Search Results

Search found 2197 results on 88 pages for 'explanation'.

Page 34/88 | < Previous Page | 30 31 32 33 34 35 36 37 38 39 40 41  | Next Page >

  • How can I prevent JungleDisk/MacOS X (10.6) creating a local volume for a removed external drive?

    - by Rew
    Ok, here is situation: I use JungleDisk to sync an online folder on to a external drive connected to my Mac. If I right click Finder, click Go to Folder... then type /Volumes/ I see the drive linked here. Once I remove the external drive, an actual folder is created here in the name of the external drive, JungleDisk continues to copy files to this folder, rather than stop. Is this a feature of Mac OS X? Can I turn if off? After I re-connect my external drive, the link to the drive is appended with a 1 (so if I called the drive SpareDrive it becomes SpareDrive 1 as the newly created folder is called SpareDrive. I realise my explanation isn't very clear, but anyone understand this, and knows how to prevent it happening please let me know. PS: I have a low reputation as I don't use this often, I tend to use stackoverflow, but will check back here for answers.

    Read the article

  • How do you configure recycle bins on roaming profiles?

    - by Zombian
    I copied the following from a post on the Spiceworks forum which remained unanswered: Is there any way to place the Recycle Bin back on the desktop of a Roaming Profile with the Desktop being redirected? I have used Google and can't find a straight forward answer. I am asking for people with experience in this. This is for a Windows XP machine. I saw mention of needing to use a program such as Undelete but I'm hoping that is not the case. Further explanation: I use redirected folders and whenever a user deletes something from their desktop,my documents it doesn't show up in the recycle bin. It doesn't appear in the recycle bin on the server either. Where is this data? I doubt it is permanently deleted. Is there a way to change the recycle bin on the users' desktop to display those files? Thank you!

    Read the article

  • SQL Distributed Reporting Services Setup

    - by Praesagus
    I am setting up two servers; one iis 7 and one sql 2008. I need to use reporting services. What is the best way to set up reporting services so that my iis box can serve the reports. I'm sure this is not an unusual configuration, but I'm having a lot of trouble finding an answer to this - probably because I am using the wrong terminology. Also does this configuration require two sql licenses (one for each server)? This sound like a lengthy explanation so links or even the correct terminology for this so I can find the answers myself would be much appreciated. Thanks

    Read the article

  • Finding throuput of CPU and Hardrive on Solaris

    - by Jim
    How do I find the throughput of a CPU and the hard disk on an OpenSolaris machine? Using mpstat or iostat? I'm having a hard time identifying the throughput if it is given at all in the commands output. For example, in mpstat there is very little explanation as to what the columns mean. I've been using the syscl column divided by time interval to find the throughput but to be honest I have no idea what a system call truly is. I'm trying to to analyze a hardrive and CPU while writing a file to the hardisk and when at rest.

    Read the article

  • How to monitor Windows Server events with Centreon Nagios

    - by Miss M
    I want to monitor events on a Windows Exchange Server (Windows 2008 R2) and have installed NSclient ++ so I can use Centreon Nagios to monitor it. I did a bit of research and came across this question that I found somewhat helpful: How to monitor Windows host with Nagios? Nick Kavadias gave a good answer but it did not provide an explanation on how to configure the Nagios config file in such a way that it would monitor a specific service on the server. So, how do I set up a service in Nagios in such a way that it will detect when a windows event occurs on a server?

    Read the article

  • Netbeans hard freezes Windows XP, how to debug

    - by Jestep
    I get this problem about once to twice a day while editing in netbeans. I will be editing some code in Netbeans and I get a hard freeze requiring a full reboot. There hasn't been any correlation with an actual event that I can tell. Sometimes it's when I focus, sometimes while typing, sometimes while clicking on another window. I need to figure out how to track down what's causing the problem, as no error is generated when this happens. No error in Netbeans logs or Windows logs. I've also tried letting it sit to see if it recovers, and it's definitely stuck. I haven't had any problems with other apps running JRE, so I'm thinking it's Netbeans itself. I can't submit a bug report because I can't get a log or any reproduce-able explanation of the problem.

