Search Results

Search found 4685 results on 188 pages for 'proper'.

Page 38/188 | < Previous Page | 34 35 36 37 38 39 40 41 42 43 44 45  | Next Page >

  • Replace clock battery on Dell Inspiron 8200?

    - by jacobsee
    I have an old Dell Inspiron 8200 laptop. Still mostly works, but the clock battery has died so everytime I power it on I need to go into the BIOS and set the proper clock time. From what I've been able to tell, replacing this battery is non-trivial, but I haven't found a clear answer. How do I replace the clock battery? And how do I buy a replacement?

    Read the article

  • Instantiating COM object hnetcfg.fwpolicy2 on Remote Server

    - by Pavan Keerthi
    I locked my self out by inadvertently changing RDP firewall rule to use IPSec,but without completing proper steps to setup IPSec channel from my laptop to server. Luckily all wmi remoting on Server works,So I am trying to edit the rule with Powershell When I enter below code ,the COM object is invoking on local machine.How can I invoke it on remote machine? Enter-PSSession $Session $fw = New-Object -ComObject hnetcfg.fwpolicy2

    Read the article

  • Timezone reset on Amazon AMI update

    - by Jeff
    I have a server set up through Amazon AWS. It's Amazon's RHEL-based AMI. When I initially booted up the machine, I set the proper timezone by creating a symlink: ln -sf /usr/share/zoneinfo/America/Los_Angeles /etc/localtime This works just fine, but whenever Amazon provides an update to their AMI the timezone automatically reverts to UTC. Is there a way around this or does it have to be manually set after each update?

    Read the article

  • How to tell credentials used for a Network Mapping?

    - by shanecourtrille
    I have a networking mapping that doesn't appear to work. When I connect to the mapping I get access denied when I try to create a folder. When I created the mapping I told it to login as another account. I have verified that account has the proper rights on the server side of things. How can I verify that my local machine is connecting with the right credentials?

    Read the article

  • All users of a group can edit each others files (Linux)

    - by Xeoncross
    I want anyone in group www-data to have write access to /var/www. For example, if 'a' and 'b' are in group www-data and 'a' creates a file in /var/www - then 'b' will be able to edit it. The problem is that I create files that PHP and Apache can't edit - and they create files I can't edit without sudo. I changed the umask setting /etc/profile from umask 022 to umask 002. Is this a safe and proper way to handle this?

    Read the article

  • Configuration Manager sub site codes

    - by NA Slacker
    I have two sub-sites set up in configuration manager. When the SCCM agent installs on the client machines within the boundaries of those sub sites they are assigned the site code of the Primary site, not the sub site code. As a result their management server remains the main server not the sub site server. I am setting up thes sub sites on cross WAN locations to cut down on traffic. What could be preventing the clients from getting associated with the proper sub site code.

    Read the article

  • Secure data hosting...

    - by kylex
    I've looked online and can't seem to find a proper answer. We have a client that requires very sensitive data be stored in a database. Is there a hosting company that provides high-level database security (this is for a bank).

    Read the article

  • Where can I report an issue with IIS?

    - by Nathan Taylor
    While working with an ASP.NET application on Chrome for Android I discovered that Request.Browser.Cookies returns False for that browser (despite the browser supporting cookies). Based on what I've read, this indicates a problem with the database which ASP.NET (and, I assume, IIS) uses to look up information about different UserAgents. The fact that it returns False means that the database is either missing Chrome for Android, or has invalid data for it. What is the a proper place to report IIS issues like this?

    Read the article

  • windows misconfigured keyboard after installing usb keyboard

    - by goliatone
    have a dell vostro 1520, installed an external usb keyboard which works fine but the laptop's keyboard does not work properly. in the log in screen everything works as it should, once logged in the keyboard breaks. keys that have an alternate symbol accessible with the FN key render it by default. Meaning i have to press the FN key for it to render the proper ones- p has the * as FN, in order to get the p i have to press p+FN.

    Read the article

  • rundll32 gets stuck when running games on windows 7 [closed]

    - by Midhat
    When I run a game on my windows 7 laptop, Rundll32 completely uses up one of my cores and the game wont start. By searching the web I have been able to fix it by 1 - Disabling game info collection/updation from the games explorer. It solved the problem for some games but not all 2 - Killing the game exe once rundll32 gets stuck and restarting the game This has solved the problem for now, but is there a proper and permanent solution to this?

    Read the article

  • Redhat linux terminal garbage output when using telnet

    - by Dinesh
    I am using redhat-linux terminal to connect to a router device by means of 'telnet'. While the device boots, the characters are getting printed in garbage manner which is as follows, In terminal, If I click on the the menu 'Terminal'-- 'Reset', then it is getting changed to proper alphabetical. Is there any way available to prevent it ? I have tried setting the encoding of the terminal to UTF-8 from the menu options. But, still the same issue.

    Read the article

  • Server and Application architecture for large outgoing email volume.

