Search Results

Search found 21963 results on 879 pages for 'lance may'.

Page 227/879 | < Previous Page | 223 224 225 226 227 228 229 230 231 232 233 234  | Next Page >

  • How to find a folder on Mac OS X 10.5?

    - by user246114
    I'm on Mac OS X 10.5 (Leopard). What's the best way to find a folder for which I'm not sure of the full name? For example, I know the folder name I want is like: "farm-animal-type" But the full name may be something like: "farm-animal-type-horse" On Windows, I would just use the find tool through Windows Explorer.

    Read the article

  • MAX Connection Pool Setting SQL Server 2008

    - by dkeeshin
    We are expecting a large number of users to hit a Website built with IIS/.Net 4.0 that our SQL Server 2008 database server is providing data for. The database is around 2GB in size. We are contemplating increasing the MAX CONNECTION POOL to between 500 to 1000 -- to handle the estimated traffic. Two questions (1) Does anyone have any hard performance numbers indicating the kind of improvement this may provide? (2) What is the impact of hitting that MAX CONNECTION POOL number in a production enviroment?

    Read the article

  • Looking for a new, free firewall (Sunbelt has a huge hole)

    - by Jason
    I've been using Sunbelt Personal Firewall v. 4.5 (previously Kerio). I've discovered that blocking Firefox connections in the configuration doesn't stop EXISTING Firefox connections. (See my post here yesterday http://superuser.com/questions/132625/sunbelt-firewall-4-5-wont-block-firefox) The "stop all traffic" may work on existing connections - but I'm done testing, as I need to be able to be selective, at any time. I was using the free version, so the "web filtering" option quit working after some time (mostly blocking ads and popups), but I didn't use that anyway. I used the last free version of Kerio before finally having to go to Sunbelt, because Kerio had an unfixed bug where you'd eventually get the BSOD and have to reset Kerio's configuration and start over (configure everything again). So I'm looking for a new Firewall. I don't like ZoneAlarm at all (no offense to all it's users that may be here - personal taste). I need the following: (Sunbelt has all these, except *) - 1. Be able to block in/out to localhost (trusted)/internet selectively for each application with a click (so there's 4 click boxes for each application) [*that effects everything immediately, regardless of what's already connected]. When a new application attempts a connection, you get an allow/deny/remember windows. - 2. Be able to easily set up filter rules for 'individual application'/'all applications,' by protocol, port/address (range), local, remote, in, out. [*Adding a filter rule also doesn't block existing connections in Sunbelt. That needs to work too.] - 3. Have an easy-to-get-to way to "stop all traffic" (like a right click option on the running icon in the task bar). - 4. Be able to set trusted/internet in/out block/allowed (4 things per item) for each of IGMP, ping, DNS, DHCP, VPN, and broadcasts. - 5. Define locahost as trusted/untrusted, define adapter connections as trusted/untrusted. - 6. Block incoming connetions during boot-up and shutdown. - 7. Show existing connections, including local & remote ip/port, protocol, current speed, total bytes transferred, and local ports opened for Listening. - 8. An Intrusion Prevention System which blocks (optionally select each one) known intrustions (long list). - 9. Block/allow applications from starting other applications (deny/allow/remember window). Wish list: A way of knowing what svchost.exe is doing - who is actually using it/calling it. I allowed it for localhost, and selectively allowed it for internet each time the allow/deny window came up. Thanks for any help/suggestions. (I'm using Windows XP SP3.)

