Search Results

Search found 15415 results on 617 pages for 'security groups'.

Page 344/617 | < Previous Page | 340 341 342 343 344 345 346 347 348 349 350 351  | Next Page >

  • Restrict print copies on a PDF

    - by Chops
    We have a very specific use case for an application we're developing, where a user will be presented with a PDF document, which they can print off. However, we need to be able to restrict the PDF so it can only be printed off once. Does anyone know if there's a way to restrict the number of times a PDF can be printed. I'm aware the PDF spec has lots of security features, but I've not found reference to anything like this before. Many thank.

    Read the article

  • Static IP on Wi-Fi at work and dynamic at home?

    - by Jason Shultz
    I need the laptops at my office to have a static IP for security purposes and identification. However, some employees take their laptops home in the evening. If I have the Wi-Fi configuration set to use a static IP, how can they have a dynamic IP at home? The laptops are using Windows Vista and Windows 7.

    Read the article

  • Programmatic, script-based, or command line method to change starting program for user on Windows Server 2000/2003?

    - by Joe Majsterski
    I have written an app that we want to distribute to a large number of customers to be used as the shell program when they log onto their server with a particular admin account. I have figured out how to change the starting program by going to Administrative Tools->Computer Management->System Tools->Local Users and Groups->Users, selecting the properties for the user, going to the Environment tab, and changing the program file name under "Starting program" to my new app. But is there a way I could do this with some code that could be sent out and run on all these servers?

    Read the article

  • What logs should I collect from a Windows server network?

    - by Cygnus X
    I'm setting up a log collection server for my Windows network (about 30 servers ranging from 2003 to 2008 R2, and about 300 vista/7 clients), and I was wondering which logs are good to collect and which ones are a waste of time. I'm going to collect the obvious ones (system, security, event, firewall, and role specific logs) but are there any others I should be worried about? I'm using Splunk if that helps answer the question.

    Read the article

  • Find visually similar images automatically?

    - by TERACytE
    I have a collection of images which is updated regularly that I'd like to group. Rather than reviewing every single image in the collection, I'd like to run an automated tool that pre-groups the images. Adobe PhotoShop Elements has a "Find Visually Similar photos" feature which works well, but it requires manually importing the images first, then I have to select an image each time I need Photoshop to search for images that are visually similar. I do not need a de-duping program since the images are never identical. Is there anything out there that can provide what I'm looking for?

    Read the article

  • No mail for root message [closed]

    - by Werulz
    I want to receive email when people login to my server via ssh (as a security measure), however, when I login, I get: No mail for root Email is [email protected] Does it need Postfix to work? I already install it on server but i haven't configured it Can you give me a tutorial to configure Postfix in case it needed? Will email be sent even if my domain hasn't been propagated yet? I added this in .bash_profile echo 'ALERT - Root Shell Access on:' `date` `who` | mail -s "Alert: Root Access from `who | awk '{print $6}'`" [email protected]

    Read the article

  • configure domino web server to use internet site document?

    - by kasper_341
    internet site configurations view has - security options - Accept SSL site certificates: default is NO Accept expired SSL certificates: default is Yes question: how does this effect server behaviour ? e.g. if i change the default behaviour -Accept SSL site certificates to yes then what effect will it have on server ? i hope the questions is clear enough, if not please let me know i will rephrase it. thanks

    Read the article

  • apple adress book mass email [on hold]

    - by Thijser
    I have been asked to help a small non profit organasation with some IT problems. They currently have a mailing list of around 200 people saved on a mac inside adres book. Now currently these people are send emails in groups of around 20 as the standard apple email program does not allow more. I know that there are programs that can be used to send email to a larger number of people however these usually require a database and I'm not sure how to use those. Anybody got any tips?

    Read the article

  • Why should I prune old objects from Active Directory?

    - by Nic
    What is the point of pruning old objects from Active Directory, especially computer accounts? If a computer is wiped or destroyed, then the stale computer account doesn't pose any security risk because it can't be used any more. And I can't imagine that stale objects affect performance very much, because if they aren't being changed then they aren't being replicated. So, what is the real motivation to keep Active Directory clean of stale objects?

    Read the article

  • How can I select multiple windows to tile in Window 7 (like you could in previous versions)?

    - by Daniel
    I've disabled Aero Snap, is there any way to restore the old method of window arrangement allowing you to do side by side, or top and bottom, etc.? All you had to do before is select the windows you want and right click. I know the menu is still there in Windows 7 but it is only for the whole Task Bar, and you can also do it from the Task Manager but that is more complex to get too. After looking all around I cannot find a way to restore any such right click menu for each application. Is there a way to tile like this for individual windows or groups?

    Read the article

  • Alternative to Xcode [closed]

    - by Moshe
    For those familiar with Windows, I used to use "Programmer's Notepad" and "TextPad". I want a Text Editor, not an IDE, with the following few features (in no particular order): Syntax Highlighting Tabbed editing Projects (groups of files together in one "project" file) Spellcheck Lightweight - I prefer something other than Xcode. Updates I am looking for something primarily for web development. Must be Free. +1 For relevant link(s). GUI Based only Conclusion I realized that gEdit is available for OS X. I met it back on Ubuntu 6. Something-or-other. We have a winner. all for input.

