Search Results

Search found 59257 results on 2371 pages for 'windows identity'.

Page 709/2371 | < Previous Page | 705 706 707 708 709 710 711 712 713 714 715 716  | Next Page >

  • Beginner Geek: Everything You Need To Know About Browser Extensions

    - by Chris Hoffman
    Browser extensions extend your web browser with additional features, modify web pages, and integrate your browser with the other services you use. This guide will introduce you to the world of browser extensions and help you get started. If you’re a geek, this stuff is obvious to you. We geeks take this for granted — we know exactly what browser extensions can do, when to use them, and what to avoid. But not everyone knows all this stuff.    

    Read the article

  • How to implement smart card authentication with a .NET Fat client?

    - by John Nevermore
    I know very little about smart card authentication in general so please point out or correct me if anything below doesn't make sense. Lets say i have: A Certificate Authority "X"-s smart card (non-exportable private key) Drivers for that smart card written in C A smart card reader CA-s authentication OCSP web service A requirement to implement user authentication in a .NET fat client application via a smart card, that was given out by the CA "X". I tried searching info on the web but no prevail. What would the steps be ? My first thought was: Set up a web service, that would allow saving of (for example) scores of a ping pong game for each user. Each time someone tries to submit a score via the client application, he can only do so by inserting the smart card into the reader. Then the public key is read from the smart card by native c calls through .NET and sent to my custom web service, which in return uses the CA-s authentication OCSP web service to prove the validity of the public key/public certificate (?). If the public key is okay and valid, encrypt a random sequence of bytes with the public key and send it to the client application. If the client application sends back the correctly decrypted random sequence of bytes along with the score of the ping pong game, then the score is saved in the database for the given user. My question is, is this the correct way to do it ? What else should i know about smart card authentication ?

    Read the article

  • VPN connection sharing for Ubuntu guest

    - by pzico
    I have Ubuntu 10.04 guest on Windows XP host. I need to use a specific VPN software that works only on Windows. How should I configure virtualbox/guest so that the VPN connection would be visible on guest? I already tried NAT and bridged network settings. With both of these options I get only normal internet connection to work, but sites requiring VPN don't work on guest, only on host.

    Read the article

  • How to Use KeePass In Your Browser, Across Your Computers, and On Your Phone

    - by Chris Hoffman
    If you’re using a password manager and it’s not the cloud-based LastPass, it’s probably KeePass. KeePass is a completely open-source password manager that stores all your sensitive data locally. However, this means that it isn’t quite as well-integrated as other solutions. Want LastPass-style browser integration, the ability to synchronize your passwords and have them everywhere, and an app to access your passwords on your phone? You’ll have to string together your own system.    

    Read the article

  • Installing Chameleon RC4

    - by user36912
    I have installed windows xp on C: and Hackintosh on F:. Currently windows xp is booting by default. If i need to boot into Hackintosh i need Empire EFI boot CD. I want to install Chameleon boot loader so that no more need of EFI boot CD. How can i install Chameleon? Will i install it from Mac or from win xp? What steps?

    Read the article

  • How to Add a Business Card Image to a Signature in Outlook 2013 Without the vCard (.vcf) File

    - by Lori Kaufman
    When you add a business card to a signature, an image of the business card is inserted into the signature and the vCard (.vcf) file is attached. If you don’t want to attach the vCard file, you can insert the image only into your signature. To insert only the image of your business card without the .vcf file, click People on the Navigation Bar at the bottom of the Outlook window. To get a business card image we can use, we must view the contacts in any form other than People, so we can open the full contact editing window. To do this, click on a different view in the Current View section of the Home tab. We chose to view our contacts in the Business Card format. Double-click on your contact in the current view. The full contact editing window displays with an image of the business card on the right. Right-click on the business card image and select Copy Image from the popup menu. To close the contact editing window, click the File tab and click Close in the menu list on the left. NOTE: You can also click the X in the upper, right corner of the contact editing window to close it. To open the signature editor, click the File tab. Click Options in the menu list on the left side of the Account Information screen. On the Outlook Options dialog box, click Mail in the list of options on the left side of the dialog box. On the Mail screen, click Signatures in the Compose messages section. NOTE: You can also access the Signatures and Stationery dialog box from the Message window for new emails and drafts. Click New Email on the Home tab or double-click an email in the Drafts folder to access the Message window. For more information, see our article about assigning a default signature. In the signature editor, right-click and select Paste from the popup menu. The image is inserted into the signature. You can also use this method to copy a business card image for use in other documents and programs. It’s also possible to insert the vCard (.vcf) file into a signature without the image. We’ll cover that topic tomorrow.     

