Search Results

Search found 18842 results on 754 pages for 'the machine'.

Page 347/754 | < Previous Page | 343 344 345 346 347 348 349 350 351 352 353 354  | Next Page >

  • How to enable ping in windows firewall in windows server 2008 r2

    - by ybbest
    If you are unable ping your windows server 2008 r2 machine or if you have a “one way ping problem”. You need to check whether you have it enabled in your windows firewall.To enable it , you need to do the following: 1. You need to go to control panel >> windows firewall >> Advanced settings 2. Go to Inbound Rules and enable File and Printer Sharing (Echo Request – ICMPv4-In),after you have done this ,your computer will become pingable.

    Read the article

  • Will learning ColdFusion help me advance my programming skills? [closed]

    - by chhantyal
    Currently I am working with a small web development company. We use jQuery on front-end, Coldfusion for back-end and MySQL as our database. We just started to use HTML5 and CSS3. This is my first internship and job. I know the basics of Python and want to add Django or Ruby on Rails on my skills set. In addition, I want to advance my programming skills with Machine Learning, Compilers, NoSQL and Unix Hacking. I also find front end web development pretty interesting. Should I focus on front-end and become skilled on HTML5/CSS3/Javascript? Or dive into back-end learning ColdFusion. I will probably leave the company after a year since I want to work with great product start-ups. And I live in India, where ColdFusion is not popular. Will learning ColdFusion help me become better programmer?

    Read the article

  • What Can We Learn About Software Security by Going to the Gym

    - by Nick Harrison
    There was a recent rash of car break-ins at the gym. Not an epidemic by any stretch, probably 4 or 5, but still... My gym used to allow you to hang your keys from a peg board at the front desk. This way you could come to the gym dressed to work out, lock your valuables in your car, and not have anything to worry about. Ignorance is bliss. The problem was that anyone who wanted to could go pick up your car keys, click the unlock button and find your car. Once there, they could rummage through your stuff and then walk back in and finish their workout as if nothing had happened. The people doing this were a little smatter then the average thief and would swipe some but not all of your cash leaving everything else in place. Most thieves would steal the whole car and be busted more quickly. The victims were unaware that anything had happened for several days. Fortunately, once the victims realized what had happened, the gym was still able to pull security tapes and find out who was misbehaving. All of the bad guys were busted, and everyone can now breathe a sigh of relieve. It is once again safe to go to the gym. Except there was still a fundamental problem. Putting your keys on a peg board by the front door is just asking for bad things to happen. One person got busted exploiting this security flaw. Others can still be exploiting it. In fact, others may well have been exploiting it and simply never got caught. How long would it take you to realize that $10 was missing from your wallet, if everything else was there? How would you even know when it went missing? Would you go to the front desk and even bother to ask them to review security tapes if you were only missing a small amount. Once highlighted, it is easy to see how commonly such vulnerability may have been exploited. So the gym did the very reasonable precaution of removing the peg board. To me the most shocking part of this story is the resulting uproar from gym members losing the convenient key peg. How dare they remove the trusted peg board? How can I work out now, I have to carry my keys from machine to machine? How can I enjoy my workout with this added inconvenience? This all happened a couple of weeks ago, and some people are still complaining. In light of the recent high profile hacking, there are a couple of parallels that can be drawn. Many web sites are riddled with vulnerabilities are crazy and easily exploitable as leaving your car keys by the front door while you work out. No one ever considered thanking the people who were swiping these keys for pointing out the vulnerability. Without a hesitation, they had their gym memberships revoked and are awaiting prosecution. The gym did recognize the vulnerability for what it is, and closed up that attack vector. What can we learn from this? Monitoring and logging will not prevent a crime but they will allow us to identify that a crime took place and may help track down who did it. Once we find a security weakness, we need to eliminate it. We may never identify and eliminate all security weaknesses, but we cannot allow well known vulnerabilities to persist in our system. In our case, we are not likely to meet resistance from end users. We are more likely to meet resistance from stake holders, product owners, keeper of schedules and budgets. We may meet resistance from integration partners, co workers, and third party vendors. Regardless of the source, we will see resistance, but the weakness needs to be dealt with. There is no need to glorify a cracker for bringing to light a security weakness. Regardless of their claimed motives, they are not heroes. There is also no point in wasting time defending weaknesses once they are identified. Deal with the weakness and move on. In may be embarrassing to find security weaknesses in our systems, but it is even more embarrassing to continue ignoring them. Even if it is unpopular, we need to seek out security weaknesses and eliminate them when we find them. http://www.sans.org has put together the Common Weakness Enumeration http://cwe.mitre.org/ which lists out common weaknesses. The site navigation takes a little getting used to, but there is a treasure trove here. Here is the detail page for SQL Injection. It clearly states how this can be exploited, in case anyone doubts that the weakness should be taken seriously, and more importantly how to mitigate the risk.

