Search Results

Search found 18475 results on 739 pages for 'non exist'.

Page 360/739 | < Previous Page | 356 357 358 359 360 361 362 363 364 365 366 367  | Next Page >

  • Logical volume that spans raid1 sets: what happens if a RAID fails?

    - by Jeff Shattock
    Consider the following scenario: /dev/md0 - 10GB RAID 1 volume built from /dev/sda and /dev/sdb /dev/md1 - 10GB RAID 1 volume built from /dev/sdc and /dev/sdd /dev/vg0 - volume group containing md0 and md1 /dev/vg0/lv0 - 15GB logical volume The raid devices are created with mdadm; the logical volumes by LVM. What happens to lv0 if md0 fails entirely? That is, if both sda and sdb disintegrate so that the md0 device can not start. Is the portion of the data that resided on md1 still accessible, or is the entire LV gone? Would the answer change if lv0 were created as a striped volume vs non-striped?

    Read the article

  • Fully secured gateway web sites

    - by SeaShore
    Hello, Are there any web sites that serve as gateways for fully encrypted communication? I mean sites with which I can open a secured session, and then to exchange through them with other sites in a secure way both URLs and content? Thanks in advance. UPDATE Sorry for not being clear. I was wondering if there was a way to access any site over the Internet (http or https) without letting any Intranet-proxy read the requested URL or the received content. My question is whether such a site exists, e.g.: I am connected to that site via https, I send it a URL in a secured way, the site gets the content from the target site (possibly in a non-secured way) and returns to me the requested content in a secured way.

    Read the article

  • Acrobat Reader, and indeed all Adobe products are freezing and crashing on print

    - by 5tratus
    Everything was working fine, right up till I had to do some driver work to get my scanner to work - now I can't seem to print from any Adobe product. I click print and the program freezes, it stops responding, and in the case of Acrobat Reader, it crashes. In the case of In-design CS4, I have to stop the process in task manager, in the case of Fireworks CS3 - I think it just crashes. Printing a PDF hangs and crashes inside of Firefox and IE browsers too. My printer works and I can print from MS Word, Excel and directly by right clicking on a non-Adobe file and choosing print. But when I try it in an Adobe product. I'm running Windows 7 64-bit, my version of Adobe Reader is: 10.1.11, Windows is updated, and I don't have any unusual extensions.

    Read the article

  • Ways to setup a ZFS pool on a device without possibility to create/manage partitions?

    - by Karl Richter
    I have a NAS where I don't have a possibility to create and manage partitions (maybe I could with some hacks that I don't want to make). What ways to setup multiple ZFS pools with one partition each (for starters - just want to use deduplication) exist? The setup should work with the NAS, i.e. over network (I'd mount the images via NFS or cifs). My ideas and associated issues so far: sparse files mounted over loop device (specifying sparse file directly as ZFS vdev doesn't work, see Can I choose a sparse file as vdev for a zfs pool?): problem that the name/number of the assigned loop device is anything but constant, not sure how increasing the number loop device with kernel parameter affects performance (there has to be a reason to limit it to 8 in the default value, right?)

    Read the article

  • Iptables: masquarading and routing

    - by nixnotwin
    I have a WAN router which is linked to isp over a /30 WAN subnet. But it also servers as a router to a /29 local public WAN subnet which is connected to few of my servers. The traffic from /29 gets routed to ISP via /30 subnet. For a wired reason I want to masqarade (NAT) the interface which has /30 ip. So the interface with /30 ip should appear as masquaraded for my 192.168.1.0/24 network and it also should act as a normal non-NAT router for my WAN public subnet /29. Can this be done with iptables on a Linux machine?

    Read the article

  • 2x ATI FireMV 2250 not working

    - by Brett Rigby
    I've just bought 2x ATI FireMV 2250 cards from a reputable seller on ebay... one is a PCI-E x1 and the other is a PCI-E x16. Problem is, neither works in my Dell Vostro 220 PC... Both cards appear to not work. Is there something I'm missing? The seller used an anti-static bag for one of the cards, syaing that: "You Must connect this graphics board to the computer's power supply" but there's no socket for that, nor any indication. I have contacted the seller, but thought I'd raise it here, as it seems strange that two cards can be non-functioning.

    Read the article

  • Why am I getting 'File in use by Another User' and 'Application Sharing Violation' errors when trying to open & and save files?

