Search Results

Search found 92226 results on 3690 pages for 'file access'.

Page 705/3690 | < Previous Page | 701 702 703 704 705 706 707 708 709 710 711 712  | Next Page >

  • Force view text file instead of download in Firefox?

    - by davr
    Often times I'll click on a random link to a .sh or .py or .cpp or ... file in Firefox, and all I want is to view the code. I don't have a Firefox handler set up for every text file extension under the sun, and I don't want to have to. Is there an easy way to force Firefox to view the file as text instead of trying to save (or open in external app)?

    Read the article

  • How can I tell if ZFS (zfs-fuse) dedup/compression is applied to a particular file?

    - by asari
    I have a zfs formatted partition using zfs-fuse for linux (Ubuntu). I had used it for a while, and then enabled dedup and compression on it (zfs set compression=on/dedup=on). Now I think I have some files that are dedup'ed and compressed, and file that are not yet. It was OK, but sometimes I was confused. Let's see, following command would consume almost 4GB of my zfs storage: cp oldfile.4GB newfile.4GB .. and this would consume almost zero: cp newfile.4GB newfile.4GB.2 This is because the old file is not yet compressed, so dedup not happened, I think. My idea is -- if I can find old files that are not yet dedup/compressed, I can perform batch copy/rename/remove them to eliminate duplicity and redundancy. But how I can check that? I know I can re-copy whole contents of my storage should work (even better with checking the time stamp of each file), but I'd be happier if I have zfsstat-like tool that shows some file properties.

    Read the article

  • sendmail: how can I restrict access to clients that only have a valid certificate?

    - by lxg
    I want to reject all connections that don't present a valid SSL/TLS certificate. First of all is the access db file the correct one to be changing? I have already tried using the basic rule given in the documentation CertIssuer:/C=US/ST=California/O=endmail.org/OU=private/CN= Darth+20Mail+20+28Cert+29/[email protected] RELAY This will obviously need a rule afterward to filter and reject all that don't present the cert? Does anyone have any pointers as to what syntax I should use? wildcards? lxg

    Read the article

  • How to access internet from 2 laptops with data card plugged-in in one of the machine?

    - by learnerforever
    Hi, I have 2 laptops - one running Windows XP and other running Vista. Both have wifi card.I have one Reliance broadband data card. I want to be able to access internet on both the machines simultaneously using this one data card. Please help. I think, there would be many many ways to do it. I do have some linksys router but any simple quick way without any extra hardware? like we could set up p2p or WLAN between these 2 machines, because both have wifi card so we shouldn't compulsorily need any extra hardware(?) I am fine with connecting data card to either of the machines. Thanks,

    Read the article

  • How to access internet from 2 laptops with data card plugged-in in one of the machine?

    - by learnerforever
    Hi, I have 2 laptops - one running Windows XP and other running Vista. Both have wifi card.I have one Reliance broadband data card. I want to be able to access internet on both the machines simultaneously using this one data card. Please help. I think, there would be many many ways to do it. I do have some linksys router but any simple quick way without any extra hardware? like we could set up p2p or WLAN between these 2 machines, because both have wifi card so we shouldn't compulsorily need any extra hardware(?) I am fine with connecting data card to either of the machines. Thanks,

    Read the article

  • How do FTP servers handle rename to an existing file?

    - by Kristian
    How do FTP servers normaly handle rename to a file that aready exist? That is, will the existing to-file be overwritten or will I get an error? Is there some specification about how FTP servers should handle this, or is it OS or implementation dependent? vsftpd on Linux seems to overwrite, with FileZilla on Vista I get 550 file exists...

    Read the article

  • Can I create directories that don't exist while creating a new file in emacs?

    - by Jim
    In emacs, I create a file by visiting it with C-x C-f. Let's say I'd like to create /home/myself/new_directory/file.txt. If new_directory does not exist yet, is there a way to have it get created during the creation of file.txt without any extra steps? (I'm thinking of something like using the -p flag to mkdir in Linux.) I feel like there's a different keystroke instead of C-x C-f that can do this, but I can't remember what it is.

    Read the article

  • Where did the text of my .html file go in TextEdit on Mac OS X?

    - by David
    I recently created a .html file in TextEdit on my Mac (Mac OS X 10.5.8). I then opened that .html file in my browser and it showed the page I created just fine. I closed the .html file and TextEdit and refreshed the page. It still worked fine. Then I opened up the .html file in TextEdit again and all the text was gone (the page in the browser still works fine though). Where did all the text go?

    Read the article

  • Secret, unlogged, transparent, case-sensitive proxy in IIS6?

