Search Results

Search found 21963 results on 879 pages for 'lance may'.

Page 471/879 | < Previous Page | 467 468 469 470 471 472 473 474 475 476 477 478  | Next Page >

  • Are Uninterruptible Power Supply (UPS) at home really a worthwhile investment for home computing? [c

    - by Jian Lin
    Possible Duplicate: Is a UPS a good investment for a home machine? I have 2 Uninterruptible power supplies at home, but they seem to expire after 5 years or so. During this 5 years, it maybe saved the computer from turning off twice. But I wonder, I often save my documents every 10 minutes. So the most I can lose is 10 minute worth of work. Not to mention that, I may not be editing anything when the power is out. Also, when the UPS expires, one of them will give out beeping sound once in a while, probably signaling the changing of the battery. So I can either buy 2 new UPS or just buy 2 power outlets instead. 2 UPS, costing $160 to $250 roughly, can it be really worth it if it can save your computer from powering off for just 2 times? What are the alternatives?

    Read the article

  • How can I avoid logging file not founds commonly caused by vulnerability scanners?

    - by agweber
    My apache logs are pretty much full of 'admin.php' not found or unable to stat and similar statements for wp-login.php, default.php, and so on that are often sought after by vulnerability scanners. Can I configure apache to avoid logging these statements for certain files? I don't want to filter out all file not founds as I'd like to fix bad links that I may have put out over the years that no longer correspond to the same files. I can use a tool like fail2ban or denyhosts, but from previous experiences it comes from so many places that those errors are still going to pile up, and the reducing those error messages are what this question is asking about.

    Read the article

  • is it possible to use multiple proxies for different target websites?

    - by fduff
    Typically I'd like to know if it's possible to have a setup where it maps some IPs with a particular proxy and other IPs using another proxy? Proxy Chaining isn't really what I'm looking for (well I don't think it is) because each address could be resolved with or without a proxy but their content may not be accessible without the right proxy. This setup could be part of home network, so that the relevant proxy s/w could be installed and setup on a Linux box for ex. Ex: website-A via proxy-1 website-B via proxy-2 all others via no-proxy

    Read the article

  • How can I limit other (administrator) users access to my profile?

    - by kojo
    Hi, We in our club have a computer with Windows 7 Professional that every club member may use. And everyone has their own separate account. Those accounts have to have administrator priveleges since I want everyone to be able to install any software and use any feature they want. However, there is a single thing that they shouldn't be allowed to do - that is, look into another users' profiles. Now when anyone goes to 'c:\Users(Any User Name)' a little prompt appears that this folder is secured and whether you really want to look inside. Simply clickinh 'ok' give you access to any profile. I tried disabling taking ownership for Administrators group in Group Policies but that had no effect. How can I effectively prohibit administrators looking into each others' profiles and documents?

    Read the article

  • Encryption container for multiple people

    - by Adam M.
    I was just wondering if anyone may have come across a product that would allow for a container based encryption to be used by multiple people, in a Windows Server setup. I wanted to see if there might be something like a truecrypt that could handle being accessed by two accounts? Looking to see if there is a product that would have such properties that would allow only a hand full of users access to the content of the location, but allow for the files to be backed up a normal backup system. That way if a file had to be restored, the container could be redirected to another location for one of the users to get access to it? This would allow for access to be restricted beyond the NTFS and file share permissons

    Read the article

  • Snowfall application with Windows 7 compatibility

    - by Shiki
    Okay, this may seem to be a strange question. I'm searching for a 'snowfall application'. Back then we had a lot of like this.. in the old ages, when XP came out, so on. Nowadays, I can't find a single working one. It's not like I suddenly want something like this, but a girl asked me whethers its possible or not. IMHO its possible but... Please help me out. =) (Obviously, free software shareware.)

    Read the article

  • What makes Ubuntu awesome [closed]

    - by Shagun
    My question may sound stupid or inappropriate for this site in which case I apologize before hand. This thing has bothered me for quiet some time so please correct me if there is anything inappropriate: I have been using Ubuntu for past 1 year and I know how awesome it is and in what terms is it better than windows.But around 2 weeks ago some of my friends asked me to show them something on Ubuntu or tell something about Ubuntu that makes people prefer it over windows. I tried to convince them by telling things like its open-source, that most of the super-computers run on Linux, that its unaffected by virus and other stuff but they seemed unconvinced. Maybe what they we looking for was some mind-boggling feature which only Ubuntu (Linux) has. Since that day I have been thinking but yet don't have anything that will show them the true powers of Linux. Please suggest your response to such a situation as it troubles me that I am not able to explain them one thing that I myself believe in. Thank you. PS : I am not looking for a theoretical answer but would like to hear of one such application which it and only it provides.