    - by GollyJer
    We're getting this a lot lately. Windows 2008 Server Windows 7 & Vista Client PC's Microsoft Office 2007 When a user tries opening a file on our network drive (word doc, excel spreadsheet, etc) the software reports the file is locked by 'another user' even when it's not. They're also seeing random 'Sharing Violation' errors when trying to save files to the network. Possibly the same manifestation of the problem shows up when a user tries saving a local, on their own drive, non-network files and they get 'Can not save due to a Sharing Violation'.

    Read the article

  • Compare Error logs across service fleet, find unique errors

    - by neuroelectronic
    I'm looking for a tool where I can list the servers to check, the location of the file and it would return a list of the most common errors across those servers (say like 2 or 3 servers for report brevity) and get a report something like this Server.A Server.B Server.C -------- -------- -------- 42 error.X 39 error.X 61 error.X 21 error.Y 7 error.Y 5 error.A 17 error.B 6 error.A 4 error.Y 4 error.A 2 error.R 3 error.S 3 error.R 1 error.S 1 error.R Of course, excluding timestamps and other error details and just grepping out the common sub-strings and listing them like so. I'd be able to look at the table and see that error.B is unique to Server.A and conclude that there is something up with Server.A. Does something like this already exist? Is this something I'll have to code myself? I'm not necessarily looking for this specific report, just the functionality to find unique errors across a set of error logs.

    Read the article

  • IIS returning plain Forbidden response. No HTTP code

    - by Alex Pineda
    I'm running a ServiceStack application on IIS. My regular services work fine and have not had any problems with permissions. My new project involves providing generated pdfs. I gave IIS_IUSRS read/write permissions to the Temp directory under my app directory. I also allow non SSL connections to this directory. When I browse to the file which ServiceStack is supposed to automatically serve up (eg. http://ryu.com/Temp/201310171723337631.pdf ) I get this: Forbidden Request.HttpMethod: GET Request.PathInfo: Request.QueryString: Request.RawUrl: /ryu/Temp/201310171723337631.pdf App.IsIntegratedPipeline: True App.WebHostPhysicalPath: C:\inetpub\ryu App.WebHostRootFileNames: [global.asax,global.asax.cs,web.config,bin,temp] Now this doesn't look like a ServiceStack error message, more like IIS, but I'm not certain as to how to get to the bottom of this. Authorization settings are Allow All.

    Read the article

  • LDAP loginShell on platforms with different paths

    - by neoice
    I'm using LDAP to deal with users and authentication across my network. I'm now adding FreeBSD hosts and have hit a problem with login shells. on Linux, shells tend to be in /bin/$shellname, so setting my login shell in LDAP to /bin/zsh works perfectly. on FreeBSD, /bin/zsh doesnt exist, I need to use /usr/local/bin/zsh. is there a solution to this? I imagine I might be able to make some sort of login-shell.sh script that LDAP passes out as the "shell" and then use the script to determine the actual shell for the user, but I'm not a fan of that idea. I'm using Debian and FreeBSD, both with a standard OpenLDAP/PAM/nss setup. edit: it looks like using /bin/sh and adding an exec $shell to .profile would "work", but that doesnt scale very well.

    Read the article

  • How does Amazon ec2-user get its sudo rights

    - by Johan
    I am looking for where the default Amazon AMI linux image sets up the privileges for the default ec2-user account. After logging in with this account I can use sudo successfully. Checking via the sudoers file, which I open by running visudo (with no other options) I see a few default settings and permissions for root ALL ALL So ... Where is the permissions for ec2-user assigned? I have not yet tried to add a new permission but ultimately I want to resign ec2-user for systems management tasks and use a non-full root user for administering the applications (stop and start mysql, httpd, edit apache's vhost files, and upload / edit web content under the web root)

    Read the article

  • Is there a time machine equivalent for windows that can back up network files?

    - by Jim Thio
    This question is similar to Does an equivalent of Time Machine exist for Windows?, with one difference: The files I want to back up are on a network drive. The computer on that network drive is running Windows XP. I want to back up data on Windows 7. How would I do so? I'd like something similar to Mac OS X' time machine. So copy of data every hour, day, week. Then thinning out, data gets deleted automatically as time goes by. For example, the data for last day is kept as hourly snapshots. For last week, as daily snapshots every day. And for last month as weekly snapshots. How can I achieve this?

    Read the article

  • Is there a more elegant way to apply conditions in nginx?

