Search Results

Search found 5105 results on 205 pages for 'words'.

Page 50/205 | < Previous Page | 46 47 48 49 50 51 52 53 54 55 56 57  | Next Page >

  • Opening a non-currupt PST file

    - by Kyle Brandt
    I have a a PST file that a user is unable to open. The permissions look fine to me, and I had to repair the file, but now the PST file is repaired and I can open it from my Outlook (In other words, seems to be a local issue). Any recommendations on what to do to see why the user can't open it with their outlook?

    Read the article

  • permission errors with python/django

    - by tipu
    Error can be seen here: http://djaffry.selfip.com:8080/ If i go to the folder /srv/twingle/search and do ls -l I get -rwxrwxrwx 1 root root 65142784 May 26 20:28 words.db I gave it 777 access (absolutely unsafe, I know, but I thought it would atleast work) any idea what can be the permissions problem? Edit: A very strange problem is that the code doesn't crash once every few refreshes.. then goes back to crashing

    Read the article

  • SSH: Configure ssh_config to use specific key file for a specific server fingerprint

    - by Penthi
    I have a key based login for a server. The IP and DNS of the server can change, because it is hosted on Amazon. Is there a way to configure the ssh client config to use the specific key file for this server only, when the fingerprint of the server matches? In other words: Normaly servers are matched by IP or DNS in the ssh client config. I want to do this by fingerprint, becaus IP and DNS can change.

    Read the article

  • Tool for logging NIC link state events.

    - by Alan B
    Intel NICs have a driver option (in Windows) that will log link state events to the system log, so if the network drops out periodically you can determine that fact. Does anyone know of a simple generic solution that does this, in other words one that is not part of the driver from a particular manufacturer? I know there are plenty of 'big iron' network monitoring tools out there but surely there's something really simple that runs as a service in Windows with minimal setup ? TIA

    Read the article

  • Sharing an internet connection via crossover capable without changing IP settings

    - by jhioj
    I have a home wireless network and two laptops. My primary laptop is normal, and runs Windows 7. My secondary laptop has no wireless capability, and I have no access to the IP settings on my account. How can I access the internet on my secondary computer through my primary computer using a crossover cable or something similar? In other words, how can I make my primary computer produce a connection that my secondary computer will find indistinguishable from normal ethernet?

    Read the article

  • wireless usb hub with the hub on the computer side - does this exist?

    - by Mala
    Hi I'm looking for what is effectively a wireless usb hub, but where the "hubbing" part takes place on the computer-side. In other words, something like this: http://www.iogear.com/product/GUWH104KIT/ Except rather than all four "terminating" slots being connected, having 4 small "wireless terminals" so that the devices can be placed all over a room instead of all within reach of the wireless usb hub Does such a product exist? Thanks!

    Read the article

  • Word Find - find any highlighted text that starts with a squared bracket

    - by user2953311
    Is there a way to Find highlighted text that ONLY begins with a open square bracket? I've tried using the square bracket as a wildcard, but it won't find any adjoining words. For example, I have a document containing conditional paragraphs, in squared brackets, with the "name" of the paragraph highlighted at the beginning: "[Document to return Thank you for sending the documents requested earlier.]" (the section in bold is highlighted in blue in Word) Is there a way to find "[Document to return"? I hope this makes sense Thanks in advance

    Read the article

  • Is there any way to do an emacs-like yank in vim?

    - by Jason Baker
    In emacs, yanking works something like this: if you delete something, it can be yanked back into another position. In other words, emacs's yank is sort of like cut and paste. On the other hand, it seems like vim's yank is like copy and paste: I can yank something and then paste it elsewhere, but the original text is still there. Is there any way to cut the text rather than just copying it in vim?

    Read the article

  • Alternatives to the Stylewriter program

    - by Brett
    I have just gone to windows 7 x64 and the StyleWriter program is not compatible. Does anyone know of a program that looks for passive verbs and sentence length of 20 words? I want a program, that helps identify passive verbs so I can change them to active verbs. I would appreciate any suggestions. Screenshot thank you

    Read the article

  • Are there any easy ways to create a YouTube playlist or download queue from a text file?

    - by Eric Johnson
    In other words, if I have a list with entries formatted "[Artist Name] - [Track Name]" without advanced knowledge of their corresponding YouTube URLs (if any exist), how might I script things so that YouTube searches for each entry, and generates the URLs for the first n number of identical or similar entries per a YouTube query? Do any simple solutions come to mind that might lever wget, PowerShell, or Python? Thanks!

    Read the article

  • How would I isolate one networked PC to LAN only?

