Search Results

Search found 31258 results on 1251 pages for 'third person view'.

Page 419/1251 | < Previous Page | 415 416 417 418 419 420 421 422 423 424 425 426  | Next Page >

  • Internet is a series of tubes?

    - by Zoredache
    Almost all of use have heard of Ted Stevens trying to describe the Internet with the analogy that it is a series of tubes (mp3). I believe that it likely that some tech person somewhere tried to describe the Internet to him and this was the best analogy they could come up with. What analogy would you use to describe the Internet, and issues related to bandwidth, latency, etc, to your grandmother or someone else with no IT experience.

    Read the article

  • WPA2 and the linux wireless tools

    - by Bill Grey
    I would like to know a distribution independent way to connect to WPA2 wireless networks. Do the wireless tools support wpa2? iwconfig and such? Or is it necessary to use wpa_supplicant? Having to edit a config file every time if changing between many networks is quickly frustrating. I am aware of tools like wicd, but would like to know if there is a standard way to do this on all distributions without requiring third party software.

    Read the article

  • MSTSC RDP over the public internet

    - by stuart Brand
    My first question so please be gentle :) I have a client who is insisting that they have to let their third party vendor support access to there server directly from the internet via RDP. Our policy does not allow direct access to the infrastructure from outside of the data centre for administration except from an approved VPN connection and then virtual desktop there on to the servers. I am now in the situation where I must give good reasons why it is dangerous to use RDP over the public internet. any help would be appreciated Thanks in advance Stuart

    Read the article

  • Which cloud service is best?? can you order it??

    - by mathew
    Hi there are many cloud services out there but famous are mentioned below...can any one tell me which one is first,second,third etc....in terms of money,performance and reliability.. 1) Amazon 2) Rackspace 3) Softlayer 4) Vps.net I dont know other actually I am only looking for Linux services .... Mathew

    Read the article

  • How do you prevent spam being sent by your users?

    - by Ernie
    So, for the third time in about two weeks (maybe less), one of our customers has had their password compromised, and a spammer was sending mail with their account using our webmail. As a result, our outgoing mail server has been listed at Spamhaus, and a lot of our outgoing mail is being rejected. I can't think of any way to prevent this from happening (although now our webmail server is using Sendmail instead of SMTP, but that just limits the scope of the problem), yet the big ISPs never seem to have a problem like this.

    Read the article

  • allow client using webpage to run and use 1 server side executable

    - by richardboon
    In simplest term here’s what I must do: When user connects to a webpage (port 80) via their browser, the web server will run a customized-proprietary third party windows executable [located on the server]; then display and allow the user full control to that program (inside the browser). Note: I cannot rewrite/redistribute that 3rd party desktop gui program.

    Read the article

  • How is a VM isolated from the physical host?

    - by dotnetdev
    Hi, I was thinking about virtualisation and how to explain it to a non-technical person and one of the things that I was wondering was how to explain the way that a VM is isolated and seperate from the phyiscal machine (so I can have a virus on a VM but this would never effect my physical host, right?). How does this technology work exactly? As I am a programmer, when I think of isolating processes, I think of using appdomains (I work with C# primarily). Thanks

    Read the article

  • How do I protect my company from my IT guy?

    - by Jesse
    I'm going to hire an IT guy to help manage my office's computers and network. We're a small shop, so he'll be the only one doing IT. Of course, I'll interview carefully, check references, and run a background check. But you never know how things will work out. How do I limit my company's exposure if the guy I hire turns out to be evil? How do I avoid making him the single most powerful person in the organization?

    Read the article

  • SCCM: Manage Network Config Baseline

    - by Malnizzle
    I'm new to SCCM and trying to figure out the best way to do things. I want to create a config baseline for defining network settings (e.g. default gateway) for a collection of servers. Is finding the applicable reg key and deploying the config that way the best method, or is there a configuration pack that includes pre-determined values, maybe a third option I am un-aware of? Thank you!

