Search Results

Search found 4865 results on 195 pages for 'special'.

Page 46/195 | < Previous Page | 42 43 44 45 46 47 48 49 50 51 52 53  | Next Page >

  • VMWare Ubuntu guest multitouch touchpad

    - by Petr Marek
    Related: Use Synaptics Touchpad Scroll in VMware Guest I've read that it's not possible to enable multitouch in vmware guest. What confuses me, is that when I use something special (like two finger scroll) in guest OS, I can see the cursor change to the scrolling one. Is this some kind of virtualization bug or is there a possibility that I can enable multitouch in guest? Host: Windows 7 Guest: Ubuntu 12.04

    Read the article

  • extract recipient addresses from mailer-daemon messages

    - by Frank Peixoto
    I need generate and email to a mailing list administrator a list of email addresses that have generated a bounceback message, to allow him to clean up the mailing list. A separate mailbox will be dedicated to receiving those messages, so I need to extract the recipients that have bounced. What's the easiest way to extract those from the mail file for that special mailbox?

    Read the article

  • Missing Driver in Win7 x64 ? (Texas Instruments PCIxx12 Integrated FlashMedia Controller)

    - by Mohammad
    I have Win7 x64 built 7600 on my Vaio laptop (VGN-AR890U) In my Device Manager there is a device that I've not found its driver yet! http://www.picfront.org/d/7vCf I've followed Update Driver button's instructions and below is the result, but it doesn't resolve the problem. I was searching the web for the driver but I couldn't find anything special that resolved my problem. http://www.picfront.org/d/7vCg Could you please guide me, how I can solve it ?

    Read the article

  • System for public internet access

    - by Pydev UA
    I'm looking for solution for a public wifi spot.. I want that all people who connect to our wifi network should be redirected to special website(after they open any internet page) where they should reed and agree with our terms of services(by clicking a button). After that they can open any internet page. I have a router and a linux box with site(with agreement page ready), so I'm looking for some software/or hardware solution for this, preferable open-source.

    Read the article

  • Proxy Access to my Squid Proxy

    - by Fake4d
    I have a squid proxy cluster to let my users surf in the internet and on intranet ressources. Now there is a special user, that wants to configure another squid in the net of the users. So this proxy wants to access the internet over a proxy-proxy configuration. It doesnt work at the moment. So here is the question: Whats the configuration line for my squid.conf to allow an IP to use my squid as an upstream proxy?

    Read the article

  • How to copy-paste in good quality from Adobe Illustrator to MS One Note?

    - by Suzan Cioc
    When I copy some drawing in Illustrator, it stores it in clipboard in 3 formats: bitmap, device independent bitmap and enhanced meta-file. If drawing contains text, then meta-file version has no anti-aliasing. Below are examples in MS Word OneNote has no "Paste Special" so it always paste in EMF. Is it possible either to tell OneNote to paste not in EMF, or tell Illustrator to use anti-aliasing while storing picture with letters?

    Read the article

  • windows 7 logging off standard users

    - by massimogentilini
    I've a Windows 7 installation with 2 users, one administrator and the other is not. If I try to logon with the standard user it show the Welcome Screen and them logoff immediately. If I logon with the administrator user or if I set the standard used as an administrator it works without problems. Any idea? Windows 7 Ultimate running on a netbook, AVG Antivirus, no special software or any other specific configuration. Regards Massimo

    Read the article

  • Using a SD card as a smart card for two-step verification for Mac logon

    - by Greg Brown
    What I am trying to do is create two-step verification to logon to my mac, one being that you would need to input a SD card (formated with special format or something) and then also have a password. Is there any software out there that could do this or any way of programming it so that once it reads the SD Card it makes the password bar visible for logon. Would it be easier to do it with Linux since it is open source? Any help in the right direction is appreciated. Thanks

    Read the article

  • Protect video with password

    - by Ruben
    Are they any method to protect video files with password, so player will ask for the pasword before playback? Currently I am protecting private video files using zip compression with password but it is very inconvenient. I am forced to uncompress huge files each time before watching, and than erase it using special utilities (to avoid further restoring). Please advice.

    Read the article

  • Building a home cluster - hardware and cost analysis

    - by ldigas
    Does anyone know some links / books / anything you can think of, that describe the process of building a little home cluster (when I say home, it doesn't necessarily mean for keeping at home - just means it's relatively cheap and small) for experimental purposes, with a special emphasis on what hardware would be adequate today, and some kind of cost analysis ? Although, if someone here's done it, I'd appreciate all the experience you can share.

