Search Results

Search found 24978 results on 1000 pages for 'mobile internet'.

Page 566/1000 | < Previous Page | 562 563 564 565 566 567 568 569 570 571 572 573  | Next Page >

  • HTML5 : trop de battage médiatique ? L'équipe du framework Kendo UI répond dans un état des lieux sur l'utilisation du langage

    État des lieux sur l'utilisation du HTML5 par l'équipe de Kendo UI "Le battage médiatique du HTML5 est-il justifié ?" Voici la question que se posent en substance l'équipe de Kendo UI, le framework JavaScript et HTML pour obtenir des interfaces utilisateurs "modernes". Pour y répondre, l'équipe a sondé plus de 4.000 développeurs. Trois questions sont particulièrement intéressantes et portent sur : la tendance d'adoption du HTML5 ; l'importance de HTML5 pour les développeurs ; l'impact des influences extérieures sur le HTML5 (exemple : le fiasco mobile de Facebook). Le résultat comple...

    Read the article

  • Windows Phone 7.8 annoncé officiellement pour début 2013, l'OS apportera les fonctions de la version 8 aux terminaux incompatibles

    Quelles fonctionnalités doivent être intégrées à Windows Phone 7.8 ? Microsoft invite les utilisateurs à faire des propositions À côté de la mise à jour Windows Phone 8, sera publiée une autre pour les terminaux actuels sous l'OS mobile. Présenté comme un changement de génération technologique, Windows Phone 8 ne pourra pas tourner sur les dispositifs actuels. Raison pour laquelle, Microsoft prévoit la publication d'une version 7.8 afin de faire bénéficier des nouveautés de cette mise à jour à ses clients existants. Windows Phone 7.8 dispose déjà de quelques fonctionnalités de la version 8 comme une nouvelle interface pour l'écran de démarrage, permettant de redimensionner les tui...

    Read the article

  • multiple threads writting to a same socket problem

    - by alex
    Hi: My program uses sockets for inter-process communication. There is one server listening on a socket port(B) on localhost waiting for a list of TCP clients to connect. And on the other end of the server is another a socket(A) that sends out data to internet. The server is designed to take everything the TCP clients send him and forward to a server on the internet. My question is if two of the TCP clients happened to send data at the same time, is this going to be a problem for the server's outgoing socket(A)? Thanks

    Read the article

  • Smartphones : quels OS progressent en Europe ? Quelle marque vend le plus ? Réponse de Kantar Worldpanel

    Quelles sont les parts de marché des différents OS mobiles en Europe ? Qui progresse ? Qui s'impose ou pas ? Réponse de Kantar Worldpanel Kantar Worldpanel ComTech vient de publier les résultats d'un étude sur les ventes réels de smartphones en Europe. Ces chiffres sont difficiles à obtenir et toujours sujet à caution. Commençons donc par un peu de méthodologie. La société s'appuie sur des panels qu'elle interroge régulièrement. « Nous collectons des données grâce à de très grands échantillons de consommateurs dans tous les pays où nous opérons. Ces mêmes consommateurs sont interrogés toutes les 4 semaines sur leur mobile / tablette : ont-ils changé d'appareil, de...

    Read the article

  • Whats next after C#\.NET [closed]

    - by AbrahamJP
    I am a .NET developer with 6+ years of exp. when ever i go for an interview I felt like dotnet space is crowded with talents. I would like to do some value addition for myself by learning new technologies\skills. I am primarily a developer on business applications. Here is some areas that I had identified. 1. Sharepoint\BizTalk 2. Mobile development (Android, iPhone) Please help to identify which technology to opt for in order to enhance my skillset.

    Read the article

  • How to make dll referenced by ActiveX component accessible?

