Search Results

Search found 27083 results on 1084 pages for 'having'.

Page 431/1084 | < Previous Page | 427 428 429 430 431 432 433 434 435 436 437 438  | Next Page >

  • How can I find the names of AD Group policies that a user/pc is using?

    - by Russ
    I am having trouble locating some settings in group policy so I can make changes due to the convoluted nature of our policies. What I would like to be able to do is go to a specific PC and see what group policies are being applied, so I can focus on those policies. My goal would be to clean up the GP's a bit, while allowing me to "walk the tree" to see what people have implemented and what is worthless. Thanks. EDIT: In this specific case, I am looking to find which GP maped drives are configured in. (User Configuration -- Preferences -- Windows Settings -- Drive Maps)

    Read the article

  • How to export a list of addresses that email in my spam folder was sent to? [migrated]

    - by Hugo
    With a Gmail [email protected] address, you'll also receive email sent to [email protected] addresses, very handy for creating filters. I often [email protected] when signing up to websites, so if I end up getting lots of spam sent to that address, I know who to blame. But what's a good way to find a list of all username+anything@ addresses in my Gmail spam folder? I'd prefer to do this within the web client if possible. Next best is using external client such as Outlook or Opera mail but without having to download lots of mail if possible. I don't really want to download spam emails.

    Read the article

  • Black spray (?) on a laptop's heat sink assembly

    - by arnehehe
    We have a HP Pavilion DV3 4000SB that was given an error on startup that the fan was having problems (System Fan 90b error message) So I decided to open the laptop up and clean the fan, as that seemed the easiest option. Upon opening it up, at first I froze and thought "No wonder! The whole thing's burnt!", but then I started thinking it looked more like someone used a spraycan on it. I looked up a video on youtube of someone disassembling his Pavilion and noticed there wasn't any of the black on his, so my question here is: Have any of you encountered this, or know what it is? Or if it's something that could point to a problem?

    Read the article

  • Print Managment

    - by nardone25
    Hello everyone, I am having a ID10T error LOL,. First I am using window server 2003 r2 edition. I installed on a domian controller print managment. So this is where all 48 printers I have are installed. I just got a new printer. I gave it an IP for the machine and when I head into the server room i tried to add it to the server. I can print a test page, when I am logged on to the print server, but on my client computer when he goes to add a printer in window xp pro the printer isn't listed in add print for network. What did I do wrong?

    Read the article

  • Terminal Server Spoolsv.exe error

    - by Voyager
    We are having a terminal server ibm x3650 with 8 gb of RAM. On many occasions, at least once in a day, we get the error "The instruction at "0x7c8199b2" refrenced memory at "0x9ddc2ade". The memory could not be "read". Click OK to terminate the program. Click on CANCEL to debug the program. I have surfed very many sites, microsoft included, but none of them have been able to give conclusive solution for ending this problem. When we press on ok or cancel, then our ERP application (VB-MS SQL) starts to work normally. till such time the message is there, all our reports are hanged (Business Objects reports). We have already installed all the drivers of printers on the TS. Can anyone help?

    Read the article

  • Can Visual Studio track the "size" or "severity" of my changes in TFS?

    - by anaximander
    I'm working on a sizeable project using VS2012 and TFS (also 2012, I think - I didn't set up the server). A lot of my recent tasks have required making very small changes to a lot of files, so I'm quite used to seeing a lot of items in my Pending Changes list. Is there a way to have VS and/or TFS track how much has been changed and let me know when the differences are becoming significant? Similarly, is there a way to quickly highlight where the major changes are when you get the latest version from TFS? It'd really help with tracking down where certain changes have been made without having to go through and compare every file - the difference highlighting tool might be nice, but when you have to use it on a dozen files to find the block you're looking for, you start to wonder if there's a faster way...

    Read the article

  • Where does Exchange 2010 store the STM file, does it even still use it?

