Search Results

Search found 1932 results on 78 pages for 'tom frost'.

Page 6/78 | < Previous Page | 2 3 4 5 6 7 8 9 10 11 12 13  | Next Page >

  • Tomcat6 host-manager

    - by Tom
    Halo Gurus I have a problem with setting a new hosts in Tomcat6 host-manager application. Host-manager application works very well. Everything works. But when restart the server, all settings are lost. I have to everything set up again. 1.I start Tomcat6 host-manager http://localhost:8080/host-manager/html 2.Set up Hosts 3.Everything works 4.Restart server /sbin/service restart tomcat6 6.The settings are lost. There are not Hosts. I have to all set up again. goto 1 note: I use CentOS5 and Tomcat6 Thanks a lot Tom

    Read the article

  • Applescript save command for QuickTime Player

    - by Frost Shadow
    I've installed the Perian addon for Quicktime so it can open .flv files, and then I can save them as .m4v or .mov. I'm trying to make an Applescript to convert from .flv to .m4v automatically by using this tutorial and butchering their example applescript file, which normally converts ChemDraw files (.cdx, .cml, .mol) to .tiff, so that it instead uses Quicktime to save the .flv files as .m4v. When I try to use it, though, I get an error "QuickTime Player got an error: document 1 doesn't understand the save message". My save message is currently: save first document in target_path as ".m4v" which looks like the QuickTime dictionary's instructions: save specifier : The document(s) or window(s) to save. [as saveable file format] : The file format to use. I've also tried "m4v", without the period, and still get the error. Is my Save direction wrong, or is it probably an error from trying to use Quicktime instead of the original ChemDraw? I tried to change references to .cdx, .cml, .mol, .tiff, and ChemDraw to .flv, .m4v, and QuickTime respectively, but maybe it's more complicated than that?

    Read the article

  • Move files from Mac to Canon PowerShot digital camera

    - by Frost Shadow
    When I plug my Canon PowerShot digital camera into Snow Leopard, it automatically opens iPhoto and asks to import the pictures, but does not mount the camera on the desktop (from what I read, it's a Canon feature to prevent people from screwing up the file system on the memory card, or something). Is there a way I can move photos I've already imported back on to the camera? I can't seem to figure out how to move stuff from Snow Leopard to the camera using iPhoto, and since it doesn't mount....

    Read the article

  • Hard Drives: Always on or spin up/down as needed?

    - by Terminal Frost
    The specific application is a NAS that hosts media content and is frequently accessed during the day. My NAS was probably cycling on and off around 5 times a day so I decided to not allow it to spin down. I'm thinking this will be better for the drive, but I am not sure. I am wondering, however, if there is any concrete information out there as to what causes more detrimental wear on a hard disk: Spinning 24/7 or cycling on and off as needed?

    Read the article

  • cloud/grid computing

    - by tom smith
    Hi guys. I'm appologizing in advance to the guys who will tell me this isn't a tech/server/IT issue! But I've been beating my head around this for a couple of days now. I'm trying figure out who to talk to, or which company I can approach to try to see if there are Grid/Cloud Computing companies who have programs setup to deal with colleges. I'm dealing with a compsci course, and we're looking at a few projects that would require a great deal of computing/computational resources. But in calling different companies (HP/Rackspace/etc..) I'm either not getting through to the right depts, or to the right people, or the companies just aren't setup for this. There are plenty of companies who have discounts for desktop software/hardware, but who in the biz deals with discounts/offerings for Cloud/Grid Computing solutions?? Any thoughts/pointers would be greatly appreciated. Thanks -tom

    Read the article

  • Sharing software updates between macs without OS X Server

    - by Frost
    Is there any way to (manually or automatically) share downloaded software updates between macs? Edit: The thinking is that I have one mac update itself using Software Update, and then somehow share the downloaded updates with other macs. For example, I have a mac pro and a mac mini on my local network. I'd like to download the Mac OS X 10.6.5 update only once, instead of having to download it separately for each mac.