    Read the article

  • How to write to a Mac OSX read-only filesystem?

    - by marienbad
    I have DMG I need to mount and write a file to. When I mount it, finder shows the root and all as read-only. Then I discovered 'mount -w'. But when I run that, I get 'mount: unknown special file or file system.' How can I mount this disk image as writable, or force a file into it?

    Read the article

  • Macbook memory upgrade question

    - by James Evans
    I've read some conflicting articles on Macbooks and memory upgrades. Some say you have to buy the "special" Mac memory (bulls$%t), others say manufacturers like Partriot and Ocz will work fine. My Macbook (non-pro) is about 6 mos old with it's 2 GB of memory (SO-DIMM 1066MHz DDR3). Does anyone have any definitive information of what will work? Thanks!

    Read the article

  • Macbook memory upgrade question

    - by James Evans
    I've read some conflicting articles on Macbooks and memory upgrades. Some say you have to buy the "special" Mac memory (bulls$%t), others say manufacturers like Partriot and Ocz will work fine. My Macbook (non-pro) is about 6 mos old with it's 2 GB of memory (SO-DIMM 1066MHz DDR3). Does anyone have any definitive information of what will work? Thanks!

    Read the article

  • Make a Phone ring from BASH through a HUAWEI e220

    - by microspino
    Hello, I have a Debian Linux system with a HUAWEI e220 on /dev/ttyUSB0. I'd like to make It ring a generic GSM phone for just one time. I'm doing this because I'd like to build an embedded system that fires some special behavior by a single GSM phone ring. How can I do It? I've tried wvdial but I receive always a "NO CARRIER" answer when I try to send It an "ATDT XXX-phone-number-to-dial-XXX" command.

    Read the article

  • How do you clean your laptop?

    - by penyaskito
    I work in the countryside gathering requirements, so my laptop often gets a lot of dust, and I cannot dedicate too much time for cleaning it, nor opening it. I'd like to hear what solutions do you use for cleaning it, specially the screen and keyboard. I prefer home-made solution before special products, that I cannot buy at work. Thanks in advance.

    Read the article

  • Can files deleted with rm -rf be recovered?

    - by Lena
    When I delete folders or files in through osx terminal using the rm -rf, where do they go? I heard that some say they are deleted directly, but some also say it only "remove the link to the file making it unable to be found or accessed without special tools" (http://superuser.com/questions/370786/where-do-files-and-directories-go-when-i-run-rm-rf-folder-or-file-name-in-ubu). Someone said something about ext3 being able to save rm-ed files in ubuntu but what about mac?

    Read the article

  • Preparing laptops for theft

    - by ccook
    With a number of laptops out there the likelihood of one being stolen is high. What methods, preferably free, can be used to secure the data on the computers? The laptops do not have any special hardware on them, and generally keep their user data in a dropbox folder. One small step taken is to have the the dropbox folder encrypted by Windows 7. Any additional suggestions are greatly appreciated. The data in the dropbox folder is sensitive.

    Read the article

  • How to kill an "exiting" process on OS X (state = E)

    - by sbwoodside
    I have a process on my Mac OS X system which is in state E ("The process is trying to exit."): % ps auwwwxc | grep -si JavaApplicationS sbwoodside 84547 0.0 0.0 0 0 ?? E Mon12am 0:00.00 (JavaApplicationS) kill -9 84547 does nothing. Is there any special trick to get this process to exit? It's holding some ports open that I would like it to let go of.

    Read the article

  • Best way to provide redundant switching/links to server

    - by Myles Gray
    We have 3x ESX hosts and 2x SANS that we wish to move to a redundant 10G networking infrastructure. We have 4x Dell PowerConnect 8024F's to provide our backbone and are configured as so (only core switches relevant to this question): So the questions are: 1) Do the interconnects between the 4x 8024F's need to be LAG'd or just STP'd 2) As the NICs on the servers are split across 2 switches, does any special configuration need to be done here or on the switches? 3) If a link or switch fails will the switches automatically find a new path to the Server/SAN?

    Read the article

< Previous Page | 42 43 44 45 46 47 48 49 50 51 52 53  | Next Page >