Search Results

Search found 26337 results on 1054 pages for 'desktop computer'.

Page 25/1054 | < Previous Page | 21 22 23 24 25 26 27 28 29 30 31 32  | Next Page >

  • Looking for a VNC (and or Remote Desktop) Profile Manager/Launcher

    - by zevlag
    I connect to many different computers via VNC and RDP. I'm looking for a windows client that can preferably do the following, though I'd accept software options that only meet some of the points: Save profiles (hostname, username, password, settings, etc.) Connect to VNC Servers Connect to RDP Servers Connect to SSH Servers (or ssh tunneling) Scan network for devices not in saved profiles Free (as in beer) Tools that do similar things, but not on windows: ARD on OSX iSSH on iPad Desktop Connect on iPad

    Read the article

  • Enabling Remote Desktop across different domain

    - by Sriram
    Have a system with Win8 within Domain A and remote has been enabled in that. Users from Domain A are able to login reomtely using admin credentials. how ever using the same credentials users from Domain B Domain C & Domain D are not able to login. Is there any setting that needs to be done so that users from other 3 domains are able to access the system either using the system admin account or using their login (added in remote desktop users account in the remote machine) Any suggestion will be helpful

    Read the article

  • I need to build a mini computer lab with 6 PCs

    - by chiurox
    Hello everyone, This weekend I need to build a mini computer lab with 5-6 PCs. The purpose is for a small computer class that will be taking place. They're mostly going to be doing office and daily kind of stuff, so nothing high performance. However, I hope it will last at least for 2 more years. I already have some parts for 2 PCs, one is a P4 3.0 and another is Celeron 2.4GHz, both socket 478. For the other 4 PCs, I'm wondering if I should buy individual parts and put it all together or get workstations like those Dell Optiplex with P4s. To put things into perspective, I am not currently in the US. I'm in South America and prices here are ridiculously. Another really important thing is that I need to share an internet connection between a total of 8 PCs at this place. Right now I only have a crappy wireless router, should I get another one? Or go with switch hub? I'm not experienced in this matter. Thanks guys!

    Read the article

  • RDPClip is not launching when I use Remote Desktop

    - by Ross
    When I'm using remote desktop to connect to my PC from my laptop(both running Windows 7 ultimate), RDPClip.exe never gets started. I can run it manually and copy/paste will work just fine, but I have no idea why it won't start automatically. I've done the usual of making sure the "Drives" checkbox is checked, but other than that I have no idea why it's mad.

    Read the article

  • Alternative Remote Desktop Software

    - by squillman
    What are good alternatives to the Windows builtin remote desktop client? I have tried Terminals and it is great but I've have run into numerous bugs with the latest release (currently 1.7e). Can anyone recommend an alternative similar to Terminals? EDIT (in response to Adam Gibbins' answer): One of the biggest things I'm looking for is session management and a tabbed environment similar to the Terminals interface.

    Read the article

  • How to stay connected on remote desktop even if different user tries to connect

    - by Darqer
    I'm logging through Remote Desktop to windows 7. Some other users sometimes try to connect to the same computer, then a message box pops up with information that I have 30 seconds to block this try or I will be logged off. Sometimes I'm away and then I'm being logged off and when I come back I have to log on again. Is there a way to turn off this functionality for single user. Is there some application that always breaks this login process ?

    Read the article

  • How to stay connected on remote desktop even if different user tires to connect

    - by Darqer
    I'm logging through Remote Desktop to windows 7. Some other users sometimes tries to connect to the same computer, then a message box pops up with information that I have 30 to break this trial or I will be logged off. Sometimes I'm away and then I'm being logged off and when I come back I have to log on again. Is there a way to turn off this functionality for single user. Is there some application that always break this login process ?

    Read the article

  • Execute a program by double-clicking the taskbar and/or the desktop, Windows 7

    - by JoePerkins
    It would be so useful, and not very difficult, because in fact I have Directory Opus installed (a very powerful windows explorer alternative) and it does exactly that, but only by double-clicking the desktop, not the taskbar. Similar options with middle-click would also be nice, such as scrolling the taskbar (maybe cycling directly through the Alt-Tab window). 7 Task Tweaker is close to this, actually, but it doesn't do what I would like.

    Read the article

  • Remote Computer renting (moving my desktop to the cloud)

    - by Carl
    I would like to rent a remote computer, like a virtual Vista or Windows 7 desktop, and run everything on it and access it with RDP (fastest). It could be virtual (running on Xen or Hyper-V) and the price needs to be right. Windows 7 to Windows 7 has nice RDP offload feature and doing stuff in the cloud is fast. Anywhere I could rent something like that? I've been using Amazon and CloudLayer, but they are optimized for server versions of Windows.

    Read the article

  • Should certain math classes be required for a Computer Science degree?

    - by sunpech
    For a Computer Science degree at many colleges and universities, certain math courses are required: Calculus, Linear Algebra, and Discrete Mathematics are few examples. However, since I've started working in the real world as a software developer, I have yet to truly use the knowledge I had at once acquired from taking those classes. My question is: Should these math classes be required to obtain a computer science degree? Or would they better served as electives? A Slashdot post: CS Profs Debate Role of Math In CS Education

    Read the article

  • what's included in a typical computer architecture class? [closed]

    - by sq1020
    Does this description fit what's usually included in a computer architecture class? Computer Organization and Assembly Language An introduction to the hardware organization and assembly language of the Intel processor. Topics include memory hierarchy and design- CPU design- pipelining- addressing modes- subroutine linkage- polled input/output- interrupts- high level language interfacing and macros.

