Search Results

Search found 90601 results on 3625 pages for 'user friendly'.

Page 442/3625 | < Previous Page | 438 439 440 441 442 443 444 445 446 447 448 449  | Next Page >

  • How can I push a git repository to a folder over SSH?

    - by Rich
    I have a folder called my-project inside which I've done git init, git commit -a, etc. Now I want to push it to an empty folder at /mnt/foo/bar on a remote server. How can I do this? I did try, based on what I'd read: cd my-project git remote add origin ssh://user@host/mnt/foo/bar/my-project.git git push origin master which didn't seem right (I'd assume source would come before destination) and it failed: fatal: '/mnt/boxee/git/midwinter-physiotherapy.git' does not appear to be a git repository fatal: The remote end hung up unexpectedly I'd like this to work such that I don't have to access the remote host and manually init a git repository every time ... do I have to do that? Am I going down the right route at all? Thanks.

    Read the article

  • what may cause unexpected log outs?

    - by lalebarde
    Sometimes, my Linux PC unexpectedly closes my session (log out) while I am working, and puts me back the login window. If I have terminal 1 logged with root and 2 logged with another user (without X), these ones are not logged out. For example, for the last three hours, it has happened five times. Other times, it leads to a reboot. So I have investigated: the UPS, but the behaviour is unchanged without it). the temperatures, but everything is fine (cpu, disks, video card). I have started to investigate also: the memory (partially tested - I have to run a full testyt next night). EDIT: totally tested and passed. My configuration is: Linux 2.6.37-tuxonice x86_64 Intel(R) Core(TM) i7 CPU 860 @ 2.80GHz. Any idea please?

    Read the article

  • For web development which is more important - CPU and Graphics card OR Ram and SSD Harddrive?

    - by adam
    Buying a laptop is always hard work and questions about specific models dont age well on forums. A popular dilema (especially with apple macbooks) is whether to spend more for a faster cpu and graphics card but settle for standard ram and hd OR drop down and spend the savings on more ram and a faster harddrive such as a ssd. Im wondering for web development i.e. ide, unit tests, photoshop work and some user testing screen capturing now and again what would provide better performance. ( No games, music production or spielberg standard video editing.) For examples sake the current apple lineup for their 15inch macbookpros. 2.66 cpu i7 4gb ram 5400rpm drive 4gig ram vs 2.4 cpu i5 8gb ram 124gb sdd roughly the same price.

    Read the article

  • Need more clarification on upgrading to 4GB on an Acer Aspire 5102WLMI

    - by Hub Lemeer
    In one of the questions before (October 2009) the question has been answered how to get an ACER Aspire 5102WLMI with 4GB of memory up and running beyond POST. I have exactly that problem, but don’t get it resolved despite your answer. I really don't know which PCB tracks have to be shortened and the 'jumper' J2 doesn't exist. There is a JP2, but that seems to be no jumper to me. I have made a photograph of the PCB tracks under the DIMMs. Would you please be so kind to give me a clue what to do (referring to that picture)? Thank you very much in advance! I AM NOT ALLOWED TO ATTACH THE PICTURE as a new user. Apologize. Can please someone tell me how to attach the image? I don't know how to earn points. ![alt text][1]

    Read the article

  • How can I set `less` or `more` max lines (scrollable height) limit/boundary in linux?

    - by Rudie
    (Sorry for the title. Any suggestions?) I've set my commandline PS1 to cover 3 lines: white space user, server and pwd $ or # to input I think less (or more?) is configured to break after window's height - 1, because when I do a $ git log, the first two lines are invisible at the top of the window and the rest is scrollable. I'm not sure who handles this scrolling and its configuration, but I assume GIT uses less/more. Where can I configure that my scrollable window is window height - 3 lines and not window height - 1? More info: If I cat lines.txt | less with a 23 line file, it shows the entire file and no scrolling. If I do the same with a 24 line file, it doesn't show line 1 (and no scrolling). With 25 lines: doesn't show lines 1 and 2 (and no scrolling). With 26 lines: shows line 1 and scrolling! The less breakpoint is at the wrong height...

    Read the article

  • How can 2 or more instances of the same program to communicate in local network?