    - by Ian Boyd
    Does IIS have a secret, unlogged, transparent, case-sensitive proxy built into it? A file exists on the web-server: GET http://www.stackoverflow.com/javascript/ModifyQuoteArea.js HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Connection: Keep-Alive Host: www.stackoverflow.com HTTP/1.1 200 OK Connection: Keep-Alive Content-Length: 29246 Date: Mon, 07 Mar 2011 14:20:07 GMT Content-Type: application/x-javascript ETag: "5a0a6178edacb1:1c51" Server: Microsoft-IIS/6.0 Last-Modified: Fri, 02 Tue 2010 17:03:32 GMT Accept-Ranges: bytes X-Powered-By: ASP.NET ... Problem is that a changes made to the file will not get served, the old (i.e. February of last year) version keeps getting served: HTTP/1.1 200 OK Connection: Keep-Alive Content-Length: 29246 Date: Mon, 07 Mar 2011 14:23:07 GMT Content-Type: application/x-javascript ETag: "5a0a6178edacb1:1c51" Server: Microsoft-IIS/6.0 Last-Modified: Fri, 02 Tue 2010 17:03:32 GMT Accept-Ranges: bytes X-Powered-By: ASP.NET ... The same old file gets served, even though we've: renamed the file deleted the file restarted IIS The request for this file does not appear in the IIS logs (e.g. C:\WINNT\System32\LogFiles\W3SVC7\) And this only happens from the outside (i.e. the internet). If you issue the request locally on the server, then you will: - get the current file (file there) - 404 (file renamed) - 404 (file deleted) But if i change the case of the requested resource, i.e.: GET http://www.stackoverflow.com/javascript/MoDiFyQuOtEArEa.js HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Connection: Keep-Alive Host: www.stackoverflow.com Note: MoDiFyQuOtEArEa.js verses ModifyQuoteArea.js Then i do get the proper file (or get the 404 as i expect if the file is renamed or deleted). But any subsequent changes to the file will not show up until i change the case of the file i'm asking for. Checking the IIS logs all indicate that the (internet) requests are all coming the correct client on the internet (i.e. not from some intermediate proxy). Since the file doesn't exist on the hard drive anymore, i conclude that there is a proxy. The requests serviced from this proxy are not logged in the IIS logs. The requests for new files are logged, and from the client IP, not a proxy IP. The proxy is case sensitivie. This does not sound like something Microsoft, or IIS, would do: - a transparent proxy - case-sensitivie - unlogged - surviving restarts of IIS - surviving in a cache for hours i can't believe that our customer's IIS is doing these things. i'm assuming there is some other transparent proxy in front of IIS. Or, does IIS have a transparent, unlogged, case-sensitive, memory based, proxy, that caches content for at least 7 hours? (Come Monday morning, IIS is serving the correct file, unlogged).

    Read the article

  • How can I secure Postgres for remote access when not in a private network?

    - by orokusaki
    I have a database server on a VMWare VM (Ubuntu 12.04.1 LTS server), and it just occurred to me that the server is accessible via the web, since the same physical server contains a VM that hosts public websites. My iptables in the database are such that only SSH traffic, loopback traffic, and TCP on port 5432 are allowed. I will only allow host access to the Postgres server from the IP of the other VM on the same physical machine. Does this seem sufficient for security, assuming there aren't gaping holes in my general OS configuration, or is Postgres one of those services that should never be web facing, (assuming there are some of "those"). Will I need to use hostssl instead of host in my pg_hba.conf, even though the data will travel only on my own network, presumably?

    Read the article

  • How to install software packages on a shared Red Hat Linux host account without root access or rpm?

    - by jeff
    I have a shared RHEL 4 host account where I do not have root privileges. I would like to install Git and Bash Complete in a way that they can be upgraded easily. To date, I've just been installing from source providing $HOME as a prefix to autoconf. Obviously this isn't ideal as I need to hunt down the files associated with the version I'm upgrading away from and delete them. I've tried using rpm but I just get -bash: rpm: command not found back so it's not available. I also looked into checkinstall but it looks like that requires rpm, dpkg, or Slackware's package manager to be available. Is there anything out there that can be used like a package manager without requiring root access or an existing package manager?

    Read the article

  • How can I make sftp accounts that can only access their home directory?

    - by LonnieBest
    I'm using Ubuntu Server 9.10. I need to setup 6 accounts for users that will exclusively need sftp. When the user logs in, I need them to only have access to their home directory. I don't want them to be able to navigate to any other places in the file system. I need their ability to type commands to be limited to only the commands needed to view and transfer files back and forth to their home directory. Can anyone offer some guidance on setting thing up this way?