    Read the article

  • Microsoft Unveils New Logo

    Indeed, with those four familiar colored squares - set in a bigger square rather than standing on a point in a diamond - Microsoft's new corporate logo seems almost inevitable. As you'd expect, the company's name makes up part of the logo, but instead of the thick italic letters it has used for the past two and a half decades, it's in a more standard, lighter font. Jeff Hansen, Microsoft's general manager of brand strategy, notes that the point of the new logo is to signal the heritage but also signal the future - a newness and a freshness. It's very fitting when you consider just how many...

    Read the article

  • What are the app pool identity and account for anonymous access for?

    - by apollodude217
    I understand what the two are used for, except I don't know what each does--i.e. what one is for vs. what the other is for. (I usually set them to the same account anyway.) If you're not sure what accounts I'm talking about, in the IIS manager thingy: Right-click on the app pool in question, go to Properties, and click the Identity tab to see the App Pool Identity. Right-click a Web site, go to Properties - Directory Security, and click Edit under Anonymous Access and authentication control to view the Account for anonymous access.

    Read the article

  • Microsoft Seeks Beta Testers

    Microsoft recently announced that it was soliciting the help of Beta testers for the upcoming version of its Security Essentials program. Although the slots are limited for the testing, Microsoft did say that it plans to release Microsoft Security Essentials Beta to the general public by the end of this year. Becoming a part of the testing process not only allows you to see what Microsoft has up its sleeve in terms of enhanced security and performance, but you can also voice your opinions on the product to give the company suggestions on improvements to include prior to the final version's r...

    Read the article

  • Solera Networks Threat Predictions for 2012, Solutions

    Legitimate sites are often trusted by their visitors, which makes them a perfect target for cybercriminals. Solera lists attacks on legitimate, yet compromised sites as a growing trend for 2012 due to the increased amount of such sites containing unpatched vulnerabilities. Once compromised, hackers can use the legitimate sites to redirect unsuspecting visitors and put them in harm's way. According to Solera, malicious spam is another undesirable item that should increase in 2012. Various methods, such as email, instant messaging, attachments, malicious links, and social networks will cont...

    Read the article

  • Did Microsoft Add Wiretapping Capability to Skype?

    Ryan Gallagher, writing for Slate, put two and two together from a lot of no comments. He noted that back in 2007, German police forces said that they couldn't tap into Skype calls because of of its strong encryption and complicated peer-to-peer network connections; in fact, Skype bluntly stated at the time that, due to its encryption and architecture techniques, it couldn't conduct wiretaps. But that may have changed. Gallagher cited a Forbes article that claims the hacker community is talking about recent changes to Skype's architecture and whether they will allow users to be wiretapped. ...

    Read the article

  • Dell All-in-One 810 CD software will no longer install

    - by authentictech
    I have a Dell All-in-One 810 printer from years ago and only recently installed it (a few months ago). Later I had reason to uninstall and re-install the printer but whenever I connect the printer Windows installs the printer drivers from its cache without the CD. How can I remove all traces of the drivers from the cache so that it will install only from the CD and not from the Windows driver cache?

    Read the article

  • How to Send and Receive Faxes Online Without a Fax Machine or Phone Line

    - by Chris Hoffman
    Some slow-moving businesses and government agencies may not accept documents over email, forcing you to fax them in. If you are forced to send a fax, you can do it from your computer for free. We’ve previously covered ways to electronically sign documents without printing and scanning them. With this process, you can digitally sign a document and fax it to a business — all on your computer and without any printing required.    