    - by sherpa
    I have an ActiveX component developed in C#. I'm referencing a dll which comes with other native dlls and it is loading them on the fly expecting them to be in the same folder (probably using Assembly.GetExecutingAssembly().Location but not sure, I don't have control over them). There is also one ini file which is also expected to be in the same folder. When I run the application as Windows form app, everything is fine, of course. But the trouble comes when I run it within Internet Explorer as the base directory is at the location of iexplore.exe. Obviously neither the dlls or the ini file can be found and many temporary working files outputted by the dlls are located in Internet Explorer folder. The workaround is to copy all ddls and ini file into the ie folder but that is not something I'd be happy about. What is the proper solution to this? Can I somehow set the base path for the ActiveX component?

    Read the article

  • Part-time Programming Job London

    - by Bluechip Solutions
    I am a student at Middlesex Universtity, London studying Information Technology. I really love software development and I have taught myself how to write HTML + CSS, JavaScript (I use jQuery and AngularJS) and Java (I learnt this in school). I have developed few apps (a desktop app in Java and a mobile app with AngularJS and PhoneGap) I am looking at applying for a part-time programming job to develop myself. Are there part time jobs available for someone like me and are my skill set enough to get me a job? I understand this topic may not be ideal here but this is the only place I know can provide me answers. Thank you!

    Read the article

  • Ways to earn money through programming and/or programming knowledge [closed]

    - by Jason Swett
    It occurred to me today that it might be useful to make a list of all the ways to earn money through either actual programming or just programming knowledge. I imagine it's probably a finite list as long as you stick to a reasonable level of granularity. Here's what I have so far: Trading your time for money (i.e. having a job or being a freelancer) Building your own software product (a full-fledged startup or a tiny mobile app or whatever) Giving talks at conferences and meetups Teaching students in a classroom Writing a book or blog (these are products, but non-software products) I've probably missed at least a few. What else is there? (I'm not sure whether this is an appropriate question, by the way. I think I would select the best answer based on how practical/original/interesting/numerous your suggestions are.)

    Read the article

  • D'où proviennent les revenus d'Opera? L'éditeur répond à la « question qu'on lui pose le plus souvent »

    D'où proviennent les revenus d'Opera ? L'éditeur répond à la « question qu'on lui pose le plus souvent » Depuis que le navigateur Opera est mis à disposition gratuitement, beaucoup de personnes se demandent d'où proviennent les revenus Opera Software, la firme norvégienne derrière le navigateur. Lassée ou amusée qu'on lui pose la question de manière récurrente, Opera a décidé de publier un billet de blog pour donner la réponse. La société dispose de deux sources de revenus différentes. La première est fondée sur le marché les systèmes embraqués (comme Opera pré-installé sur un téléphone mobile ou une set-top box) et l'autre vient du marché des PC. En ce qui ...

    Read the article

  • La Preview du SDK de Windows Phone 8 disponible pour les développeurs ayant déjà publié une application sur le Marketplace

    La Preview du SDK de Windows Phone 8 disponible le 12 septembre mais pas pour tout le monde Parallèlement à la présentation des nouveaux terminaux Windows Phone 8 de Nokia, Microsoft a annoncé la date de sortie d'une préversion (quasi-finale) du Kit de développement pour l'OS mobile. Le SDK Windows Phone 8 pourra être téléchargé à partir du 12 septembre prochain, mais seulement pour un groupe restreint de développeurs, selon le billet de blog de Microsoft. Il semblerait que l'outil soit uniquement accessible aux personnes ayant déjà publié une application sur le MarketPlace Windows Phone. Ce choix de Micro...

    Read the article

  • Google Maps : Street View enrichit la WebApp accessible depuis les navigateurs mobiles, première réponse de Google à Apple

    Google Maps : StreetView enrichit la WebApp Accessible depuis les navigateurs mobiles, une première réponse de Google à la décision d'Apple Google vient d'ajouter StreetView à son application Web accessible depuis un navigateur mobile? et donc depuis un iPad ou un iPhone via Safari. Cette WebApp - enrichie de la fonctionnalité qui permet de naviguer virtuellement dans les rues de villes - est aujourd'hui le seul moyen pour Google de toucher les utilisateurs sous iOS depuis qu'Apple a décidé de mettre fin au partenariat qui faisait des Google Maps le service de cartographie par défaut de ses appareils. Pour les remplacer, Apple a sorti sa propre application. Mais son service...

