Search Results

Search found 5048 results on 202 pages for 'safe browsing'.

Page 70/202 | < Previous Page | 66 67 68 69 70 71 72 73 74 75 76 77  | Next Page >

  • Configuring Eclipse with wxPython

    - by Alex
    Hi, I've been browsing documentation, but haven't been able to find a straightforward tutorial, so I apologize if this is a really simple question. Anyway, I have eclipse with pydev installed on MAC OSX, and I want configure wxPython to work with eclipse, how do I do this? Once I've downloaded wxpython, what steps do I take to allow wxPython development from eclipse? Thanks!

    Read the article

  • Filter Django Haystack results like QuerySet?

    - by prometheus
    Is it possible to combine a Django Haystack search with "built-in" QuerySet filter operations, specifically filtering with Q() instances and lookup types not supported by SearchQuerySet? In either order: haystack-searched -> queryset-filtered or queryset-filtered -> haystack-searched Browsing the Django Haystack documentation didn't give any directions how to do this.

    Read the article

  • Problem with Rails ERb rendering?

    - by logan
    A very simple HTML in my .erb file: <a href="javascript:void(0)" id="xyz">Click</a> But when browsing this code in the browser, I get the link which text is: Click (javascript:void(0)). Could you please help me explain why it is? Thanks much for your help. My development environment: Ruby 1.8.7 Rails 2.3.4

    Read the article

  • How do IE, FF, and Chrome compare in security? [closed]

    - by cable729
    I'm trying to determine which of the three main browsers (Chrome, Firefox, and Internet Explorer) are the most secure and safe. Right now, in our system, Firefox 10 and IE 8 are cleared as 'good-to-use', but Chrome isn't. Is Chrome really less secure than Firefox and IE, or are the IT folks are slow at updating (Firefox 12 and IE 9 and 10 preview are out right now)? Completely rewrote question. I found the original was not specific enough and the edits started sapping its focus

    Read the article

  • Information on Rojiani's Numerical methods C textbook

    - by yCalleecharan
    Hi, having taken a look at a few textbooks that discuss numerical methods and C programming, I was gladly surprised when browsing through "programming in C with numerical methods for engineers" by Rojiani. I understand of course it's important that one need to have a solid background in numerical methods prior to try implementing them on a computer. I would like to know if someone here has been using this book and if possible point out strengths and weaknesses of this textbook. Thanks a lot...

    Read the article

  • Are Time Machine backups secure?

    - by Leandro Ardissone
    I have my Time Machine backups on an external disk (WD My Passport with no hardware encryption) and I'm worried if the data stored on the disk is safe in case somebody steals it and connect it to any Mac/PC. Does any Mac can browse the Time Machine backups? Or are they encrypted in any way? If no, is there a way to improve security of the backups, should I buy a hardware encryption based HD? Thanks.

    Read the article

  • NFS Client library

    - by Reflog
    Hello. I'm looking for some stand alone library to access NFS shares. I am not looking for mounting the shares, just browsing and accessing the files for reading. Preferable something with a simple simple API similar to regular POSIX operations of opendir, scandir, read and etc. Thanks in advance!

    Read the article

  • How to know when the kernel was last compiled?

    - by Mehmet Tuncal
    I have installed a linux distro and I "think" it is vulnerable to kernel exploits. I have to update kernel but I need to know if it is really compiled in year 2003? How can I know if additional updates are made to the kernel? Linux gandalf 2.4.21-4.ELsmp #1 SMP Fri Oct 3 17:52:56 EDT 2003 i686 i686 i386 GNU/Linux Does also "smp" mean that it is safe from latest threats or something? Thank you.

    Read the article

  • Pointless 'MIDL_INTERFACE' Macro in winapi?

    - by nebukadnezzar
    After browsing some old code, I noticed that some classes are defined in this manner: MIDL_INTERFACE("XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX") Classname: public IUnknown { /* classmembers ... */ }; However, the macro MIDL_INTERFACE is defined as: #define MIDL_INTERFACE(x) struct in C:/MinGW/include/rpcndr.h (somewhere around line 17). The macro itself is rather obviously entirely pointless, so what's the true purpose of this macro?

