Search Results

Search found 30270 results on 1211 pages for 'bart read'.

Page 382/1211 | < Previous Page | 378 379 380 381 382 383 384 385 386 387 388 389  | Next Page >

  • Layman's book for understanding computer networks

    - by srid
    The good thing about books targeting a layman is that it is usually very engaging to read (not dry and boring like, say, school/university books). Charles Petzold's Code: The Hidden Language of Computer Hardware and Software does this for explaining the underlying hardware in computers. Is there a similar book for understanding computer networking?

    Read the article

  • Is Jabber the same thing as XMPP?

    - by Atomiton
    I find conflcting information on this subject. Are they the same thing? I've read that Jabber is "based" on XMPP. For example: The chat client "Pidgin" has a box for XMPP but seemingly not for Jabber. Yet, it seems to support it. What's the difference between XMPP and Jabber?

    Read the article

  • How to locate MAC address in Windows 7

    - by Alibarsdad
    I am unable to locate the MAC address in a new computer with Windows 7. I've tried ipconfig/all to which I got "no items match your search". I also tried getmac. A screen flashed very briefly with what appeared to be the information but was not there long enough to read.

    Read the article

  • SSD has 32-bit Win 7 Ult.; partition now both unformattable and undeletable.

    - by user33666
    Drive 0, Partition 1 can't be deleted or formatted, at least by using the HD drive bay and attempting a delete or format with the 32-bit Win 7 CD. Most of my data is still on it and available for read/write (where the drive isn't occasionally pocked with "unrecoverable" or "corrupted" files). I've just never heard of a condition where the HD cannot be formattable. I now just have a very expensive backup drive that's got Swiss cheesed areas. The thing doesn't accept a Windows 7 repair or reinstall either.

    Read the article

  • How to split a multipage TIFF file on Windows?

    - by Portman
    I thought Adobe Photoshop could do everything, but apparently it cannot read multipage TIFF files. I have a TIFF file with four pages, and I need to edit one of the pages. Windows Picture Viewer can print all four pages, but cannot split them. Anyone know how I can split the original TIFF into four separate images suitable for editing? The Google search for "free tiff splitter windows" returns lots of suspicious looking downloads.

    Read the article

  • How can I use fetchmail (or another email grabber) with OSX keychain for authentication?

    - by bias
    Every fetchmail tutorial I've read says putting your email account password clear-text in a config file is safe. However, I prefer security through layers (since, if my terminal is up and someone suspecting such email foolery slides over and simply types "grep -i pass ~/.*" then, oops, all my base are belong to them!). Now, with msmtp (as opposed to sendmail) I can authenticate using the OSX keychain. Is there an email 'grabber' that lets me use Keychains (or at least, that lets me MD5 the password)?

    Read the article

  • Sync windows live and gmail

    - by vener
    I was wondering how could I sync the emails between two accounts? I know I can forward them to one of the email accounts but that is not how I want it. Both emails account should have the same email from the same person and their status such as read/unread status synced.

    Read the article

  • How to change shortcut keys in Thunderbird 3 for Linux?

    - by Josh
    I use Thunderbird on Ubuntu Linux and have just upgraded to Ubuntu 10 / Thunderbird 3. One of my gripes however is that Thunderbird uses a number of shortcut keys that have no secondary key requirements, for example, "Mark as Read" is M. Not ControlM. Just M. Worse, "Mark as Junk" is J. Which means I sometimes inadvertently mark messages as Junk. How can I customize Thunderbird's shortcuts so, for example, "Mark as Junk" is ControlJ?

    Read the article

  • ipconfig windows flashes and disappears...

    - by jdelage
    Using Windows XP on a Thinkpad. When I type ipconfig in the run command line prompt, the windows appears briefly and then disappears without me doing anything (and before I can read anything). Does anyone know what causes this and how to fix it? Thanks, JDelage

    Read the article

  • Keep rainmeter from minimizing

    - by thegreyspot
    HI! Just been playing around with Rainmeter and I notice that if I want to go look at my desktop and I click on the bottom right square in win7 that minimizes to the desktop, the rainmeter "gadget" gets minimized as well, not letting me read what I want to see. Is there something I can configure to make it stay up? Thanks!

    Read the article

  • Is there a way to HIDE a file/dir from a specific user/group?

    - by Iraklis
    I'm setting up ACL permissions in CENTOS. I'm getting close to the structure that I have in mind however one piece is missing for completing the puzzle. Is there any way to HIDE a file/directory from a specific user/group? I'm not talking about not being able to read, change dir to it. I want to completely hide it from the specific user/group (not to show up on ls -la).