    Read the article

  • Why do I need to relaunch dkpg-reconfigure keyboard-configuration after every startup?

    - by yves Baumes
    I've switched recently to an UK keyboard, from a FR keyboard. It is an usb keyboard, and first I plugged it in, I had to launch dpkg-reconfigure keyboard-configuration in order to request the correct layout (ie: uk). But after every reboot of the machine, the laytout comes back to the FR layout. How can I make the modification persisting? I am using Ubuntu, running the Stump Window Manager. And here is the /etc/default/keyboard at any time (that is right after startup, and before and after I run the dpkg-reconfigure tool) XKBMODEL="hhk" XKBLAYOUT="gb" XKBVARIANT="" XKBOPTIONS="terminate:ctrl_alt_bksp"

    Read the article

  • Setting up Windows Azure PowerShell

    - by Sahil Malik
    SharePoint, WCF and Azure Trainings: more information Azure is in the cloud, PowerShell is on my machine, between the two lie vast oceans and dragons. What is a developer to do, to use PowerShell to work with Azure? Here is what you do, Install Windows Azure PowerShell Start WebPI, search for “Windows Azure PowerShell” – choose to add and install it. Run Windows Azure PowerShell This is easy, click on start (or whatever the hell you do in Windows 2012), and search for Windows Azure PowerShell. Connect your subscription  Read full article ....

    Read the article

  • Microsoft and Joyent Announce Node.js Windows Port

    With the Node.js command line tool, developers can type ?node my_app.js.' to run JavaScript programs. It gives developers a JavaScript application programming interface (API) supplies access for the network and file system as well. One instance where Node.js often comes in handy is in the creation of scalable networked programs that emphasize high concurrency and low response times. Developers who wish to use Node.js use on Windows at this time must do so running a virtual machine with Linux. Claudia Caldato, Principal Program Manager of Microsoft's Interoperability Strategy Team, offered...

    Read the article

  • Text reverses on remote gnome session

    - by Andrew Stern
    I have two computers running 10.4 . The first machine is a wired desktop with sshd. The second is a wifi connected laptop with the ssh client. When I use my laptop to bring up a remote gnome session to my desktop all the text gets reversed. Steps: 1) login as a user on the laptop to activate the wifi with a stored key. 2) goto a console Ctrl-Alt F1 3) do a xterm -- :1 to bring up a blank graphic session 4) ssh -Y user@desktopmachine gnome-session This shows reversed text and messes up the keyboard so I can't type

    Read the article

  • CRT as 2nd monitor goes screwy after start up?

    - by rhys
    new install of 12.04 on an old dell with a radeon ATI RV516 video card with monitor out and s-video out. During boot up all is good. Both screens operate and look fine. Then just before the desktop appears the cCRT goes purple and is covered in heavy horizontal lines, but as i said during boot up it was fine and the resolution was fine. The main monitor, an lcd, operates normally. everything else works fine, it's just the picture on the CRT that is screwed up. I used the same monitor and CRT running 11.10 which worked fine any help would be appreciated and yes i am a newbie to ubuntu here is a vid showing the completely normal screens at reboot then the purple badness when the desktop loads ?? and don't laugh at the slow machine, it's old. http://www.youtube.com/my_videos_edit?ns=1&video_id=zfuh6lBMLnc

