Search Results

Search found 9836 results on 394 pages for 'mac taylor'.

Page 249/394 | < Previous Page | 245 246 247 248 249 250 251 252 253 254 255 256  | Next Page >

  • How do you install Firefox plugins from a file?

    - by Ethan
    I would like to install this SQLite Manager plug-in for Firefox on Mac OS X. However, the page advertising the plug-in does not offer the customary "get addon" link (or whatever it's called). There is only the possibility of downloading files. Such as: SQLiteManager_0.5.0b5.xpi How do you use that to install the plug-in?

    Read the article

  • How secure is a bluetooth keyboard against password sniffing?

    - by jhs
    In a situation where an admin will enter sensitive information into a keyboard (the root password), what is the risk that a bluetooth keyboard (ship by default with Mac systems these days) would put those passwords at risk? Another way of asking would be: what security and encryption protocols are used, if any, to establish a bluetooth connection between a keyboard and host system?

    Read the article

  • WOL not working with two NIC's

    - by amazinghorse24
    We have recently moved from a windows 2003 server to an 08 R2. Running the program from the command line says that the magic packet has successfully been sent but it never actually reached the destination computer. We have two NIC's on the server. If I disable the NIC that isn't (currently) in use, WOL will work fine, but in the future we will need to use both NIC's. Also, we use MAC Addresses for WOL.

    Read the article

  • is it good to use Loptop keyboard cover ?

    - by mgpyone
    Currently, I've used a laptop keyboard cover (for Mac), my brother told me that it's not good for your lappy,because of it keeps the laptop heat. is it ? also using the Laptop Plastic Cover. it has any effect on the laptop heat ? I like to get any suggestions, please.

    Read the article

  • What should I do about com.apple.quarantine?

    - by Jason S
    I've downloaded some .jar files from the internet and want to use them under Mac OS X. But the OS seems to have tagged them with the extended attribute com.apple.quarantine (no indication of this until I noticed the "@" in the ls -l and figured out how to use ls -l@) -- apparently because they have been downloaded from the internet. What's the right way to deal with this?

    Read the article

  • Sync local folder with WebDAV

    - by daniels
    I have a local folder on my Mac that I want to sync with a WebDAV server. There are a lot of files in my folder. After I edit some files or add/remove folders, I want to be able to sync the changes to the WebDAV server, ignoring what it is on the server and always using my files. Is there any script or tool that I can use from command line to do that? And mounting the resource is not a solution.

    Read the article

  • Intel i7 vs Xeon quad core processor?

    - by jasondavis
    I know the Xeon processors have been around for a long time and are mostly used in servers but I am curious, why do people not use the xeon's in a high performance desktop? As far as I know about the best desktop processor out there now is the i7 line. The i7's and xeons are both quad-core processors, what is the main difference in these? I just saw that the mac pro's are using the quad core xeons instead of the i7's

    Read the article

  • Cracking truecrypt files in minutes? Or just truecrypt harddrives in minutes?

    - by oshirowanen
    Apparently http://www.lostpassword.com/kit-forensic.htm can be used to crack truecrypt hard drive encryption. Has anyone tried it and is it possible to crack truecrypt files too with this software? Passware Kit Forensic, complete with Passware FireWire Memory Imager, is the first and only commercial software that decrypts BitLocker and TrueCrypt hard disks, and instantly recovers Mac and Windows login passwords of seized computers.

    Read the article

  • What to do with old OS install media?

    - by dwj
    I'm doing an end-of-the-year clean up and found some old OS install media - Mac OS X 10.3.5, Windows 2000, Windows XP. It seems wrong to just throw them out but they can't have a home with me anymore.  Is there some place I can donate them to?  Anyone know of anyone collecting this stuff for posterity?

    Read the article

  • Font Substitution - How Does It Work?

    - by Hutch
    Let's say I open Outlook and compose an email and choose a totally random font and hit send. Let's assume I have Outlook set to send in HTML format, and my mail server sends HTML and the recipients server receives HTML, and their client displays HTML etc. However, let's assume their PC doesn't have the font I chose installed (could be Windows, Mac, Linux, anything). What happens next with regards to how it chooses a font to display the message?

