Search Results

Search found 96005 results on 3841 pages for 'user group'.

Page 515/3841 | < Previous Page | 511 512 513 514 515 516 517 518 519 520 521 522  | Next Page >

  • How small can/should I make my partitions?

    - by Pureferret
    My machine is currently split into 3 user partitions (plus however many Windows and Linux have decided to slyly create) Which are C: Windows 7, D: Data, and E(?): Ubuntu. I'm considering wiping my Windows 7 Install (stupid Skyrim not installing) and restructuring the way my machine operates. I want the partitions for the Windows and Linux install to be as small as possible while still able to function well, and be able to install games on my Windows C: drive. I then want to link from both Win7 and Linux drives to the middle D drive so that the in built My Documents (and etc on windows) folder and my Home folder (linux) share a common location, rather than my current situation which is 3 separate file locations. Something like this: I have 1 TB to play with and I want to know the 'best' sizes to make these partitions when I reinstall Windows (which I need to do anyway) and re-jig everything.

    Read the article

  • Changing Word mail merge data source locations in bulk?

    - by Daft Viking
    I've just moved a number of Word mail merge files, and a number of Excel spreadsheets that are the data sources for the mail merges, from a Windows XP computer to a Windows 7 computer, and now all the paths for the merge sources are incorrect (used to be c:\documents and settings\user\my documents.... now c:\users\documents....). While I can correct the path of the data source in each file individually, I was hoping that there would be some way of updating the files in bulk, as there are a relatively large number of them. Word 2007 is what is being used, but the documents are all in the previous DOC format (not DOCX).

    Read the article

  • Automate Windows 8.1 Enterprise upgrade [migrated]

    - by Ben M.
    I have been trying to find the necessary command line switches for automating the upgrade for my Windows 8 clients to Windows 8.1. I have the ISO extracted and I've run setup.exe /? but that doesn't tell me enough. I can't find any relevant information from search engines. Can anyone point me to some documentation or information on how to automate the upgrade so that it keeps user data, programs, etc? I know how to do it when running the installer manually, but I obviously do not wish to do that with 100+ machines.

    Read the article

  • How to enable the flash player plugin in IE8?

    - by Nik Reiman
    I updated to IE8 the other day on my Vista laptop, mostly because Windows Update kept bugging me about it. As a Chrome user, I don't really care so much about IE8, but I do have to use it occaisionally to test website compatibility. At any rate, flash seems to be completely deactivated, and I don't see a place to re-enable it anywhere in the preferences. I've done a bit of googling on the issue, but only found information about how to disable flash, not how to actually enable it. I have the flash 10 debug player installed, and it works fine with Chrome and Firefox. What could be the matter?

    Read the article

  • Advanced call forwarding in Skype

    - by Ivan
    Hi all, I'd like to forward calls from a Skype account to another Skype account (both online), but so that it calls and then enters a number. E.g., I have two accounts: acc1 and acc2. I want all calls from acc1 to be forwarded to acc2, and when the call is established to enter "#123". Is that possible? Thanks. EDIT: The question is basically how to call a user and add the extension directly, before the call has been established (e.g., to call directly acc2:#123).

    Read the article

  • Entourage to Outlook Migration questions

    - by George Bluff
    I am currently migrating a users information from a pop email account to my exchange server. I have already migrated them over to my hosted exchange, and their email is following properly. Now, the user is moving from Entourage on a Mac (10.7) to Outlook 2010 on a PC (Windows 7). I was wondering what the easiest way was to migrate him since there is no .pst files. I have been able to get his email over by dragging the inbox from Entourage to the desktop, then converting the files to .eml using IMAPSize, importing them to Outlook Express (which will only work on Windows XP), then exporting to a pst, then importing in the new account. Takes awhile with large emails, but it works. The issue I am now having is for calendar items. I exported the calendar and got a folder with all the .ics files, but Outlook 2010 doesn't seem to have an easy way to import all of them. Any thoughts?