    Read the article

  • Underlying Concept Behind Keyboard Mappings

    - by ajay
    I am frustrated with key mapping issues. On my Linux box, if I type Home/End in Vim, then the cursor actually moves to the beginning/end of the line. On my Mac when I am on TextEdit, if I do Fn + Left or Fn + Right, it takes me to beginning/end of the line. But if I am on Vim on my Mac terminal, then the same key combinations don't work. Why? I see online all the different cryptic settings that I have to paste in .vimrc to make this work, but I can't find any explanation for those cryptic map, imap settings. What is the underlying issue here, and how can I fix it? Thanks!

    Read the article

  • How to print through remote computer with TeamViewer

    - by senzacionale
    We are using TeamViewer and we would like to print at the remote computer. Is this possible? If yes, how? I've been reading the docs but I can't find a solution. Further Explanation: I am on my machine say machine 1. And, I am connected to Machine 2 on the internet somewhere through Teamviewer. I know that Machine 2 has printer attached to it and it is working well. What I want is to print a Word Document for example which is locally on Machine 1 to be printed on Machine 2's printer. Is this possible?

    Read the article

  • TOP CPU usage for whole system

    - by heike
    I am using a machine that has using cat /proc/cpuinfo | grep processor | wc -l returning 8 I am trying to load the server using a load generator that I wrote, and capture the behaviour of TOP command for idle (as the software that is tested on server runs on ROOT). Doing the load as an increasing step function, I capture the idle state every second, and see the result. Strange thing is that when I increase the load every 1 minute, the idle state is infact increasing (??). This honestly does not make sense .. I thought with more load, the idle state will decrease, and the cpu usage will increase. Is there any reasonable explanation for this behaviour, maybe for the server utilization itself? Thanks for any feedback -- ok, no idea for the down vote. but I try to find this behaviour a lot, can not find any reasonable things to explain this ..

    Read the article

  • freebsd dev server on virtualbox over windows

    - by g_kaya
    I need a unixy environment for development purposes. I hate doing things on windows but it is more stable for daily use and I don't have a mac, so I'm having to use windows (7). I want to run freebsd in a virtual machine, configure it to be the localhost server, be able to connect using ssh (within my home-network) and be able to install vbox guest addons. If guest additions aren't the best, I can use solaris or linux flavours. I need no gui. I don't know anything about network stuff, so I need a detailed explanation from vise people here, or a nice doc to read. Edit : To be more specific as requested, I use following on unices: *django 1.4 *apache *python (2.7) *emacs *mysql *probably node.js *bash scripting I use windows to be able to do daily things easily, like connecting to my tablet, browsing and learning java. And I don't want to use linux as my desktop os, beacuse it gets broken a lot, it's annoying to maintain wlan problems and some more.

    Read the article

  • Good reference for Cisco Resilient Ethernet Protocol

    - by Karthik
    I have been trying to understand Cisco's Resilient Ethernet Protocol, but am unable to find a proper source to read from. I checked the Cisco site and also their White Paper on REP. But none of them helped to understand REP clearly. Googling was also of not much help, as all I got was explanation about configuration instructions and not on the protocol itself. Can you guys point me to a good book or site, which explains Resilient Ethernet Protocol in detail? Thanks in advance.

    Read the article

  • Can files deleted on an ecnrypted drive be restored?

    - by roddik
    Hi. There are ways to restore files, deleted from the system by default, I'm not sure about the way they work but I guess thet read content, that has not been overwritten. On the other hand, there are programs (e.g. TrueCrypt), that encrypt disks, claiming that it wouldn't be possible to tell apart random data and file contents on such a disk without a password. Therefore I think that files, deleted from such disks can't be restored. Is that correct? I know one way to find out would be to try it, but there is a possibility, that I would just pick the wrong restoring software. Moreover, I'm more interested in theorethical explanation why it would/wouldn't be possible. Thanks

    Read the article

  • How do I sync the Solution Explorer with the current File in Visual Studio?

    - by thepaulpage
    When I have an open code file in Visual Studio that I am editing I would like to keep that same file highlighted inside of the solution Explorer so that I know where I am at. What I'd really like is to change the focus to a different code file and the solution explorer to move to the file that I am editing. Further Explanation and example: I have a project with 2 files. Class1 and Class2. I open both files. The focus is on Class1. I click on the Class2 Tab, thereby changing the file that I am editing to Class2. Desired Behavior The solution explorer will highlight Class2.

