Search Results

Search found 9643 results on 386 pages for 'somebody explain me'.

Page 37/386 | < Previous Page | 33 34 35 36 37 38 39 40 41 42 43 44  | Next Page >

  • find command in Linux

    - by Martin
    My goal is to find all pdf files on a remote machine, so I resort to the useful command find. So I type find ~ *.pdf or find ~ "*.pdf" and I get nothing. I do the same on my machine and I get nothing. I do a regular search from the menu on my machine and I find quite a few pdf files. Would somebody please tell me what am I doing wrong?

    Read the article

  • Running virtual machines: Linux vs Windows 7

    - by vikp
    Hi, I have tried running windows xp development virtual machine under windows 7 and the performance was dreadful. I'm considering installing Linux and running the virtual machine from the Linux, but I'm not sure whether I can expect any performance gains? It's a 2.4ghz core 2 duo machine with 4gb ram and 5400 rpm hdd. Can somebody please recommend very cut down version of linux that can run VMWare player and isn't resource hungry? Thank you

    Read the article

  • Rank Source Control Optionsl-VSS vs CVS vs none vs your own hell

    - by Roman A. Taycher
    It seems like a lit of people here and on many programmer wikis/blogs/ect. elsewhere really dislike VSS. A lot of people also have a serious dislike for cvs. In many places I have heard a lot of differing opinions on whether or not using vss or cvs is better or worse then using no source control, please rate the worst and explain why!!!!! you rated them this way. Feel free to throw in your own horrible system in the rankings. If you feel it depends on the circumstances try to explain the some of the different scenarios which lead to different rankings. (note:I see a lot of discussion of what is better but little of what is worse.) second note: while both answers are nice I'm looking less for good replacements and more for a comparison of which is worse and more importantly why!!!!!

    Read the article

  • How to limit ram usage of a certain binary?

    - by marc.riera
    Hello, i have a binary, which indexes some stuff, it eats all my ram and my swap. Then the server hangs. I would like to limit its ram usage. I've looking at cpulimit and /etc/security/limits.conf but both of them focus on cpu limits and user/processes . Have somebody limited the usage of a certain binary? How can I approach this issue? Thanks

    Read the article

  • Supply username and password to mstsc

    - by Will
    In previous versions of the remote desktop client there were methods of passing in the password through various methods. Has anybody found a good method using the latest remote desktop client? I'm aware of LaunchRDP but that doesn't meet our needs. Perhaps somebody knows the algorithm so I can dynamically assemble RDP connection files?

    Read the article

  • Latex font for special expression

    - by Claus
    Hi I wanna highlight some special terms throughout my thesis. I do not wanna use tt{} or emph{} or bold to do that but some special font. Can here somebody suggest me common pratice how to do that? Many thanks, Claus

    Read the article

  • Force logout a user

    - by Mithun
    I When I logged into the machine as root and typed who to see which users are logged in, I found somebody else too logged in as root devuser pts/0 2011-11-18 09:55 (xxx.xxx.xxx.xxx) root pts/1 2011-11-18 09:56 (xxx.xxx.xxx.xxx) testuser pts/2 2011-11-18 14:54 (xxx.xxx.xxx.xxx) root pts/3 2011-11-18 14:55 (xxx.xxx.xxx.xxx) How can I force a root user at pts/3 to logout?

    Read the article

  • Are Time Machine backups secure?

    - by Leandro Ardissone
    I have my Time Machine backups on an external disk (WD My Passport with no hardware encryption) and I'm worried if the data stored on the disk is safe in case somebody steals it and connect it to any Mac/PC. Does any Mac can browse the Time Machine backups? Or are they encrypted in any way? If no, is there a way to improve security of the backups, should I buy a hardware encryption based HD? Thanks.

    Read the article

  • Linux Teamviewer functionality, but for ssh only

    - by Icapan
    I need to access some Linux server behind NAT (no ports forwarded), so I need to have something like "phone home" like Teamviewer has. There is no GUI, but somebody can log in through SSH and dictate a password if it is changing (like Teamviewer). SSH (port 22) is enough (I can tunnel ports through SSH if I need). Any suggestions? How safe is it?

    Read the article

  • OS X wants to back up Macintosh HD to itself

    - by slhck
    From time to time, OS X (10.6) will ask me if I want to perform a backup of my Macintosh HD, but the backup destination is obviously the HD itself. I have not plugged in any external device, nor is there a Time Capsule network share. A message like this will appear: Moreover, the Macintosh HD will suddenly have a Time Machine icon in Finder. Has somebody experienced the same and could help me identify how to stop OS X from using its own disk as the backup destination?

    Read the article

  • how to configure tomcat6 for ubuntu

    - by bipul
    i have installed apache tomcat6 for ubuntu 9.04 recenty.But it seems that some API's like servelet and http are not included althogh i have installed openJDK 1.6. somebody advised me to set JAVA_HOME path variable. BUT i am not able to do that and from where to do that. please explain the procedure.

    Read the article

  • how to configure tomcat6 for ubuntu

    - by Bipul
    i have installed apache tomcat6 for ubuntu 9.04 recenty.But it seems that some API's like servelet and http are not included althogh i have installed openJDK 1.6. somebody advised me to set JAVA_HOME path variable. BUT i am not able to do that and from where to do that. please explain the procedure.

    Read the article

  • Can you tell by the network traffic whether a video was watched or downloaded from YouTube?

    - by humanityANDpeace
    My question is about quite popular YouTube downloaders like youtube-dl (a command line program) or VideoDownloadHelper (a Firefox-browser extension). Comparing two cases: Watching a video on YouTube Download the video using a downloader (to be specific let's assume youtube-dl) Is it possible to tell – for instance by inspecting the network traffic – that the video was downloaded and not "only watched" on YouTube? Maybe one could compare network traffic using programmes like Wireshark? I cannot do that myself, but maybe this will help somebody to answer the question.

    Read the article

  • GDB hardware watchpoint very slow - why?

    - by Laurynas Biveinis
    On a large C application, I have set a hardware watchpoint on a memory address as follows: (gdb) watch *((int*)0x12F5D58) Hardware watchpoint 3: *((int*)0x12F5D58) As you can see, it's a hardware watchpoint, not software, which would explain the slowness. Now the application running time under debugger has changed from less than ten seconds to one hour and counting. The watchpoint has triggered three times so far, the first time after 15 minutes when the memory page containing the address was made readable by sbrk. Surely during those 15 minutes the watchpoint should have been efficient since the memory page was inaccessible? And that still does not explain, why it's so slow afterwards. The GDB is $ gdb --version GNU gdb (GDB) 7.0-ubuntu [...] Thanks in advance for any ideas as what might be the cause or how to fix/work around it.

    Read the article

  • How can I create email account using WHM Cpanel?

    - by prakash.panjwani
    Hello Friends, I have a dedicated linux server. I am using WHM cpanel for linux server.I want to create a email account using this cpanel. I am not getting how I can create a email account.The cpanel says that mail Lists 0/0. I have attached the images of cpanel.I am newer with linux server. Please somebody help me. Thanks In advance.

    Read the article

< Previous Page | 33 34 35 36 37 38 39 40 41 42 43 44  | Next Page >