Search Results

Search found 39440 results on 1578 pages for 'possible homework'.

Page 462/1578 | < Previous Page | 458 459 460 461 462 463 464 465 466 467 468 469  | Next Page >

  • Closing programs with middle-click in windows 7

    - by JoePerkins
    Is this possible? I want to close programs in the taskbar with middle-click, like tabs in firefox. The best approach I have so far is waiting for the mini-view that pops up when you point with the mouse in the taskbar and then middle-clicking there, but I would like to close them directly.

    Read the article

  • Automating MySQL configuration with kickstart

    - by Nimmy Lebby
    I've been testing deployment for a website with some virtual servers. I have most of my deployment steps done via kickstart file (package installation and user creation). However, for MySQL I have to: Run mysql_secure_installation (sets up root password, deletes anonymous users, disallows root login remotely, removes test databases) ./ Then, create the website's databases and the database user. I'm not sure if this is possible in kickstart---especially the prompts in mysql_secure_installation. Perhaps someone has some suggestions or examples?

    Read the article

  • pipe from tar to ftp

    - by facha
    I have ftp access to a server I do not control. I'd like to start sending archives of my server's FS to that ftp. The problem is I don't have enough free space on my system to create a backup archive first (and store it on my fs) and then send it to ftp. So I'm wondering if it is possible to do something like this: tar -jcpvf - / | ftp-put ftp://user:pass@host/file.tbz Normally there is no problem doing it over ssh, but in this case I only have ftp available.

    Read the article

  • When is a domain computer account scheduled to change the password?

    - by Jason Stangroome
    I understand domain-joined computers have machine accounts in AD and these accounts have passwords that expire (apparently every 30 days by default) and those passwords are automatically changed without user intervention. Given that this is known to cause issues when restoring snapshots of domain-joined virtual machines, is it possible to query the domain-joined computer or AD to determine when the machine account password is next scheduled to be changed?

    Read the article

  • Installing Cygwin, what distro do I use?

    - by user2699451
    I have a fresh install of Windows and a Linux OS that I can't access, how do I fix this? I do not have the .iso/disk for Linux anymore. So I figured, I can install Cygwin and through that install Grub, but I am used to Linux Mint, which uses apt-get. I have used CentOS before which uses rpm, but how do I install and use packages in the Cygwin terminal, and is it possible to install Grub through Cygwin?

    Read the article

  • How to combine AWS and dedicated external servers?

    - by rfw21
    I have an extensive network of servers all currently hosted on AWS EC2. For reasons of cost I plan to gradually migrate to dedicated servers where possible. So: How can I best combine AWS and non-AWS servers in my network? Ideally, I should be able to assign internal IP addresses to the external servers, include them in AWS security groups and ensure that all private traffic between my AWS servers and external servers is secure.

    Read the article

  • Single machine domain with Windows 7 OS

    - by Robert Koritnik
    Is it possible to setup one single machine with Windows 7 x64 OS and somehow make it work as if it's part of a certain domain? So domain controller would be simulated in some way? I would like to avoid VMs and make it actually work on one machine with non server OS. Is there even a simpler way of doing it? Why: I have to setup development environment for Sharepoint 2010 and it will make my life much easier if my machine would be part of a domain.

    Read the article

  • how to record video

    - by lego 69
    hello, I'm watching video from one server via Windows Media Player, is it possible to record this video while I'm watching it? thanks in advance, I tried with download master but it doesn't work, thanks in advance

    Read the article

  • Firefox add-on to move the tab bar.

    - by D Connors
    Hi, I'm using Firefox on my netbook, and I want to save as many vertical pixels as possible without turning to full-screen mode. Right now, the only thing in my way is the fact that the tab bar can't be moved like the navigation bar or the bookmarks toolbar. I'm looking for a Firefox add-on that will let me place the tab bar side-by-side with the other bars. Is there anything like that? (the lighter the better)

    Read the article

  • Change language for Windows server 2003

    - by Fishcake
    I'm currently working in Spain for the week and am having to setup IIS on Windows Server 2003. However the box we've been given is in Spanish which makes it very hard for me to understand. Is it possible to actually change the language in Server 2003?

