Search Results

Search found 44026 results on 1762 pages for 'raid question'.

Page 478/1762 | < Previous Page | 474 475 476 477 478 479 480 481 482 483 484 485  | Next Page >

  • Bash or Zsh - which one and why?

    - by Andrew
    So, the question pretty much says it all. I'm on Snow Leopard, and I do a lot of web development, particularly in Rails 3 which makes heavy use of the console. I've seen some notable bloggers etc. mention Zsh as their preference over Bash, but I don't know what difference it would make. Could anyone give me a good comparison of what difference there is and what might make one prefer one option or the other? Thanks!

    Read the article

  • Windows 7 CMD.exe jumplist possible?

    - by TMRW
    It seems CMD does not have it's own jumplist.Has someone created one already? I would like to be able to pin script and command files to cmd.exe only.I can pin them separately with the /explorer as the first line on target box but i would like all of them to be pinned to cmd.exe by default.Kind of like all folders are pinned to explorer.exe.I also made a rather bad looking mockup to make the question a little more clear: http://img576.imageshack.us/img576/9263/cmdjumplist.jpg

    Read the article

  • Is it safe to leave a broadband router running 24/7?

    - by Anirvan
    My father-in-law's ISP warned him in the strictest possible terms to physically turn off his rented Nokia Siemens C2110 PPPoE broadband router when not in use. Everyone I know leaves their broadband router on all the time, and I've never heard of any negative impacts. Is leaving a consumer broadband router running 24/7 really problematic? Is the ISP in question being ridiculously paranoid?

    Read the article

  • How does Kerberos work with SSH?

    - by Phil
    Suppose I have four computers, Laptop, Server1, Server2, Kerberos server: I log in using PuTTY or SSH from L to S1, giving my username / password From S1 I then SSH to S2. No password is needed as Kerberos authenticates me Describe all the important SSH and KRB5 protocol exchanges: "L sends username to S1", "K sends ... to S1" etc. (This question is intended to be community-edited; please improve it for the non-expert reader.)

    Read the article

  • Buying Microsoft SQL Server 2008 Web Edition

    - by Marco
    I want to buy Microsoft SQL Server 2008 Web Edition in order to remotely install it on the server. The question is: Can I buy a licence in USA and pay in US dollars? OR do I have to buy it in my country (Portugal)? Since the servers are in Germany, should I buy the licence in Germany? (And if anyone know a good reseller I would apreciate)

    Read the article

  • Give the path to the inserted USB key to a script

    - by Xavier Nodet
    I'd like to run a given Perl script whenever I connect my camera to my PC, so that this script will download all the photos on it. But as the drive letter for the camera may change depending on what's already connected, I need to pass this drive letter as an argument to the script. Is this doable? Thanks. PS: if this is not possible, an answer to this other question would be very helpful.

    Read the article

  • Internet Speed for Webserver

    - by René
    That should be kind of dumb question in comparison to all other questions here. What minimum upload and download is required for a small home webserver with one webpage? Or is there a schema that shows me the required upload and download speed for a number of visitors? We talk about a Windows Server, but not really sure this is relevant. That's just for a practice project.

    Read the article

  • Expectations for NTFS file recovery

    - by Fred Hamilton
    Yesterday I booted my XP system, and as I looked up a minute later I saw the light blue screen and tail-end of that pre-boot diskcheck Windows sometimes does if it finds an error (or was previously told to run a diskcheck drung the next boot). I didn't worry about it at the moment... But then I looked at my "scratch" disk, which was a 70% full, 750GB hard disk...and it now looks like it has been freshly formatted. It doesn't have a single file on it, just the hidden "System Volume Information" file and 750GB of freedom from data. I looked at some of the recovery tools from the Free NTFS partition recovery question and decided to try PC INSPECTOR™ File Recovery 4.x initially. It ran overnight and afterwards returned a list of thousands of files it could recover. The odd thing was that the filenames were lost, but the file extensions were not (WTF?). And all of the files were exactly 1,472kB in size. I recovered a dozen PDFs as a test, and 80% of them displayed OK despite being padded out to 1.5MB (though I assume any files 1472kB are hosed). My primary question is: Is this the best I can expect from any file recovery software when trying to recover NTFS files? Or is there perhaps something better out there? I assume this is as good as it gets, but wanted to check in with the experts first. Bonus questions: What might have happened to my drive? I didn't intentionally format it. I've never seen a disk error cause the drive to suddenly become a clean, reformatted drive. Could some malicious/confused software have told my PC to format my disk on reboot? Is that even a function Windows XP has? Why can the file extensions be recovered but not the filename? Does NTFS really treat them as separate entities? I thought I had 8.3 naming turned off, but maybe that had something to do with it. Or maybe it looks at the data in the file and guesses the extension?

    Read the article

  • Changing user password logged in as Admin

    - by Mike
    Quick question, I forgot my Win XP password to logon to my laptop. My user name is on the "Office" domain for work. When I logon as the Administrator I have to logon the local domain "This computer". How do I reset my password for my account on the other domain? Thanks!