    - by RichieACC
    Our domain controller died, with no hope of recovering anything. The AD backup died with it. Due to no longer having a DC, our Exchange is unable to start. I'm trying to use "Kernel for Exchange Server" to recover the mails that are in the mailbox store. I've found the .edb file, but the .stm file is nowhere on the machine. Does Exchange 2010 still use the .edb & .stm files, or is there a new store format? If not, where will the .stm file be hiding?

    Read the article

  • Can ping cannot be pinged

    - by slayerIQ
    Today, I installed my new router so I can connect my other pc and my ps3. In my network, there are some other computers these are connected with each other through another router. So I have one modem with 2 routers that make up my network. Everything works fine the only problem I am having is being pinged by other computers in the network. All the computers are on the same subnet 255.255.255.0. There is no problem with my firewall or anything I tested everything. How can i solve this?

    Read the article

  • WD: UDMA CRC Errors and Reallocated Sector

    - by Leo White
    I got a WD Caviar Black 1TB (WD1001FALS) and according to SMART, I got: one "Reallocated Sector" one "Reallocated Event" 26 UDMA CRC Errors in my drive but it's a "Pass" for the "SMART overall-health self assessment test". I think it's because of these, I'm having problems with Grub, and thus can't boot into any OS at all. Are these problems serious? According to "Warranty Services", my drive is still "In Limited Warranty". Would I be eligible for a replacement? FYI: I'm running Ubuntu 11.10. Any help will be appreciated. Thanks

    Read the article

  • MySQL Cluster transaction isolation level - READ_COMMITTED

    - by Doori Bar
    I'm learning by mostly reading the documentation. Unfortunately, http://dev.mysql.com/doc/refman/5.1/en/set-transaction.html#isolevel_read-committed doesn't say anything, while it says everything. Confused? Me too. ndb engine supports only "READ_COMMITTED" transaction isolation level. A. It starts by saying "sets and reads its own fresh snapshot", which I translate to: The transaction is having a separated 'zone' which whatever it stores there - is what it reads back. B. While out-side of the transaction, the old-values are unlocked. C. It continues with: "for locking reads" sentence - No idea what it means. Question: they claim only READ_COMMITTED transaction isolation level is supported, but while handling a BLOB or a TEXT, they say the isolation is now "locked for reading" too. So is it a contradiction? can a transaction LOCK for reading just as well while handling something other than BLOB/TEXT? (such as integers)

    Read the article

  • some issues with removing www and redirecting index.html

    - by MariaKeys
    Hello Fellas, I am having trouble doing what i want to do with the following setup. I would like to remove all WWW, and also forward index.html to root dir. I would like this to be for all domains, so i am doing inside httpd.conf directory directive. I tried many variations with no success. Latest version is below (domains are inside /var/www/html, in seperate directories). http://www.example.com/index.html > http://example.com http://www.example.com/someother/index.html > http://example.com/someother/ Thanks, Maria <Directory "/var/www/html/*/"> RewriteEngine on RewriteBase / RewriteCond %{HTTP_HOST} ^www\.(.+)$ [NC] RewriteRule ^(.*)$ http://%1/$1 [R=301,L] #RewriteCond %{REQUEST_URI} /^index\.html/ RewriteRule ^(.*)index\.html$ / [R=301,L] Options ExecCGI Includes FollowSymLinks AllowOverride AuthConfig AllowOverride All Order allow,deny Allow from all </Directory>

    Read the article

  • Can't rename folders in Window 7/32bit after anti-virus change

    - by Tasos
    I recently started having the common, as I realized, problem of not being able to rename folders in Windows 7 (32 bit). I don't understand why it happened after almost a year of ideal use of Windows 7. I haven't removed the libraries nor can I think of anything else that could potentially cause this, at least as far as I know. The only thing I did recently was to change my anti-virus program from the freeware version of Avira to the freeware anti-virus Microsoft Security Essentials. Any idea on what the problem is and how to fix this?

    Read the article

  • Unable to browse one server unless using FQDN all others work.