    Read the article

  • Google met à jour Chrome pour Android et iOS, avec des corrections de bugs et l'ajout de nouvelles fonctionnalités

    Google met à jour Chrome pour Android et iOS avec des corrections de bugs et l'ajout de nouvelles fonctionnalités Google a publié des mises à jour de Chrome pour les systèmes d'exploitation mobile Android et iOS. Le navigateur passe à la version 18 pour Android et à la version 23 comme la déclinaison Desktop pour l'OS d'Apple. Chrome 23 apporte comme nouveauté phare, le support de l'application PassBook. La prise en charge de cette fonction très appréciée d'iOS 6 va permettre aux utilisateurs de sauvegarder les billets d'embarquement, les chèques-cadeaux, les cartes de fidélités, les coupons, les tickets de cinéma, etc. dans l'application PassBook. À cette ...

    Read the article

  • Microsoft déploie une mise à jour pour Windows Phone 8, qui apporterait des correctifs et quelques nouveautés pas encore définies

    Microsoft déploie une mise à jour pour Windows Phone 8 Portico apporterait de meilleures performances, des correctifs et quelques nouveautés Six semaines seulement après la sortie de Windows Phone 8, Microsoft serait déjà en cours de déploiement d'une mise à jour pour son OS mobile. Selon le site spécialisé WPCentral, les consommateurs européens utilisant les smartphones HTC 8X sont les premiers à avoir reçu cette mise jour. Baptisée officieusement « Portico », cette mise à jour apporte essentiellement des correctifs pour un problème de redémarrage aléatoire signalé par certains utilisateurs, et pour un bug qui empêchait la connexion Wi-Fi de persister après une mise en v...

    Read the article

  • Quelles fonctionnalités doivent être intégrées à Windows Phone 7.8 ? Microsoft invite les utilisateurs à faire des propositions

    Quelles fonctionnalités doivent être intégrées à Windows Phone 7.8 ? Microsoft invite les utilisateurs à faire des propositions À côté de la mise à jour Windows Phone 8, sera publiée une autre pour les terminaux actuels sous l'OS mobile. Présenté comme un changement de génération technologique, Windows Phone 8 ne pourra pas tourner sur les dispositifs actuels. Raison pour laquelle, Microsoft prévoit la publication d'une version 7.8 afin de faire bénéficier des nouveautés de cette mise à jour à ses clients existants. Windows Phone 7.8 dispose déjà de quelques fonctionnalités de la version 8 comme une nouvelle interface pour l'écran de démarrage, permettant de redimensionner les tui...

    Read the article

  • Android–Supporting Multiple Devices Part 2

    - by rodelljr
    Originally posted on: http://geekswithblogs.net/rodelljr/archive/2014/06/03/androidsupporting-multiple-devices-part-2.aspxI would like to thank the KC Mobile App Developers group for allowing me to do my presentation; Supporting Multiple Devices Part 2. In this talk, I discussed a Master/Detail application that runs on Android 2.2 devices and forward. I used the Actionbar compat Android library to allow the older devices to have an actionbar. I also used a SQLite database for my data. And just to add one last thing, I also incorporated the use of custom fonts. If you are interesting in looking at this sample application, I have uploaded it to my GitHub account here. I also have a Power Point presentation which you can get here.I will be doing this talk again at a later date this year, so when I have a date and location, I will post a follow up blog.