    Read the article

  • connecting two routers

    - by lee
    I have two routers, both wireless, that i wish to connect together. As it stands Router A is connected via a micro filter into the phone line which i access the web wirelessly. What I want to achieve is to connect Router B to A so I can hardwire My TV and Sky (cable) Box into B and simultaneously browse the web wirelessly via router A. Is this possible? If so I'd appreciate the help on this one to save me running 50ft cable under the carpet!!! PS I'm using Mac OS.

    Read the article

  • About the security of adding a signature to a PDF file

    - by ????
    We can add a "bitmap" or image signature to a PDF file, either by using Adobe Acrobat or by Mac's Preview app, but I wonder, besides always encrypting it with a password before sending it by email to the other party, how valid and secure is it? The reason is, if the signature is a bitmap, then there is nothing that prevents anybody copying and pasting that image to other documents, or even, if a cheque is written to anybody at all (such as to the landlord), then there is nothing that prevents the signature from being scanned and copied and pasted to any other PDF documents as well.

    Read the article

  • Java compiler error: Can't open input server /Library/InputManagers/Inquisitor

    - by unknown (yahoo)
    I am trying to compile HelloWorld in Java under Mac OS X 10.6 (Snow Leopard) and I get this compiler error: java[51692:903] Can't open input server /Library/InputManagers/Inquisitor It happens when I am using terminal command javac and when I am trying to do this in NetBeans. I was trying to open folder "Inquisitor", but I have no access to folder, even if I login as root user. What is going on?

    Read the article

  • Tool to sync bookmarks between devices in the local network

    - by Daps0l
    I'm looking for a tool to sync my bookmarks locally, without uploading them to any website (like xmarks does.) Example: i currently use 1Password to sync my logins/passwords. They are not uploaded to any website. The program simply syncs between devices (Mac OSX, iPad, Windows) on the local network, without the need of any remote server/database. Now i'm looking for a tool that does (kind of) the same thing, for bookmarks.

    Read the article

  • nothing in dev folder

    - by 4321bust
    hi, i'm new to this so bear with me plz. im attempting to set up git on my mac and need to be using my dev folder. however, there seems to be nothing in my folder ("zero KB on disk") with no sub directories listed. other hidden directories are intact. i've never really gone this deep into things before so i'm not sure how/why anything would previously have been deleted. any help greatly appreciated.

    Read the article

  • Free IPhoto Alternative

    - by Evert
    Hi guys, I'm looking for a free iPhoto alternative for OS/X. I reinstalled my mac, and lost the original iLife cd. So instead of trying to find it somewhere, I'd like to use an Open Source alternative instead. Nice to have: * iPhoto library importer * Facebook exporter * Exporter for other online photo apps I'm NOT looking for a pure online-based service. I want something for my desktop that acts as a good replacement.

    Read the article

  • How to convert or burn a .DMG image file on Windows?

    - by Nick Josevski
    Does anyone have software they use frequently and can recommend to burn a mac created .DMG file on a windows operating system? Ideally free, or at least reasonably priced. Or an alternative application convert it to .ISO or something equivalent. I'm looking for reassurance I won't be wasting several (more expensive than normal DVDs) dual layer DVDs to get this done right. As the .DMG file is 7gig.