    Read the article

  • How to multiplex subtitles with avi or mp4 in Linux?

    - by woofeR
    I have been searching something which can multiplex subtitle with video files in Linux environment. The key thing is that it should softly embed the subtitle to video, not encode again. (like avidemux). After this multiplexing process, user should be able to open/close subtitle using VLC for example. While searching that, I found a software which can do exactly what I need, named AVI-Mux GUI in Windows environment. However, I need these software's Linux alternative. Thanks.

    Read the article

  • How do I know if I need to backup locally stored emails?

    - by Sometimes
    I am moving a friend's website and emails from the current server to a new one. I don't have much experience working with migrating emails and in the past when moving servers all the emails have disappeared from the users local inbox, eg. MS Outlook. To make my question more clear, How do I know if I have to backup the emails before moving server? as I know sometimes they are stored locally and sometimes they are not. And, how do I know if the emails will remain on the user's machine once I move the information from server to server?

    Read the article

  • Can I ping via an arbitrary interface of a DD-WRT system? [migrated]

    - by bytebuster
    There's a Linksys WRT54GL router with DD-WRT firmware (v23SP2). The network has a simple dual-WAN configuration (standby mode, switching by a script): ~ # ip route 192.168.3.0/24 dev br0 proto kernel scope link src 192.168.3.1 192.168.2.0/24 dev vlan2 proto kernel scope link src 192.168.2.2 192.168.1.0/24 dev vlan1 proto kernel scope link src 192.168.1.67 127.0.0.0/8 dev lo scope link default via 192.168.2.1 dev vlan2 I'm trying to ping a certain server arbitrary via vlan1 or vlan2. What I tried, as suggested here: ping -I vlan2 <address> ping 192.168.2.1 <address> In both cases ping simply exits with no error messages. Also, ping ignores many other parameters, again, by exiting silently. I failed to find any references that DD-WRT has a limited version of ping whatsoever. I also don't think it can be a permissions issue as mentioned here since the only user with DD-WRT is root. What's wrong?

    Read the article

  • Windows 7, connecting to Samba shares

    - by Colin Pickard
    How can I connect to a Samba share with authentication using Windows 7? We have a bunch of Linux, HP-UX and AIX servers on our network with folders shared using Samba. These are not connected to our Active Directory or anything, we just type a user name and password when we connect to them. They still all work fine from Windows XP, but we've upgraded a couple of machines to Windows 7 and they can't access the shares. You get prompted for a password but it says "The specified network password is incorrect" (it's not).

    Read the article

  • Cannot Delete an Empty Folder in Windows 7

    - by Mike Gates
    I've used this question's answer by user "Moab" to give myself permission to delete an empty folder, so that I no longer get "accessed denied". However, now when I try removing this folder, I get a message that says "The process cannot access the file because it is being used by another process." This is merely my "eclipse" (IDE) folder that I totally emptied out and am trying to delete, but for some reason cannot. I've tried quite a few things: Via Windows Explorer: Right Click - Delete Via Command Prompt RD /S /Q eclipse del /F eclipse rmdir /S eclipse I'm out of ideas, and I'd really like to delete this folder without having to install any software. I've done a bit of research and this is all I found that I could try. Does anyone have any other ideas?

    Read the article

  • Minimal Linux distribution with sshd and apt

    - by Sergey Mikhanov
    When I signed up for my Debian Linux VPS hosting and first logged on and invoked ps, there was the only user process running: sshd. As I can see, this was minimal Linux with only two things installed and configured: sshd and apt (plus all dependencies, of course). I want to build (or use existing) similar Linux distro, any advice on how to build (or pick) one? Googling "minimum linux", or "linux with sshd only" usually brings up Debian's netinstall, which is not what I want. Thanks in advance.