    Read the article

  • Windows 8: Paradigm Shift

    You've probably heard a lot about the loss of the Start button in Windows 8. While it isn't completely lost - you can still get to it via a convoluted path - its disappearance is merely a sign of the rethinking that went into the operating system's creation. Window 8's designers made certain assumptions while building the new system: Users will interact with the operating system predominantly through a touch interface. Users will do their computing on mobile devices, and may in fact use several different devices for the same purposes. They may even want to get work done on devices they do n...

    Read the article

  • Android : 56% des utilisateurs français n'ont pas d'appli payante d'après Surikate, les bugs principale raison de désinstallation des apps

    Android : 56% des utilisateurs français n'ont aucune application payante D'après une étude de Surikate, les bugs sont la principale raison de la désinstallation d'une app La société de marketing mobile Surikate vient de réaliser une nouvelle étude sur les utilisateurs d'Android en France. Menée en partenariat avec l'Ifop, et avec plus de 9 000 participants, cette enquête avance quelques chiffres intéressants ? ou en tout cas surprenant. Deux qui retiendront un peu plus l'attention des développeurs. Le premier révèle que la principale raison de suppression d'une application est la présence de bugs (76%). Le deuxième que 56% des possesseurs d'appareils sous A...

    Read the article

  • Le SDK Windows Phone 8 disponible, avec un nouveau Dev Center et une version du Framework .NET pour l'OS

    Le SDK Windows Phone 8 disponible avec un nouveau Dev Center et une version du Framework .NET pour l'OS Le très attendu kit de développement pour Windows Phone 8 a été dévoilé hier au grand public. C'est lors de la première journée de la conférence Build, la grande messe de Microsoft pour les développeurs qui se tient au campus de Redmond, que la firme a mise à la disposition des développeurs tous les outils dont ils ont besoin pour créer des applications Windows Phone 8. Le SDK Windows Phone 8 sort un jour après que Microsoft ait présenté le nouvel OS mobile qui apporte un lot important de nouvelles fonctionnalités (voir les articles en lire aussi). Il faut rappeler que la...

    Read the article

  • How many hours do you spend programming outside of work if you are married (with children) [closed]

    - by eterps
    I recently attended a conference and met some insanely talented developers with mile-long lists of accomplishments. One puzzling thing I noticed about many of these wildly successful people is that a lot of their output (books, blogs, games, mobile apps) are done as hobby projects outside of their normal jobs. Not only this, but most of them were married, and some even with children. I'm absolutely baffled by this. My question is targeted to folks that are married, working full time, and also spend time outside of work on hobby projects or extra programming. The question is: How many hours do you put in programming outside of your normal job, and how do you balance it with your family life?

    Read the article

  • A step-up from TiddlyWiki that is still 100% portable?

    - by Smandoli
    TiddlyWiki is a great idea, brilliantly implemented. I'm using it as a portable personal "knowledge manager," and these are the prize virtues: It travels on my USB flash memory stick and runs on any computer, regardless of operating system No software installation is needed on the computer (TiddlyWiki merely uses the Internet browser) No Internet connection is needed In terms of data retrieval functionality, it mimics a relational database (use of tags and internal links) Let's say I've got a million words of prose in 4,000 tiddlers (posts). I'm still testing, but it looks like TiddlyWiki gets very slow. Is there an app like TiddlyWiki that keeps all the virtues I listed above, and allows more storage? NOTE: Separation of content and presentation would be ideal. It's nifty that TiddlyWiki has everything in a single HTML document, but it's unhelpful in many ways. I don't care if a directory of assorted docs is needed (SQLite, XML?), as long as it's functionally self-contained.