    Read the article

  • Using Amazon S3 for multiple remote data site uploads, securely

    - by Aitch
    I've been playing about with Amazon S3 a little for the first time and like what I see for various reasons relating to my potential use case. We have multiple (online) remote server boxes harvesting sensor data that is regularly uploaded every hour or so (rsync'ed) to a VPS server. The number of remote server boxes is growing regularly and forecast to keep growing (hundreds). The servers are geographically dispersed. The servers are also automatically built, therefore generic with standard tools and not bespoke per location. The data is many hundreds of files per day. I want to avoid a situation where I need to provision more VPS storage, or additional servers every time we hit the VPS capacity limit, after every N server deployments, whatever N might be. The remote servers can never be considered fully secure due to us not knowing what might happen to them when we are not looking. Our current solution is a bit naive and simply restricts inbound rsync only over ssh to known mac address directories and a known public key. There are plenty of holes to pick in this, I know. Let's say I write or use a script like s3cmd/s3sync to potentially push up the files. Would I need to manage hundreds of access keys and have each server customized to include this (do-able, but key management becomes nightmarish?) Could I restrict inbound connections somehow (eg by mac address), or just allow write-only to any client that was running the script? ( i could deal with a flood of data if someone got into a system? ) having a bucket per remote machine does not seem feasible due to bucket limits? I don't think I want to use a single common key as if one machine is breached then potentially, a malicious hack could get access to the filestore key and start deleting for ll clients, correct? I hope my inexperience has not blinded me to some other solution that might be suggested! I've read lots of examples of people using S3 for backup, but can't really find anything about this sort of data collection, unless my google terminology is wrong... I've written more than I should here, perhaps it can be summarised thus: In a perfect world I just want to have one of our techs install a new remote server into a location and it automagically starts sending files home with little or no intervention, and minimises risk? Pipedream or feasible? TIA, Aitch

    Read the article

  • Static IPv6 address in Windows unused for outgoing connections

    - by Luc
    I'm running a Windows server and trying to get it to use a static IPv6 address for outgoing connections to other IPv6 hosts (such as Gmail). I need this because Gmail requires a ptr record, and I can't set one for random addresses. The static address is configured on the host, but it also has a temporary privacy address as well as a random address from the router it seems. By default Windows uses the privacy address; it seems this is the expected behavior (and it makes perfect sense for people/users that did not set a static address, but I did!). I've tried disabling the privacy address with: netsh int ipv6 set privacy disabled This indeed gets rid of the privacy address, but I still have the random address that the router assigned. To disable this, it was said I needed to disable "router discovery" using this command: net interface ipv6 set interface 14 routerdiscovery=disabled Upon doing this, all IPv6 connectivity is lost. If I do this while pinging Gmail, it will report "Destination host unreachable" as soon as I enter the command. In the static IPv6 configuration, I did configure the default gateway and prefix length, so I don't see why it's unable to connect. Probably has something to do with the lack of ARP in IPv6 and somehow being unable to resolve the router's MAC, but I wouldn't know how to fix this. Finally I've tried disabling the DHCPv6 lease with these commands: netsh interface ipv6 set interface "IDMZ Team" managedaddress=disabled netsh interface ipv6 set interface "IDMZ Team" otherstateful=disabled Which was to no avail; the host continues to obtain and use the router-assigned IPv6 address. The router is a FritzBox 7340, which shows me all the IPv4 and IPv6 addresses that the host (identified by MAC) utilizes, but I'm unable to change the assigned address. Maybe this could be done over the telnet interface of the router somehow, but again, I wouldn't know how to do this even if it's the way to go. In short, any of the following would probably solve my problem: Change Windows' source address selection behavior. Have Windows not get an address from the router and not generate a privacy address; Have the router hand out a static address and make Windows use that as source address. Recover connectivity after disabling router discovery on Windows. Alternatively I might use some (batch, perl, ...) script to throw away all IPv6 addresses except the desired one, but this feels rather hacky. If it's the only way (or less hacky than another hacky solution), it might be an option though. Thanks!

    Read the article

  • Installing Windows server 2008 on not VT system

    - by Shahid
    I have a Dell Inspiron 1440 laptop and it has no virtualization support, i want to install Windows Server 2008 on it using Virtual Box, i know that we can install Mac OS on not Virtualization supported system using some patch. I also haired that Virtual box don't needs hardware virtualization, it will do that using software virtualization. how can i achieve that, any guidance would be very nice. Thanks

    Read the article

< Previous Page | 245 246 247 248 249 250 251 252 253 254 255 256  | Next Page >