    Read the article

  • Save Windows 8 Files and Install Ubuntu

    - by Nika
    I would like to install Ubuntu on my laptop. I am new to Ubuntu and therefore have some questions: 1.My hardware is Acer Emachines Intel Celeron T3000 1.8 3 Gig of Ram and Native Intel Intergrated graphics card. Can I run Ubuntu on this machine without any problems? 2.I am windows user and currently have windows 8. I want to install ubuntu but want to save all my directories on C:\ D:\ disks so that I can open my files in ubuntu. Is it possible to save my current directory system and save all my files after installing ubuntu? Can I open all my files? I have very important data in files so I dont want to lose them at all :) Thank You

    Read the article

  • Date calculation algorithm

    - by Julian Cuevas
    I'm working on a project to schedule a machine shop, basically I've got everything covered BUT date calculations, I've got a method called schedule (working on PHP here): public function schedule($start_date, $duration_in_minutes) Now my problem is, currently I'm calculating end time manually because time calculations have the following rules: During weekdays, work with business hours (7:00 AM to 5:00 PM) Work on Saturdays from 7:00 AM to 2:00 PM Ignore holidays (in Colombia we have A LOT of holidays) I already have a lookup table for holidays, I also have a Java version of this algorithm that I wrote for a previous version of the project, but that one's also manual. Is there any way to calculate an end time from a start time given duration?, my problem is that I have to consider the above rules, I'm looking for a (maybe?) math based solution, however I currently don't have the mind to devise such a solution myself. I'll be happy to provide code samples if necessary.

    Read the article

  • Do I need to uninstall Ubuntu after fresh Windows 7 installation?

    - by Dan
    I installed Ubuntu 12.04 from Windows 7 using Wubi. For reasons I won't elaborate here, I had to reinstall Windows 7. Now I want to uninstall Ubuntu. But there is no entry for ubuntu in Windows' Add/Remove Programs anymore. What I tried: running the Uninstall executable from Ubuntu's installation folder, which didn't do anything. delete the old installation folder No matter what I do Ubuntu continues to show up as a boot option together with Windows 7 whenever I start my machine. How do I completely get rid of the Ubuntu installation? Thanks.

    Read the article

  • Adoption of Exadata - Gartner research note

    - by Javier Puerta
    Independent research note by Gartner acknowledges Oracle Exadata Database Machine has achieved significant early adoption and acceptance of its database appliance value proposition. Analyst Merv Adrian looks at some of the main issues that IT professionals have solved as they assess or deploy the Oracle Exadata solution, including: OLTP and DSS workload support workload consolidation increasing performance and scalability demands data compression improvements  Gartner reports clients using Oracle Exadata experienced the following: report significant performance improvements substantial amounts of cache memory which greatly improves processing speed Oracle Advanced Compression providing 2-4X data compression delivering significant reductions in storage requirements and driving shorter times for backup operations Tables compressed with Oracle Advanced Compression automatically recompress as data is added/updated. One client specifically reported consolidating more than 400 applications onto the Oracle Exadata platform Read the full Gartner note

    Read the article

  • Reminder: GlassFish 3.1 Clustering Webinar Today!

    - by alexismp
    Quick reminder for those of you that missed the GlassFish Clustering Webinar from March, we have a new session today (June 28th, 2011). The session is planned at 10:00 a.m. PT / 1:00 p.m. ET / 19.00 CT and you'll need to register first. John Clingan, Principal Product Manager for GlassFish, will walk you through the various clustering features introduced and enhanced in version 3.1. This includes the SSH-based provisioning of clusters (never log in to any machine again), the centralized administration, High Availability and smart failover, load-balancer, Domain Admin Server (DAS) performance improvements, cluster deployments and more. Other than learning about these new product features this is also your chance to ask questions to John and other GlassFish team members. See you there!

    Read the article

  • Assign subdomains to separate ports on web server

    - by Michael Frank
    I have set up an Abyss web server as a little experiment, and I want to know if it is possible to assign subdomains to different ports on the machine the web server is running on. I have a couple webUIs that I'd like to assign subdomains: 192.168.1.1:8000 becomes example.com/webui1/ 192.168.1.1:8001 becomes example.com/webui2/ The webUIs are available by accessing their ports via example.com:8000. I have tried using a reverse proxy, but it seems that this is only usable on one internal IP at a time. What other options do I have? Answer is good, but my current set up doesn't meet the requirements. Abyss Web Server X2 is required to use Virtual Hosts with Abyss.