    Read the article

  • How can I perform a syntax check on an .htaccess file in a shared hosting environment?

    - by Danny
    I have a build script (Perl) that modifies the .htaccess file when I deploy my applications. As a double-check I'd like to be able to perform some sort of syntax checking on the created .htaccess file. I am familiar with the idea of using apachectl -t however, I am in a shared hosting environment and because of file access restrictions I cannot read certain configuration files specified by the sysadmins. Apachectl simply will not work in this regard. Ideas or suggestions welcome.

    Read the article

  • Windows zip error: Windows cannot complete the extraction. The destination file could not be created

    - by Snake Eyes
    I have a strange error in Windows 7 when I want to execute/open a file inside ZIP archive. I have two files: File1.dwg File2.dwg The archive is not corrupted ( I checked with 7zip utility ) When I double click on the any file inside ZIP (I opened ZIP with Windows Explorer), the error occured: Ok. If I open zip file with 7-zip or WinRAR every file could be opened(executed) without error and the AutoCAD is opened to see the dwg content. Why in Windows ZIP ? What points have I to see to manage/remove this error ? Thank you. UPDATE If I click Extract all from Windows ZIP, the error occured as unspecified error:

    Read the article

  • Google Apps claims my domain is registered but when I try to access it claims it is not

    - by user32953
    Hi all, we have registered one of our domains with Google Apps 2 years ago. However, we didn't even use it. Now if I try to access: http://google.com/a/mydomain.com What I see is: Server error Sorry, you've reached a login page for a domain that isn't using Google Apps. Please check the web address and try again. Then I go to Google Apps Standard Edition signup page and type mydomain.com. However, what I get is: This domain has already been registered with Google Apps. Please contact your domain administrator for instructions on using Google Apps with this domain. Is there anyone who can explain me what this inconsistency is caused by and what I can do? Since Google Apps Standard Edition doesn't grant me to contact with Google, I can't even submit a bug report. Any help would be appreciated.

    Read the article

  • How to disable irritating Office File Validation security alert?

    - by Rabarberski
    I have Microsoft Office 2007 running on Windows 7. Yesterday I updated Office to the latest service pack, i.e. SP3. This morning, when opening an MS Word document (.doc format, and a document I created myself some months ago) I was greeted with a new dialog box saying: Security Alert - Office File Validation WARNING: Office File Validation detected a problem while trying to open this file. Opening this is probably dangerous, and may allow a malicious user to take over your computer. Contact the sender and ask them to re-save and re-send the file. For more security, verify in person or via the phone that they sent the file. Including two links to some microsoft blabla webpage. Obviously the document is safe as I created it myself some months ago. How to disable this irritating dialog box? (On a sidenote, a rethorical question: Will Microsoft never learn? I consider myself a power user in Word, but I have no clue what could be wrong with my document so that it is considered dangerous. Let alone more basic users of Word. Sigh....)

    Read the article

  • Where did the text of my .html file go in text edit on mac.

    - by David
    I recently created a .html file in text edit on my mac (os x 10.5.8). I then opened that .html file in my browser and it showed the page i created just fine. I closed the .html file and text edit and refreshed the page. It still worked fine. Then i opened up the .html file in text edit again and all the text was gone (the page in the browser still works fine though). Where did all the text go?

    Read the article

  • How can I prevent Firefox from storing a 10 MB places database file in my Windows roaming profile?

    - by Paul D. Waite
    On my work PC, Firefox stores a 10 MB file called places.sqlite in my roaming profile: C:\Users\MY_USERNAME\AppData\Roaming\Mozilla\Firefox\Profiles\PROFILE_ID\places.sqlite I don't use any location-related features in Firefox, and this file causes my roaming profile to be larger than my company allows (25 MB), meaning I get warnings about my profile size every day. Can I stop Firefox storing this file in my roaming profile?

    Read the article

  • How can I split the 5.1 audio channels from an AC3 file into individuals streams (preferably on a Ma

    - by Drarok
    I have a file that I've pulled from a DVD that is apparently in AC3 5.1 format. The extension is .AC3 and it opens an plays in QuickTime, VLC etc. What I want is each individual channel in a separate file, but I can't seem to find any tools that will allow be to do that. Is there a way to split the file I have, or alternatively is there a way to pull the audio streams from a 5.1 DVD?

    Read the article

  • Windows and file system abstraction - how much does it matter where something comes from?

