Search Results

Search found 43110 results on 1725 pages for 'noob question'.

Page 446/1725 | < Previous Page | 442 443 444 445 446 447 448 449 450 451 452 453  | Next Page >

  • Is there any way to execute something when closing the laptop's lid?

    - by Matias
    I'm wondering if there is any way to execute a program, run some command or anything else when closing the laptop's lid. My question aims to be generic, both for Windows and Linux. Something useful should be locking the laptop when closing the lid (Win + L in windows), or running expensive processes such as antivirus analysis etc. without doing it manually before closing the lid.

    Read the article

  • Where does Tomcat cache my taglib .jar files?

    - by NogginTheNog
    I'm deploying a .jar file to a tomcat instance (we're running 6.0.18 on Redhat linux) and according to the log output the old .jar is still being used. I've restarted everthing I can think of, have deleted the work directory etc.etc. but to no avail. I'm no tomcat expert, so here's my question: where should I look for to ascertain if tomcat is using a cached jar and how should I prevent it from doing so?

    Read the article

  • In Linux how do I mount a OS-X partition * by name * that is on the same host?

    - by philcolbourn
    I once used gnome-mount like this gnome-mount -o ro -d /dev/sda2 or gnome-mount -o ro -p "Macintosh HD" But, alas, gnome-mount seems to be no more. RIP. I can do this gvfs-mount -d /dev/sda2 (which generates a whole lot of errors but does mount the partition in the /media directory.) This is a related question: http://superuser.com/questions/131918/gnome-mount-alternative-in-ubuntu-10-04-or-how-to-mount-partition-with-normal-use But how do you do it by name?

    Read the article

  • Change windows hostname from command line

    - by Joe
    This question is related to http://stackoverflow.com/questions/54989/change-windows-hostname-from-command-line, but I'm in a different situation. The netdom tool will not work on a computer not joined to a domain. I've tried setting the hostname from the registry, but I was wondering if there was another way from the command-line.

    Read the article

  • iPhone log reader

    - by Alexis Hirst
    I went to the apple store today to discuss a problem with my iPhone battery, and they plugged it into one of their macs and used an application that interpreted the logs stored on my phone. So, my question is, does anybody know the name of the application that reads the logs, and if so, where it is available? Since it is a diagnostic tool, I'm guessing it won't be openly available, but I thought i would ask anyway.

    Read the article

  • TFS2010 Hangs “Waiting for Build Agent”

    - by Qpirate
    I have asked this question over on SO the link to the question is here but i am hoping this is a better place to ask it. I have 3 VM's each running the TFS Build Host Service 1 has 1 controller and 1 agent 2 have 2 Build Agents each. Most of the time (7\10 builds) it comes back with the following error message TF215097: An error occurred while initializing a build for build definition BUILD_DEFINITION: There was no endpoint listening at http://MACHINE1:9191/Build/v3.0/Services/Controller/14 that could accept the message. This is often caused by an incorrect address or SOAP action. See InnerException, if present, for more details. and there is no errors when i do get this message. the following is the config file that i have created <configuration> <appSettings> <add key="traceWriter" value="true"/> </appSettings> <system.diagnostics> <switches> <add name="BuildServiceTraceLevel" value="4"/> <add name="API" value="4"/> <add name="Authentication" value="4"/> <add name="Authorization" value="4"/> <add name="Database" value="4"/> <add name="General" value="4"/> <add name="traceLevel" value="4"/> </switches> <trace autoflush="true" indentsize="4"> <listeners> <add name="myListener" type="Microsoft.TeamFoundation.TeamFoundationTextWriterTraceListener,Microsoft.TeamFoundation.Common, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" initializeData="c:\logs\TFSBuildServiceHost.exe.log" /> <remove name="Default" /> </listeners> </trace> </system.diagnostics> </configuration> I do have my own custom activities in my build process but this does not seem to be a problem as sometimes the build actually does go. I have tried refreshing the template as some sites suggest. Has anyone come across a solution for this problem? or can anyone tell me how to catch these errors when they happen?

    Read the article

  • Is there an eSATA memory stick / thumb drive?