    Read the article

  • Problem with Free sapce

    - by Andrew Neely
    I was zeroing out the free space on my Ubuntu 12.04 using sfill, when the command stopped responding and I had to reboot the machine. Now, the system says that it has no space left, and that it is running in low graphics mode. Before this happened, I had nearly 500 gig free. df says there are 0 bytes free. df -i reports only 2% of INODES used. I've run fsck and it didn't resolve the issue. What can I do to resolve the issue?

    Read the article

  • One click access to bookmarked files?

    - by dunderhead
    On my Windows machine with just one click I can launch favourite or bookmarked files that I use on a daily basis, which is a great time-saver. Is there any way to do this with 11.10 Unity? Ideally I would like to right-click on an icon in the launcher and have a list of files appear that I could then left-click to launch, but I'd be happy for any simple solution. Please note that I am not referring to recently used files lists - these do not work at all because the bookmarked file will always drop off the bottom of any recently used file list.

    Read the article

  • What ever happened to the Google AJAX Search API

    - by John
    I am looking to query the main Google search however all references including stackoveflow point to the Google AJAX Search API. The odd thing is that it does not seem to exist any more not even a note to say it is depreciated? The old links point to main Google code site. If I look at the list of API's on that site the API it replaced is there Web Search API (Deprecated) which links back to same page but not the Google AJAX Search API. Further Google searching is not being helpful either, many blog posts pointing to the same Google site (http://code.google.com/apis/ajaxsearch/) that has no content and redirects to the same place? Just to prove it did exist I have found it on the way back machine however the last snapshot did not show any special unusual message.

    Read the article

  • Recover files from a SATA drive from USB

    - by Shane
    I've damaged the drive I had in my windows laptop and now I want to try to recover as many files as possible. I know very little about linux though. I have Ubuntu 10.04. I have a docking station for the drive and it is connected to my linux machine. The drive appears in disk utility. Unfortunately, this is where I have no idea where to proceed. Any help is appreciated and I can provide more info if needed.

    Read the article

  • Windows 7/Ubuntu 10.10 Dual-Triple Boot Partitioning Recommendation for HP Laptop OEM

    - by Denja
    Hi Linux Community, I find my self struggling with the ever slow and buggy windows OS once again. It's Time for me to go with the Ubuntu/Linux way for a better and faster Operating System. As a Computer technician i want to learn and use both Systems but possibly introduce New users to more affordable Linux Based Systems. For now, Im in the process of creating dual-boot or even triple boot layouts on my laptop machine Here's the layout in use now: * (C:) Windows 7 system partition NTFS - 284,89GB (Primary,Boot,Pagefile,Dump) * HP_TOOLS system partition FAT32 - 99MB (Primary) * (D:) RECOVERY partition NTFS - 12,90GB (Primary) * SYSTEM partition NTFS 199MB (Primary) Here's the layout I want to make. * (C:) Windows 7 system partition NTFS - 60GB (Primary) (sda1) * (D:) Windows data partition (user files) NTFS - 60GB(Extended or Primary)(sda2);wanna share with Linux * Linux root Ext4 - 10GB (Primary)(sda3) * Linux swap swap- RAM size, 3GB (sda4) * Linux home Ext4- 164,9GB (Extended)(sda5) Question 1: Based on my layout what is your suggestion for a Triple Boot layout for an additional Linux OS (Like Puppy)? Thank you in advance for your advises and suggestions.

    Read the article

  • How to reset the Xorg / xserver?

    - by thomas
    xserver keeps crashing on my general user account both in unity 3d and 2d. It doesn't do it on the guest account. That's why I want to reset / rollback everything xserver related, hoping this is going to fix it. Most answers on this involve sudo dpkg-reconfigure xserver-xorg. However, this does nothing for me (generates no output) and I read in other forums, that it's deprecated. So, what's the current way to reset all xserver / xorg options; what's the alternative to sudo dpkg-reconfigure xserver-xorg ? Thanks Edit: X crashes during work, not before login or so. And the effect of a crash is, that I get thrown out of the session, not a freeze or machine crash.