    Read the article

  • User account that is not allowed to edit one file on Ubuntu

    - by spacemonkey
    Hi, I wanted to ask if it is possible to create a user account on Ubuntu so that it had all powers and rights of root account except it would be impossible to edit a certain file. What I intend to do is to edit host file in order to block access of certain websites, and then create a user account which would be the same as root account except it would be not able to edit host file. Maybe there is an easier way to block an access of certain sites forever? Thanks!

    Read the article

  • How to mount LUKS partition securely on server

    - by Ency
    I'm curious if it is possible to mount a partition encrypted by cryptsetup with LUKS securely and automatically on Ubuntu 10.0.4 LTS. For example, if I use the key for the encrypted partition, than that key has to be presented on a device that is not encrypted and if someone steals my disk they'll be able to find the key and decrypt the partition. Is there any safe way to mount an encrypted partition? If not, does anything exist to do what I want?

    Read the article

  • Replacing objects, handling clones, dealing with write logs

    - by Alix
    Hi everyone, I'm dealing with a problem I can't figure out how to solve, and I'd love to hear some suggestions. [NOTE: I realise I'm asking several questions; however, answers need to take into account all of the issues, so I cannot split this into several questions] Here's the deal: I'm implementing a system that underlies user applications and that protect shared objects from concurrent accesses. The application programmer (whose application will run on top of my system) defines such shared objects like this: public class MyAtomicObject { // These are just examples of fields you may want to have in your class. public virtual int x { get; set; } public virtual List<int> list { get; set; } public virtual MyClassA objA { get; set; } public virtual MyClassB objB { get; set; } } As you can see they declare the fields of their class as auto-generated properties (auto-generated means they don't need to implement get and set). This is so that I can go in and extend their class and implement each get and set myself in order to handle possible concurrent accesses, etc. This is all well and good, but now it starts to get ugly: the application threads run transactions, like this: The thread signals it's starting a transaction. This means we now need to monitor its accesses to the fields of the atomic objects. The thread runs its code, possibly accessing fields for reading or writing. If there are accesses for writing, we'll hide them from the other transactions (other threads), and only make them visible in step 3. This is because the transaction may fail and have to roll back (undo) its updates, and in that case we don't want other threads to see its "dirty" data. The thread signals it wants to commit the transaction. If the commit is successful, the updates it made will now become visible to everyone else. Otherwise, the transaction will abort, the updates will remain invisible, and no one will ever know the transaction was there. So basically the concept of transaction is a series of accesses that appear to have happened atomically, that is, all at the same time, in the same instant, which would be the moment of successful commit. (This is as opposed to its updates becoming visible as it makes them) In order to hide the write accesses in step 2, I clone the accessed field (let's say it's the field list) and put it in the transaction's write log. After that, any time the transaction accesses list, it will actually be accessing the clone in its write log, and not the global copy everyone else sees. Like this, any changes it makes will be done to the (invisible) clone, not to the global copy. If in step 3 the commit is successful, the transaction should replace the global copy with the updated list it has in its write log, and then the changes become visible for everyone else at once. It would be something like this: myAtomicObject.list = updatedCloneOfListInTheWriteLog; Problem #1: possible references to the list. Let's say someone puts a reference to the global list in a dictionary. When I do... myAtomicObject.list = updatedCloneOfListInTheWriteLog; ...I'm just replacing the reference in the field list, but not the real object (I'm not overwriting the data), so in the dictionary we'll still have a reference to the old version of the list. A possible solution would be to overwrite the data (in the case of a list, empty the global list and add all the elements of the clone). More generically, I would need to copy the fields of one list to the other. I can do this with reflection, but that's not very pretty. Is there any other way to do it? Problem #2: even if problem #1 is solved, I still have a similar problem with the clone: the application programmer doesn't know I'm giving him a clone and not the global copy. What if he puts the clone in a dictionary? Then at commit there will be some references to the global copy and some to the clone, when in truth they should all point to the same object. I thought about providing a wrapper object that contains both the cloned list and a pointer to the global copy, but the programmer doesn't know about this wrapper, so they're not going to use the pointer at all. The wrapper would be like this: public class Wrapper<T> : T { // This would be the pointer to the global copy. The local data is contained in whatever fields the wrapper inherits from T. private T thisPtr; } I do need this wrapper for comparisons: if I have a dictionary that has an entry with the global copy as key, if I look it up with the clone, like this: dictionary[updatedCloneOfListInTheWriteLog] I need it to return the entry, that is, to think that updatedCloneOfListInTheWriteLog and the global copy are the same thing. For this, I can just override Equals, GetHashCode, operator== and operator!=, no problem. However I still don't know how to solve the case in which the programmer unknowingly inserts a reference to the clone in a dictionary. Problem #3: the wrapper must extend the class of the object it wraps (if it's wrapping MyClassA, it must extend MyClassA) so that it's accepted wherever an object of that class (MyClass) would be accepted. However, that class (MyClassA) may be final. This is pretty horrible :$. Any suggestions? I don't need to use a wrapper, anything you can think of is fine. What I cannot change is the write log (I need to have a write log) and the fact that the programmer doesn't know about the clone. I hope I've made some sense. Feel free to ask for more info if something needs some clearing up. Thanks so much!