    Read the article

  • Win 7: How can I resize a window to make it much bigger than my screen?

    - by RexE
    I have a window that I'd like to make much bigger than my physical screen (explanation of why below). I hit Alt+Space, M, and then press the Up arrow to move the title bar above the physical top of my screen. However, when I press Enter to set it, the title bar snaps back to the top of my screen. How can I prevent this from happening? Background: I want to get a hi-res image of a neighborhood map so that it can be printed to a poster. Google Earth has a "Save as JPG" feature, which will save the map in the window to a file. The bigger the window, the bigger the JPG; so, I'm trying to make the window as big as I can. Alternate suggestions welcome.

    Read the article

  • Perfmon quick rundown

    - by anon
    I've known quite along while about performance monitor on Windows. I have decided now to create a scheduled performance monitoring of my entire system so I can find bottlenecks for future improvements. So as you can imagine this is going to run 24/7 so I can identify peak utilization. With performance monitor on Windows 7 for example where are the logs stored (c:\perfmon)? Is there a log size? Even better is the a website that can get me up to speed with scheduling and best practices of perfmon? (I don't need an explanation of what I can monitor)

    Read the article

  • Setting Boot and Mirror Disks correctly at the Solaris OBP

    - by Shaun Dewberry
    I am recovering a domain that was lost due to power outage on an Sun Fire E25K server. I know how to set the appropriate parameters at the openboot prompt using nvalias/devalias, boot etc. However, I do not understand how one gets from the output of show-disks {1a0} ok show-disks a) /pci@1dd,600000/SUNW,qlc@1/fp@0,0/disk b) /pci@1dd,700000/SUNW,qlc@1/fp@0,0/disk c) /pci@1dc,700000/pci@1/pci@1/scsi@2,1/disk d) /pci@1dc,700000/pci@1/pci@1/scsi@2/disk e) /pci@1bd,600000/SUNW,qlc@1/fp@0,0/disk f) /pci@1bd,700000/SUNW,qlc@1/fp@0,0/disk g) /pci@1bc,700000/pci@1/pci@1/scsi@2,1/disk h) /pci@1bc,700000/pci@1/pci@1/scsi@2/disk q) NO SELECTION Enter Selection, q to quit: to the correct full disk path. I know it is basically one of the pci/scsi paths listed above, but in all instruction or examples a string of additional characters is appended to the path to specify Targets and Units but the explanation of the path construction is never given. Could someone please explain how to construct this disk path correctly?

    Read the article

  • Three disk (possibly RAID) data recovery

    - by Martin
    I have on my desk three 160 GB disks that were once part of an HP Proliant Windows 2003 Server. They may have been part of a RAID configuration of some sort. They may or may not be damaged in some way. When I interface them via USB, one of them shows up as a drive, but unformatted. The others show up as uninitialized disks in manager. An alternative explanation is that the two drives were simply not unused. What's my first step? I've recovered data off damaged drives before but never had anything to do with RAID configs. How can I even tell if any type of RAID was used?

    Read the article

  • How to schedule download of windows 7 updates?

    - by atoMerz
    To put it short: I'd like to schedule my windows updates to start/stop at certain times of day. How can I do this? More explanation: This is because my internet traffic is limited by ISP and it's free only during a specific period throughout the day (2:00am-7:00am). I've set windows update setting to check for updates but notify me before downloading in order to prevent it from automatically using up my traffic. But then I have to manually tell it when to start downloading. I obviously don't want to stay up that late just to push a button. So again, how can I schedule windows updates to start/stop at specified times?

    Read the article

  • iSCSI drives suddenly inaccessible or corrupted

    - by Hammer1
    I have two NAS (Seagate Black Armors) connected to our network through iSCSI to a Dell Optiplex 760 running 32-bit Windows 7 and Windows iSCSI Initiator. For some unknown reason within the last week both are reportedly inaccessible and/or corrupt (that is the error message generated when I attempt to open the on the iSCSI computer). However, connecting to either of them via direct IP goes off without a hitch. I've tried Error checking but received "The disk check could not be performed because Windows could not access the disk." I've tried System Recover to a date almost two weeks back thinking Windows update may have caused the issue but there is no change. Anyone have an explanation and/or a solution to get them reconnected? Thanks.

