trying to add a response header to the Jetty configuration the following command, Access-Control-Allow-Origin: * Ok so this Jetty webserver is the base on which Geoserver is running. I asked this question in the GIS forum but no one was able to answer it so I felt I might get the answer here. I wish to add this response to the header to remove the error Unable to load XMLHttpRequest I wish to know that under which tags should I wrap this response header and where in the file should I save it.

    Read the article

< Previous Page | 222 223 224 225 226 227 228 229 230 231 232 233  | Next Page >