    Read the article

  • Windows Media Center HDMI Capture Cards

    - by RSolberg
    I'm working on a new software application that utilizes windows media center to play recorded TV shows in the center of the screen. We can get this to work with standard coax or RCA input TV Tuner/Capture cards. My question is this... Are there any TV tuner / capture cards out there that allow you to use Windows Media Center with an HDMI input of some kind?

    Read the article

  • Windows Server 2008 R2: User account set to not show on login

    - by josecortesp
    Hello There, this is my first Serverfault Question: I found myself this afternoon Setting up a Win Server 2008 R2 system for use with Team foundation source code control, and in order to give team-mates right to connect, i had to create user account for each of them (10 persons) (I can't and I don't want to create a domain). The point is that, after that, all that user accounts are showing in the login screen. Can i set those accounts to not show there? How? Thanks in advance

    Read the article

  • Stream audio source from Mac OS X as MP3

    - by Adam Backstrom
    I'd like to broadcast audio from my Mac desktop to my Palm Pre, as the Pre is more portable and I can use it in the kitchen, or while I'm exercising, and so on. I can already capture the audio using Soundflower, but how might I create an MP3 stream out of the audio input device? For all intents and purposes, Soundflower can reduce this question down to, "How can I create an MP3 stream from the built-in microphone on my Mac?" as the answer can be applied equally well to iTunes output.

    Read the article

  • LVM snapshot size

    - by Devator
    I currently have 2 volume's: [root@compute4 /]# lvscan ACTIVE '/dev/vps/vm108_img' [30.00 GB] inherit ACTIVE '/dev/vps/vm109_img' [90.00 GB] inherit Now, I use the LVM snapshot function to create backups. My quesion is, what size does the snapshot needs to be? Atleast the same as the volume in question or can it be a lot smaller and will only the changes be saved into it?

    Read the article

  • Any issues with computer on one domain in a separate forest and user account in another domain/forest?

    - by TheCleaner
    I have a few of my sites with a trust relationship among two different forests with a single domain in each AD forest. I'll skip all the politics and details that don't matter and just ask the question: Will having a machine with a computer account in one domain and their user account in another cause any issues? (besides GPO behavior that would need to be understood such as their computer getting a GPO applied from the computer's domain, and their user account getting a GPO applied from their user domain)

    Read the article

  • Can't Mount Databases in the Recovery Storage Group in Exchange 2003

    - by Kyle Brandt
    After restoring some mail stores, mounting them in the recovery storage group errors out. So far a repair with eseutil (which the log says was successful) and a server reboot has been tried. A defrag is currently running on the mail store I need to go through this again to post the exact error codes, so I will be updating this question. But I thought someone who does this a lot might have a "More times than not..." answer in the meantime.

    Read the article

  • My external hard drive letter is increasing each time i plugin it to my laptop, how to solve this pr

    - by Amr ElGarhy
    I have a strange problem, everytime i plugin my external hard drive, its letter increase, "g,h,i,j,k,l,m, then n, and now o" I went to computer manager and did what is described in this question: http://superuser.com/questions/76165/windows-changing-an-external-hard-drives-drive-letter To change the drive letter, but i found that the letters from h to n are all missed and not in the list. How to solve this problem? I am using windows 7 ultimate edition 32. 2GB Ram.

    Read the article

  • Blocking HTTP clients which request certain URLs repeatedly

    - by Guido Domenici
    I run a website on Windows Server 2008 R2. Looking through the IIS logs, I have noticed that there are some IP addresses repeatedly requesting certain URLs (such as for example /mysql/phpmyadmin/main.php, /phpadmin/main.php) which do not exist, as the site is entirely served off of ASP.NET. They are obviously fishing for known vulnerabilities. My question is, are there any firewall or other tools (Windows built-in or commercial) that allow me to block those IP addresses which request certain URLs multiple times?

    Read the article

  • Can't login as root but I can SU while logged with another user

    - by Rhyuk
    What I was doing before this happened?: I was tinkering trying to setup X server so I can open an app's GUI remotely so I installed "X Window System", "xclock" and uncommented "# ForwardX11 yes" from my "/etc/ssh/ssh_config". (never got it working but thats a whole other question) Since that moment I'm not able to login as root from Putty (I get Access Denied). I can login as another user and I can "su" successfully so I know the password is right. How can have direct access with root again?

    Read the article

  • how to remove a column of a list on SharePoint

    - by George2
    Hello everyone, I am using SharePoint 2007 + Windows Server 2008 with SharePoint 2007's publishing portal template. I have created a list with datasheet view on a page (I add the list by adding a Web Part - then select the list control to add it as a web part to the page.) When create the list, I have added 5 columns, and inserted some rows. My question is, how to remove one column of the list? thanks in advance, George

    Read the article

< Previous Page | 474 475 476 477 478 479 480 481 482 483 484 485  | Next Page >