    Read the article

  • File report ignoring NTFS permissions

    - by Edulin
    I need to inventory based on file age a huge NAS. Some folders are restricted, and only users or groups have rights. As you probably know Treesize is the best solution, the only problem I found is that if I want to script it it only takes a screenshot instead of writing the information to a text file. (If done through the GUI I'm allowed to copy/paste into text, but I need to script it, several shares). Robocopy /l lists the files but I also need to know the dates (last access / last modify) I saw a kernel driver by hobeanu to bypass ntfs permissions. But do you know any easier way to bypass ntfs permissions? or any other application that allows this type of request and save the information to a text file. (scriptable) Thanks

    Read the article

  • I have install on my xpsp pc VMware® Workstation 7.1.1 build-282343

    - by Ajifan
    I have installed on my XP sp pc to VMware® Workstation 7.1.1 build-282343 And also I have more two separate machine one laptop and one pc I have already connect those three machine's to a Nortel switch to distribute internet as a work group Now I want add a virtual Windows server 2003 enterprise and I want to connect those my to machine as a client and want to give some policies and security for users Like real network environment t how I can implement those steps please explain me step by step

    Read the article

  • Limit access on login and IP in .htaccess

    - by Rob
    There are many examples showing how to use .htaccess to restrict users by login or on their IP address (i.e they are ok from the ones given without authorisation). For some reason the following is never mentioned, yet it seems quite useful. How do I restrict using groups and ip, e.g. group1 can access the page from anywhere group2 can access the page only from certain IP addresses if you are not logged on, you cant see the page, regardless where you are I would like to have all 3 of these working at the same time.

    Read the article

  • Static IP address on Wi-Fi at work and dynamic at home?

    - by Jason Shultz
    I need the laptops at my office to have a static IP address for security purposes and identification. However, some employees take their laptops home in the evening. If I have the Wi-Fi configuration set to use a static IP address, how can they have a dynamic IP address at home? The laptops are using Windows Vista and Windows 7.

    Read the article

  • Change Google Chrome's Process model?

    - by mobius42
    See here: http://imgur.com/lKffI.png Does anyone here know how to stop Chrome doing this? Chrome seems to group all tabs I open through the same page into one process. If I copy and paste the links individually into separate tabs, it creates new processes, but when I just middle click links, it groups them into one. I want to force Chrome to create a new process for every tab because when one page locks up, it freezes pretty much all the tabs I have open and if one of the tabs crashes, it takes the rest with it. You can apparently alter Chrome's process model to one called "--process-per-tab" which seems to be what I'm looking for, but when I try and open Chrome with this argument via the terminal, it doesn't work. It's likely I'm not using the correct command; what I tried was: /Applications/"Google Chrome.app"/Contents/MacOS/"Google Chrome" --process-per-tab I'm on OSX and using the latest dev build 5.0.396.0.

    Read the article

  • windows 7 start menu showing incorrect data

    - by madmik3
    Hi, I've tried to rebuild my search index but it does not seem to help. When i search for anything even command I either get an empty list or a list of short cuts with the names Programs Documents Files ... They all have the default white paper icon. If I click on them I get an error message that says Internet security settings prevented one or more files from being opened. Any ideas? thanks

    Read the article

  • Where to get Google Chrome 12 for Linux i386?

    - by pts
    I need a .deb download of Google Chrome 12 (not the newest version, but version 12) for i386 Linux. Where can I get it? I need this version because my operating system doesn't have the libraries required by newer Chrome .deb packages. In this question I am not interested in upgrading or changing my operating system, and I'm not interested in using different browsers, and I'm aware of the security implications of using that particular old browser. Please give me a working download link if you know one.

    Read the article

  • Unable to install some applications on windows 7 64 bit (These files can't be opened error)

    - by rzlines
    I get the following error when I try to install some application on my windows 7 64 bit system. How do I turn this off as I know that the applications that I'm installing are trusted. I have turned off windows defender and tried to tweak internet explorer security settings according to the first few google results but yet I have the same error. (I also created a new user account and tried importing new registry keys but nothing even then) How can I solve this?

    Read the article

  • Shares Not working

    - by Crash893
    I'm running a ms server 2012 box acting as a file server, I've set up 4 shares (IT SECURITY PUBLIC HR) to start out with each share has its corresponding group as full permissions to the folder however when I access the server \server\it it says i don't have permissions. Public has NTLM AUTH as its full read/write and i can't even get into that Clearly im doing something wrong but im very new to windows server and im not sure how to start trouble shooting.

    Read the article

  • Creating a task that runs at incorrect login credentials

    - by GDA
    I'm trying to set up a personalized security option on my computer to take a picture using the webcam whenever someone tries to log onto my computer using an incorrect password. I've set up the task in the task scheduler, and I can get it to pass, but then the problem begins. When the task passes, it triggers like a million times and keeps going until I disable the task. Does anybody know why it might be doing that and how to make it not?

    Read the article

  • Maximum number of outgoing VPN connections?

    - by icray
    I'm working on a project where we would like to have around 50 outgoing (not incoming) VPN connections. We could use PPTP or IPSEC. Security isn't an issue, we control all the sites and users won't have access. Windows Server appears to have a limit of 5 outgoing connections. Does anyone know if it's possible to tweak it to allow more? Or can we get this many outgoing VPN connections with Linux?

    Read the article

< Previous Page | 340 341 342 343 344 345 346 347 348 349 350 351  | Next Page >