    Read the article

  • Adding value of cell X only if cell Y is blank

    - by Graeme Hutchison
    I have a list with three columns A, B, and C. The first two columns are complete (A and B), while the third (C) has many blanked fields. What I want to do is replace all the blank fields in Column C with the same value form cell A in the same row. The List contains over 2000 records, of which 65% have a blank Column C value, so I would like to use a formula/function. Below is an example of what I have and what I want to do (on a much smaller scale)

    Read the article

  • Forefront TMG 2010: Can you monitor realtime TCP connections and bandwidth on a per-user basis?

    - by user65235
    I'm just starting a trial of ForeFront TMG to use as a proxy server. I know I can get a real time activity monitor and filter on a per user basis, but would like to be able to get a real time activity monitor of all users that I can then sort by bandwidth consumed (enabling me to get a view on who the bandwidth hogs are). Does anyone know if this is possible in Forefront TMG or if a third party product is required? Thanks. JR

    Read the article

  • Sent command-line output as an arguments to other command

    - by pavelartlover
    1) Here is the command to install special package (for example system/header) #pkg install system/header 2) ALso we can install several packages #pkg install system/header network/ssh package/rpm 3) Here is the command to show all available packages from special group #pkg contents -o fmri -H -rt depend -a type=group solaris-desktop How to install all packages from a special group in one command? (How to send output from the third command as an argument to second?)

    Read the article

  • Per-application volume control in windows XP?

    - by Chris Gow
    Is there a way either built-in (don't think there is) or via a third-party to specify the volume on a per application basis in Windows XP? For example, right now I am listening to some music on fairly loudly and I would like all of the alerts I am getting from other apps (email, twitter updates, IMs) to be reduced.

    Read the article

  • Does mailx send mail using an SMTP relay or does it directly connect to the target SMTP server?

    - by iamrohitbanga
    Suppose i send a mail using the following the following command: mailx [email protected] then does mailx first try to find out the SMTP server of my ISP for relaying the mail or does it connect directly. Does it depend on whether my PC has a public IP address or it is behind a NAT. How do I check the settings of mailx on my PC? How can I verify this using tcpdump?

    Read the article

  • Domain clients can't reach website with same name as domain

    - by Moses
    I know this is a very basic question but I need some help. I'm setting up a domain controller on Zentyal with the domain name example.com. But I need the domain users to be able to get to our company website with the same name (http://example.com) that's hosted out there on a third party's server. I know this has something to do with adding a DNS record, but I don't know what type. I would experiment, but I don't want to break the whole works!

    Read the article

  • record phone conversation on a WM device

    - by doug
    Hi there does anyone know a good windows mobile software application which will allow me to record the phone discussion (what I say and what the other person says) Also I'll be interested to know which windows mobile application will allow me to use the phone as a audio recorder (reportophon).

    Read the article

  • double-click to run .sh file

    - by Delirium tremens
    GUI: I changed the permissions of an sh file, so that I can read, write and execute it. I double-clicked it, selected run in Terminal, but it didn't run. I double-clicked it, selected run, but it didn't run. Command-Line: bash *filename* runs it sh *filename* runs it The file content is: #!/bin/bash # get dirsyncpro home DIRSYNCPRO_HOME="$(dirname $0)" # start programm and pass any parameters java -Xmx512M -jar "$DIRSYNCPRO_HOME/dirsyncpro.jar" $* Works in this person's computer: http://www.knowliz.com/2008/08/how-to-installrun-sh-file-in-linux.html What's going on?

    Read the article

  • Backup server 2008 system state without using wbadmin?

    - by Beuy
    Is it possible to backup the System State of a 2008 server without using wbamdin? The setup in question does support the requirements that wbadmin forces (all volumes are marked as critical). Third party tools are an option but I would like to keep away from the big money sinks (BE etc)

    Read the article

< Previous Page | 415 416 417 418 419 420 421 422 423 424 425 426  | Next Page >