    Read the article

  • How do I extend the virsh/qemu/libvirt Timeout?

    - by Nick
    There's a known issue with starting virtual machines with large hard drive images. Apparently, the time-out is 3 seconds, but in reality, it can take up to 15 seconds for a machine to start. I've read several bug reports, and people confirming it's a time-out problem, but I have yet to see a solution. Is there an option I can pass, like: virsh start MyMachine --ignore-timeout Or a config file that needs changed? Thanks!

    Read the article

  • Can I use ext3 as a shared fs if I add a lock manager ?

    - by edomaur
    I need a cluster filesystem for an iSCSI device. The problem is that the servers to which it is connected generate datafiles which must be read by every other servers. Except for the writing and deleting of such files, I do not need a full locking scheme like in OCFS2 or GFS2. So, can I use a distributed lock manager (DLM) on top of an ext3 filesystem or must I use only specialized filesystem ?

    Read the article

  • Freezing a dead(ish) laptop battery...

    - by Wesley
    I have a Compaq CQ50-215CA laptop with a battery that does not properly hold charge. Vista's battery meter does not read the remaining charge left; the laptop will randomly shut down at ~60% and sometimes the meter goes back up to 100% before shutting down without warning. So, does freezing a dead-ish laptop battery somehow repair it and allow it to hold charge again?

    Read the article

  • Eucalyptus / no bootable EBS yet - any alternatives to Eucalyptus?

    - by itgorilla
    I've read a couple of articles that Eucalyptus doesn't support bootable EBS yet. This is a problem since you can't make a backup form an instance like you a able on Amazon cloud or Rack Space Cloud. If you ever reboot the physical Ecalyptus sever that's running the node controller the instance is gone along with all your settings. Are there any alternatives to Eucalyptus or is just the only game in town when it comes to open source cloud?

    Read the article

  • Copy and paste twice

    - by Shane
    Is there a way, to copy and paste twice? For example, is there a way, for me to copy one url, store it, and then copy another url, and then for the urls to be pasted respectively? I read somewhere, that this is possible, but have not ben able to figure it out.

    Read the article

  • Where are the default Adobe Illustrator fonts found when installed?

    - by EdenMachine
    I need a copy of the Myriad-Roman font that is the default font for Adobe Illustrator. I have Illustrator installed but I need to put the font on my sever so my PDF DLL can read the font since my PDF is using that Myriad-Roman font. Please don't get distracted about the PDF part - I just need to know how to find the font wherever Adobe installs it when I install Illustrator (CS5). TIA!

    Read the article

  • Configuring my Linux firewall for Tomcat

    - by David Pinn
    I'm following some instructions for Installing Tomcat. They require me to add the following line to my iptables file: -A RH-Lokkit-0-50-INPUT -p tcp -m tcp --dport 8080 --syn -j ACCEPT Having carefully read the man page for iptables, I have learned what the parameters do, except for the first one. What does -A RH-Lokkit-0-50-INPUT do, and can you confirm that it is sensible in this case?

    Read the article

  • WMI query to check setting "Reversible Encryption" in Windows XP

    - by Mart
    In Windows XP, there are two settings in Group Policy I'm looking at: Password must meet complexity requirements Store password using reversible encryption Both of these settings are under Local Computer Policy/Computer Config/Windows Settings/Security Settings/Account Policies/Password Policy. For the first one, I have found the setting in RSOP_SecurityEventLogSettingBoolean class in WMI. However, I can't find the latter. Does anybody know in which class in WMI can I read that particular setting?

    Read the article

  • .htaccess: Transparently adding a name to the request

    - by Jon
    I've read this tutorial about how to modify your .htaccess in order to server many web2py applications but it doesn't seem to work. Here is my .htaccess RewriteEngine On RewriteRule ^dispatch\.fcgi/ - [L] RewriteRule ^(.*)$ dispatch.fcgi/$1 [L] RewriteCond %{HTTP_HOST} =www.moublemouble.com [NC, OR] RewriteCond %{HTTP_HOST} =moublemouble.com [NC] RewriteRule ^/(.*) /moublemouble/$1 [PT,L] All I get is a 500 Internal Error and .htaccess is not my strong point. Any clues?

    Read the article

  • What happens when a flash drive wears out?

    - by endolith
    Flash memory has a limited number of read/write cycles, after which it fails. What happens when it fails? Is it like a hard drive, where a failed write is silently moved to another part of the disk and that sector marked as bad and never used again, without data loss? Are there a limited number of replacement sectors? Do operating systems warn the user in some way?

    Read the article

< Previous Page | 378 379 380 381 382 383 384 385 386 387 388 389  | Next Page >