    Read the article

  • Sysadmin Dress Code

    - by andyh_ky
    What kind of dress code do you have at work as a systems administrator? Business casual, casual, some days casual, some days business casual, formal? It's safe to say "it all depends on the type of day we're planning on having" - but what happens if you need to speak to some C level personnel? Do you have a spare set of clothes?

    Read the article

  • See images in SSMS?

    - by Vaccano
    I was browsing around and found this blog post: http://erikej.blogspot.com/2010/04/version-3-of-exportsqlce-now-available.html (It is for a great add in if you user SQL Server CE.) On that post I saw an screen shot of SSMS with images in the results. How is this done? I have images in my database (PNG files that are serialized via memory stream), but I just see numbers when I select the image column.

    Read the article

  • What is a good software development plan?

    - by Totophil
    Whilst browsing through answers on SO I came across something that is, in my view, one of the more frequent software development management misconceptions: "[software development] plan is a reasonably detailed description of all the activities you need to undertake". Hence the question: what is good software development plan? Can it be boiled down just to a work breakdown structure; is WBS the single most important thing for a software development plan anyway?

    Read the article

  • Linux Teamviewer functionality, but for ssh only

    - by Icapan
    I need to access some Linux server behind NAT (no ports forwarded), so I need to have something like "phone home" like Teamviewer has. There is no GUI, but somebody can log in through SSH and dictate a password if it is changing (like Teamviewer). SSH (port 22) is enough (I can tunnel ports through SSH if I need). Any suggestions? How safe is it?

    Read the article

  • cifs/samba client library

    - by Reflog
    Hello. I'm looking for some stand alone library to access SMB/CIFS shares. I am not looking for mounting the shares, just browsing and accessing the files for reading. Preferable something with a simple simple API similar to regular POSIX operations of opendir, scandir, read and etc. Thanks in advance!

    Read the article

  • Data Execution Prevention in Windows Live Messenger

    - by Andrija
    I keep getting "Data Execution Prevention" error in Windows Live Messenger. I have noticed that this is happening usually when I leave computer to get coffee, and screensaver comes up, WLM breaks. Is there any way to prevent this error from happening? I see I can turn off this "Data Execution Prevention", but is that safe, since I know that WLM is under heavy attacks from spammers/hackers? Thanks

    Read the article

  • Install McAfee And Nod32

    - by hosseinsinohe
    Hi All I have a computer with windows XP service pack 3 as an operating system.This computer is in a network with McAfee update server.This server will install and update McAfee client in all computers in that network.When I install and running 'Eset Nod32 Smart Security (AntiVirus)',computer is getting hanged. (Not works in Safe Mode). How can I install both Nod32 and McAfee on this network ?

    Read the article

  • Oracle on windows cluster with online/offline IPs

    - by yzador
    I have a windows cluster (on windows 2008 server) with nodes in different subnets. So cluster has two IPs, one for each node (I'm talking not about node IP, but about cluster IP). One is online, the other is offline. Is it possible to run Oracle Fail Safe on this configuration? I've tried to install it, but it gives me the following error when trying to verify group or add database to group: FS-10220: Network name maps to IP address in the cluster resource but maps to IP address on the system

    Read the article

  • How to share information across controllers?

    - by Steffen
    Hi everybody, I recently started programming my first Cocoa app. I have ran into a problem i hope you can help me with. I have a MainController who controls the user browsing his computer and sets some textfield = the chosen folder. I need to retrieve that chosen folder in my AnalyzeController in order to do some work. How do i pass the textfield objectValue from the MainController to the AnalyzeController? Thanks

    Read the article

  • Is Google Analytics for Mobile available for Windows Mobile / Compact Framework

    - by Michal Drozdowicz
    Recently Google introduced an SDK for application usage tracking on mobile devices (Google Analytics for Mobile Apps). Unfortunately, it seems that it only supports IPhone and Android devices. Do you have any idea if this framework can somehow be used from Windows Mobile / Compact Framework applications or if Google is planning to release an SDK for WM? BTW, I don't mean a WM application for browsing through GA server reports, but an SDK for tracking your mobile app's usage.

    Read the article

< Previous Page | 66 67 68 69 70 71 72 73 74 75 76 77  | Next Page >