    - by deceze
    I have come across the following phenomenon and would like to know how leaky Windows' file system abstraction is or if there's something else involved. I partitioned the hard disk of my MacBook Pro and installed Windows 7 (64 bit). The Bootcamp driver package includes file system drivers (right term?) that enable Windows to access the Mac OS HFS+ partition. AFAIK it's a read-only access, but it works. Now, I have some disk images of stuff I usually install, so I grabbed a copy of Daemon Tools to mount them. When I mount an image saved on the HFS+ partition, about two out of three installers on these disks (usually InstallShield) crash with all sorts of weird errors. Most are just gibberish that lead to all sorts of non-solutions on Google, one was "This application is not the right type for your computer, check if you need 32 or 64 bit versions." When moving the image files to another Windows 7 computer on the network and mounting them from the network share, they work fine. My question now is, why do applications behave differently depending on whether the read-only image file, which should be abstracted away through the read-only virtual Daemon Tools drive, is located on a read-only HFS+ partition or on a Windows network share? And I'll just roll this into the question as well since I was wondering: Does the file system of a network share matter? Does the client system need to understand the file system of the share host or is that abstracted away in SMB?

    Read the article

  • How to restore a Windows Easy Transfer file from a 64bit machine to a 32bit machine?

    - by Kevin Davis
    Using a 32bit laptop, I saved my settings etc. using "Windows Easy Transfer" from the Win7 RC. I set the file destination to a Win2K R2 machine that happened to be 64bit. When I re-installed my laptop and tried to restore my settings from the file I'd saved I was surprised to get an error: "Windows Easy Transfer can't transfer files from a 64-bit computer to a 32-bit computer." Is there a known workaround? Ideas on how to unpack the file and get my stuff?

    Read the article

  • Is there a way to obtain the raw image from a Norton Ghost file ?

    - by amo-ej1
    I have a Norton Ghost .gho file, and basicly I want to extract the raw image out of this, for example to use with with tools like dd. (So using any symantec/windows tools is not an option). Is there any open source tool which can deal with these .gho files ? (Note: the.gho file I'm using is a sector based one, and not a file-based one, which implies that things such as Ghost explorer won't work either (see this page)

    Read the article

  • Securing RDP access to Windows Server 2008 R2: is Network Level Authentication enough?

    - by jamesfm
    I am a dev with little admin expertise, administering a single dedicated web server remotely. A recent independent security audit of our site recommended that "RDP is not exposed to the Internet and that a robust management solution such as a VPN is considered for remote access. When used, RDP should be configured for Server Authentication to ensure that clients cannot be subjected to man-in-the-middle attacks." Having read around a bit, it seems like Network Level Authentication is a Good Thing so I have enabled the "Allow connections only from Remote Desktop with NLA" option on the server today. Is this acion enough to mitigate the risk of a Man-in-the-Middle attack? Or are there other essential steps I should be taking? If VPN is essential, how do I go about it?

    Read the article

  • how to stream audio and video files, but use any media player on Windows (without using Windows file

    - by RamyenHead
    I want to access and play media files on machine S (Windows XP) from machine C (Windows XP). Using Windows File Sharing ("share this folder" stuff), if it works, I would share the folder containing media files on machine S, and I would be able to play media files, sitting in front of C, using any media player I want. Windows somehow ensures that the remote files behave like local files. But Windows file sharing won't work for me, is there any alternative? If two machines were both Linux, I would install an SSH server on S and use Nautilus from C to access and play media files. The reason why I can't use Windows file sharing is, my campus use two different subnets, I have S and C on different subnets and it seems that the firewall governing the whole network in campus doesn't allow file sharing between different subnets. I tried changing Windows Firewall settings on S to allow C in, it still wouldn't work, so it must be the other firewall.

    Read the article

  • How do I protect large file downloads through PHP and/or Apache?

    - by Eric
    We have some large files (1-8GB) that are not publicly accessible. Currently we're serving them up through a PHP script that buffers the files in 1MB chunks and writes it to the output. It's incredibly CPU intensive and slows the server down when only a few downloads are active. We want to move the file transfer work to Apache or a more efficient method. We are using cookie authentication. FTP downloads are out unless there's some way to authenticate FTP sessions through the existing PHP session cookie. Ideally we'd like something where we can use PHP to hide the link to the file while it passes off the file transfer work to Apache, which is no doubt far more efficient at HTTP file transfers than PHP. We want to be able to resume downloads as well. Any help is appreciated.

    Read the article

< Previous Page | 701 702 703 704 705 706 707 708 709 710 711 712  | Next Page >