    Read the article

  • Is there really a need for encryption to have true wireless security? [closed]

    - by Cawas
    I welcome better key-wording here, both on tags and title. I'm trying to conceive a free, open and secure network environment that would work anywhere, from big enterprises to small home networks of just 1 machine. I think since wireless Access Points are the most, if not only, true weak point of a Local Area Network (let's not consider every other security aspect of having internet) there would be basically two points to consider here: Having an open AP for anyone to use the internet through Leaving the whole LAN also open for guests to be able to easily read (only) files on it, and even a place to drop files on Considering these two aspects, once everything is done properly... What's the most secure option between having that, or having just an encrypted password-protected wifi? Of course "both" would seem "more secure". But it shouldn't actually be anything substantial. That's the question, but I think it may need more elaborating on. If you don't think so, please feel free to skip the next (long) part. Elaborating more on the two aspects ... I've always had the feeling using any kind of the so called "wireless security" methods is actually a bad design. I'm talking mostly about encrypting and pass-phrasing (which are actually two different concepts), since I won't even consider hiding SSID and mac filtering. I understand it's a natural way of thinking. With cable networking nobody can access the network unless they have access to the physical cable, so you're "secure" in the physical way. In a way, encrypting is for wireless what building walls is for the cables. And giving pass-phrases would be adding a door with a key. But the cabling without encryption is also insecure. If someone plugin all the data is right there. So, while I can see the use for encrypting data, I don't think it's a security measure in wireless networks. It's wasting resources for too little gain. I believe we should encrypt only sensitive data regardless of wires. That's already done with HTTPS, so I don't really need to encrypt my torrents, for instance. They're torrents, they are meant to be freely shared! As for using passwords, they should be added to the users, always. Not to wifi. For securing files, truly, best solution is backup. Sure all that doesn't happen that often, but I won't consider the most situations where people just don't care. I think there are enough situations where we actually use passwords on our OS users, so let's go with that in mind. I keep promoting the Fonera concept as an instance. It opens up a free wifi port, if you choose so, and anyone can connect to the internet through that, without having any access to your LAN. It also uses a QoS which will never let your bandwidth drop from that public usage. That's security, and it's open. But it's lacking the second aspect. I'll probably be bashed for promoting the non-usage of WPA 2 with AES or whatever, but I wanted to know from more experienced (super) users out there: what do you think?

