Search Results

Search found 6346 results on 254 pages for 'turn a'.

Page 55/254 | < Previous Page | 51 52 53 54 55 56 57 58 59 60 61 62  | Next Page >

  • How do I enable Aero Snap?

    - by Ivo Flipse
    I'm currently using my girlfriends laptop (HP Pavillion dv8296ea) with Windows 7 Ultimate and Aero Snap isn't working. The graphics card has a Windows Experience Index of 3.5, I have an Aero theme enabled and the system is up-to-date Does anyone have an idea why Aero Snap isn't working or how I can turn it on?

    Read the article

  • Kernel-Power errors acer aspire m7720

    - by toby
    hey to whom it concerns i have an acre aspire m7720 with 12gb ram and 5 tb hardives everything else is the same and i get Kernel-Power errors and my monitor say input not supported and i have to turn the power off cause i cant see anything on my screen wondering what the hell is going on and how do i fix this cause it pisses me off and wondering if i need a bigger power supply is the problem toby

    Read the article

  • Keep IIS7 Failed Request Tracing as a sysadmin only diagnostic tool?

    - by Kev
    I'm giving some of our customers the ability to manage their sites via IIS Feature Delegation and IIS Manager for Remote Administration. One feature I'm unsure about permitting access to is Failed Request Tracing for the following reasons: Customers will forget to turn it off The server will be taking a performance hit (especially if 500 sites all have it turned on) The server will become littered with old FRT's The potential to leak sensitive information about how the server is configured thus providing useful information to would-be intruders. Should we just keep this as a troubleshooting tool for our own admins?

    Read the article

  • Make exe or bat require admin privileges UAC

    - by petebob796
    I am trying to create an install CD to install multiple windows updates and hotfixes in one. The Autorun.inf launching a .bat (or .exe) running each update in turn. Currently if I run this .bat each update brings up a UAC prompt individually which can be annoying. However if I run the .bat as administrator it can launch and install each update with just one prompt. Is there a way to force the bat (or .exe) to need admin priviledges no matter who runs it.

    Read the article

  • Volume control tools

    - by Stan
    Sometimes I feel watching some youtube in Chrome has very low volume even if I turn everything to 100%. Is there any tools can increase volume above the system's maximun? I know IndieVolume does, but that didn't support some of my applications. So try to look for some alternatives. thanks

    Read the article

  • Disable some extra keys on keyboard in windows

    - by user1649054
    I have a keyboard with some types of extra keys, such as multimedia (play, pause, stop ,..), turn off, and etc. some times it's annoying with a "exit button" just right beside arrows that accidentally presses, and programs gonna close, and some other similar problems. I'm wondering is there any solution to disable, or change the functionality of these types of keyboard keys in Windows (win7)? Cheers

    Read the article

  • Apple Mail in SL using excessive data

    - by user32522
    Hi, I am using Apple Mail on Snow Leopard. It seems to use excessive data, around 1.5 GB a day. I don't receive mails remotely close to that size obviously. Does anybody have any idea what's happening. Its very consistent. Turn Mail off, and the download goes away. Much appreciated.

    Read the article

  • After Effects CS4: Using layer markers.

    - by GuruAbyss
    I have a question regarding Layer Markers in AE. What I'm trying to do is have a layer start off normal then in the time line I'll place a marker and have it change its color using Effect Color correction Change color to. The hue will change from 0% to 50% for 10 frames then turn back to normal. How would I go about doing this?