    Read the article

  • How to set the PHP Api Version for phpize

    - by Tom Frost
    I'm upgrading php on my server but I'm running into a problem with phpize and compiling external modules. phpize -v reports: Configuring for: PHP Api Version: 20041225 Zend Module Api No: 20090115 Zend Extension Api No: 220090115 But on my test server (which I'm trying to replicate) I get this: Configuring for: PHP Api Version: 20090626 Zend Module Api No: 20090626 Zend Extension Api No: 220090626 I'm running debian squeeze, pulling the php 5.3.0-2 packages from the experimental repo. The difference betweent he two servers is that the first server has had old verisons of php on it, and the test server was installed with php 5.3.0-2 from the start. I've attempted uninstalling all PHP packages from the first server (using --purge to get rid of all the config files) and re-installing 5.3 fresh, but I'm still having the same issue. Help!

    Read the article

  • IMAP and Folder Subscriptions

    - by tom
    Hey guys I'm trying to figure out how folder subscriptions work with IMAP Clients and, in my case, in an Exchange 2007 environment. I have managed to deduce, I think correctly, that the folder subscription settings for individuals are stored centrally on the mailbox (At least, having configured 2 profiles on thunderbird, on 2 different machines, they subscribe to the exact same folders and dont display the exact same ones). The point of this being that I have had 2 or 3 different people in the past day report to me that they are having problems subscribing to certain folders, and having certain folder subscriptions remembered (particularly sub-folders). This is across both Thunderbird 2 and 3. can anyone suggest anything? Tom

    Read the article

  • How can I write automated tests for iptables?

    - by Phil Frost
    I am configuring a Linux router with iptables. I want to write acceptance tests for the configuration that assert things like: traffic from some guy on the internet is not forwarded, and TCP to port 80 on the webserver in the DMZ from hosts on the corporate LAN is forwarded. An ancient FAQ alludes to a iptables -C option which allows one to ask something like, "given a packet from X, to Y, on port Z, would it be accepted or dropped?" Although the FAQ suggests it works like this, for iptables (but maybe not ipchains as it uses in the examples) the -C option seems to not simulate a test packet running through all the rules, but rather checks for the existence for an exactly matching rule. This has little value as a test. I want to assert that the rules have the desired effect, not just that they exist. I've considered creating yet more test VMs and a virtual network, then probing with tools like nmap for effects. However, I'm avoiding this solution due to the complexity of creating all those additional virtual machines, which is really quite a heavy way to generate some test traffic. It would also be nice to have an automated testing methodology which can also work on a real server in production. How else might I solve this problem? Is there some mechanism I might use to generate or simulate arbitrary traffic, then know if it was (or would be) dropped or accepted by iptables?

    Read the article

  • Can anyone explain these differences between two similar i7 processors? [closed]

    - by Brian Frost
    I have two systems I've just built. They both have i7 processors and Asus P8Z77 motherboards. When I run a simple processor loop benchmark that I wrote in Delphi some time back I get one machine showing nealry twice as fast as the other. I then used CPU-Z to dump me the details of the hardware and I see that the fast machine shows: Processor 1 ID = 0 Number of cores 4 (max 8) Number of threads 8 (max 16) Name Intel Core i7 2700K Codename Sandy Bridge Specification Intel(R) Core(TM) i7-2700K CPU @ 3.50GHz Package (platform ID) Socket 1155 LGA (0x1) CPUID 6.A.7 Extended CPUID 6.2A Core Stepping D2 Technology 32 nm TDP Limit 95 Watts Core Speed 3610.7 MHz Multiplier x FSB 36.0 x 100.3 MHz Stock frequency 3500 MHz the slow machine shows: Processor 1 ID = 0 Number of cores 4 (max 8) Number of threads 8 (max 16) Name Intel Core i7 2600K Codename Sandy Bridge Specification Intel(R) Core(TM) i7-2600K CPU @ 3.40GHz Package (platform ID) Socket 1155 LGA (0x1) CPUID 6.A.7 Extended CPUID 6.2A Core Stepping D2 Technology 32 nm TDP Limit 95 Watts Core Speed 1648.2 MHz Multiplier x FSB 16.0 x 103.0 MHz Stock frequency 3400 MHz i.e the slow machine has a 2600k to the fast machine 2700k. The very different "Multiplier x FSB" must be significant but I dont understand how two processors with a very 'similar' number can be so different. To get the machines the same must I copy the processors or is there some clever setting that I can change? Thanks for any help. Brian.