    Read the article

  • seaudit report detail

    - by user1014130
    I've just started using selinux in the last 6 months and am getting to grips with it. However, using sealert on a new CENTOS 6 server, Im not getting the level of detail I was with CENTOS 5. To illustrate: Running sealert -a /var/log/audit/audit.log On CENTOS 5 I get: Summary: SELinux is preventing postdrop (postfix_postdrop_t) "getattr" to /var/log/httpd/error_log (httpd_log_t). Detailed Description: SELinux denied access requested by postdrop. It is not expected that this access is required by postdrop and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: Sometimes labeling problems can cause SELinux denials. You could try to restore the default system file context for /var/log/httpd/error_log, restorecon -v '/var/log/httpd/error_log' If this does not work, there is currently no automatic way to allow this access. Instead, you can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Additional Information: Source Context root:system_r:postfix_postdrop_t Target Context system_u:object_r:httpd_log_t Target Objects /var/log/httpd/error_log [ file ] Source postdrop Source Path /usr/sbin/postdrop Port Host Source RPM Packages postfix-2.3.3-2.1.el5_2 Target RPM Packages Policy RPM selinux-policy-2.4.6-279.el5_5.1 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name catchall_file Host Name server109-228-26-144.live-servers.net Platform Linux server109-228-26-144.live-servers.net 2.6.18-194.8.1.el5 #1 SMP Thu Jul 1 19:04:48 EDT 2010 x86_64 x86_64 Alert Count 1 First Seen Wed Jun 13 11:43:55 2012 Last Seen Wed Jun 13 11:43:55 2012 but on CENTOS 6 I just get: Summary: SELinux is preventing postdrop (postfix_postdrop_t) "getattr" to /var/log/httpd/error_log (httpd_log_t). Detailed Description: SELinux denied access requested by postdrop. It is not expected that this access is required by postdrop and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: Sometimes labeling problems can cause SELinux denials. You could try to restore the default system file context for /var/log/httpd/error_log, restorecon -v '/var/log/httpd/error_log' If this does not work, there is currently no automatic way to allow this access. Instead, you can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Im running exactly the same command. Does anyone have any idea why Im not getting the "Additional information" that I do with CENTOS 5? Thanks in advance Dylan

    Read the article

  • Windows Explorer not displaying drives (Windows 7)

    - by mjd79
    A very strange issue - Windows Explorer doesn't display the drives connected to my machine. I did make some changes to my setup a while back with the Local Group Policy Editor to disable the "Aero Shake" behavior, so I may have inadvertently enabled or disabled something related to this, but to be honest, I don't remember when the behavior actually started. Any ideas? This is a Windows 7 machine.

    Read the article

  • Leave bash script running on remote terminal while not logged in?

    - by mechko
    I have a bash script that takes several hours to run. While it's running, I would like to do other things, which may involve logging out or disconnecting from the internet (my script runs network tests on various computers). I understand that there is a command that would allow me to run my tests from a remote terminal and logout of the terminal while it runs. Does anyone know what this command is? Thanks

    Read the article

  • Windows Server 2008 R2 restore question

    - by user8160
    I'd like to make a backup/image of my machine, so that I may install it if i ever need to. What I mean by image is a snapshot of all of my programs, settings,files, everything, i think this is referred to as a ghost image. I want to be able to restore so I do not have to reinstall everything again. Does the backup/restore utility in Windows Server 2008 R2 do this?

    Read the article

  • DansGuardian: content regexp list for exact sites, how?

    - by Sergey
    We have contentregexplist file where we can write all substitutions like "source regex"-"dest string" And they ALL run for each page. Is it possible somehow to define a domain name(s) for which (only for 1 domain! not every page) some regexps should be looked for? To be clear: How to replace "Google"-"garbage" in page source only for host host.example.org? May be other content filtering system can do this? Then which one?

    Read the article

  • USB sticks optimized for OS booting and virus removal [closed]

    - by Rupert
    I'm looking to buy some usb sticks which will mainly be used in tech support for the purposes of removing viruses and booting up various OS's. Therefore, I am looking for the following features: Write protected switch (so that they may be safely plugged in to potentially infected machines) As fast as possible (so that loading, for example, a windows recovery, doesn't take forever) At least 4GB in size Any other features that might be useful for the above purpose Price is no object but, of course, the cheaper the better.

    Read the article

  • I need a tool that can organize my time and manage my tasks

    - by wael34218
    Ok so I am really swamped at work, and need a tool that keep tracks of what I did and what I didn't. I need the tool to do the following: I need that tool to set priorities on my tasks. Some tasks do have subtasks inside of it, so I need to keep track of those as well. Pending status, some tasks may require that I need to wait for other parties to finish their work. Intuitive and easy to use. Run on Mac OS X

    Read the article

  • Remove USB device from command line

    - by Luke
    I'm constructing a backup script for Windows 7, and the last action I want it to perform is to safely "remove" the USB drive that it is backing up to. I am under the impression that plugging the drive into the SAME USB port all the time will keep the same DEV_ID, correct me if I'm wrong. With a Command Line (or PowerShell), how can I tell Windows to safely remove the hardware automatically without user input? Just as a place holder, other OSes that may have a way to do this would be great to know as well

    Read the article

  • No Data Received

    - by Ben Moore
    Out of the blue, around 40% of my website's community can no longer visit, saying they're getting "No Data Received" errors. We've taken our firewall offline, tried going through systems such as Cloudflare and checked our .htaccess to no avail. I've asked affected users to traceroute but the weird thing is it looks like it's being stopped at ISP level. Can anyone suggest other things that may be causing this error?