    Read the article

  • How to boot more than 1 linux distro along with windows?

    - by BD at Rivenhill
    I have a machine that currently has Windows Vista living peacefully with Ubuntu 10.04 but I would like to test out another distro outside of a virtual machine without destroying my current Ubuntu or Windows installs. Is this possible? If so, any recommendations on how to arrange the partitions? I was thinking of moving user home areas to a separate partition and having 1 partition for all Ubuntu files and 1 for all files associated with the other distro.

    Read the article

  • Pairing a Bluetooth headset with Windows PC

    - by hmemcpy
    I was wondering if it's possible to pair my Bluetooth headset (i.Tech Arrow 2) with my Windows 7, so that I can use it in Skype, for instance? Windows recognizes it, but it fails to find drivers for it, and I can't seem to find any drivers for it on their website. Any suggestions?

    Read the article

  • How do you disable an upstart service in ubuntu 10.10?

    - by Doug
    In 10.10 upstart is being used instead of sysvinit. It's possible to remove annoying upstart services which you do not want by removing the appropriate file in /etc/init/blah.conf However, this seems a heavy handed approach. How do you correctly configure upstart to be able to selectively turn these services on and off via the command line? As a practical example, the answers listed here to turn gdm off using rcconf no longer work: How do I prevent GDM from running at boot on Ubuntu?

    Read the article

  • Launch Chrome as application

    - by Chris
    Hi, I am writing a web app. I would like the users to be able to launch a Chromium browser (SRWare Iron) without an address bar or tabs.. just a frame.. Possible? How? Thanks UPDATE: Sry answered my own question. Pulled the --app="url" switch off a Gears icon that Remember The Milk made on my desktop. If I had only kept looking instead of posting :)

    Read the article

  • Redirecting http to https (iis 7)

    - by Simon
    Our server redirects http://ourdomain.com/anything to http://ourdomain.com Is is possible to get it to redirect and retain the anything part? ie. http://ourdomain.com/cat/dog to https://ourdomain.com/cat/dog

    Read the article

  • How to add "most recent emails from this user" to Gmail inbox as a sidebar

    - by Scott B
    I use and love gmail. However, since i use email for customer support, I'm always doing a cross reference lookup via the search feature to see my past conversations with the person whose email I'm reading. I'd love to have a right sidebar widget that shows me, for any email I choose to read, the list of previous conversations/emails with that person. Is this possible? I'm using Chrome Ideally, this sidebar would bump or replace the contextual ads that now display over there.

    Read the article

  • How can I match an AWS account number to a key and secret

    - by iwein
    My client gave me a key and a secret to manage his EC2 things, but to make one of my AMI's available to run I have to fill in the Account Number. Is it possible to deduce the account number from the key and the secret? Obviously I also asked the client for this information, but since it's weekend and I'm not fond of waiting I wanted to see if I could figure it out myself. Have you done this before?

    Read the article

< Previous Page | 458 459 460 461 462 463 464 465 466 467 468 469  | Next Page >