    - by jasondavis
    The new PC I just finished building has eSATA support. I use a USB stick/thumb drive all the time on my PC for stuff, is there an equivalent available anywhere for eSATA? Please list one product per post, and provide a link to the manufacturer's product page. Also see the USB-3 version of this question.

    Read the article

  • Using dd command and running out of space while cloning drive to img

    - by Alan Kuras
    I have a problem with drive cloning. Im using dd on damaged disk with bad sectors trying to make an image from it. Im booting computer with Live Linux CD . Damaged disk: sda 146GB (NTFS) External drive: sdb 300GB (NTFS) After running the command below im running out of space on disk sdb. dd if=/dev/sda of=/dev/sdb/hdd.img bs=4096 conv=noerror,sync The question is why im running out of space on disk sdb ?

    Read the article

  • hardening a server: disallow password-login for sudoers and log unusual ips

    - by Fabian Zeindl
    Two question regarding sudo-login into an ubuntu-system (debian tips welcome as well): Is it possible to require sudoers on my box to only login with publickey-authentication? Is it possible to log which ip sudoers log in from and check that for "unusual activity" or take actions? I'm thinking about temporarily removing sudo-rights if sudoers don't log in from whitelisted IPs. Or is that too risky to be exploited?

    Read the article

  • can i find the web hosting company from an ip address ?

    - by ufk
    Hiya. i really hope this question suites serverfault, if not my apologies! I have an ip address, is there a way to find the web hosting service that this ip address belongs to ? I tried using whois and traceroute but no luck so far. the case is that my friend bought a domain and storage several years ago and he can't remember where he bought the storage from. thanks!

    Read the article

  • What is the proper position for the loopback address in a DNS server selection list?

    - by Bigbio2002
    Best practices indicate that one should list 127.0.0.1 in the DNS list for the network adapter configuration for a Domain Controller, but not as the first one. With that said, what is the best place to put it in a list with more than two DNS servers listed? Second, last, or it doesn't matter? Also helpful would be an explanation as to why. Related question: What should the order of DNS servers be for the network adapter of a domain controller?

    Read the article

  • finger for Windows

    - by tearman
    Ok probably a bit of an odd question, but is there a way to enable "finger" like functionality on a Windows network? we'd basically like the ability to find out where a user is logged in on a network and possibly which users are logged onto a workstation if possible. We're currently on AD2003 functional level, with the intent of going to AD2008 very soon, so compatibility in that arena is preferable.

    Read the article

  • Force gdm login screen to the primary monitor

    - by JIa3ep
    I have two monitors attached to my video card. Primary monitor has a resolution equal to 1280x1024 and second has 1920x1200. My gdm login screen always appears on the second monitor even if it is switched off. My question is how to force gdm to show login screen always on primary monitor with resolution 1280x1024? I use Ubuntu 10.04.

    Read the article

  • How much did it cost our competitor to DDoS us at 50 Gbps for two weeks?

    - by MiniQuark
    I know that this question may sound like an invalid serverfault question, but I believe that it's quite valid: the amount of time and effort that a sysadmin should spend on DDoS protection is a direct function of typical DDoS prices. Let me rephrase this: protecting a web site against small attacks is one thing, but resisting 50 Gbps of UDP flood is another and requires time & money. Deciding whether or not to spend that time & money depends on whether such an attack is likely or not, and this in turn depends on how cheap and simple such an attack is for the attacker. So here's the full story: our company has been victim to a massive DDoS attack (over 50 Gbps of UDP traffic, full-time during 2 weeks). We are pretty sure that it's one of our competitors, and we actually know which one, because we were the only two remaining competitors on a very big request for proposal, and the DDoS attack magically stopped the day we won (double hurray, by the way)! These people have proved in the past that they are very dishonest, but we know that they are not technical at all, so we believe that they simply paid for some botnet DDoS service. I would like to know how much these services typically cost, for such a large scale attack. Please do not give any link to such services, I would really hate to give these people any publicity. I understand that a hacker could very well do this for free, but what's a typical price for such an attack if our competitors paid for it through some kind of botnet service? It is really starting to scare me (if we're talking thousands of dollars here, then I am really going to freak off: who knows, they might just hire a hit-man one day?). Of course we filed a complaint, but the police says that they cannot do much about it (DDoS attacks are virtually untraceable, so they say), and our suspicions are not enough to justify them raiding our competitor's offices to search for proofs. For your information, we now changed our infrastructure to be able to sustain such attacks: we now use a major CDN service so that our servers are not directly affected by DDoS attacks. Requests for dynamic pages do get proxied to our servers, but for low level attacks (UDP flood, or Syn floods, for example) we only receive legitimate trafic, so we're fine. If they decide to launch higher level attacks (HTTP flood or slowloris attacks for example), most of the load should be handled by the CDN... at least I hope so! Thank you very much for your help.