    Read the article

  • Can I get some help on a javascript project?

    - by HenryOrrin
    I'm learning javascript and I thought it would be fun to build a "simple" calculator. I spent a few hours coding, and implementing the functions, but it only works partially. Can one of you look at my code and try and figure out what's wrong? The Calculator.zip Here's some explanation of the issues: the add(), subtract(), multiply(), and divide() methods work partially, not at all, or don't do as they're supposed to.. sometimes the 0 wont clear when the replaceDisplay() method evaluates the screen. If it helps, I'm also using jquery, so keep that in mind. Thank you!

    Read the article

  • Monitoring/logging a malfunctioning internet connection

    - by Pekka
    I have a mysterious internet connection problem: Every 15-20 minutes, the connection will become very slow, and take 2-3 minutes for anything to load. I've had a technician from the ISP over here to test the hardware, and everything is in pristine condition. They have no other explanation than a configuration error on my machine, a possibility I can exclude 90% because I'm experiencing the same problems with another machine. I will have to monitor the situation now, and I would like to run a program that logs when internet connections become slow. I thought about putting something together using at and wget. Does anybody know of some other tool for this that does this out of the box - maybe something with an adjustable request frequency, logging connection speeds etc.?

    Read the article

  • Recommended laptops for system admins?

    - by 80skeys
    Hey all - I'm in the market for a new laptop and wanted to get some recommendations. I'm a Linux sysadmin and this laptop is primarily for work related use, working from home, after hours, occasional trips to the data center, etc. We all know the drill. My typical setup includes various utilities and tools plus multiple partitions for booting different OS's including VMware. Need serial port of course, DVD-RW, and all the usual stuff we use in our daily routine. I'm kinda thinking a Thinkpad T510 but open to other suggestions! Brief explanation of why you suggest some particular brand and configuration is appreciated.

    Read the article

  • Possible? OpenVPN server requiring both certificate- AND password-based login (via Tomato router firmware)

    - by Eric
    I've been using Shibby's build of Tomato (64k NVRAM version) on my Asus N66U router in order to run an OpenVPN server. I'm curious whether it's possible to setup this OpenVPN server to require both a certificate AND a username/password before a user is allowed access. I noticed there's a "challenge password" entry when filling out the certificate details, but everyone says to leave it blank "or else"; I have no idea why, and I can't find an explanation. In addition, I've Google'd this issue a bunch and have noticed people talking about a PAM module for OpenVPN in order to authenticate via username/password, but that appeared to be an either/or option; in other words, I can force authentication via username/password OR certificate. I want to require both. Is this possible? If so, how?

    Read the article

  • Please provide how to setup using VMware, AD [closed]

    - by user552585
    In my organisation we have more than 100 pcs and high configured 3 IBM servers. Now the senario is 300 employees with diff programmers like .Net,java,php etc. these employees use by these systems only in diff shifts without stop their work. I want all applications required them on every system and they have perticular id, Pw to login and i have to secure the organisation data and userdata to tamper or any thing by other users. Please provide how to setup using VMware, AD with MicroSoft environment with fully secured manner. please give brief explanation. Please help me

    Read the article

  • Is it possible to redirect/bounce TCP traffic to an external destination, based on rules?

    - by xfx
    I'm not even sure if this is possible... Also, please forgive my ignorance on the subject. What I'm looking for is for "something" that would allow me to redirect all TCP traffic arriving to host A to host B, but based on some rules. Say host A (the intermediary) receives a request (say a simple HTTP request) from a host with domain X. In that case, it lets it pass through and it's handled by host A itself. Now, let's suppose that host A receives another HTTP request from a host with domain Y, but this time, due to some customizable rules, host A redirects all the traffic to host B, and host B is able to handle it as if came directly from domain Y. And, at this point, both host B and the host with domain Y are able to freely communicate (of course, thought host A). NOTE: All these hosts are on the Internet, not inside a LAN. Please, let me know if the explanation is not clear enough.

    Read the article

< Previous Page | 30 31 32 33 34 35 36 37 38 39 40 41  | Next Page >