Search Results

Search found 41338 results on 1654 pages for 'used'.

Page 43/1654 | < Previous Page | 39 40 41 42 43 44 45 46 47 48 49 50  | Next Page >

  • Where is the hostname in /etc/hostname on a debian server used?

    - by Tchalvak
    I have a webserver running a number of websites. When I ssh in, it gives me a tab name of [email protected], which is counterintuitive, making it seem like those tabs are on my localhost. I would like to change the hostname, but I want to be sure that it won't break anything else. So for what purposes does that hostname string get used, and how can I be sure that it won't affect any functioning systems?

    Read the article

  • How do I change the search engine used by about:home?

    - by Lekensteyn
    Firefox 4's default home page provides a search engine with some snippets below. Is there any way to customize the search engine used through about:config or some other configuration file? localStorage["search-engine"] sometimes gets reset, possibly after a FF update. I would like to avoid creating a greasemonkey script that scripts on about:home. If an extension exist to fulfill the task, I'd be happy too. I'm using Firefox from Kubuntu 11.04 for that matters.

    Read the article

  • Is it normal for an AC adapter to drop voltage if it's not used by a laptop?

    - by leladax
    I'm currently investigating the livelihood of a laptop adaptor and I noticed, unlike another adaptor it drops voltage to almost zero after I also attempt to measure its current [while it did show voltage at first, before measuring current]. The other adaptor normally shows voltage and then normally shows some current and then if it turns to measure voltage, it shows it normally again. I assume the adaptor is faulty, however, I want to make sure if laptop adaptors turn off themselves if they aren't used normally by a laptop.

    Read the article

  • What is the best IIS tracing tool you have used?

    - by Vivek
    I have spent majority of my career using and troubleshooting IIS Web Server. According to me the best thing happened to a Web admin is FRT (Failed Request Tracing) in IIS 7.0.I have used Event Tracing for Windows as well and FRT is as much helpful.Is there any such tracing tool which can give such good in-depth and greater understanding on request flow through the pipeline?

    Read the article

  • Can the Installation Monitor from the Win2K Resource kit be used on newer OS's?

    - by Scott Chamberlain
    Can the utility "Installation Monitor" from the Windows 2000 Resource Kit Tools for administrative tasks be used on newer OS's, specifically, Windows Server 2008 R2. The main thing I am concerned about is it may error will not track things correctly without letting me know that that it errored due to how Windows has changed between 2000 and today. If that is not the correct tool to use to monitor what a application is writing to the hard drive and registry, can you recommend me what I should use instead?

    Read the article

  • How can I recover my Transcend pendrive when both the used space and free space are 0 bytes?

    - by Debabratta
    I have an Transcend pendrive, and when I connect it and double click it to explore, it is showing the error: Please insert a disk into drive Also In the properties field it is showing File system- Unknown Used space- 0 bytes free space- 0 bytes capacity- 0 bytes I tried to format it using using the command prompt but it is not showing in the list disk command. It is also not showing in the Disk Management.

    Read the article

  • Throttle or limit resources used by a user in a database?

    - by Eduardo
    I would like to know how databases (like MySQL) are able to manage per user resources (like Oracle Database Resource Manager does) to be able to have users that may only get resources only when the database is mostly idle. http://stackoverflow.com/questions/2418581/is-there-a-way-to-throttle-or-limit-resources-used-by-a-user-in-oracle

    Read the article

  • Can capistrano or fabric be used to setup a server from scratch?

    - by Blankman
    I'm hoping there is a light weight, command line utility that I could use to setup a server from scratch. I like python's fabric or ruby's capistrano but from what I was reading they are more used for deployment purposes and not setting up apache, mysql, update patches etc. I know there are other tools like puppet, but I don't want to setup a master/slave for servers etc., I was hoping there was a more light-weight tool for this.

    Read the article

  • What router hardware or software should be used when multiple public IPs are routed into the same LAN?

    - by lcbrevard
    I am looking for recommendations to replace a set of consumer grade (Linksys, Netgear, Belkin) routers with something that can handle more traffic while routing more than one static public IP into the same LAN address space. We have a block of static public IPs, 5 usable, with Comcast Business. Currently four of them are in use for: General office access Web server Mail and DNS servers Download and backup web server for separate business All systems (a mixture of physical and virtual) are in the same LAN address space (10.x.y.0/24) to enable easy access between them inside the office. There are 30 or more systems in use depending on which virtual machines are currently active. We have a mixture of Windows, Linux, FreeBSD, and Solaris. Currently a separate consumer grade router is used for each of the four static addresses, with its WAN address set to the specific static address and a different gateway address for each: uses 10.x.y.1 - various ports are forwarded to various LAN IPs on systems with gateway 10.x.y.1 uses 10.x.y.254 - port 80 is forwarded to a server with gateway 10.x.y.254 uses 10.x.y.253 - ports for mail and dns are forwarded to a server with gateway 10.x.y.253 uses 10.x.y.252 - ports as needed are forwarded to server with gateway 10.x.y.252 Only router 1. is allowed to serve DHCP and address reservation based on the MAC is used for most of the internal "server" IP addresses so they are at fixed values. [Some are set static due to limitations in the address reservation capabilities of router 1.] And, yes, this really does work! But... I am looking for: better DHCP with more capable address reservation higher capacity so I don't have to periodically power cycle the routers One obvious improvement would be to have a real DHCP server and not use a consumer grade router for that purpose. I am torn between buying a "professional" router such as Cisco or Juniper or Sonic Wall verus learning to configure some spare hardware to perform this function. The price goes up extremely rapidly with capabilities for commercial routers! Worse, some routers require licensing based on the number of clients - a disaster in our environment with so many virtual machines. Sorry for such a long posting but I am getting tired of having to power cycle routers and deal with shifting IP addresses afterwards!

    Read the article

  • Cached memory refers to both cached memory (that is currently usable) and used memory (that was previous cached)?

    - by Pacerier
    Hi all I was trying to confirm my understanding of "standby list" and "modified list" as stated in this article. Is it true that "Cached memory" (as shown in the image below) refers to memory that is currently cached (available for use), and memory that was previous cached (previously available for use), but currently used (now not available for use) ? So if x = "Cached memory" (1184), y = "modified cache pages", z = "cached and were modified", x = y + z holds true ?

    Read the article

  • What is the HTTP_PROFILE browser header and how is it used?

    - by Tom
    I've just come across the HTTP_PROFILE header that seems to be used by mobile browsers to point to an .xml document describing the device's capabilities. Doing a Google search doesn't turn up any definitive resources on what this is and how it should be used, can anyone point me to something along the lines of a spec/W3C standard?

    Read the article

  • What development technologies or technology stack is typically used in the security industry?

    - by vfilby
    In this case security means building security (access control, alarm systems, etc). And I am not talking about working directly with the hardware, more focused on web based applications/api's that clients or companies can use? Are there technologies that are commonly used? Are there technologies that shouldn't be used? Are there any real benefits to a linux based stack as opposed to a windows based stack for exposing web based applications?

    Read the article

< Previous Page | 39 40 41 42 43 44 45 46 47 48 49 50  | Next Page >