    Read the article

  • Do you know of any alternative to "Google App Engine"?

    - by brilliant
    On their presentation of "Google App Engine" Google team members boldly said: "You write a code and we will run it for you". Then the "Google App Engine" was launched and it still does its job quite successfully - "Google App Engine" runs millions of applications of different sizes belonging to different users completely free!!! Now, here is the question: Do You know of any alternative to GAE? Have You ever even heard of any such service out there that would run Your Python code for free?

    Read the article

  • Create kickstart configuration file from existing configuration.

    - by ÜMineiro
    Is there a script or another way to automatically generate a kickstart configuration file from the system state of an existing server so that the file can be use to replicate (not clone) the configuration of the system in another install? I know that the anaconda-ks.cfg file is stored on the /root dir. but the system in question have been extensively changed since it's installation, and the file is of no use now.

    Read the article

  • Real performance gain from faster IDE or SATA hard drive?

    - by raw_noob
    How much of a real-world performance gain would you expect from: replacing a 5400rpm IDE HD with a 7200rpm IDE HD? replacing a 5400rpm IDE HD with a SATA-150? It's assumed that the drive in question is both the system drive and the only drive. A modest AMD Sempron-based home computer with adequate DDR memory running Windows XP Home SP3. Thanks for looking.

    Read the article

  • WINDOWS 7 SOFTWARE PROBLEM

    - by PHILIP KIRK
    I am running Windows 7 and have adjusted something which has caused all of my shortcuts and program icons to show the same program namely Adobe Reader and when I click on any of the icon or shortcuts they only open Adobe reader, I have reinstalled Windows 7 But this has made no change, I posted this question yesterday but apparently with not enough information I hope this is better and someone can help.

    Read the article

  • powerpoint compatibility

    - by John
    Imagine you work in Office 2007 or 2010, you create a far-fetched presentation and save it as 'ppt'. Office 2007/2010 warns you that some effects will be lost, but you save it. Question: If you open that ppt file in the office version you're working with(2007/2010) will it run like on '97 or '03 with the lack of effects, no other problems? I'm asking so I know whether I have to install an older office so I can check compatibility.I use 2010. Thanks in advance

    Read the article

  • What is the default mount point on Linux systems (all)?

    - by Vijay Sharma
    My question is very basic in nature. Is the mount point for external media (like USB) always /media? Because in a Debian system, if I plug in any USB device that goes to the /media folder. So is it the case with all the other Linux flavors like Fedora, Ubuntu, etc. If a USB device is automatically mounted will it always go to the /media directory?

    Read the article

  • Installing Windows 7 x64 SP1: Error 0x8007007b (The filename, directory name or volume label syntax is incorrect)

    - by Eikern
    I just tried to install Windows 7 x64 SP1 on my desktop computer, but 10 minutes in to the installation i get this error: The filename, directory name or volume label syntax is incorrect. ERROR_INVALID_NAME(0x8007007b) My guess is that I have to reinstall the OS, but I'm wondering if I somehow can get a more detailed error message. I want to know what has got the wrong name/path? Anybody know? EDIT: I pressed enter after selecting a tag, before I had finished the question.

    Read the article

  • Can I prevent logon wallpaper from being changed when changing Windows theme?

    - by eidylon
    Hello all; I use TweaksLogon to change the logon wallpaper on my Win7x64 Ultimate system. However if I change my windows theme, it resets the logon wallpaper back to the default. Is there any way this can be prevented so that it will keep my chosen logon wall when changing the windows theme? I've tried both the programs at this question: http://superuser.com/questions/113817/customize-logon-or-welcome-screen-in-windows-7

    Read the article

< Previous Page | 442 443 444 445 446 447 448 449 450 451 452 453  | Next Page >