    Read the article

  • Forward all traffic through an ssh tunnel

    - by Eamorr
    I hope someone can follow this and I'll explain as best I can. I'm trying to forward all traffic from port 6999 on x.x.x.224, through an ssh tunnel, and onto port 7000 on x.x.x.218. Here is some ASCII art: |browser|-----|Squid on x.x.x.224|------|ssh tunnel|------<satellite link>-----|Squid on x.x.x.218|-----|www| 3128 6999 7000 80 When I remove the ssh tunnel, everything works fine. The idea is to turn off encryption on the ssh tunnel (to save bandwidth) and turn on maximum compression (to save more bandwidth). This is because it's a satellite link. Here's the ssh tunnel I've been using: ssh -C -f -C -o CompressionLevel=9 -o Cipher=none [email protected] -L 7000:172.16.1.224:6999 -N The trouble is, I don't know how to get data from Squid on x.x.x.224 into the ssh tunnel? Am I going about this the wrong way? Should I create an ssh tunnel on x.x.x.218? I use iptables to stop squid on x.x.x.224 from reading port 80, but to feed from port 6999 instead (i.e. via the ssh tunnel). Do I need another iptables rule? Any comments greatly appreciated. Many thanks in advance, Regarding Eduardo Ivanec's question, here is a netstat -i any port 7000 -nn dump from x.x.x.218: 14:42:15.386462 IP 172.16.1.224.40006 > 172.16.1.218.7000: Flags [S], seq 2804513708, win 14600, options [mss 1460,sackOK,TS val 86702647 ecr 0,nop,wscale 4], length 0 14:42:15.386690 IP 172.16.1.218.7000 > 172.16.1.224.40006: Flags [R.], seq 0, ack 2804513709, win 0, length 0 Update 2: When I run the second command, I get the following error in my browser: ERROR The requested URL could not be retrieved The following error was encountered while trying to retrieve the URL: http://109.123.109.205/index.php Zero Sized Reply Squid did not receive any data for this request. Your cache administrator is webmaster. Generated Fri, 01 Jul 2011 16:06:06 GMT by remote-site (squid/2.7.STABLE9) remote-site is 172.16.1.224 When I do a tcpdump -i any port 7000 -nn I get the following: root@remote-site:~# tcpdump -i any port 7000 -nn tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on any, link-type LINUX_SLL (Linux cooked), capture size 65535 bytes channel 2: open failed: connect failed: Connection refused channel 2: open failed: connect failed: Connection refused channel 2: open failed: connect failed: Connection refused channel 2: open failed: connect failed: Connection refused channel 2: open failed: connect failed: Connection refused channel 2: open failed: connect failed: Connection refused channel 2: open failed: connect failed: Connection refused channel 2: open failed: connect failed: Connection refused channel 2: open failed: connect failed: Connection refused channel 2: open failed: connect failed: Connection refused channel 2: open failed: connect failed: Connection refused

    Read the article

  • Is dual-booting an OS more or less secure than running a virtual machine?

    - by Mark
    I run two operating systems on two separate disk partitions on the same physical machine (a modern MacBook Pro). In order to isolate them from each other, I've taken the following steps: Configured /etc/fstab with ro,noauto (read-only, no auto-mount) Fully encrypted each partition with a separate encryption key (committed to memory) Let's assume that a virus infects my first partition unbeknownst to me. I log out of the first partition (which encrypts the volume), and then turn off the machine to clear the RAM. I then un-encrypt and boot into the second partition. Can I be reasonably confident that the virus has not / cannot infect both partitions, or am I playing with fire here? I realize that MBPs don't ship with a TPM, so a boot-loader infection going unnoticed is still a theoretical possibility. However, this risk seems about equal to the risk of the VMWare/VirtualBox Hypervisor being exploited when running a guest OS, especially since the MBP line uses UEFI instead of BIOS. This leads to my question: is the dual-partitioning approach outlined above more or less secure than using a Virtual Machine for isolation of services? Would that change if my computer had a TPM installed? Background: Note that I am of course taking all the usual additional precautions, such as checking for OS software updates daily, not logging in as an Admin user unless absolutely necessary, running real-time antivirus programs on both partitions, running a host-based firewall, monitoring outgoing network connections, etc. My question is really a public check to see if I'm overlooking anything here and try to figure out if my dual-boot scheme actually is more secure than the Virtual Machine route. Most importantly, I'm just looking to learn more about security issues. EDIT #1: As pointed out in the comments, the scenario is a bit on the paranoid side for my particular use-case. But think about people who may be in corporate or government settings and are considering using a Virtual Machine to run services or applications that are considered "high risk". Are they better off using a VM or a dual-boot scenario as I outlined? An answer that effectively weighs any pros/cons to that trade-off is what I'm really looking for in an answer to this post. EDIT #2: This question was partially fueled by debate about whether a Virtual Machine actually protects a host OS at all. Personally, I think it does, but consider this quote from Theo de Raadt on the OpenBSD mailing list: x86 virtualization is about basically placing another nearly full kernel, full of new bugs, on top of a nasty x86 architecture which barely has correct page protection. Then running your operating system on the other side of this brand new pile of shit. You are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can't write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes. -http://kerneltrap.org/OpenBSD/Virtualization_Security By quoting Theo's argument, I'm not endorsing it. I'm simply pointing out that there are multiple perspectives here, so I'm trying to find out more about the issue.

    Read the article

  • in Open Office Calc, how do I drag and drop cells to insert rather than replace their destination?

    - by joachim
    I want to rearrange rows with the mouse in Calc. In Excel, I select the whole row, then drag and drop it while holding SHIFT. This causes the drag and drop cursor to turn into a bar rather than cells, and the cells are inserted at the bar's position. Is there a way to accomplish the same sort of thing in Calc without going round the houses inserting columns before the drag operation?

    Read the article

  • Reverse Screen Share: Mac Snow Leopard

    - by Shyam
    Hi, I am currently enjoying the powerful features of screen sharing. I was wondering though, if it would be possible to share my screen with another Mac. I have a Macbook Pro that can connect to a Mac mini (which in its turn is connected to a flatscreen). Is this possible and what must I do to achieve this?