    Read the article

  • Installation is forbidden by system policy

    - by Frost
    Note: I'm posting this here on Superuser as I think the issue is more related to the Windows Installer than the game itself. My friend is having trouble installing Company of Heroes and CoH: Opposing fronts under Windows 7. A couple of percent into the installation, when the C/C++ runtime is being installed, the install fails with the following message: An error occured while installing the Windows Installer package "C:\Users\...\AppData\Local\Temp\...\...\vcredist.msi". Error code 10212:00000659: MsiInstallProductW returned 00000659: This installation is forbidden by system policy. Contact your system administrator. We have tried: Making sure that any previous installations have been completely removed, including searching and deleting any files/folders/registry entries matching "THQ" (the publisher) and "Relic" (the developer). Installing into a brand new user account Running Setup.exe as administrator Running Compatibility check for Setup.exe, which suggested Windows XP but failed when trying those settings out Does anyone know what might be the cause of the system policy error?

    Read the article

  • Does the Fast Video Download addon share my data?

    - by Frost Shadow
    I've installed the Fast Video Download version 3.0.8 addon for Firefox to download flash videos, like from youtube. What I'm wondering is, how does the addon download it, and do other people see that i'm downloading the videos? For example, is all the software to download the video already on my computer, or does the addon contact someone else to get the video, or let them know? Can the webpage's administrator see I'm downloading the video?

    Read the article

  • Exchange 2010 - Trying to add an additional domain fails

    - by Tom Beech
    We're trying to add an additional domain to our existing exchange 2010 box. I'm doing this under our network administrator user which has pretty much every permission but i'm getting: VERBOSE: Connecting to EXCHANGE01.isd.isdevelopment.co.uk VERBOSE: Connected to EXCHANGE01.isd.isdevelopment.co.uk. [PS] C:\Windows\system32>new-AcceptedDomain -Name 'NewName' -DomainName 'newDomainaddress.com' -DomainType 'Autho ritative' Active Directory operation failed on DCSERVER01.isd.isdevelopment.co.uk. This error is not retriable. Additional inform ation: Insufficient access rights to perform the operation. Active directory response: 00002098: SecErr: DSID-03150BB9, problem 4003 (INSUFF_ACCESS_RIGHTS), data 0 + CategoryInfo : NotSpecified: (0:Int32) [New-AcceptedDomain], ADOperationException + FullyQualifiedErrorId : 282695C2,Microsoft.Exchange.Management.SystemConfigurationTasks.NewAcceptedDomain Any help will be appreciated. Tom

    Read the article

  • Risk to native OS from Live CD?

    - by Frost Shadow
    Will booting from a Live CD (I was thinking Anonym OS) have any risk to the native OS? I wanted to try it out on my school´s computer, but I´d rather not have to explain why I accidentally reformatted the HD and deleted everything.. I know once you´ve booted the right way, it shouldn´t leave any trace on the HD, but is it possible I can push some wrong button and end up trying to overwrite the native with the Live OS? Also, since the computer itself is connected to the internet, will the network administrator be able to see that i´ve booted from a Live CD? I´m thinking yes, but just thought I´d check. Thanks for any help!

    Read the article

  • Iptables mark incoming packet - vpn routing

    - by Tom
    I have connected my home to my workplace for out of house backup reasons through openvpn. The connection is working nicely. At work I have 5 fixed IP addresses. Now I would like to assign one of these IP addresses to be forwarded to my home machine. I have confirmed packet arrival at my home machine with tcpdump. The problem is that my default route at home is NOT the tun0 (naturally), but eth0 to my own ISP. So I created a separate routing table to route my tun0 packets back to where they belong, but do not how to mark the incoming packet which arrive through tun0 with iptables, so I can drive them back. I do not want any port restrictions, but only what comes from tun0 should leave through tun0 thanks tom

    Read the article

  • What do encrypted files' data look like?