    Read the article

  • pls help to log back in to FB with an existing profile [closed]

    - by Katalin Glegyák
    Dear to Whom it may concern on Facebook, My name is Katalin Glegyák. I have had an account with an email: [email protected], even though I do not use that email anymore. Someone wanted to hack my account, so I changed password to a pretty complicated one, which I could not remember..(I know:)) I needed to prove my identity by typing in 3 codes that were sent to 3 friends on fb. I did it. Fb told me to come back in one day. I did so. But this is the message I keep getting: "We're sorry. The email you used to start the account recovery process is already in use. Please restart the process with a new email address.". I really do not want to log back in again with a new subscribtion. I already have 600 ppl who I know from places, and I have certain important messages also...Pls pls..help me..... Thank you very much, Merry Xmas, Kate Glegyák ([email protected])

    Read the article

  • "Undeleting" partition (NTFS) - recommendations?

    - by kagali-san
    So I have a drive which either suffered from hardware error or, possibly, got a little shock from badly configured Windows unattended install started on the same PC (the drive in question wasn't the install drive..). Quick exam shows that filesystem is seemingly intact, as some data recovery tools work with it (UnFormat rated it as "Excellent"). This may mean that a copy of partition table exists on disk, or a copy of MFT survived whatever happened, or.. Any idea how to restore partition tables/FS header, add a drive letter thus let Windows to mount the filesystem as if nothing happened? (I guess there must be tools of this kind)

    Read the article

  • Forbidden - 403 error Apache

    - by philippe
    I was setting my local Apache server to run Python cgi, then I came with the following error: Forbidden You don't have permission to access /hw10/main.cgi on this server. What I've changed on my http config file was: ScriptAlias /cgi-bin/ "/var/www/cgi-bin/" <Directory "/var/www/cgi-bin"> AllowOverride None Options FollowSymLinks +ExecCGI Order allow,deny Allow from all Require all granted </Directory> AddHandler cgi-script .cgi .py May someone please help me with that? I was trying to configure my Apache server to run .cgi Python scripts, and I came across that.

    Read the article

  • Does the nginx “upstream” directive have a port setting?

    - by orzzzzz
    moved from:http://stackoverflow.com/questions/3748517/does-nginx-upstream-has-a-port-setting I use upstream and proxy for load balancing. The directive proxy_pass http://upstream_name uses the default port, which is 80. However, if the upstream server does not listen on this port, then the request fails. How do I specify an alternate port? my configuration: http{ #... upstream myups{ server 192.168.1.100:6666; server 192.168.1.101:9999; } #.... server{ listen 81; #..... location ~ /myapp { proxy_pass http://myups:81/; } } nginx -t: [warn]: upstream "myups" may not have port 81 in /opt/nginx/conf/nginx.conf:78.

    Read the article

  • Have two partitions in RAID1

    - by mateikav
    The answers are unclear wherever I look. I have two 2TB drives for a RAID1 and I want to mirror them while having two partitions on the drives. One partition will be 100GB and contain programs, the other partition will be 1.8TB and contain personal files. Some may ask why? The answer is that my programs are currently on another older drive and I want to save time and pain uninstalling and re-installing critical programs while merely copying them to the new drives via Shadowcopy. When I create the RAID1, will both partitions be mirrored? Is this possible? I am sorry if I am being confusing or unclear.

    Read the article

  • Dependency Injection: What point am I allowed to create a new object?

    - by Gaz_Edge
    I am refactoring a php application and I am trying to do has much dependency injection as possible. I feel like I've got a good grasp of how it works, and I can certainly see my classes becoming a lot leaner and more robust. Im refactoring so that I can inject a dependency rather than create a new object within the class, but at some point I am going to have to create some objects i.e. use the dreaded new keyword. The problem I have now run into is at what point can I actually create new objects? Its looking like I'll end up at a top level class, creating loads of new objects as there is no where else to go. This feels wrong. I've read some blogs that use factory classes to create all the objects, and then you inject the factory into other classes. You can then call the factory methods, and the factory creates the new object for you. My concern with doing this is now my factory classes are going to be a new free-for-all! I guess this may be ok as they are factory classes, but are there some rules to stick to when using factory pattern and DI, or am I going way off the mark here.