    - by Ezequiel
    Hi, we need to develop an application to send large amount of emails (newsletters) We estimate 15 millions of emails per month (6 - 10 emails per seconds). Would you recommend me the proper architecture for this application? should we have several MTA agents and use them in a round robin fashion? What considerations should we take on account to not being treated as spammers (its really not spam what we are going to send). Thanks for your help. Ezequiel

    Read the article

  • web (html) gui building software

    - by Gaurav Sharma
    Hello everyone, I am in need of a software (preferablly free/open source) which facilitates fast and easy creation of html form and controls with proper styling. Similar to MachForms. This utility saves me a lot of time but there is one limitation of using it. The source code remains with the server only. Help me find a capable solution. Thanks

    Read the article

  • Postfix flow/hook reference, or high-level overview?

    - by threecheeseopera
    The Postfix MTA consists of several components/services that work together to perform the different stages of delivery and receipt of mail; these include the smtp daemon, the pickup and cleanup processes, the queue manager, the smtp service, pipe/spawn/virtual/rewrite ... and others (including the possibility of custom components). Postfix also provides several types of hooks that allow it to integrate with external software, such as policy servers, filters, bounce handlers, loggers, and authentication mechanisms; these hooks can be connected to different components/stages of the delivery process, and can communicate via (at least) IPC, network, database, several types of flat files, or a predefined protocol (e.g. milter). An old and very limited example of this is shown at this page. My question: Does anyone have access to a resource that describes these hooks, the components/delivery stages that the hook can interact with, and the supported communication methods? Or, more likely, documentation of the various Postfix components and the hooks/methods that they support? For example: Given the requirement "if the recipient primary MX server matches 'shadysmtpd', check the recipient address against a list; if there is a match, terminate the SMTP connection without notice". My software would need to 1) integrate into the proper part of the SMTP process, 2) use some method to perform the address check (TCP map server? regular expressions? mysql?), and 3) implement the required action (connection termination). Additionally, there will probably be several methods to accomplish this, and another requirement would be to find that which best fits (ex: a network server might be faster than a flat-file lookup; or, if a large volume of mail might be affected by this check, it should be performed as early in the mail process as possible). Real-world example: The apolicy policy server (performs checks on addresses according to user-defined rules) is designed as a standalone TCP server that hooks into Postfix inside the smtpd component via the directive 'check_policy_service inet:127.0.0.1:10001' in the 'smtpd_client_restrictions' configuration option. This means that, when Postfix first receives an item of mail to be delivered, it will create a TCP connection to the policy server address:port for the purpose of determining if the client is allowed to send mail from this server (in addition to whatever other restrictions / restriction lookup methods are defined in that option); the proper action will be taken based on the server's response. Notes: 1)The Postfix architecture page describes some of this information in ascii art; what I am hoping for is distilled, condensed, reference material. 2) Please correct me if I am wrong on any level; there is a mountain of material, and I am just one man ;) Thanks!

    Read the article

  • Blade Enclosure, Multiple Blade Servers, Whats the closest approximation to a DMZ?

    - by codeulike
    I appreciate that to get a proper DMZ, one should have a physical separation between the DMZ servers and the LAN servers, with a firewall server in between. But, in a network consisting of a single Blade Enclosure containing two or more Blade servers, whats the closest approximation to a DMZ that could be designed? More details: Virtual servers, mostly Windows, running in a VMWare environment on the Blade servers, and physical firewall box between the Blade enclosure and the internet.

    Read the article

  • Problem in connecting LCD monitor to Ubuntu laptop

    - by piemesons
    I was using my LCD monitor with my laptop properly with Windows 7. But I am facing a problem in Ubuntu. It connects in a proper way but on pressing backspace it automatically moves back to my laptop screen. Sometimes pressing any key moves back to my laptop screen. How can I fix this behavior?

    Read the article

  • V MAX Anyone..Need to learn administrating VMAX

    - by kevinmika
    Hello All, This is going to be my first post here. I 'm working as an Administrator at SNI. I have been responsible for managing Celerra and Clariion,but this new environment has 2 VMAX boxes . Since, I don't have prior experience is managing symmetrix ,i am kinda stuck here ( no training as well) Can some body suggest me a proper link where i can learn the basics as well as the administrative part of V MAX. Thanks in advance for your help! Kevin

    Read the article

  • Remove password from an Excel Document

    - by Ben Confino
    I'm providing internal support and one of our users has managed to put a password on an excel file by accident, I've done the proper checks to make sure that the user should have access to the document and now want to know what the recommendation for removing a password from an Excel document. For what its worth, the password appears after Excel opens but before you can see any data in excel.

    Read the article

  • How to convert image into unicode

    - by Zahida Raeesi
    Hello there: I have created a Baluchi keyboard via ARABIC keyboard. But there are few keys not available in Arabic too. I tried different combination of keys to fulfill my requirement but now issue is that for a specific key there is no unicode combination available in UNICODE chart. plz help me out to covert this image in proper UNICODE text so that I can update my Baluchi keyboard Looking forward for your prompt and positive response with best regards, Raji Baloch

    Read the article

< Previous Page | 34 35 36 37 38 39 40 41 42 43 44 45  | Next Page >