    Read the article

  • Google Earth - zoom like with a scope, rotate the camera

    - by Suma
    I know it is possible to change a viewing altitude in Google Earth, but is it possible to zoom in/out as well, like with a telescope? I would like to preview what could be viewed from a particular lookout point, but without zoom in it seems very hard. Another feature which would be handy for the purpose: is it possible to turn the viewing direction around the camera, and not around the target?

    Read the article

  • 2 Servers setup for redundency, backup

    - by minal
    I presently have 1 dedicated virtual server running my website/blog/mail, etc. This is on Hyper-V with 512MB RAM. Windows Web2008. With the VM, I have these running within it: SmarterMail – for emails MS DNS – I have my own nameservers on this server SQL Express IIS7 2 IP Address I have now leased 2 physical servers : P4 2.6Ghz 1GB RAM 80GB HDD. With these new servers, I get 2 IPs per server as well. These are running Windows 2008 Standard. With the VM the HDD was obviously on a RAID setup so I was not worried about hardware issues as it fell on the provider to manage. However, with the new servers the HDD is not RAID’d, hence my concern is that if it fails I need a backup position. What would be the most ideal setup to go for? I am thinking: Server 1: (Web/PrimaryDNS) DNS – NS1 SQL Express – OFF turn on when required, ie. Server2 is down SmarterMail – OFF turn on when required, ie. Server2 is down IIS 7 Server2:(SQL/Backup) DNS – NS2 SQL Web Edition SmarterMail IIS 7 How can I set it up so that if 1 goes down I can have everything on 2 instantly or by manual switching over. I am confused as other DNS servers will cache the web servers IP address for requests, and if that server goes down, the backup server will have a different IP. How do I make this work? I will be doing routine backups, in which case I will keep copies of backups on both servers. If I am copying the same stuff on both servers like a mirror then I am losing on using the true performance out of it. It's like 1 server is always on standby. Ideally I want SQL and web on 2 diff machines for best performance. If Server1 goes down, I should be able to switch to Server2 fairly easily. I don't have a problem with manual intervention to start the sql/mail services, etc. In terms of scalabilty, the VM has coped pretty well to date. Moving forward the SQL and IIS workload is going to double pretty quickly. Some ideas would be great.

    Read the article

  • Excel Conditional Formatting Escaping a Question Mark

    - by kzh
    I would like to use a conditional formatting rule in an excel file that would color any box with a question mark in it red. It seems that Excel is using a question mark as a wild card and will turn all cells with at least one character in them red. How can i escape the question mark? These don't seem to work: "?" \? '?' ??

    Read the article

  • Windows Defender WTF?

    - by Azvarr
    OK, i have been doing nothing different than i have been since i have gotten W7. Now all of the sudden windows defender is turned OFF and i cant turn it back on. It tells me that it is blocked by group policy. WTF?

    Read the article

  • When you add a new node to a cluster, what do you do to the default services?

    - by Tom
    Everytime I acquire a new server or reload an existing server (CentOS 6.X) I have to decide what services to leave running in chkconfig. It seems the datacenter staff aren't using a single edition of CentOS and sometimes the default services running are different. I'm always inclined to turn off every service I've never heard of but then I think, if it's not broken don't fix it. How do you deal with the default services in a new installation?

    Read the article

  • upgrading hard drive on toshiba satellite 5200 ....

    - by krul
    Hi, I have this beautiful & old laptop and would like to replace hard drive. I've purchased samsung 120GB hard drive and exchange hard drives. When I turn on computer my laptop doesn't recognize hard drive at all. It doesn't find nothing under master drive. What am I doing wrong, and is it possible to make this upgrade? Thanks

    Read the article

  • Good DVD ripper - for Divx

    - by alex
    I'm currently going through my DVD collection, and digitising it, to allow me to watch it on a media streamer (I'm NOT a filesharer!!) I want to know what software i should use, to convert my DVD's to AVI divx format. I currently use Xilisoft DVD ripper, however this creates a "letterbox" at the top and bottom of the file - and there doesn't seem to be a way to turn this off. I'm a novice at video encoding, so would need something fairly simple / well documented.

    Read the article

  • HP Pavilion DV6 doesn't recognize wireless networks

    - by Mike N.
    Okay so about a few weeks after I got my laptop the wifi would connect and disconnect, off and on. And every time I troubleshoot it, a message comes up saying there's a network cable not properly plugged in or broken... It's been doing this for about a year and I usually just tap the bottom of the laptop or something and the wifi connects again but now it refuses to turn back on, how do I fix this?

    Read the article

< Previous Page | 51 52 53 54 55 56 57 58 59 60 61 62  | Next Page >