    - by user1981437
    I want to create program which will be in use for few computers connected in local network. Basically the program aim is to keep track of all tables in a bar ( lets say ), which are reserved. When some user book a table as reserved the program should broadcast the table number to all other Pc's and mark the table as reserved. Since all computers use the same program, how is possible to create communication between all of them ? Should i use sockets to achieve this? If it matters, all of the computers have installed Linux OS,and the app will be developed in ruby,perl or php. Thank you.

    Read the article

  • Tricking Linux apps about current time with environment variables

    - by geek
    Sometimes it is possible to trick a Linux app by calling it like this: HOME=/tmp/foo myapp This would make myapp think /tmp/foo is the home directory, it won't try to get the user id, find its home directory via getpwent(). This is useful when myapp must be forced to dump some of its config files into a non-standard location different than ~. A similar trick can be done like this: LANG=foo LC_ALL=bar myapp This is useful when myapp needs to be called once with a different locale without having to make the change persistent by using the export bash built-in or even modify stuff in /etc/profile. Is it possible to pull the same trick with time and date? The goal is to make an app use another time than the system ones. The final goal - to make timestamps that appear in logs/commit messages not being tied to the system time.

    Read the article

  • Prioritize file sharing capabilities in Windows Server 2008

    - by cmbrnt
    I've got a server running Windows Server 2008, and use it mainly for sharing files throughout the domain from a number of disks. It's running on VMware ESXi 4.0, in case that matters. My problem is that when I log in to the server to check user permissions etc, the access speed the files on the remote disks almost grinds to a halt. I havn't been able to measure the speeds, but I would guess it slows down to about 100kB/s as soon as I log in. This is on a gigabit network and the problems are equal for all users, even the ones connected to the same switch as the server. I've assigned 2 GB RAM to the server, and reserved it 1,5Ghz processor power. I don't have to do anything special on the server for this halt to occur. How can I make sure file sharing is prioritized on the server, so no matter what applications I'm using it will always make sure file sharing works properly? Could this be a VMware issue?

    Read the article

  • Boot custom linux up by pressing Lenovo OKR button?

    - by Semmu
    I have a Lenovo Y510p laptop and I'm a Linux user, use Windows only for gaming. The device had no OS when I bought it and I also installed an SSD besides the 1TB hard drive. I would like to "hack" the One-Key-Recovery button, because I have no interest in its default behaviour (I don't need Windows recovery), but if I could boot up a hidden, fail-safe Linux with it, that would be great. How could I achieve it? I tried to search what the button does, but I only found some installers for Windows that could magically create a partition for the recovery. I would like to override this behaviour completely to boot up something else.

    Read the article

  • Windows XP - Website unaccessible on single pc in LAN

    - by DorentuZ
    For serveral days now, a website isn't accessible on a single pc in the LAN. On the other pc's, it works just fine. And it's just a single website that's not accessible as far as I know of. The website generates a timeout on every single web browser I've tried (IE8, Firefox and Chrome). However, traceroute, nmap and telnet all work just fine. I've even tried multiple user accounts and safe mode, but that didn't work either. As a side note: using a linux live cd did work and I could access the website without any problems. The hosts file is the windows default, the ip- and dns settings on the network adapter normal as well. No strange processes are running and no viruses found. According to tcpview and netstat there are connections to the domain, but every request in the browser results in a timeout.. Any idea what's happening?

    Read the article

  • Why is my subscribed podcast got greyed out podcasts that are never synched?

    - by jonswaino
    I'm having lots of problems with iTunes, particularly the fact that I have a subscribed podcast with many podcasts within it, but most of them seem to be unchecked and greyed out. When I come to sync my iPod the iPod only contains 5 podcasts, when in my podcast folder there are 100s of files?!? It seems to download only the 1 most recent podcast. This is very fustrating to say the least! Where is the user friendliness of Apple's supposedly best product? If this cannot be fixed, is there an alternative to iTunes, or is it possible to use windows media player with my iPod, this is painful!

    Read the article

  • How to enable/disable authentication without password when executing commands as superuser?

    - by 44taka
    On a Fedora 19 system which I set up for somebody a while ago I noticed that no authentication is required when commands are executed as the superuser. So, for example, when running Yum Extender, configuring the firewall or running some command with sudo in the terminal, I am not asked to provide a password. (With graphical applications the authentication dialog pops up for a few milliseconds.) For better security I would like to disable this automatic (authentication-less) assumption of superuser privileges. I do not remember if or how I enabled this authentication without a password. I might have enabled it for convenience for the non-pro user of this machine, but did not do any "fancy" things (like editing config files) to do so. I did not edit the sudoer file. I just checked that. I might have checked a "Do not ask for password again" checkbox or something similar. Whatever I did, I would like to undo it and enforce authentication for superuser tasks again.