    - by Reg
    Hello - I installed 4 new Windows 2008 R2 Servers. All are joined to the domain. One out of the four will not browse to our DC without using a FQDN. I can ping the DC server and see it in Network neighborhood but when I click on it I get Windows cannot access \SERVER. BUT accessing it by using \server.domain works fine. It is only having problems with the one DC server. Able to browse every other server with UNC without using FQDN.This is the only machine on our domain that is experiencing the problem and have tried different user accounts.

    Read the article

  • blocking port 80 via iptables

    - by JoyIan Yee-Hernandez
    I'm having problems with iptables. I am trying to block port 80 from the outside, basically plan is we just need to Tunnel via SSH then we can get on the GUI etc. on a server I have this in my rule: Chain OUTPUT (policy ACCEPT 28145 packets, 14M bytes) pkts bytes target prot opt in out source destination 0 0 DROP tcp -- * eth1 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW,ESTABLISHED And Chain INPUT (policy DROP 41 packets, 6041 bytes) 0 0 DROP tcp -- eth1 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW,ESTABLISHED Any guys wanna share some insights?

    Read the article

  • Starting VM as an executable with as low overhead as possible

    - by Robert Koritnik
    Is there a solution to create a virtual machine and start it by having an executable file, that will start the machine? If possible to start as quickly as possible. Strange situation? Not at all. Read on... Real life scenario Since we can't have domain controller on a non-server OS it would be nice to have domain controller in an as thin as possible machine (possibly Samba or similar because we'd like to make it startup as quickly as possible - in a matter of a few seconds) packed in a single executable. We could then configure our non-server OS to run the executable when it starts and before user logs in. This would make it possible to login into a domain.

    Read the article

  • How to revert to "last known good configuration"

    - by Ripley
    Hi Guys. I failed to install ubuntu 10.04 with WUBI, for some reason it's showing me the root partion is not defined. I'm bored to fight with it so I just removed ubuntu in windows. However this installation made my original Windows XP cripple, a normal boot will end up with a blue screen, error code 7E, I'm still able to boot with the 'last known good configuration' tho. My understanding is booting like this will recover things and I'm supposed to be good when reboot, while this is not the case for me, I have to choose the 'boot from last known good configuration' each and every time to work around the blue screen. Could you suggest how could I resolve this? I feel it's foolish having to waste 10 more seconds each time starting the OS.

    Read the article

  • Easy to use database with views for a medical student doing research?

    - by Sarah
    I'm having trouble finding a tool that does this for my friend (without designing it myself). What is needed is a simple program with a database where input forms and views can be designed and saved. A patient table might consist of, say, 50 columns, so it is imperative that it is possible to make columns be able to default, say, through a form for submission of data. By views I mean something like "saved selections" based on various criteria (WHERE runny_nose=True...) but as friendly as possible to save, and export options would be nice. Does this exist at all? It seems at one hand trivial and on the other, my Google fu is failing.

    Read the article

  • Using a Group Managed Service Account (gMSA) for a scheduled task

    - by Trevor Sullivan
    Back in Windows Server 2008 R2, when stand-alone Managed Service Accounts (sMSA) were new, they could not be used to execute scheduled tasks. In Windows Server 2012 however, there is a new type of account called the Group Managed Service Account (gMSA). This type of account is supposedly capable of launching scheduled tasks in the task scheduler on clients & member servers inside of a Windows Server 2012 forest/domain functional level. So far, I have: Established a Windows Server 2012 forest/domain Created a Group Managed Service Account (gMSA) Installed the gMSA on a Windows Server 2012 member server And currently I'm having trouble with: Setting a scheduled task to use the gMSA When I attempt to use a gMSA on a scheduled task, I get the error message that says "The object cannot be found" (paraphrased) message. My question is: How do I configure a Scheduled Task to execute using a Group Managed Service Account (gMSA)?

    Read the article

  • Windows 7 Explorer - Activate mouse focus to be able to scroll in tree and file view?