    Read the article

  • Flash player (in Firefox) is unstable in 14.04

    - by henry
    For 13.10, I used this guide to get Intel iGPU-supported playback of flash videos in Firefox: http://www.webupd8.org/2013/09/adobe-flash-player-hardware.html All in all, Intel graphics acceleration for flash content was working just fine in 13.10, at least on my machine (with Xubuntu). I basically followed the guide to do the same for 14.04, but about 2-3 weeks ago flash videos started acting up. Whenever I have one instance of flash paused or stopped in one tab and go to the next tab to continue some song on Soundcloud or something, it's game over. I'm clueless as to what I can do here. Did anything change in the meantime?

    Read the article

  • Can someone provide a short code example of compiler bootstrapping?

    - by Jatin
    This Turing award lecture by Ken Thompson on topic "Reflections on Trusting Trust" gives good insight about how C compiler was made in C itself. Though I understand the crux, it still hasn't sunk in. So ultimately, once the compiler is written to do lexical analysis, parse trees, syntax analysis, byte code generation etc, a separate machine code is again written to do all that on compiler? Can anyone please explain with a small example of the procedure? Bootstrapping on wiki gives good insights, but only a rough view on it. PS: I am aware of the duplicates on the site, but found them to be an overview which I am already aware

    Read the article

  • Ask the Readers: How Do You Customize Your Computer?

    - by Jason Fitzpatrick
    Whether you spend your energy customizing via case mods or leave the box stock and re-skin the OS, we’re interested in hearing all about how you customize your computing experience and make the machine yours. This week we want to hear about the OS tweaks, skins, modifications, and other tweaks you’ve applied to your computer to personalize it. Whether it’s minor tweaks at work because IT has the machines locked down or massive custom-built boxes at home that show off your love for your favorite Sci-Fi show, it’s time to share your favorite tools, tricks, and tips for customizing your computing experience–even better, share some screenshots or photos in the comments below. Don’t forget to check back in on Friday for the What You Said roundup! How to Stress Test the Hard Drives in Your PC or Server How To Customize Your Android Lock Screen with WidgetLocker The Best Free Portable Apps for Your Flash Drive Toolkit

    Read the article

  • Blog not even ranking for exact title match, after domain has been dropped twice [on hold]

    - by Akshay Hallur
    Consider a blog, related to blogging and SEO. The domain has been dropped (expired) 2 times before acquisition. The current owner is the 3rd owner of the domain since 5 months. Blog posts are not ranking, even for exact titles. Google+ or other shares will show up instead of the content. Some blog posts are not even indexed. Let us TAKE that it gets around 7 organic visits / day. Dropped domain, less likely used for spam (WayBack machine (2 Reframed drops) 3 captures since 2004, Don't know whether there was Email spam) (But no manual actions in WMT, so no reconsideration request). What could be the reason for this? How can Google be told that ownership is changed and the domain is now spam-free? Would this domain be salvageble, or does this only change after relocating to another domain?

    Read the article

  • LXDE keybind "Raise" window not working

    - by Campa
    I am using LXDE* over Ubuntu Oneiric on a DELL Studio-XPS 64-bit machine and I can't get the keybind for raising windows to work. In my ~/.config/openbox/lxde-rc.xml I put: <!-- Iconify window: it works. --> <keybind key="A-Down"> <action name="Iconify"/> </keybind> <!-- Raise window: does nothing. --> <keybind key="A-Up"> <action name="Focus"/> <action name="Raise"/> </keybind> then I openbox --reconfigure, but no rasing windows keybindings. I could use the NextWindow action, but... not really the same. References: http://openbox.org/wiki/Help:Bindings http://openbox.org/wiki/Help:Actions *Nested question: how to know the version of installed LXDE?

    Read the article

< Previous Page | 343 344 345 346 347 348 349 350 351 352 353 354  | Next Page >