    Read the article

  • Useful Command-line Commands on Windows

    - by Sung Meister
    The aim for this Wiki is to promote using a command to open up commonly used applications without having to go through many mouse clicks - thus saving time on monitoring and troubleshooting Windows machines. Answer entries need to specify Application name Commands Screenshot (Optional) Shortcut to commands && - Command Chaining %SYSTEMROOT%\System32\rcimlby.exe -LaunchRA - Remote Assistance (Windows XP) appwiz.cpl - Programs and Features (Formerly Known as "Add or Remove Programs") appwiz.cpl @,2 - Turn Windows Features On and Off (Add/Remove Windows Components pane) arp - Displays and modifies the IP-to-Physical address translation tables used by address resolution protocol (ARP) at - Schedule tasks either locally or remotely without using Scheduled Tasks bootsect.exe - Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR cacls - Change Access Control List (ACL) permissions on a directory, its subcontents, or files calc - Calculator chkdsk - Check/Fix the disk surface for physical errors or bad sectors cipher - Displays or alters the encryption of directories [files] on NTFS partitions cleanmgr.exe - Disk Cleanup clip - Redirects output of command line tools to the Windows clipboard cls - clear the command line screen cmd /k - Run command with command extensions enabled color - Sets the default console foreground and background colors in console command.com - Default Operating System Shell compmgmt.msc - Computer Management control.exe /name Microsoft.NetworkAndSharingCenter - Network and Sharing Center control keyboard - Keyboard Properties control mouse(or main.cpl) - Mouse Properties control sysdm.cpl,@0,3 - Advanced Tab of the System Properties dialog control userpasswords2 - Opens the classic User Accounts dialog desk.cpl - opens the display properties devmgmt.msc - Device Manager diskmgmt.msc - Disk Management diskpart - Disk management from the command line dsa.msc - Opens active directory users and computers dsquery - Finds any objects in the directory according to criteria dxdiag - DirectX Diagnostic Tool eventvwr - Windows Event Log (Event Viewer) explorer . - Open explorer with the current folder selected. explorer /e, . - Open explorer, with folder tree, with current folder selected. F7 - View command history find - Searches for a text string in a file or files findstr - Find a string in a file firewall.cpl - Opens the Windows Firewall settings fsmgmt.msc - Shared Folders fsutil - Perform tasks related to FAT and NTFS file systems ftp - Transfers files to and from a computer running an FTP server service getmac - Shows the mac address(es) of your network adapter(s) gpedit.msc - Group Policy Editor gpresult - Displays the Resultant Set of Policy (RSoP) information for a target user and computer httpcfg.exe - HTTP Configuration Utility iisreset - To restart IIS InetMgr.exe - Internet Information Services (IIS) Manager 7 InetMgr6.exe - Internet Information Services (IIS) Manager 6 intl.cpl - Regional and Language Options ipconfig - Internet protocol configuration lusrmgr.msc - Local Users and Groups Administrator msconfig - System Configuration notepad - Notepad? ;) mmsys.cpl - Sound/Recording/Playback properties mode - Configure system devices more - Displays one screen of output at a time mrt - Microsoft Windows Malicious Software Removal Tool mstsc.exe - Remote Desktop Connection nbstat - displays protocol statistics and current TCP/IP connections using NBT ncpa.cpl - Network Connections netsh - Display or modify the network configuration of a computer that is currently running netstat - Network Statistics net statistics - Check computer up time net stop - Stops a running service. net use - Connects a computer to or disconnects a computer from a shared resource, or displays information about computer connections odbcad32.exe - ODBC Data Source Administrator pathping - A traceroute that collects detailed packet loss stats perfmon - Opens Reliability and Performance Monitor ping - Determine whether a remote computer is accessible over the network powercfg.cpl - Power management control panel applet quser - Display information about user sessions on a terminal server qwinsta - See disconnected remote desktop sessions reg.exe - Console Registry Tool for Windows regedit - Registry Editor rasdial - Connects to a VPN or a dialup network robocopy - Backup/Restore/Copy large amounts of files reliably rsop.msc - Resultant Set of Policy (shows the combined effect of all group policies active on the current system/login) runas - Run specific tools and programs with different permissions than the user's current logon provides sc - Manage anything you want to do with services. schtasks - Enables an administrator to create, delete, query, change, run and end scheduled tasks on a local or remote system. secpol.msc - Local Security Settings services.msc - Services control panel set - Displays, sets, or removes cmd.exe environment variables. set DIRCMD - Preset dir parameter in cmd.exe start - Starts a separate window to run a specified program or command start. - opens the current directory in the Windows Explorer. shutdown.exe - Shutdown or Reboot a local/remote machine subst.exe - Associates a path with a drive letter, including local drives systeminfo -Displays a comprehensive information about the system taskkill - terminate tasks by process id (PID) or image name tasklist.exe - List Processes on local or a remote machine taskmgr.exe - Task Manager telephon.cpl - Telephone and Modem properties timedate.cpl - Date and Time title - Change the title of the CMD window you have open tracert - Trace route wmic - Windows Management Instrumentation Command-line winver.exe - Find Windows Version wscui.cpl - Windows Security Center wuauclt.exe - Windows Update AutoUpdate Client