    - by none
    I'd like to be able to scroll in the tree view without having to click in it. Is there a way to do this? I have once used a tool that generally gives focus to the window underneath the mouse cursor, but this caused some other glitches so I would like to achieve this without an extra tool. I also think that there are programs that embed the Windows Explorer and offer more features, including the behaviour I would like to have. But maybe a registry value change is all that is needed?

    Read the article

  • Redirect physical keyboard input to SSH

    - by Dimme
    I'm having a raspberry pi running debian linux and I have an RFID reader connected to it. The RFID reader behaves like a keyboard. Every time I scan a tag it types then number of the tag and then carriage return. My problem is that I want to redirect the output of the RFID reader to my SSH session. That means anything that is typed to the physical keyboard of the pi should be displayed in my SSH window. I have tried with: cat /dev/tty0 but it wont work because the user is not logged in. Is there a way to disable the login screen after the pi boots and then redirect all input through SSH?

    Read the article

  • Domain Key Entries

    - by natediggs
    More BIND DNS questions. OK, my changes the the zone files are no propagating out. Now I'm having a problem with the domain key entries I'm trying to create. I'm starting by trying to set the domain key policy. To do so I added the following entry to my zone file (actual domain XXX'd out). Based on everything I've read this is properly formatted and should work. When I try to verify the DNS entry for our domain it doesn't how up. _domainkey.XXXX.com TXT "t=y; o=~;" Is there something I'm missing? Nate

    Read the article

  • Which is the cheapest machine where I can run linux and plug in some webcams? (and with network inte

    - by marc.riera
    I'm looking for a very cheap machine to run a linux distro for security(anti-thief) software. I would like to be able to connect to the network and a couple of webcams. May be ip-webcams or usb-webcams. The idea is having a machine with batteryes, laptop style, but there is no need to have a display/monitor attatched all the time. I'm planning to spend no more than 200$, in case it also gets stolen. Any advice on what to buy? (all modifications to this security plan are welcome) Thanks.

    Read the article

  • Bringing my Dell XPS 13 ultrabook back to factory state

    - by TysHTTP
    I have a brand new Dell XPS 13 ultra book. After i picked it up at the store, i wiped the exising partitions which also contained the restore/rescue data, which you need to reinstall the factory version of Windows 8 that comes with this machine. I did this because we have a different MS partner edition of Windows which i prefer to run. After doing all this, i noticed that there was something wrong with machine. No real damage, but the specs are not completely as they should be. Turned out that a simple mistake while ordering. Now, long story short, the shop says that it has no problem with taking the product back, as long as it is in it's original state. And this is the problem i'm having, because i formatted the original partitions that contain that rescue option / windows 8 setup, i don't have a clue whether it's possible to get back to that original. Does anyone have an idea on how to get this fixed?

    Read the article

  • SSH Tunnel doesn't work in China

    - by Martin
    Last year I was working in China for a few months. I never bothered setting up a real VPN, but just created a SSH tunnel, and changed my browsers proxy settings to connect through it. Everything worked great (except flash of course) but that was fine. However, now I'm back in China but I'm having problems with this approach. I do the same thing as last time, and according to https://ipcheckit.com/ my IP address is indeed the IP of my (private) server in the US, and I'm logging in to my server using a fingerprint I created long before going to China so no MITM should be possible. Furthermore the certificate from ipcheckit.com is from GeoTrust - so everything should be OK However, I still can't access sites which are blocked in China. Any idea how this could be possible?

    Read the article

  • Forensics on Virtual Private servers [closed]

    - by intiha
    So these days with talks about having hacked machines being used for malware spreading and botnet C&C, the one issue that is not clear to me is what do the law enforcement agencies do once they have identified a server as being a source or controller of attack/APT and that server is a VPS on my cluster/datacenter? Do they take away the entire machine? This option seems to have a lot of collateral damage associated with it, so I am not sure what happens and what are the best practices for system admins for helping law enforcement with its job while keeping our jobs!

    Read the article

< Previous Page | 427 428 429 430 431 432 433 434 435 436 437 438  | Next Page >