Search Results

Search found 26256 results on 1051 pages for 'information science'.

Page 356/1051 | < Previous Page | 352 353 354 355 356 357 358 359 360 361 362 363  | Next Page >

  • Why is a journal rule in Exchange 2007 causing messages to arrive in the journal account in non-enve

    - by Bocker
    The bulk of the messages in the journal account on Exchange 2k7 arrive in the appropriate format, message body contains header information while actual message body is attached, but a rather large number of messages are arriving in the journal without this format. The to/from pair of these messages does not show the journal as a recipient, so this isn't a case of the journal receiving these as a recipient. They appear to be journaled using the journal rule, but the format is incorrect.

    Read the article

  • Macbook memory upgrade question

    - by James Evans
    I've read some conflicting articles on Macbooks and memory upgrades. Some say you have to buy the "special" Mac memory (bulls$%t), others say manufacturers like Partriot and Ocz will work fine. My Macbook (non-pro) is about 6 mos old with it's 2 GB of memory (SO-DIMM 1066MHz DDR3). Does anyone have any definitive information of what will work? Thanks!

    Read the article

  • Macbook memory upgrade question

    - by James Evans
    I've read some conflicting articles on Macbooks and memory upgrades. Some say you have to buy the "special" Mac memory (bulls$%t), others say manufacturers like Partriot and Ocz will work fine. My Macbook (non-pro) is about 6 mos old with it's 2 GB of memory (SO-DIMM 1066MHz DDR3). Does anyone have any definitive information of what will work? Thanks!

    Read the article

  • DynDNS updating IP address via Cisco ASA 5505

    - by yonatan
    I'm setting up an ASA 5505 where the ISP provides a dynamic IP address (rarely changes.) I would like to start using some of the services provided by DynDNS such as Custom DNS. I've come across some information regarding Cisco Routers and DynDNS, but nothing definitive on the ASA platform. My question is whether I can configure the ASA5505 to update the IP address rather than install the DynDNS Updater software on a machine running on the LAN? Thanks

    Read the article

  • Xeon X3220 Dual-Core 2.4 GHz - which march setting for gcc?

    - by hurikhan77
    Should I use -march=nocona or -march=core2 when compiling binaries for this processor with gcc 4.3? vendor_id : GenuineIntel cpu family : 6 model : 15 model name : Intel(R) Xeon(R) CPU X3220 @ 2.40GHz stepping : 8 cpuid level : 10 flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss syscall nx lm constant_tsc arch_perfmon pebs bts rep_good pni ssse3 cx16 lahf_lm I cannot really find if this CPU is already core2 architecture... Only find information about the quad core variants, but this CPU is only dual core.

    Read the article

  • Exchange 2003 default permissions for ANONYMOUS LOGON and Everyone

    - by Make it useful Keep it simple
    ANONYMOUS LOGON and Everyone have the following top level permissions in our Exchange 2003 Server: Read Execute Read permissions List contents Read properties List objects Create public folder Create named properties in the information store Are these the "default" settings? In particular, are the "Read" and "Execute" permissions a problem? We have a simple small business setup, Outlook clients connect to the server on the local network, OWA is used from outside the network for browser and smartphone access. Thanks

    Read the article

  • Where can I report an issue with IIS?

    - by Nathan Taylor
    While working with an ASP.NET application on Chrome for Android I discovered that Request.Browser.Cookies returns False for that browser (despite the browser supporting cookies). Based on what I've read, this indicates a problem with the database which ASP.NET (and, I assume, IIS) uses to look up information about different UserAgents. The fact that it returns False means that the database is either missing Chrome for Android, or has invalid data for it. What is the a proper place to report IIS issues like this?

    Read the article

  • Expose Windows LDAP address book on the internet

    - by Ryaner
    I need to expose Active Directory, or at least the address book functions on the internet for some mail clients and other devices. The standard response is to simply not or vpn in, however VPN isn't an option for us with some of the hardware devices. A number collages expose their setups out to the internet so I'm assuming their has to be a safe way of doing it. Best option I've come up with to install a linux ldap host, then hourly sync over the relevant contact information however that seems like major overkill.

    Read the article

  • Removed recipients number limitation still affects on Exchange 2003

    - by gcaracuel
    We have an Exchange 2003 cluster in wich we have limited the number of recipients in the past. We deleted it but it's still affecting our service. I have moved the services to the other node (it's an active/pasive cluster) so i guess i have restarted with this procedure the "Microsoft Exchange Information Store service" as is required to limit it (http://technet.microsoft.com/en-us/library/aa996677(v=exchg.80).aspx). anyone have any idea why the limitation is not deleted?

    Read the article

  • Do proxies really provide anonymity?

    - by Somebody still uses you MS-DOS
    Do web proxies really provide anonymity? I mean, without someone asking for logs in a web proxy server for who/when connected, is it impossible to know who was behind that IP address? I'm asking this because I heard somewhere that some technologies (like "flash") bypass personal IP information for requests or something like that. (I'm a noob in server configuration and concepts like DNS and proxies. Thanks!)

    Read the article

  • Different background images in Conemu tabs

    - by jasper
    Is it possible to assign different background images to tabs in Conemu? Console2 supports custom backgrounds per tab, and I'd like something similar to the functionality it provides. Perhaps I can set this in Startup - Tasks or via the command line of a running tab, but I can't find any information on it. e.g. Tab1 cmd "cmd.png" Tab2 powershell "ps.png" Tab3 Visual Studio Command Prompt "vs.png" Tab4 Admin:cmd "warning.png"

    Read the article

  • Alternatives to musicbrainz picard -audio-fingerprinting tagging services [closed]

    - by Journeyman Geek
    Possible Duplicate: Auto-tagging MP3s I'm currently using musicbranz picard to tag files that don't have any usable tagging information. For some reason, currently none of the files I trying to ID seem to be identified, despite some of them them being artists who are almost certainly on musicbrainz. So, I'm looking for something that uses an alternate database and does the same thing - to identify unknown music files off an audio fingerprint. Windows is preferred, but I would be fine with any of the big 3 OSes (Windows/Linux/OS X).