    Read the article

  • which command run in cron returns nothing

    - by Zárate
    Hi there, I've written a little utility in haXe + Neko that needs to execute some GIT commands. To avoid hardcoding the path to the GIT executable I'd like to use the which command to find out where it is. Everything works as expected when running manually from the console, but not when the the app runs on a cron job. I'm aware of the restricted environment (here or here) when you run a script using cron, but still surprised this doesn't work: /usr/bin/which git >> /home/user/git.txt The text file is created but the content is empty. Again, when run from the console it works as expected. Any ideas? I'm running OS X Leopard, if that helps. Thanks : ) Juan

    Read the article

  • My gmail password hacked in Firefox?

    - by ellockie
    While writing a message using Firefox suddenly my gmail login details, including password, were pasted into the body of my message at the current cursor position and in the browser's find field (whole password and a bit of email address in the latter). I don't store my passwords in the browser nor in any of it's addons, although I keep it in one of Chrome's extensions. I don't use whole email address to login, only the user name, so it's very strange and worrying. I must admit I clicked some suspicious link the same day (by checking the root of the domain first), but I quickly closed that page and after that I haven't used that password. Both Avira and Spybot didn't detect anything. What was it and what can I do to make sure my browser is safe?

    Read the article

  • Convert SQL Query results to Active Directory Groups

    - by antgiant
    Are there any quality products (ideally open source) that allow me to run an arbitrary SQL query that results in 2 columns (username, group name) and they adds that username in AD to a group of that name in AD? If the username doesn't exist it is ignored. If the group name doesn't exist ideally it gets created. Updated for Clarity: I have a MSSQL based system that is the authoritative source for some of the Active Directory Security groups, and their members. I want to be able to to have those Active Directory Security Groups populated by a one-way sync originating from MSSQL. Sadly the MSSQL based system does not have a good API, so I will have to do this with direct SQL calls. Is there anything that does this well?

    Read the article

  • Exploring other windows 8 machine's root

    - by moswald
    (Note, this is without a domain.) I used to be able to type start \\other_machine\c$ in PowerShell and explorer would pop up with a login dialog. Then I'd type other_machine\moswald and my password (the account is a local admin, of course) and I'm in. Now both machines have Windows 8 installed, and this no longer works (the dialog re-prompts with an "Access is denied" displayed). I've verified (through whoami) that the user is named other_machine\moswald, and I'm positive I'm typing the correct password. So what gives? (edited to include specific result)

    Read the article

  • Relevant Knowledge spyware

    - by Usman Masood
    I am an advanced user, using Windows 7 with Avast! antivirus running. Today I started browsing and faced some weird popup. Upon investigation I found that "Relevant Knowledge" was running in my system. I was able to uninstall it using the Programs Manager and deleted the file's entries in the registry, but I am a little troubled due to the fact that Avast! was not able to detect it; and secondly, how it came into my system. Also, what further prevention measures should I take?

    Read the article

  • Which GUI Toolkit was used for TuneUp Utilities and Avast ?

    - by vettipayyan
    There are arguments supporting and discouraging the use of TuneUp Utilities . However , their User Interface is a really good one and i can't find out what gui toolkit they've used .... I wonder this for Avast too... I'm using PyQt for my image processing app and trying to improve the look and feel which is essential for it. But i can't find these type of custom styles etc... If you've suggestions tell me. It'll be helpful..

    Read the article

  • Sign out of messenger on Windows 8

    - by jmlumpkin
    I just installed the Windows 8 Consumer Preview. Just going through the default procedure, I let it use my Xbox Live account to create a user. When I then went and turned on my Xbox, it now notified me that I was logged into Messenger in two locations. I went back to Windows 8, and turned my Live account into a local account on that machine. But when I then turned the Xbox again, I got the same message. Is there a way to just 'sign out of messenger' on Windows 8? Or is there a location to even see where I am signed in at?