    - by Ryan Detzel
    Is there a better way to do this? I can't find a way to nest or apply boolean operators to conditions in nginx. Basically if there is a cookie set(non-anonymous user) we want to hit the server. If the cookie is not set and the file exists we want to server the file otherwise hit the server. set $test "D"; if ($http_cookie ~* "session" ) { set $test "${test}C"; } if (-f $request_filename/index.html$is_args$args) { set $test "${test}F"; } if ($test = DF){ rewrite (.*)/ $1/index.html$is_args$args? break; } if ($test = DCF){ proxy_pass http://django; break; } if ($test = DC){ proxy_pass http://django; break; } if ($test = D){ proxy_pass http://django; break; }

    Read the article

  • Cross platform KVM over ethernet

    - by Falmarri
    I'm not sure if this exists, but this is what I'd like to do. I have a laptop and a desktop that I work on about equally. The laptop runs windows 7 and the desktop is on kubuntu 10.04. What I want to be able to do is be able to drag my mouse accross my screen and have it act like my laptop is a second monitor. Whereby I can use my desktop mouse, drag it say to the left off of my desktop monitor, and use it on my laptop (I don't care about the keyboard, just the mouse). Is that possible? Are there any other solutions that exist? I'd prefer not to have a physical kvm switch.

    Read the article

  • Flashing cursor with new laptop battery

    - by Fuzzy Purple Monkey
    I recently purchased a new, non-Toshiba battery for my Toshiba M700 tablet/laptop. The battery fits fine and the tablet detects and charges it, but when I try to boot up all I get is the Toshiba logo then a flashing cursor in the top-left. I can get to the bios, but no further. If I put the old battery back in, everything boots up fine. Has anyone else seen this problem? What am I missing? Thanks in advance!

    Read the article

  • How do I capture and playback http web requests against multiple web servers?

    - by KevM
    My overall goal is to not interrupt a production system while capturing HTTP Posts to a web application so that I can reverse engineer the telemetry coming from a closed application. I have control over the transmitter of the HTTP Posts but not the receiving web application. It seems like I need a request "forking" proxy. Sort of a reverse proxy that pushes the request to 2 endpoints, a master and slave, only relaying the response from the master endpoint back to the requester. I am not a server geek so something like this may exist but I don't know the term of art for what I am looking for. Another possibility could be a simple logging proxy. Capture a log of the web requests. Rewrite the log to target my "slave" web application. Playback the log with curl or something. Thank you for your assistance.

    Read the article

  • Virtual bridge/switch for Windows server&client?

    - by Tiberiu-Ionu? Stan
    I can't find a very simple application, with litle to zero configuration on both client and server side which would help one computer to bring other computers on an existing private LAN. OpenVPN seems like an overkill for this type of thing, and is really hard to get running or debug by various clueless people trying to connect. Does such a software exist? It's very odd not to. THe Windows provided VPN (PPTP over TCP and GRE) is not what I'm looking for because it is often filtered by ISPs. Only TCP and UDP solutions pls. Encryption is not needed.

    Read the article

  • Is it better to use a crowded 2.4GHz Wi-Fi channel 1, 6, 11 or "unused" 3, 4, 8, or 9?

    - by Luke
    I understand that 2.4GHz Wi-Fi channels overlap, and that the only non-overlapping channels in the US are 1, 6, and 11. Generally, my signal strength on channels 1, 6, and 11 are much stronger than my neighbors' on the same channel. However, several of the channels may have 4 or 5 others on that same channel. In this scenario, is it better to use 3, 4, 8, or 9? Or is it better to use the crowded channels 1, 6, and 11? As a secondary question, does it even matter that my signal strength is much higher than theirs? Related: Why use wifi channels other than 1, 6 or 11?

    Read the article

  • rsync synchronizing files only without creating folders on destination

    - by Vincent
    Is it possible with rsync to not create directories on destination? Imagine I have that source : a/ a/x.txt b/ b/y.txt And that I have this destination : a/ a/z.txt The wanted result of rsync source destination : a/ a/x.txt a/z.txt Of course my real situation involves thousand files/folders structure and I don't want solutions involving explicit list of synced folders, which I can do. I'm looking for a clean way just to prevent any folder creation on destination. By exclude or filtering... That could even be something outside rsync, like a hack with permissions if rsync can't do this... For information, this is really easy to get this kind of situations, in my case I have: A server with 2 disks, let's say A & B. And a local drive C. I usually use rsync to sync (and merge) remote A & B into local C. Then sometimes I just want to sync back some C files into A and B. (Just new Files... not non-existing folders on destination)

    Read the article

  • Can't see CMD.EXE on Windows 7

    - by Andrea
    I have a problem with Windows 7 and cmd.exe with these conditions: Logon as non admin user Launch cmd.exe I can see cmd.exe in task manager but it's invisible in the desktop and I don't know what to do, everything is fine and I can see cmd.exe if I do login with an admin account. I can see it in the "Process" tab but not in the "Application" tab, and if I launch five cmd.exe's, I see five processes, but from that tab I have no "Bring to front" or "Maximise" I can't find any WOW folder under C:\Windows, even with show hidden and system files enabled. I'm running Windows 7 32-bit running on a 64-bit Intel Core 2 Duo E7500

    Read the article

  • What is the secure way to isolate ftp server users on unix?

