Search Results

Search found 21317 results on 853 pages for 'key mapping'.

Page 49/853 | < Previous Page | 45 46 47 48 49 50 51 52 53 54 55 56  | Next Page >

  • Issue about mapping MAC address to Ipv6 address

    - by deepsky
    I know that the address in ipv6 with prefix range 001 to 111 should use a 64-bit interface identifier that follows the EUI-64 format, which translates the MAC to ipv6 as below. MAC:00-02-b3-1e-83-29 --> 02-02-b3-ff-fe-1e-83-29 --->ipv6 addr: fe80::202:b3ff:fe1e:8329 Then I checked my network status with ipconfig /all on my windows XP, but it seems my ipv6 address doesn't follow the above rule: MAC:00-24-81-XX-XX-XX ipv6 addr:2001:da8:8006:225:0:24:81XX:XXXX Obviously it doesn't follow the EUI-64 format. Instead it just directly use the MAC as the last 8 bytes. Anyone know the reason? Pls Correct me if I am wrong.

    Read the article

  • Google Optimization - Your Key For Online Success

    The online market is a highly attractive and lucrative one, in case you need to succeed on the internet there are a lot of different avenues however the one that stands way above all other options is Google. Website business owners can make the most of their online ventures with Google Optimization. A form of SEO or search engine optimization that primarily concentrates on the world's most popular search engine, Google optimization can offer a lot of benefits to your business.

    Read the article

  • Prevent product key from being used on multiple virtual machines

    - by Nahum Litvin
    I have a software product. it will probably run on VMs that have no network connection at all. I want the user to pay for each VM the user runs. I thought to ask the user for some kind of hardware ID and provide him with serial that is unique for his machine. But user can just copy the VM image and than have two machines running? So I thought of having a security dongle. But how can I prevent user from running two VM's on the same machine both connected to the same dongle? This should be only basic defense so that actual hacking will be required to breach the license and not only spinning one more VM.

    Read the article

  • Print screen key can no longer select a region to capture

    - by Steven Sproat
    After upgrading from 11.04 to 11.10, I've noticed that the "Take Screenshot" application used to be launched when I'd hit print screen. Now it automatically captures the entire screen. In 11.04 it would pop up the "take screenshot" application which allows me to capture a rectangular region of the screen. Can this be reverted? I never want to capture the whole screen, only portions of it, which means manually cropping out that section in GIMP with this changed behaviour. Cheers.

    Read the article

  • Subdomain mapping to domain

    - by bobobobo
    What happens if you have 2 DNS entries: Name | Type | Value -------------+-------+-------------- example.com | A | 20.20.20.20 example.com | MX | mail.example.com Does this mean that smtp requests to example.com will map to 20.20.20.20, and somehow request in the headers mail.example.com? What?

    Read the article

  • mapping server 2008 network drive to vista home premium x64

    - by rboorgapally
    We have a windows server 2008 box at my work place. I want to map a drive from the server to my laptop. I use windows vista home premium x64. I am connected to my workplace through VPN. i can map the drive when I use the administrator account on the server. But the log on is unsuccessful if I use my personal account on the server to map the drive. My personal account on the server is part of Administrators group. Can any one help me with this?

    Read the article

  • Web service for checking out / leasing a token

    - by JP Slavinsky
    I run a web site on AWS that has a number of web servers (say 4 of them) running behind a load balancer. For this particular web site, I have one license key of New Relic for doing instrumentation. At any one time, I only want one of the 4 web servers to be using the key. If that server goes offline, I want one of the remaining web servers to be able to begin using the license key. Does anyone know of a service that would let me manage this process? The service would not particularly need to store the key itself but rather just manage the fact that only one web server can lease out the right to use the key at any time. Something where the web servers would have to come back every few minutes and renew their lease, and if they don't it becomes available to someone else. I just realized I could maybe accomplish a hacked version of this using a file on S3, but that doesn't prevent race conditions / etc and is definitely hackish. Any thoughts welcome. FWIW, this site is built on Ruby on Rails. Thanks! JP