    Read the article

  • How to merge many text files data in databse

    - by Mirage
    i have around 100 text files. The files have questions and 3 choices. FIles are like below ab001.txt -- contains question ab001a.txt -- is the first choice ab001b.txt ---is second choice ab001c.txt --- is third choice There are thousnad files like this. now i want to insert them in sql or first may in excel like First columns questions and other three columns as answers First two characters are same for soom files , looks like it signifies osme category so around every 30 questioons have same first charaters Any ideas

    Read the article

  • I want to buy a second hand laptop, how to get the real technical specifications of a used laptop?

    - by Steven
    I want to buy a second hand laptop. I need to examine a laptop's configuration before I make a decision to buy it. I know the information the information about the components of a laptop can be intentionally fabricated.So the information I go through my computer/properties/hardware/device manager to see may not be reliable. So how can I get the real technical specifications of a second hand laptop?

    Read the article

  • PCIe network card deactivate DVI output (but NOT VGA output) on Shuttle SG41J1+

    - by wazoox
    It's all in the title :) Inserting a network card (or any other PCIe card, RAID controller, SAS, etc ) in the PCIe 16x slot of the Shuttle SG41J1 deactivate the DVI output. The VGA output still works fine. Shuttle support says that it's a chipset limitation (G41 + ICH7), but that doesn't make sense to me : the VGA and DVI share the same hardware but the D/A converter stage. Does anyone think that there may be some solution to this conundrum? Can a future BIOS update solve the problem?

    Read the article

  • TCP Proxy with multiple clients?

    - by Daphna
    I am looking for a TCP proxy - a utility that will connect to a port, read a TCP stream, and write it to clients that connect to it. The key point here is that there may be more than one client, and each client should receive a copy of the stream. Preferably windows solution, but Linux can be useful as well.

    Read the article

  • Want to create an SQL function that removes table row duplicates [migrated]

    - by Hoser
    I'd be following the procedure outlined here (unless of course someone has a better way to do it), and I'm wondering if I could just have some help being pointed in the right direction on how to start. Basically I need help first on HOW to create functions, and general tips on making it adjustable for varying number of columns etc. This may be a very complicated task, as I have no previous experience making SQL functions, so please let me know if this is a difficult task for an SQL noobie working with MS SQL 2005.

    Read the article

  • Can the Installation Monitor from the Win2K Resource kit be used on newer OS's?

    - by Scott Chamberlain
    Can the utility "Installation Monitor" from the Windows 2000 Resource Kit Tools for administrative tasks be used on newer OS's, specifically, Windows Server 2008 R2. The main thing I am concerned about is it may error will not track things correctly without letting me know that that it errored due to how Windows has changed between 2000 and today. If that is not the correct tool to use to monitor what a application is writing to the hard drive and registry, can you recommend me what I should use instead?

    Read the article

  • Websites that introducing new stuff

    - by user33929
    Is there any blog/website that introducing new funny/fancy websites or new tech (software/hardware)? I am talking about the site that may introduce digg.com, superuser.com, mint.com or delicious.com when these site first come out. Also, introducing new handy/useful 3rd party applications/tools. Thanks.

    Read the article

  • Extracting a SQLCLR assembly

    - by Ed Leighton-Dick
    One of our in-house applications has a SQLCLR assembly which is currently experiencing problems. The developer is having problems recreating the issue using the version that is stored in our source control system, so he suspects that some code may have been released that was not uploaded to source control. Is there a way to extract a SQLCLR assembly into a .dll file so that he can reverse engineer it for analysis?

    Read the article

  • Software for browsing/searching SQL Server transaction logs

    - by CodeByMoonlight
    I'd like to know whether there is any piece of software that will allow the browsing/searching of SQL Server transaction logs (any version). We've previously used Lumigent Log Explorer against SQL Server 2000 which fulfilled our need, but the product no longer exists and Lumigent's closest replacement doesn't appear to support SQL 2008 (according to the data sheet). I've discovered something called ApexSQL Audit which may fit the bill, but I'm wondering if anyone has any experience of it, how it compares with Log Explorer, and whether there are any good alternatives out there. Thanks :)

    Read the article

  • How to determine where debian package was sourced

    - by user169309
    How would I trace out which archive(s) in the sources.list a given installed deb package was or (could be) sourced from? I understand that the same package may be indexed by multiple archives. Does "aptitude" log any of this type of information when its installing packages? My aim is to pare down my current sources.list to the minimum set of archives needed to maintain the current set of installed packages.

    Read the article

< Previous Page | 223 224 225 226 227 228 229 230 231 232 233 234  | Next Page >