    Read the article

  • Who are the most influential computer scientists today? [closed]

    - by Banana
    Possible Duplicate: Which individuals are having the greatest impact on software developers today? Computer science has changed dramatically during the last decades, and new fields that recently arose in the scientific community are completely different with respect to classical cs related topics (for example, social network analysis). I'd like to have an overview of the most influential computer scientists in activity, or at least, who have been working during the last 10/15 years, possibly listed according to their specific field of study.

    Read the article

  • Remote Desktop from a ubuntu 13.04 to an Ubuntu 13.04 machine so the user on the second machine can see my movments

    - by user163169
    I would like to remote desktop/VPN from an Ubuntu 13.04 computer (a) to an Ubuntu 13.04 computer(b) so the user(s) on the second machine can see my movements. I would like something a lot like team-viewer or Join.me but these machines do not have Internet but that are attached on a local network and I can VPN to them but that can not see what I am doing and I need them to be able to see my movements.

    Read the article

  • Desktop Applications Versus Web Applications

    Up until the advent of the internet programmers really only developed one type of application used by end-users.  This type of application was called a desktop application. As the name implies, these applications ran strictly from a desktop computer, and were limited by the resources available to the computer. Initially, this type of applications did not need resources outside of the scope of the computer in which they installed. The problem with this type of application is that if multiple end-users need to access the same desktop application, then the application must be installed on the end-user’s computer. In this age of software development security was not as big of a concern as it is today with other types of applications. This is primarily due to the fact that an end-user must have access to the computer where the software is installed in order for them to access the application. In addition, developers could also password protect the application just in case an authorized end-user was able to gain access to the computer. With the birth of the internet a second form of application emerged because developers were trying to solve inherent issues with the preexisting desktop application. One of the solutions to overcome some of the short comings of desktop applications is the web application. Web applications are hosted on a centralized server and clients only need to have network access and a web browser in order to access the application. Because a web application can be installed on a remote server it removes the need for individual installations of the same application on each end-user’s computer.  The main benefits to an application being hosted on a server is increased accessibility to the application due to the fact that nothing has to be installed on a desktop computer for an end-user to be able to access the application. In addition, web applications are much easier to maintain because any change to the application is applied on the server and is inherently applied to any end-user trying to use the application. This removes the time needed to install and maintain individual installations of a desktop application. However with the increased accessibility there are additional costs that are incurred compared to a desktop application because of the additional cost and maintenance of a server hosting the application. Typically, after a desktop application is purchased there are no additional reoccurring fees associated with the application.  When developing a web based application there are additional considerations that must be addressed compared to a desktop application. The added benefit of increased accessibility also now adds a new failure point when trying to gain access to an application. An end-user now must have network connectivity in order to access the application. This issue is not a concern for desktop applications because there resources are typically bound to the computer in which they run. Since the availability of an application is increased with the use of the client-server model in a web based application, additional security concerns now come in to play. As stated before a, desktop application is bound to the accessibility of the end-user to the computer that the application is installed. This is not the case with web based applications because they potentially could have access from anywhere with the proper internet/network connection. Additional security steps are required to insure the integrity of the application and its data. Examples of these steps include and are not limited to the following: Restricted/Password Areas This form of security is used when specific information can only be accessed by end-users based on a set of accessibility rules. IP Restrictions This form of security is used when only specific locations need to access an application. This form of security is applied from within the web server or a firewall. Network Restrictions (Firewalls) This form of security is used to contain access to an application within a specific sub set of a network. Data Encryption This form of security is used transform personally identifiable information in to something unreadable so that it can be stored for future use. Encrypted Protocols (HTTPS) This form of security is used to prevent others from reading messages being sent between applications over a network.

    Read the article

  • Computer components which have unique ID

    - by user23950
    What are the computer parts that has a unique ID? Be it software or hardware. For example, IP Address. And the MAC ID in the NIC. Unique ID's that could be used by bad sites to distinguish you from the rest of the crowd. Edit: Or anything that cannot be changed. Anything that is embedded in the hardware that cannot be changed.

    Read the article

  • Computer doesn't start up apart from lights/noise

    - by Casebash
    One of my computers doesn't boot up or at least nothing appears on my screen (not even the bios). It still makes some noise and the lights stay on, but not any beeping like I have heard computer make when start up fails. Before this happened my screen would occasionally have a strange image appear than crash (usually around startup). It would also sometimes just freeze without the image appearing. Any suggestions for how I can attempt to identify the problem?

    Read the article

  • Extended desktop problem

    - by 08Hawkeye
    I'm a little embarrassed I can't seem to fix this issue: Running a Dell D630 laptop with a VGA to an external monitor. Every time the computer goes to sleep the Dualview setting reverts to single display. I click the Nvidia dualview setting again but the external monitor remains black screen. The only way I can get it working again is to restart :(. What's going on here?? thanks yall //sw

    Read the article

< Previous Page | 21 22 23 24 25 26 27 28 29 30 31 32  | Next Page >