    - by itsraine
    I would like to have one of my PCs available to the rest of my home network for file sharing and VNC access, but I want to block any Internet traffic going to and from the PC. In other words, I want all local PCs I have connected to the router functioning as any normal LAN would, but when it comes to the Internet I want one particular PC to be "safe" from the Internet. My guess is that this is some sort of port blocking or some other router function, but I'm not quite sure.

    Read the article

  • What is the difference between "load" and "fetch"?

    - by DragonLord
    I often encounter the words load and fetch in contexts where data are being read from some source, and they seem to have slightly different meanings. What's the difference? I've done some research and couldn't find any specific technical difference in general usage. While the term fetch can refer to one stage in CPU instruction execution, I've seen it used in contexts not related to CPUs, and I'm looking for an answer that is not specific to CPUs.

    Read the article

  • Open Command Window here in Explorer

    - by JohnM2
    How to add an icon to Windows Explorer toolbar (in Windows XP), that once clicked, opens a command window in selected directory? In other words, I am looking for MS Powertoys"Open Command Window here" like tool but instead of context menu, for Explorer toolbar.

    Read the article

  • Virtual Machine and Virus

    - by tellme
    I have a requirement for which I have to get online without protection (firewall, anti-virus). At the same time, I don't want to risk getting infected with viruses. If I install a virtual machine (VirtualBox) to test, and it does get infected with viruses, will it also infect my host system? In other words, can I use the virtual machine for testing without being concerned about a virus on the virtual machine infecting my host?

    Read the article

  • Notepad Merge 2 lines into 1 line

    - by Kalman Mettler
    Sorry for my rough English, I try to visualize my question. I have two lists of words, one per line, each list in a separate file: File 1: white fehér green zöld red piros File 2: white blanco green verde red roja I need to combine these lists, removing any duplicates and create a new file containing the following: fehér blanco zöld verde piros roja I am a newbie with Notepad++ and can't work out this problem.

    Read the article

  • Encrypt client connection with squid forward proxy using SSL

    - by Twisted Whisper
    I'm setting up a Squid forward proxy and I'm wondering if I could configure Squid in such a way that the connection from my web browser to squid is https regardless of whether the connection from squid to the destination website is http or https. In other words, I want my connection from my web browser to my forward proxy to be encrypted even though I'm just surfing normal http website through that proxy. Can it be done?

    Read the article

  • Domain joining an workstation question?

    - by ekamtaj
    Hey Guys, I have a question about domain joining workstations. We just upgraded exchange and AD to new server. I want to know how I domain join these old workstations to the new domain controller and preserve all the users document etc. Inother words I don't want to create another user account on the workstations. Thanks for all your help.

    Read the article

  • Logitech mk520 (k520) keyboard Ctrl + Shift + ArrowKeys not working correctly. - Windows 8

    - by Phxvyper
    Ever since i installed windows 8, I'm unable to use Ctrl + Shift + Arrow Keys (to select words and phrases quickly in text editors) with any program. Ive found the same issue with other models of Logitech keyboards (not with any other brand, though) however, the solutions provided to those other models aren't working for me (or are impossible to complete, because of the difference in the model) If you have a possible solution, please reply! Thank you.

    Read the article

  • How to prevent bad queries from breaking replication?

    - by nulll
    For my personal experience, mysql replication is fragile. I know that there area many things not to do beacuse they could break replication, but we are humans and the error could always occur. So I was thinking... is there a way to enforce mysql replication? Something that prevents queries that are dangerous for the replication to be runt? In other words I'm searching for something that saves replication even if I accidentally run evil queries.

    Read the article

  • Exchange: encrypted mail database?

    - by Matt
    For an Microsoft Exchange server, is it possible to encrypt the email database such that the sysadmin cannot see the emails? In other words, the admin would be responsible for all aspects of running the Windows server and Exchange process, but would not be able to see the contents of any one email (except those sent to him, obviously). Only another individual (e.g. company owner) would be able to see all emails contained in the database.

    Read the article

  • AHK for creating folder + subfolders

    - by quanto
    I need an AHK script which creates: a folder in the currently open folder in Windows Explorer (under Windows 7), whose name consists the current date in the format (yyyy-mm-dd) the text which is currently in the clipboard the newly created folder must contain 3 subfolders, named "1", "2", and "3" I'd like to copy a few words (e.g. Testing Testing Testing) from another application, go to a location on my harddisk (using Windows Explorer), activate the hotkey, and AHK will create for me a folder named: 2012-06-04 Testing Testing Testing with subfolders "1", "2", and "3".

    Read the article

< Previous Page | 46 47 48 49 50 51 52 53 54 55 56 57  | Next Page >