    Read the article

  • Meeting reminders disappearing after accepting

    - by stayinwett
    I have a particular user whose Outlook is acting up. Whenever he accepts a meeting invitation from a specific person, the reminders get turned off in the calendar. Every other person who got the meeting invitation still gets the reminders. This is the only thread that I found somewhat relevant: http://www.eggheadcafe.com/software/aspnet/32118199/lost-functionality-when-accepting-meeting-requests.aspx This is weird though because he doesn't have any rules that should cause the meeting invitations to be stored in a weird folder or anything, they are left alone. I tried loading his profile and accepting the invitation on my end, and it went through fine (it was marked down in the calendar with a 15 minute reminder). When I looked at previous meetings he accepted from that person, there is indeed no reminder set. Any suggestions? Windows XPSP3, Outlook 2007, Exchange 2k3

    Read the article

  • Running suspicious X programs in GNU/Linux

    - by Vi
    What the most harmful thing can malware program started as separate limited user account do if it has access to the X server? Network and filesystem things are already considered by chroot and netfilter. It obviously can lock the screen and I will need to switch to other vt and kill it manually. Can it for example disrupt other GUI programs on the same X server (access to root terminal in nearby window)? I know that it is safer to run it in separate X server, for example, in Xtightvnc or even some virtual machine, but how dangerous is to just run it like other programs?

    Read the article

  • My Computer will not turn on?

    - by user269120
    I recently built a gaming pc. It was working fine before the following events: I installed a graphics card driver update then: in windows it said that the user experience index needed to be refreshed, so i started the test and somewhere in the middle of the test my pc just switched off. No shutting down just stopped. Now it won't turn back on. I have checked its plugged in and the switch on psu is down, i tried a different power cable and i checked all the connections. When i press the power button nothing happens, no fans no lights no post beep. Computer Parts: Motherboard: Gigabyte GA78LMT-USB3 CPU: AMD FX-6350 @ 3.9 Ghz RAM: 2x4gb Crucial Ballistix Sport Power Supply: Tesla 750w psu Graphics card: XFX Radeon 7870 DD Case: CiT Vantage R Gaming Case Hard Drive: 2TB Western Digital Caviar Green Please help me, this computer is only a week old since i built it. All anwsers are appreciated :)

    Read the article

  • How do I make control-click in Opera open new tabs?

    - by user21952-is-a-great-name
    In Opera, as opposed to all other modern browsers I know, control-click does not open a new tab. Moreover, I couldn't find any good way to configure this behavior. The best available option seems to be this. However, it's so hacky that it won't work on HTTPS sites unless you enable user javascript there, which doesn't seem like a good idea. There also seem to be other proposed solutions, but none of them seem to work. I'd like this because my laptop has no middle mouse-button, and I'm a creature of habit. Do people have any ideas (for the latest version, 10.50)? I'd like ctrl-click to open a background tab, but I can do with foreground. Thank you!

    Read the article

  • Using Excel Lookup Function and Handling Case Where No Matches Exist

    - by Dave
    I'm using Excel to enter data for an event where people register. A high percentage of the registrants will have registered for previous events, so we can their name and ID number. I'm trying to use the LOOKUP function in Excel to lookup the name and then populate the ID field with their ID number. This works well unless the value that is looked up is a new user that we don't already have details for. However, if the LOOKUP function can not find an exact match, it chooses the largest value in the lookup_range that is less than or equal to the value. This causes a problem since you can't tell if the match was exact (and the data is correct) or not exact and the match is incorrect. How do I catch non-matches and handle separately?

    Read the article

  • What data should I (can I) gather to prove a .net bug in third party software?

    - by gef05
    Our users are using a third-party system and every so often - a user might go all day without this happening, other days they may see it two or three times in seven hours - a red x will appear on screen rather than a button, field, or control. This is a .net system. Looking online I can see that this is a .net error. Problem is, our devs didn't write it, and the vendor wants proof that the problem resides with their system, not our PCs. What can we do to gather information on such an issue that would allow us to make our case to the vendor and get them to create a fix? I'm thinking of data to gather - anything from OS, memory. .net version installed etc. But I'd also like to know about error logging - if it's possible to log errors that occur in third-party systems.

