Search Results

Search found 3884 results on 156 pages for 'personal growth'.

Page 49/156 | < Previous Page | 45 46 47 48 49 50 51 52 53 54 55 56  | Next Page >

  • how to create a 802.11n wireless network between laptops and asus n-13 wireless adapter ?

    - by xpugur
    I have a asus usb n-13 wireless adapter and 3 laptops in a home we try to create a network witn 802.11n standards but failed each time laptops have intel 5100 agn. We try to create network with wpa-2 personal encryption that also fails(couldn't connect) but with wep encryption connects but with 802.11g standard... so do you know how to create a 802.11N based network? ... thank you...

    Read the article

  • how to create a 802.11n wireless network between laptops and asus n-13 wireless adapter ?

    - by xpugur
    I have a asus usb n-13 wireless adapter and 3 laptops in a home we try to create a network witn 802.11n standards but failed each time laptops have intel 5100 agn. We try to create network with wpa-2 personal encryption that also fails(couldn't connect) but with wep encryption connects but with 802.11g standard... so do you know how to create a 802.11N based network? ... thank you...

    Read the article

  • how to report some illegal website to FBI or crime department [closed]

    - by steve
    hello all I asked this question on stackoverflow and they suggested this I dont know whether i can ask this question here or not I am finding many web forums supportingstealing of personal info like creditcards and they selling at 2$ each and thye making gift vouchers of main auction websites and selling them 500$ at 10$ (these guys looping people hardwork ) where can i report these type of sites if i found in internet ? can anyone please tell me exactly where can i report regards steve

    Read the article

  • Always set "reply-to" for certain recipients?

    - by Benjamin Oakes
    Is it possible to always have Thunderbird set "reply-to" for a certain set of recipients? I sometimes email my significant other at work (about upcoming office parties, events, etc. that she would need to know about), but I'd like to handle the rest of the discussion from my personal email account.

    Read the article

  • How do I uninstall MySQL on Mac OS X (Snow Leopard)?

    - by Abhic
    I had installed MySQL from the command line when I setup a local web server with custom modules on my Snow Leopard box. I recently discovered MAMP and its just easier to work with it than with the personal web server Apple has and via command like utils. I uninstall ports completely but still see 'mysqld' in my Activity Monitor. I would like to uninstall this cleanly. Any tips?

    Read the article

  • Methods of cooling with no more room in case?

    - by Wesley
    Hi all, I've got an HP DC7100 and an HP m8530f. The DC7100 is a small form factor desktop while the m8530f has a mATX board with lots of extra features like front I/O and HP Personal Media Drive bay. Both of these have very little space (especially the DC7100) and don't have any other places to mount fans. What other possible ways of cooling are there, if there isn't much space left inside the case? Thanks in advance.

    Read the article

  • What laptop for dev with VS

    - by Gareth
    Im looking to spend upto £500 on a laptop in the next few days, and am now after a bit of adivce. This laptop will be used to develop personal projects on using VS2010, and SQL sever express. I know this sort of question has been asked plenty before however Im looking for specifics, has anyone bought a laptop recently to run VS on and if so what did you get? has anyone seen any good deals on laptops that fit in my price range? Any suggestions apprieciated Thanks

    Read the article

  • Can I add a file and burn an .iso at once?

    - by Flame
    I just downloaded a Windows 7 iso from MSDNAA at school and they gave me a personal key. I'd like to add a file with my key onto the disc, but it has to remain bootable. Is there a really simple way to do this, or one that doesn't require some shareware? I'm using XP right now, or any solution under ubuntu is fine.

    Read the article

  • How to enable .NET Framework 3.5 on Windows 8 without downloading it?

    - by Diogo
    Since I installed Windows 8 Preview on my personal computer, during the installation of some programs and drivers(Windows 7 ones) started to pop me a message warning that .Net Framework 3.5 was needed: I could use "Install this feature", start to download some dependencies(300MB) and that's it, but I don't want to have to download it every time I want to enable this feature on every machine that I install Windows 8. There is some way to install .Net 3.5 on Windows 8 without having to download the entire Framework from Microsoft?

    Read the article

  • trying to make an ad-hoc network between windows xp and windows 7.

    - by djgoosh
    hello , i'm using a usb modem on a windows xp 32 bit pro version and i'm trying to connect to this computer with a windows 7 64 bit pro version. i made myself a personal ad-hoc wireless network. but it doesn't seem to work. the windows xp computer wireless tray icon seems like it's connected but when i go to the windows 7 computer it's seems connected with an error. any help ? thanks in advance , udi

    Read the article

  • Looking for network monitoring software for Win7 x64 (similar to the one included with Sunbelt perso

    - by rep_movsd
    I've upgraded from Windows XP to Windows 7 (64bit) and I found that the very convenient Sunbelt Kerio Personal Firewall will not work on this version. I hear the Windows 7 firewall is good enough(even though it never prompts for outbound connections) but Kerio had a nice network monitor feature which showed all applications with inbound and outbound connections and the current speed and bytes transferred for each one. Is there any software out there that can give me similar monitoring as what Kerio does? TCPView is almost as good, but doesnt show transfer statistics.

    Read the article

  • How to block a sub-site in windows?