    Read the article

  • Network Restructure Method for Double-NAT network

    - by Adrian
    Due to a series of poor network design decisions (mostly) made many years ago in order to save a few bucks here and there, I have a network that is decidedly sub-optimally architected. I'm looking for suggestions to improve this less-than-pleasant situation. We're a non-profit with a Linux-based IT department and a limited budget. (Note: None of the Windows equipment we have runs does anything that talks to the Internet nor do we have any Windows admins on staff.) Key points: We have a main office and about 12 remote sites that essentially double NAT their subnets with physically-segregated switches. (No VLANing and limited ability to do so with current switches) These locations have a "DMZ" subnet that are NAT'd on an identically assigned 10.0.0/24 subnet at each site. These subnets cannot talk to DMZs at any other location because we don't route them anywhere except between server and adjacent "firewall". Some of these locations have multiple ISP connections (T1, Cable, and/or DSLs) that we manually route using IP Tools in Linux. These firewalls all run on the (10.0.0/24) network and are mostly "pro-sumer" grade firewalls (Linksys, Netgear, etc.) or ISP-provided DSL modems. Connecting these firewalls (via simple unmanaged switches) is one or more servers that must be publically-accessible. Connected to the main office's 10.0.0/24 subnet are servers for email, tele-commuter VPN, remote office VPN server, primary router to the internal 192.168/24 subnets. These have to be access from specific ISP connections based on traffic type and connection source. All our routing is done manually or with OpenVPN route statements Inter-office traffic goes through the OpenVPN service in the main 'Router' server which has it's own NAT'ing involved. Remote sites only have one server installed at each site and cannot afford multiple servers due to budget constraints. These servers are all LTSP servers several 5-20 terminals. The 192.168.2/24 and 192.168.3/24 subnets are mostly but NOT entirely on Cisco 2960 switches that can do VLAN. The remainder are DLink DGS-1248 switches that I am not sure I trust well enough to use with VLANs. There is also some remaining internal concern about VLANs since only the senior networking staff person understands how it works. All regular internet traffic goes through the CentOS 5 router server which in turns NATs the 192.168/24 subnets to the 10.0.0.0/24 subnets according to the manually-configured routing rules that we use to point outbound traffic to the proper internet connection based on '-host' routing statements. I want to simplify this and ready All Of The Things for ESXi virtualization, including these public-facing services. Is there a no- or low-cost solution that would get rid of the Double-NAT and restore a little sanity to this mess so that my future replacement doesn't hunt me down? Basic Diagram for the main office: These are my goals: Public-facing Servers with interfaces on that middle 10.0.0/24 network to be moved in to 192.168.2/24 subnet on ESXi servers. Get rid of the double NAT and get our entire network on one single subnet. My understanding is that this is something we'll need to do under IPv6 anyway, but I think this mess is standing in the way.

    Read the article

  • Why is IIS Anonymous authentication being used with administrative UNC drive access?

    - by Mark Lindell
    My account is local administrator on my machine. If I try to browse to a non-existent drive letter on my own box using a UNC path name: \mymachine\x$ my account would get locked out. I would also get the following warning (Event ID 100, Type “Warning”) 5 times under the “System” group in Event Viewer on my box: The server was unable to logon the Windows NT account 'ourdomain\myaccount' due to the following error: Logon failure: unknown user name or bad password. I would also get the following warning 3 times: The server was unable to logon the Windows NT account 'ourdomain\myaccount' due to the following error: The referenced account is currently locked out and may not be logged on to. On the domain controller, Event ID 680 of type “Failure Audit” would appear 4 times under the “Security” group in Event Viewer: Logon attempt by: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 Logon account: myaccount Followed by Event ID 644: User Account Locked Out: Target Account Name: myaccount Target Account ID: OURDOMAIN\myaccount Caller Machine Name: MYMACHINE Caller User Name: STAN$ Caller Domain: OURDOMAIN Caller Logon ID: (0x0,0x3E7) Followed by another 4 errors having Event ID 680. Strangely, every time I tried to browse to the UNC path I would be prompted for a user name and password, the above errors would be written to the log, and my account would be locked out. When I hit “Cancel” in response to the user name/password prompt, the following message box would display: Windows cannot find \mymachine\x$. Check the spelling and try again, or try searching for the item by clicking the Start button and then clicking Search. I checked with others in the group using XP and they only got the above message box when browsing to a “bad” drive letter on their box. No one else was prompted for a user name/password and then locked out. So, every time I tried to browse to the “bad” drive letter, behind the scenes XP was trying to login 8 times using bad credentials (or, at least a bad password as the login was correct), causing my account to get locked out on the 4th try. Interestingly, If I tried browsing to a “good” drive such as “c$” it would work fine. As a test, I tried logging on to my box as a different login and browsing the “bad” UNC path. Strangely, my “ourdomain\myaccount” account was getting locked out – not the one I was logged in as! I was totally confused as to why the credentials for the other login were being passed. After much Googling, I found a link referring to some IIS settings I was vaguely familiar with from the past but could not see how they would affect this issue. It was related to the IIS directory security setting “Anonymous access and authentication control” located under: Control Panel/Administrative Tools/Computer Management/Services and Applications/Internet Information Services/Web Sites/Default Web Site/Properties/Directory Security/Anonymous access and authentication control/Edit/Password I found no indication while scouring the Internet that this property was related to my UNC problem. But, I did notice that this property was set to my domain user name and password. And, my password did age recently but I had not reset the password accordingly for this property. Sure enough, keying in the new password corrected the problem. I was no longer prompted for a user name/password when browsing the UNC path and the account lock-outs ceased. Now, a couple of questions: Why would an IIS setting affect the browsing of a UNC path on a local box? Why had I not encountered this problem before? My password has aged several times and I’ve never encountered this problem. And, I can’t remember the last time I updated the “Anonymous access” IIS password it’s been so long. I’ve run the script after a password reset before and never had my account locked-out due to the UNC problem (the script accesses UNC paths as a normal part of its processing). Windows Update did install “Cumulative Security Update for Internet Explorer 7 for Windows XP (KB972260)” on my box on 7/29/2009. I wonder if this is responsible.