    Read the article

  • Cannot use `su` or `sudo` after set up key-based access to SSH

    - by OrangeTux
    I'm following this tuturial to setup key-based access to the SSH I created a user. I add copy the key to the client via ssh-copy-id <username>@<host> Becasuse ssh <username>@<host> still prompts for a password I run ssh-add on the local machine. The terminal doens't prompt for a password, I can login without using a password. But I cannot run su anymore. Every input for the password results in Authentication failure. I tried it again. But before coping the key, I added to the sudoer file. Copied key, ssh-add. But now I cannot login to my SSH shell att all? How can I setup a key-based SSH access with the possibiluty to use su or sudo?

    Read the article

  • Unable to remove/hide icons from desktop folder

    - by Kyomu
    I wish to hide some windows icons from my desktop folder1, but cannot. When I click delete, it says they will be deleted from my desktop (which they already are), but they remain visible in the desktop folder, which is where I wish them removed. Is there any way I can remove these? (I always use Win+E which really lets me get to all of these easy enough). Offending icons: Libraries, Homegroup, User folder, Computer, Network, Control Panel, and Recycle Bin. For those who might be wondering why, I find myself in this folder a bit to often (including when uploading a file), and find these nothing but clutter, especially as these always default to the top. Thanks for your help! 1 By desktop folder, I mean the folder you would see by going to "My Computer" and clicking "Desktop" on the top left under Favorites. Note: Changing my "Desktop Icon Settings" under "Personalize" does not affect the desktop folder, but rather just the desktop view.

    Read the article

  • Web log files analyzer

    - by Peter Štibraný
    I already use Google Analytics on my page, but I'd like to get additional info from log files. I've looked at various packages during last days, but nothing impressed me so far. Some requirements: must work on log file level (I use apache combined logs, but can configure apache to produce other types of logs) can generate static reports (windows/linux) or use GUI (windows only) should be easy to add custom user agents, and rerun analysis if it can recognize installation of eclipse plugins from log, that would be big plus understands google serp position referer should not require two days to setup (awstats, I am looking at you) should be still under active developement (i.e. analog isn't good answer) preferrably free, or at not very expensive :-) Any good analyzers programs out there?

    Read the article

  • File/folder Write/Delete wise, is my server secure?

    - by acidzombie24
    I wanted to know if someone got access to my server by using a nonroot account, how much damage can he do? After i su someuser I used this command to find all files and folders that are writeable. find / -writable >> list.txt Here is the result. Its most /dev/something and /proc/something and these /var/lock /var/run/mysqld/mysqld.sock /var/tmp /var/lib/php5 Is my system secure? /var/tmp makes sense but i am unsure why this user has write access to those folders. Should i change them? stat /var/lib/php5 gives me 1733 which is odd. Why write access? why no read? is this some kind of weird use of a temp file?

    Read the article

  • Extensions disappear when I close and open Google Chrome

    - by PavanM
    I am running the latest version of Google Chrome 23.0.1271.97 (Official Build 171054) m on Windows 7. Any new extension I install simply disappears(not disabled, total disappearance) once I close and re-start google chrome. This is not happening to one of my old extension. It stays there across chrome re-starts. I tried everything google help suggested- I created new user profile by renaming the Defaults folder I checked for any permission change that the extensions might have undergone. This is not the case. I am not running in developer mode. This happens when I close ALL instances of google chrome. Even if one instance of chrome is running, this doesn't happen. But I cant have an instance of Google Chrome always running :( I even reported the issue to Google Chrome team to no avail and new.crbug.com is offline. And I skimmed through many threads opened for the same issue only to find souls like me. SE is my last resort :)

    Read the article

  • What is the difference between Skip and Don't Copy buttons in Copy File dialog?

    - by Vadim
    This is a silly question. In Windows 7/Vista when a user trying to copy multiple file, it looks like he has five options: Copy and Replace Don't Copy Copy, but keep both files Skip Cancel the operation. It looks to me that option 2 (Don't Copy) is the same as 4 (Skip). However, it's kind of strange for Microsoft to put two buttons that perform the same action. I probably miss something. Could you please tell me what I'm missing?

    Read the article

< Previous Page | 511 512 513 514 515 516 517 518 519 520 521 522  | Next Page >