    - by Creedy
    How can i block a sub-site of a website as e.g. http://example.com/someSite unfortunately the hosts file is not an option since you can only block whole domains there and any "/" just destroys these rules. this is just for my personal protection against visiting some sites too often, while i still have to be able to get to the other sites of that domain (as e.g. example.com/someOtherSite) would be great if someone knows a solution regarding this topic

    Read the article

  • Logon onto shared Windows account using individual passwords?

    - by Tom
    In a networked WinXP environment, I have a computer-controlled device which I want to connect to the network, but allow various people to use. The computer must be left running and logged on at all times. My thought is to run the computer under a "shared account" which would allow each user to logon/unlock the screen using their own network password (i.e., the password for their personal account). Is this possible? Thanks, Tom

    Read the article

  • Annoying Windows Explorer bar present on OEM Preinstalled Windows 7

    - by Velcro
    We have recently got some preconfigured ready-to-use computers. During some checks, I saw a strange bar located between address bar and toolbar in Windows Explorer. I removed all trialware and Google Toolbar as well, but this bar doesn't go away. What can I do to remove it? EDIT: My personal computer looks like this: Also, cursor changes to when I hover the bar. EDIT: On another OEM installation, there isn't the bar:

    Read the article

  • How to block a sub-domain in windows?

    - by Creedy
    How can i block a sub-site of a website as e.g. http://example.com/someSite unfortunately the hosts file is not an option since you can only block whole domains there and any "/" just destroys these rules. this is just for my personal protection against visiting some sites too often, while i still have to be able to get to the other sites of that domain (as e.g. example.com/someOtherSite) would be great if someone knows a solution regarding this topic

    Read the article

  • Looking for a new, free firewall (Sunbelt has a huge hole)

    - by Jason
    I've been using Sunbelt Personal Firewall v. 4.5 (previously Kerio). I've discovered that blocking Firefox connections in the configuration doesn't stop EXISTING Firefox connections. (See my post here yesterday http://superuser.com/questions/132625/sunbelt-firewall-4-5-wont-block-firefox) The "stop all traffic" may work on existing connections - but I'm done testing, as I need to be able to be selective, at any time. I was using the free version, so the "web filtering" option quit working after some time (mostly blocking ads and popups), but I didn't use that anyway. I used the last free version of Kerio before finally having to go to Sunbelt, because Kerio had an unfixed bug where you'd eventually get the BSOD and have to reset Kerio's configuration and start over (configure everything again). So I'm looking for a new Firewall. I don't like ZoneAlarm at all (no offense to all it's users that may be here - personal taste). I need the following: (Sunbelt has all these, except *) - 1. Be able to block in/out to localhost (trusted)/internet selectively for each application with a click (so there's 4 click boxes for each application) [*that effects everything immediately, regardless of what's already connected]. When a new application attempts a connection, you get an allow/deny/remember windows. - 2. Be able to easily set up filter rules for 'individual application'/'all applications,' by protocol, port/address (range), local, remote, in, out. [*Adding a filter rule also doesn't block existing connections in Sunbelt. That needs to work too.] - 3. Have an easy-to-get-to way to "stop all traffic" (like a right click option on the running icon in the task bar). - 4. Be able to set trusted/internet in/out block/allowed (4 things per item) for each of IGMP, ping, DNS, DHCP, VPN, and broadcasts. - 5. Define locahost as trusted/untrusted, define adapter connections as trusted/untrusted. - 6. Block incoming connetions during boot-up and shutdown. - 7. Show existing connections, including local & remote ip/port, protocol, current speed, total bytes transferred, and local ports opened for Listening. - 8. An Intrusion Prevention System which blocks (optionally select each one) known intrustions (long list). - 9. Block/allow applications from starting other applications (deny/allow/remember window). Wish list: A way of knowing what svchost.exe is doing - who is actually using it/calling it. I allowed it for localhost, and selectively allowed it for internet each time the allow/deny window came up. Thanks for any help/suggestions. (I'm using Windows XP SP3.)

    Read the article

  • Do any good tools exist for restoring Windows 7 to its factory settings when a clean install isn't an option?

    - by JMK
    I am trying to restore a Windows 7 (Ultimate) PC to its factory settings manually, basically by uninstalling everything in the Add/Remove Programs dialogue box, deleting all personal files and running CCleaner. This is going to take a while. I can't do a clean install because I don't have physical access to the computer, do any good tools exist for restoring Windows 7 to its factory settings when a clean install isn't an option?

    Read the article

  • How to create a directory per each user with only access to the user and domain administrator?

    - by stighy
    For my company, I would like to create a single directory for each user in a server. Each directory must be personal, and I would like to create a desktop link to that directory. For example, in my server SERVER01 I need a simple structure like users\johnsmith users\robertgreen users\johndoe Each directory must have a limit of 5 gigabytes and must be accessible only to the single user and to the domain administrator. How to do in Active Directory? With a script?

    Read the article

  • How to prevent bad queries from breaking replication?

    - by nulll
    For my personal experience, mysql replication is fragile. I know that there area many things not to do beacuse they could break replication, but we are humans and the error could always occur. So I was thinking... is there a way to enforce mysql replication? Something that prevents queries that are dangerous for the replication to be runt? In other words I'm searching for something that saves replication even if I accidentally run evil queries.

    Read the article

< Previous Page | 45 46 47 48 49 50 51 52 53 54 55 56  | Next Page >