    Read the article

  • XBMC remote control key repeat

    - by Amigable Clark Kant
    Those who have used XBMC with a WiFi remote, such as an Android or iOS device with the official XBMC remotes, have probably seen this at one time or another: your remote stops working, when you press a key, that key is repeated very fast. Sometimes you can break the key repeat loop by pressing that same key again. Sometimes (as this particular morning) you can not. This problem has existed for literally years (it even occurs on the old XBOX only builds) but there seems to be no definite explanation as to what is causing it. I am asking for a workaround. (If you Google, you can find threads were people are ridiculed for bringing up this problem, which is one reason I ask here instead of on the official forums. Also the fact that this problem has persisted for so many years.) I am running, right now, XBMCBuntu Live Eden and the latest official iOS remote. Although, I have seen this problem on all combinations of remotes and XBMC versions I have tried over the years, which are many. (XBMC on Windows, Linux, OSX, remotes on Android and iOS.) Link to bug #136 for the Android remote. It's marked as "fixed" as of client version 636, but the problem is seen again in rev 730. Go figure. There is something fundamentally wrong with how keypresses are sent from the various remotes to XBMC, since this problem is seen across time, XBMC versions and iOS/Android.

    Read the article

  • EC2 Instance of Wordpress not mapping URLs correctly

    - by Benjamin
    I'm using an AWS EC2 micro instance to run a wordpress blog. I've successfully mapped a subdomain to the Elastic IP for the micro instance. After a few minor changes, the URL I mapped to the Elastic IP (blog.example.com) opens up the wordpress home page but whenever I click on any of the wordpress links the domain changes to the AWS public DNS for that instance (http://ec2-123-45-678-910.compute-1.amazonaws.com/wordpress/). How do I fix the URLs so that they all follow the subdomain I have setup?

    Read the article

  • khotkey: starts firefox on any key?

    - by Adobe
    I have many scripts which I call with khotkey. However -- in my other laptop -- khotkey wouldn't call the script -- but tries to open the command in firefox. I checked -- the scripts are executable, and are mine. What else could that be? When I start the command from konsole -- it works as expected, but when I call it with khotkey -- it doesn't. I guess someone shadows my keybiding. But who could that be?

    Read the article

  • SSH with public/private key to iMac fails.

    - by bennedich
    I'm trying to connect to my iMac (server) from my macbook (client) on my LAN. Both have Mac OS X 10.6.4. Server running on a new clean install of the OS. When just activating Remote Login in System Preferences everything works fine. But when setting up ssh to only work with public/private key I get the following error messages from the server log depending on if I use a rsa passphrase or not: With passphrase (case 1): PAM: user account has expired for <myServerUserName> from 192.168.X.X via 192.168.X.Y Without passphrase (case 2): Failed publickey for <myServerUserName> from 192.168.X.X port AAAAA ssh2 This is my setup algorithm: Create a private and public key on client with command ssh-keygen -t rsa. In case 1 I also set a passphrase. Move the id_rsa.pub to the server path /Users/<myServerUserName>/.ssh/ In this folder I execute cat id_rsa.pub > authorized_keys Making sure Remote Login isn't active, I now execute sudo /usr/sbin/sshd -d on the server. Back on the client I now type ssh -v -v -v <myServerUserName>@192.168.X.Y and get prompted to accept RSA key fingerprint. This is NOT the same fingerprint as the one from when I created the private/public key (should it be?). I accept. Depending on case: CASE 1: Client gets halted for password and the response is permission denied even though correct password is given. Back on the server I can read the error message I stated above for case 1: PAM: user account has expired... CASE 2: Client gets message Connection closed by 192.168.X.Y. Back on the server I can read the error message I stated above for case 2: Failed publickey... What could possibly cause this?

    Read the article

  • Print Screen key doesn't work if a drop-down menu is active

    - by wim
    On 11.10, I don't get a screengrab when pressing the Print Screen button on my keyboard if I have activated a drop down menu. For example, in nautilus, I can click the File menu and press the print screen button, nothing happens. Deactivating the drop down menu and all other things being equal, it works. Is that normal? Often when using this thing I'm actually needing to show some of those menu options. Currently I use the workaround to grab after a delay of a few seconds, but I'm used to the print screen button working no matter what's in focus and would prefer it that way.

    Read the article

  • 8 key points to securing your SaaS applications

    This article lists the technical and functional specifications allowing you to attain both strength and flexibility for your SaaS application. It will help you conceptualize the security of your application, taking into account important constraints from the beginning of your project. You will thus be able to cover short terms needs, while at the same time anticipation any future evolutions necessary to the development of your business.

    Read the article

  • Key Aspects of Successful Search Engine Optimization

    The term Search Engine Optimization refers to the process of using keywords and keyword phrases to get high rankings in web search results. To properly market a website online, there are a number of measures that have to be put in place regarding website content, website layout, keyword choices and general marketing strategies.

    Read the article

< Previous Page | 45 46 47 48 49 50 51 52 53 54 55 56  | Next Page >