    Read the article

  • How to write more than one line in a launcher

    - by seraex
    How can I run three commands in a launcher? My commands are cd /home/seraex/MyDoc rm MyDoc.tgz tar cfz MyDoc.tgz * which will go to my documents folder and delete old backup and make a new backup. At the moment I make a text file and then make a launcher and point it to the file, but I want to delete the file and make the launcher run the commands directly. I'm using ubuntu 10.10 ' ubuntu site says 'Unfortunately launchers do not have access to the Bash environment so you cannot just include the multi commands' when i ggole chaining in launchers. thanks, admin may delete the question '

    Read the article

  • Problem video nvidia ubuntu 12.04

    - by dragonov7
    I just did a fresh install of ubuntu 12.04 on my PC (Dell precision 370) but the video is not working as it should. Problems: When I log in to unity 3D I get a transparent bar (where the firefox, libre office, etc icons are) but I can see the tooltips when I put my mouse over where the icons are, I can see the top toolbar with no problem and I see just white on the rest of the desktop! When I log in using unity 2D I see the left bar cut in half (so I can't see the trash icon that is at the botton), the toolbar at the top shows OK and the desktop show OK but with some apps. For example, if I open a terminal and maximize it, it will only show just where the left toolbar "cuts". But if I open firefox it will open fine. Config: My PC comes with a nvidia quadro nvs 280 and I see that by default ubuntu is using the nouveau driver. Workarounds tried: I tried uninstalling the nouveau driver and the desktop works fine but I can use only unity 2D. I tried installing the nvidia-173 drivers using synaptic but I get "Could not apply changes! Fix broken packages first". I go to "Edit - Fix Broken packages" and I get the error: "E: Unable to correct problem, you have held broken packages.E: Error, PkgProblemResolver::Resolve generated breakes, this may be caused by held packages.E:Unable to correct dependencies" Output of lspci: 01:00.0 VGA compatible controller: NVIDIA Corporation NV37GL [Quadro PCI-E Series] (rev a2) Any idea so as to what I should do? Thanks in advance for any help. PS: Ah, the nvidia-173 driver was working fine on ubuntu 10.04.

    Read the article

  • Restore boot sector from a hard disc to another

    - by giang.asl.8
    I have a win7 on my old Seagate HDD. Recently I installed one new SSD and setup win8 on it. So I have a boot table to choose win7 or win8 to startup. Now when I tried to remove the old one (the Seagate), I can't boot into windows any more. I just have a blinking underscore in boot screen, forever ang forever. I guess the reason is that the boot sector, or boot table (or something like that) was installed on the old HDD. So may someone show me how to boot into my win8 without reinstall the old HDD.

    Read the article

  • What is and what is not replicated in a glassfish cluster with a mod_jk load balancer?

    - by Navigateur
    I have a Glassfish (3.1.2) cluster over 2 computers as nodes, with a mod_jk load balancer. Are servlet instance variables replicated perfectly? If not, how do I make sure it is? Are all actions, including method calls and disk writes, replicated perfectly? If not, how do I make sure they are? These may seem like stupid questions, but I'm not seeking "load balancing" as much as I am seeking exact replication to enable future upgrading without any service interruption. How do I achieve this if it is not already the case?

    Read the article

  • How to disable multiple form submit (POST) in IIS

    - by user1209640
    We had a major SharePoint outage a few months back because a user wedged their keyboard in such a way as to cause the Enter button to be pressed indefinitely. The user was on a customized people search page and hundreds of POSTs by the same user were submitted asynchronously, which overloaded the server. Because I work in a large organization, I am looking for a more global way to prevent this from happening. Is there a way to prevent multiple web form submissions by a common user within a short period of time within IIS? I am aware we can write javascript to disable the button after it is clicked, but we are hoping to prevent this issue from occurring on other pages where a similar possibility may exist. Update: It appears looking at the source code, the javascript is performing a document.location = url, whenever keycode 13 (Enter) is pressed. Again, we can write JS to prevent this in this location, but we also want to be able to guard against this kind of issue more generally... preferably at the IIS level.

    Read the article

  • Contacts and chat history of skype was lost.

    - by oommu
    First, my skype didn't have sound effects so I uninstalled it then I reinstall the skype. The sound effect still not working so I downloaded the new version of skype ( beta one), I installed it then the sound effect still not working so I download the old version of skype then install it. The sound effect works but I lost all of my contacts and lost all of chat history. The chat history is really important for me. May you please help me to restore my chat history? Thank you.