    Read the article

  • Exchange 2003 calendar's "far" future is blank when scheduling

    - by wfaulk
    If a user tries to schedule a meeting in the "far" future, where ""far" future" seems to mean "seven or more weeks into the future", no existing meetings show up, and resources (at least) frequently (if not always) show up with the white-with-black-hatching "No Information" indicator in the meeting creation window, but shows up fine if you look at the actual calendar from the main Outlook window. Is this expected behavior? If so, is there any way to extend how far out Exchange/Outlook will look?

    Read the article

  • Purpose of the postfix.sendmail -n option

    - by DoesNotCompute
    I'm using a PHP librairy to send email through postfix. But i'm keep getting this message in the logs when i try to send emails : postfix/sendmail[15782]: fatal: -n option not supported I will remove this flag from my code but i'm curious about the purpose of this flag which seems to be useless (http://linux.die.net/man/1/sendmail.postfix). I can't find any information about it on google, any idea about the purpose of this option?

    Read the article

  • How to stay financially organized easily when running a small web development company

    - by jls33fsls
    So I'm a programmer and I run my own web development company. In the past I have been able to get away with just doing some simple number crunching at the end of each year to do my taxes, but my company has grown substantially over the last year, and now that I am sitting down to do my taxes it has become an absolute nightmare because none of my information is organized at all. I want to be abel to easily keep track of my monthly and yearly financial data for my company (I use a Mac), any suggestions?

    Read the article

  • Is Jabber the same thing as XMPP?

    - by Atomiton
    I find conflcting information on this subject. Are they the same thing? I've read that Jabber is "based" on XMPP. For example: The chat client "Pidgin" has a box for XMPP but seemingly not for Jabber. Yet, it seems to support it. What's the difference between XMPP and Jabber?

    Read the article

  • Complete stack traces from Hyperic

    - by Mike Kushner
    I've setup Hyperic to run on our CI-machine, and every once in a while it reacts to some random stack trace and sends of an alert. So far so good, we've caught a lot of intermittent bugs that way. My only issue is that the alert only contains the first error line and not the entire stack trace, which requires me to access the machine and look at the logs manually. Is there any way to modify the alert message to contain more information, alternatively to include the log file in the alert mail?

    Read the article

  • HP ProBook 4540s CD/DVD Drive cannot Read Disks

    - by DavidB
    I seem to have a problem with the CD/DVD drive on my HP ProBook 4540s laptop. I cannot get it to read any disks. Normally, I would say that this is a hardware issue, but whenever I put a disk that previously could be read in the drive, it starts to make noise like it is trying to to read the disk but cannot and AnyDVD HD seems to be able to retrieve disk information with some struggle. Any ideas on what the problem could be?

    Read the article

  • PCI-DSS compliance for business with only swipe terminals [migrated]

    - by rowatt
    I support the IT infrastructure for a small retail business which is now required to undergo a PCI-DSS assessment. The payment service and terminal provider (Streamline) has asked that we use Trustwave to do the PCI-DSS certification. The problem I face is that if I answer all questions and follow Trustwave's requirements to the letter, we will have to invest significantly in networking equipment to segment LANs and /or do internal vulnerability scanning, while at the same time Streamline assures me that the terminals we have (Verifone VX670-B and MagIC3 X-8) are secure, don't store any credit card information and are PCI-DSS compliant so by implication we don't need to take any action to ensure their network security. I'm looking for any suggestions as to how we can most easily meet the networking requirements for PCI-DSS. Some background on our current network setup: single wired LAN, also with WiFi turned on (though if this creates any PCI-DSS complexities we can turn it off). single Netgear ADSL router. This is the only firewall we have in place, and the firewall is out the box configuration (i.e. no DMZ, SNMP etc). Passwords have been changed though :-) a few windows PCs and 2 windows based tills, none of which ever see any credit card information at all. two swipe terminals. Until a few months ago (before we were told we had to be PCI-DSS certified) these terminals did auth/capture over the phone. Streamline suggested we moved to their IP Broadband service, which instead uses an SSL encrypted channel over the internet to do auth/capture, so we now use that service. We don't do any ecommerce or receive payments over the internet. All transactions are either cardholder present, or MOTO with details given over phone and typed direct into terminal. We're based in the UK. As I currently understand it we have three options in order to get PCI-DSS certification. segment our network so the POS terminals are isolated from all PCs, and set up internal vulnerability scanning on that network. don't segment the network, and have to do more internal scanning and have more onerous management of PCs than I think we need (for example, though the tills are Windows based, they are fully managed so I have no control over software update policies, anti virus etc). All PCs have anti virus (MSE) and windows updates automatically applied, but we don't have any centralised go back to auth/capture over phone lines. I can't imagine we are the first merchant to be in this situation. I'm looking for any recommendations a simple, cost effective way to be PCI-DSS compliant - either by doing 1 or 2 above with (hopefully) simple and inexpensive equipment/software, or any other ways if there's a better way to do this. Or... should we just go back to the digital stone age and do auth/capture over the phone, which means we don't need to do anything on our network to be PCI-DSS certified?

    Read the article

< Previous Page | 352 353 354 355 356 357 358 359 360 361 362 363  | Next Page >