    - by Frost Shadow
    I know there are a lot of encryption programs available, that I would guess use different methods for encryption, and thus have different types of output files (.fve .tc .cha .dmg (bitlocker, truecrypt, challenger, ect.)), but if someone didn't know what the file was and just looked at the data, what would it look like? Does it just look like random bits, or can you still pick out a pattern? If it does look random, how is it if I moved the encrypted file to another computer, the other computer can tell it's a file, and is able to decrypt it (how would it even know where to start or stop, if it all looked random)? Also, how is the structure affected by encrypting files twice, using the same method, or a different one? Thanks for any help, and if you know any books or site about encryption for complete idiots, I'd appreciate it!

    Read the article

  • Host website without domain name?

    - by Frost Shadow
    I have an old desktop sitting around I wanted to try making a server out of, but I don't want to pay to register a Domain Name. Is there a way I can host a website without a domain name, or to register a domain name for free? If I can't host a web page without a domain name, can I just access the files on the server through the internet some how without a domain name? Thanks for any insight!

    Read the article

  • Email error 'Default email client is not properly installed' after installing Bugzilla 3.6.3 on Windows Home Server 2011

    - by Brian Frost
    I have been using Bugzilla fine on the older 32-bit Windows Home Server and I have now started a migration to the newer Windows Home Server 2011 with a new machine and a fresh Bugzilla install of 3.6.3. All goes well until I try to check out the email action and I get 'Could not perform this operation because the defaulty mail client in not properly installed. Is this a security /firewall issue? I dont know enough about servers to know what to look for, so any help will be gratefully appreciated. Thanks.

    Read the article

  • Remote Install Mac OS X from Windows not on LAN?

    - by Frost Shadow
    I want to install applications from my Mac OS X install disc, or be able to archive-install from it, but it's back at my house outside my current LAN. Is there a way I can remotely access my OS X install disc on my home Windows XP computer from my Snow Leopard? In my help manual it says I can do remote installs, or use another computer's disc drive remotely, but it has to be with another computer on the LAN. Is there a way to combine my mac's LAN and my windows' LAN? I think it has something to do with making a VPN; is there a way to do that which will work between Snow Leopard and XP, doesn't require additional hardware, and is preferably free? Thanks a lot!

    Read the article

  • Method to control multiple sites using same cookie?

    - by Frost Shadow
    Is it possible for two different web pages to use the same cookie? For example, some news sites now have buttons on the bottom, where if you are logged into facebook, you can just click the button to "like" the article. Is this a case of a 3rd party website using facebook's cookie to know which account you are, and if so, is there a way I can control it? I'm not sure how the new "like" system works, so maybe the button part isn't actually on the news site, but hosted on facebooks servers or something, so it's really facebook itself accessing its own cookie. If that's the case, is there a way I can choose when a site accesses its own cookie? Thanks for any help!

    Read the article

  • Hiding UITabBar when rotating device iPhone

    - by Tom G
    Has anyone successfully hidden a UITabbar when rotating the device? I have one view in the UItabbar controller that i rotate (So effectively one tab that rotates) When this happens i want the tab bar to disappear... but nothing seems to work! Either the tabbar still remains visible Or it disappears along with the view Or the tabbar disappears and the view no longer rotates! So if anyone has successfully accomplished this task any advice would be greatly appreciated! Thanks Tom

    Read the article

  • Axis2 and OpenSAML

    - by Tom Kiley
    I'm trying to add SAML assertions to a SOAP web service that is built on the axis2 engine. I'm having a little trouble wrapping my head around how the two would interact. Could someone help point me in the right direction to add a SAML assertion to a response message from Axis2? Thanks, Tom

    Read the article

  • Form generator and data capture PHP application

    - by Tom
    Hi, Does anyone know of a PHP open source which can generate forms to be deployed across your website. These forms will collect and aggregate the data with in on database. There should also be the functionality to search across the forms (to generate reports and newsletter mailing lists) All the services I have found so far have been hosted solutions. Thanks Tom

    Read the article

< Previous Page | 2 3 4 5 6 7 8 9 10 11 12 13  | Next Page >