    Read the article

  • My computer is broken after recent update attempt to 14.04

    - by user317550
    So it all started on a day much like today, because it is today but that's not the point, when I got a notification telling me I haven't upgraded to 14.04. Not due to lack of trying, however. It offered to upgrade me itself. Now keep in mind, I've tried very hard to upgrade my is from 12.04 to 14.04. Many times, I believe, due to tinkering where there shouldn't be tinkering, my BIOS are messed up. So upgrading is essentially impossible, but I wasn't about to stop it from updating for me, thinking it didn't have too much to do with BIOS as it doesn't reboot until after. So I let it go about its business and some time later I look back at it, and my unity sidebar is gone, and anytime there's text on screen it shows as those box things. The real bottom line is that I want to know my options. All of them. I would love to be able to keep the stuff on my hard drive so a hard drive swap may be an option if you guys say that would work. I just need my computer back. Let me know if I left anything out. Peace! B^)

    Read the article

  • sudo like in Ubuntu (for Debian and other Linuxes)

    - by chris_l
    Hi, I personally like the default sudo behavior of Ubuntu: - Root login impossible - "admin" group granted "ALL=(ALL) ALL" - users in the "admin" group are asked for their user password (not a root password) when using sudo. [I like it, because this way, there's no root password to be shared among several people. There may be good reasons for other opinions, too - but that shouldn't be the topic of this question.] Now I'm trying to re-create this behavior in Debian Etch. It basically works, but there's one important difference: Debian doesn't ask for a password. It should ask for the user's password. I edited the sudoers file to be exactly the same as in Ubuntu, and I added a user to the newly created "admin" group. What else do I have to do to get the Ubuntu behavior in Debian (and other Linuxes)? Thanks Chris

    Read the article

  • Alternative to cPanel (For Email, ect)

    - by Dboy1612
    I'm currently setting up a VPS for the first time. Standard that I've ever worked with before on shared hosting was cPanel, but as the majority of my work I plan on doing from now on will be using NodeJS and Python/Flask, I'd like to avoid needing to install Apache/MySQL/PHP. What would be my best bet to help manage a mail server other than cPanel? Or even other specific server settings that may come in handy later? Plan on using Ubuntu if that counts for anything.

    Read the article

  • Control Windows 8 with a tablet

    - by Frantumn
    It seems much of Windows 8 is based on the idea that it will be running on tablets, and touch screen PCs. I like this, but I don't have a W89 tablet, or a touch PC yet. I'm running W8 on a laptop, and am wondering if there's any way of using my iPad2 as a touch interface with metro? Or another options that'd be nice is if there's a input device similar to Apple's "Magic Trackpad" that would allow me to use hand gestures instead of a mouse cursor when in metro apps. I've seen some cool videos of MS Smart Glass and it would seem that the capabilities are there. But it may just be too early on to do this? I'm not sure.

    Read the article

  • (core dumped) ${TOMCAT_START}?

    - by Farticle Pilter
    I am running COMSOL (a scientific software) as a server, to which MATLAB is connected to. After a while, COMSOL aborted with the following error message. [s@beads ~]$ comsol server -comsolinifile $HOME/comsolini/comsolbatch.ini Error occurred during initialization of VM Could not reserve enough space for object heap Could not create the Java virtual machine. [s@beads ~]$ comsol server -comsolinifile $HOME/comsolini/comsolserver.ini COMSOL 4.4 (Build: 150) started listening on port 2036 Use the console command 'close' to exit the program A client with username 's' has logged on to the server from 'beads.myuniversity.edu' using port 2036. /software/linux/x86_64/comsol-4.4/bin/comsol: line 1436: 32757 Aborted (core dumped) ${TOMCAT_START} What might be the cause of this (core dumped) ${TOMCAT_START}? How may I fix it?

    Read the article

  • Keyboard that can't be removed (W8 CP)

    - by torazaburo
    Somehow I ended up with four keyboards installed (English (United States), Japanese (Japan), Kannada, and Hindi. They are installed in the sense that the tray drop down displays these four, and when I ALT-SHIFT through my keyboards it cycles through them. The mysterious thing is that in the Languages Control Panel, only the first two are shown, so I am stuck as to how to remove the last two. In the past, I may have installed and removed the Kannada and Hindi keyboards. What I did recently was to install the English (India) keyboard, as a way to get the ability to input the rupee symbol with ALT-CTRL-4. That English (India) keyboard did show up in the Languages Control Panel and allow itself to be removed. It almost seems like installing that keyboard somehow activate hidden registry settings left over from back when I had Kannada and Hindi installed. In any case, any ideas about how to remove these keyboards which don't appear in the Language Control Panel?

    Read the article

< Previous Page | 467 468 469 470 471 472 473 474 475 476 477 478  | Next Page >