    Read the article

  • Thread problem with XNA C#

    - by Luis
    I'm development a network card game, and for now i've two players connected but there is a problem with one of them, this one can't do anything on the game. Looks that screen was blocked. I'm think that is because a code i used before. That code is: if (InvokeRequired) { this.Invoke(new MethodInvoker(delegate { ... })); return; } The code above is surrounding code to changing Button values, make connection with server and create game window. Without this code a warning is shown. InvalidOperationException was unhandled Cross-thread operation not valid: Control 'startGameButton' accessed from a thread other than the thread it was created on.

    Read the article

  • What could cause a program to stay in "Add/Remove Programs" even after removing from registry

    - by Ryan
    Trying to manually remove an entry from Control Panel Add/Remove Programs. (custom software, not MS KB patch or windows component and not doing anyting 'funky' like trying to stop itself form being uninstalled) Followed http://support.microsoft.com/kb/314481 removing all applicable registry keys for program from HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ and even tried rebooting but still it persists. Double checked followed KB314481 and search for program name doesn't return any other matches in that part of the registry. Any ideas what would cause this or how to solve?

    Read the article

  • domain resolves old ip on win 7

    - by Ahmet vardar
    Hi, I recently have moved my server and changed nameservers and ip, i updated my domain. but somehow in windows 7 when i go to my domain, it resolves old ip even though mac os x shows the new site. Then i edited hosts file with the new ip in windows, it is ok now. but why this happens ? is it about isp cache or sth ? thanks

    Read the article

  • Editing the FTP Root page

    - by user31542
    We have an ancient FTP server that runs Server 2000 and when our users use IE to login they are Presented with the following error: To view this FTP site in Windows Explorer, click Page, and then click Open FTP Site in Windows Explorer. The problem is with the upgrade to IE 7 "Page" has been replaced by "View". Does anyone know a way to get into the default page and edit its settings to update it?

    Read the article

  • My Laptop Beeps when I try to USB boot install

    - by Gino
    I tried to boot install Ubuntu using my laptop (without CD Drive) using a USB drive, then it goes to the boot selection menu (the one with the Ubuntu logo installation options). I selected Install then my laptop just beeps - 1 short beep, after that it stops then nothing installs, it just stays at the installation menu, can someone please help? Laptop Specs Neo Notebook (forgot the model version) 2GB RAM running Win XP SP3 150GB Hard Drive memory Would really appreciate if someone helped, I just used the normal 12.04 installer.

    Read the article

  • SSRS reports print button missing in IE 8

    - by Will Sams
    Seems like this is broken again (http://serverfault.com/questions/177268/ssrs-report-unable-to-load-client-print-control and SQL 2008 SP2 RsClientPrint ActiveX - "Unable to load client print control"). We updated all of our Windows 7 clients last Friday and it looks like the mighty "Unable to load client print control" has returned since then. Anyone aware of possible problems with the latest batch of Windows Updates?

    Read the article

  • Game maps with "counties" that are split along lines that aren't necessarily straight

    - by pm_2
    I want to create a game environment that supports a 2D map. This is a really basic map, but must be split along lines that are not necessarily straight. So imagine a country with county boundaries. I then want to be able to detect drag / drop events within these counties. What I'm really looking for here is a pointer to where to start on this (how it has been done before - any existing libraries out there), as I'm sure that what I'm trying to do is not new - although I can't find a beginners guide for this anywhere.

    Read the article

  • Safely dual-boot XP and Ubuntu 12.04 Desktop?

    - by Ycart I
    My netbook Acer AOD255 has three primary partitions in it by default - PQSERVICE/recovery (NTFS), Android x86 1.6 (FAT32), and the main WinXP Home SP3 (pre-installed, dual-booted with Android from inside WinXP). I was able to resize all three partitions to give 9GB of unallocated space for a future Ubuntu installation, which can already be booted from a pendrive. Here's my problems: 1.) I don't know how to install Ubuntu on that 9GB space (even if I create an unformatted partition for it) 2.) I currently have no means of reinstalling my XP, or backing-up any data (so I don't want to accidentally wipe out my whole HDD at all) 3.) I want XP and Ubuntu to be dual-booted thru a boot manager like GRUB or something more practical (but google searches confuse me) 4.) When I boot to try Ubuntu, GParted displays my whole drive as unallocated space. It also says "can't have overlapping partitions" or something.

    Read the article

< Previous Page | 705 706 707 708 709 710 711 712 713 714 715 716  | Next Page >