    - by djs
    I've read documentation for various ftp daemons and various long threads about the security implications of using a chroot environment for an ftp server when giving users write access. If you read the vsftpd documentation, in particular, it implies that using chroot_local_user is a security hazard, while not using it is not. There seems to be no coverage of the implications of allowing the user access to the entire filesystem (as permitted by their user and group membership), nor to the confusion this can create. So, I'd like to understand what is the correct method to use in practice. Should an ftp server with authenticated write-access users provide a non-chroot environment, a chroot environment, or some other option? Given that Windows ftp daemons don't have the option to use chroot, they need to implement isolation otherwise. Do any unix ftp daemons do something similar?

    Read the article

  • (Windows 7) Dial Up Connection Locks up the Networking Service

    - by Nick
    I connect to the internet by using my cell phone as a dial up modem. (shh, don't tell my service provider) The connection is usually seamless and the speed is good (150kbps) but occasionally, the connection will get terminated by either the phone or the network, I'm not sure which and then Windows7 stubbornly doesn't acknowledge that the connection is dead so I can re-dial. I have tried to manually kill the connection, but then anything related to the network service refuses to open and the connection is still there. No "Network and Sharing Center", "Network Devices" and often the tray menu will refuse to pop open. The only way I have found to clear the problem is a full restart which. Logging off doesn't work and I haven't been able to find the service that is frozen. If anyone knows how to fix this or prevent this from happening or even how to go about troubleshooting I would be very grateful. ps. This problem is non-existant when tethering in linux on the same machine. (Ubunutu 9 and JoliOS)

    Read the article

  • 1080p HD TV + what is minimum spec pc required to stream HD movie files to it?

    - by rutherford
    I want to stream hi-def (non flash-based) movies from my future minimum spec pc to my network-ready HDTV. What I want to know is a) when streaming from a computer (local wifi network), is the computer's cpu/video/ram resources used to the same extent as it would be if playing back on the computers local screen? If not what are the differences? b) So with streaming hd content what is the minimum spec processor I should go for, if i) only one TV is acting as client ii) two TVs are simultaneous clients.

    Read the article

  • Bulk Deleting All Messages in a Folder in Microsoft Outlook Web Access [closed]

    - by Cerin
    Possible Duplicate: Multiple delete in Microsoft Outlook Web Access How do you delete all messages in a folder in Outlook, preferrably through Web Access? I left my Outlook account unattended for several days (on vacation) and when I got back I found several folders with over 5k emails, mostly error logging or spam. When I try to open the Outlook client, it just locks up, presumably unable to download that many emails. I can view at most 100 emails at a time, but I can't select all emails to delete or permanently delete them immediately, so manually deleting this many emails is going to take a while. Gmail has a similar feature to select and delete all emails in a folder, and that's free so I figure being a quality non-free product from Microsoft, Outlook should have a similar feature (yes that's sarcasm). I've Googled, but I'm not finding anything. Is this possible?

    Read the article

  • Can a processor upgrade cause BSOD?

    - by Daniel
    I Had the following hardware setup: Phenom II X4 945 Asus M4A97 4GB DDR2 OCZ Radeon HD5850 OCZ Agility 2 120 GB Windows 7 x64 Pro Fully updated (latest drivers and windows update patches) Then I bought an used Phenom II X6 1090T and installed it without formatting. Since that my computer started BSODing almost every time I'm playing any game and with different error messages, like: page fault in non-paged area bad pool header the video memory manager found a problem error in dxgmm1.sys(or something like that) And when it doesn't BSOD the game simply crashes. I have tried: Updating BIOS Reseting BIOS to defaults Reinstalling Video Drivers Installing the latest DirectX All that's left is to do a full format and I don't want to do that since it's going to be a lot of work to fine tune windows to my preferences again. So is my "new" processor defective or do I really need to format the computer? Update: I use a (properly installed) custom cooler from Coolermaster and both the BIOS and the Open Hardware Monitor(Application) attest the CPU is not overheating, so I guess the CPU its defective and since I bought it from a guy over the Internet I'm probably screwed

    Read the article

< Previous Page | 356 357 358 359 360 361 362 363 364 365 366 367  | Next Page >