    Read the article

  • Static file download from browser breaking in varnish but works fine in Apache

    - by Ron
    I would at first like to thank everyone at serverfault for this great website and I also come to this site while searching in google for various server related issues and setups. I also have an issue today and so I am posting here and hope that the seniors would help me out. I had setup a website on a dedicated server a few days ago and I used Varnish 3 as the frontend to Apache2 on a Debian Lenny server as the traffic was a bit high. There are several static file downloads of around 10-20 MB in size in the website. The website looked fine in the last few days after I setup. I was checking from a 5mbps + broadband connection and the file downloads were also completed in seconds and working fine. But today I realized that on a slow internet connection the file downloads were breaking off. When I tried to download the files from the website using a browser then it broke off after a minute or so. It kept on happening again and again and so it had nothing to do with the internet connection. The internet connection was around 512 kbps and so it was not dial up level speed too but decent speed where files should easily download though not that fast. Then I thought of trying out with the apache backend port and used the port number to check out if the problem occurs. But then on adding the apache port in the static file download url, the files got downloaded easily and did not break even once. I tried it several times to make sure that it was not a coincidence but every time I was using the apache port in the file download url then it was downloading fine while it was breaking each time with the normal link which was routed through Varnish I suppose. So, it seems Varnish has somehow resulted in the broken file downloads. Could anyone give any idea as to why it is happening and how to fix the problem. For more clarification, take this example: Apache backend set on port 8008, Varnish frontend set on port 80 Now when I download say http://mywebsite.com/directory/filename.extension Then the download breaks off after a minute or so. I cannot be sure it is due to the time or size though and I am just assuming. May be some other reason too. But when I download using: http://mywebsite.com:8008/directory/filename.extension Then the file download does not break at all and it gets download fine. So, it seems that varnish is somehow creating the file download breaking and not apache. Does anybody have any idea as to why it is happening and how can it be fixed. Any help would be highly appreciated. And my varnish default.vcl is backend apache { set backend.host = "127.0.0.1"; set backend.port = "8008"; } sub vcl_deliver { remove resp.http.X-Varnish; remove resp.http.Via; remove resp.http.Age; remove resp.http.Server; remove resp.http.X-Powered-By; }

    Read the article

< Previous Page | 562 563 564 565 566 567 568 569 570 571 572 573  | Next Page >