    Read the article

  • Cannot access https sites through any browser on Win XP?

    - by mooep
    This isnt a firewall issue, I can telnet to gmail with no problems, but all browsers (chrome, IE, firefox) return a This web page is not available. error when tring to access it through the browser. I can access the same pages, using the same browsers, on the same machine, but through a different user account with no problem. What the hell is going on? Help appreciated. Edit: This is definitely a windows setup issue - I have just created a new admin account and can access https with problems. This is seriously infuriating.

    Read the article

  • Run SSH trough a proxy

    - by Row Minds
    I have a question. How can i run SSH trough a proxy or a SSH Tunneling Protocol? For example i have a computer(Ubuntu) with ip eg. 123.123.123.123 and i want to connect to my server trough a proxy eg. 111.111.111.111 so i can see in lastlog that the last authentication was made from 123.123.123.123 . I need this because i cannot access a certain server at work only with an specified range IP. What i tried so far was http://daniel.haxx.se/docs/sshproxy.html where i used ssh -D 1 [email protected] -p 443 where i had 127.0.0.1 forwarded to a SSH Tunneling Protocol http://www.nixtutor.com/linux/installing-and-configuring-an-ssh-server/ (i configurated listening on port 443 but no result, still no connection (denied) ...) This question may sound simple, but i can't figure it out, can you please help me? Thanks.

    Read the article

  • How do I change the colors used in MS Word 2007 track changes?

    - by kief_morris
    I'm reviewing a document in MS Word 2007, and when I add comments, the bubble has red text on a slightly lighter red background. This is pretty hard to read. The Track Changes Options dialog isn't of much help, I can change the background color for Comments, and it's slightly more readable. But I know that Word assigns a color to each user who reviews the document, I'd like to be able to change mine to a different one, and still have it work properly when I pass the document on to others. MS help is useless.

    Read the article

  • How do brand laptop manufacturers restrict hard disk drive?

    - by user176705
    I'm curious to know, when I bought a brand new laptop there are limitations to create or change the HDD partitions, except the following partitions: c:\ drive (Main partition + OS drive) NTFS. 400 Gb. Recovery drive NTFS. 15 Gb. Tools drive FAT32. 2 Gb. System drive NTFS. 0.3 Gb. My questions are: How do manufacturers restrict HDDs ? What is the term for these restrictions? Can this be applied to desktop PCs? Is it possible to modify the restrictions by an end-user?

    Read the article

  • Long term system health monitor

    - by user30336
    As an experienced user, I sometimes notice that things are not going well with my computer. For example, my backup drive recently started cycling up and down, so I guessed it was probably dying, and replaced it. I detected this with my ears. Windows did not seem to notice or care. There ought to be software that monitors overall system health by keeping track of things like this, so that unusual events or increasing error rates will not be shrugged off. Among other things: disk errors that are recovered, corrupt network packets (at above the baseline expected rate) and crashes of trusted programs are early warnings. Is there any software that tries to use this kind of monitoring to warn of impending trouble?

    Read the article

  • XP Filesharing works with IP's but not computer names.

    - by Luminose
    I recently ran into a problem where I was setting up a 5 person LAN. I enabled filesharing on the main computer and wanted to allow the other 4 computers to have access. 2 computers were able to access \expample without any issues. 1 computer would only connect if I uses the ip address \x.x.x.x\data. The third computer was able to access \example but required the user to login every time they tried to access the share. Why is there such inconsistency in these connections? All 5 computers are Windows XP Professional.

    Read the article

  • Windows X86 and ARM Compatible Remote Desktop

    - by John
    I'm looking for super-easy to use X86/ARM compatible remote desktop software. I need to do remote work with a client and because they know absolutely nothing they walked out of Best Buy with an ARM laptop that can't run jack. It must be freeware. It must be compatible with both x86/win7 and ARM/fail8 versions of Windows. It must be able to have something the first time it comes up that the user can tell me and I know how to connect to their computer (simple like Ammyy Admin). She is running some kind of Windows RT ARM laptop. I am running an x86 Windows 7 desktop.

    Read the article

< Previous Page | 438 439 440 441 442 443 444 445 446 447 448 449  | Next Page >