Search Results

Search found 12502 results on 501 pages for 'kind'.

Page 73/501 | < Previous Page | 69 70 71 72 73 74 75 76 77 78 79 80  | Next Page >

  • Editing the registry entry to have Citrix call the local install of an application

    - by jrembold
    We use Citrix to access an app (APP1) remotely. As it currently stands, when APP1 needs to do a merge document, it calls a session of another app (APP2) from the Citrix server. However, due to latency issues, we now want APP1 to call a local version of APP2. This is controlled in the registry entry for APP1. I'm wondering what kind of path entry would need to be made so that APP1 would call the local APP2 while following the rules of the Citrix profile.

    Read the article

  • Is there any way to set up a malware-blocking transparent proxy on an Airport Extreme?

    - by Chris R
    I'd like to add some kind of easily-administered transparent HTTP proxy to my home network. Ideally, it would allow me to, for example, redirect web requests to blacklisted servers into nothing, block certain kinds of content, et al. My home network at the moment consists of a mac mini media server that could -- if the load wasn't huge -- fill this role as well, an Airport Extreme, and a mac laptop that is my main machine. I'm reasonably technically savvy, so don't spare the complicated answers.

    Read the article

  • Reverse KVM solution

    - by aksamit
    I need to setup a computer so that it can be operated from two locations. The locations are about 20 meter from each other and the user wants the experience to be the same from both locations, i.e. no remote desktop or anything like that and preferably a seamless switch. So basically I need a double set of, monitor, keyboard and mouse, and then of course link it together by some kind of suitable hardware.

    Read the article

  • Windows 8.1 and fingerprint readers

    - by Sevenate
    Is there any build in UI for that kind of hardware like it exist in Modern UI for WiFi, Bluetooth, Broadband mobile and other common settings or I'm forced to use separate software (besides the obvious drivers for hardware)? The thing is that I have build-in fingerprint reader in my laptop and I have installed all necessary official drivers for it (and it looks like they are working fine, btw). But I did not find any UI settings where I could change Sign-in option from password/picture password/pin to fingerprint.

    Read the article

  • How much does HDD cache matter with Linux softraid?

    - by Jawa
    I'm in a process of renewing/expanding my disk sets, but not quite sure what kind of disks to get, cache-wise. What difference does disk cache amount of 16/32/64MB do, in capacities of, say, 1/1.5/2TB SATA disks? The disks will be used in a webapp server and in a media workstation, with Linux's softraid in raid-1/raid-5 configurations. Note, that as both purposes are purely for a hobby, the pricetag for a dozen of disks is a big issue.

    Read the article

  • usb audio recording: clicking noice

    - by snot
    I'm having problems recording audio on windows using usb audio devices. The recorded material will have some kind of jitter/clicking noice. I tested three different usb microphones and three different recording applications. Every combination will have the same problem. Does some one know a solution for this problem?

    Read the article

  • Server unstable after a WHM automated update

    - by user34521
    I have a server with WHM/cPanel server a website (Apache, PHP, MySQL) and a few days ago WHM performed some kind of update on itself (there are new icons and new appearance overall). Ever since that day, my site has been running slow for shorts periods of time, but several times a day. That never happend before. Is there some common cause for this? Something that WHM does when it does an update? I'm really clueless about this problem.

    Read the article

  • is it dangerous for the processor core to be *always* loaded at 100%?

    - by javapowered
    In my HFT software I plan to use one core for stock index calculation. That would be simply while(true) loop without any delays which will calculate (sum and multiply) components as often as possible (so millions times per second) and I plan to do that 8 hours per day every day. I was never before loading my computer to 100% full time every day regullary. May it be dangerous? Do processor has kind of "resource" (very big of course) after which it can stopped working?

    Read the article

  • bash aliases equivalent for powershell?

    - by Santosh Kumar
    By default my Windows PowerShell starts in C:\Users\Santosh, my XAMPP installation is in D:\ so the htdocs folder is located at D:\xampp\htdocs. If I have to edit something in htdocs folder then I have to type full cd D:\xampp\htdocs\ (autocompletion is not so kind) then edit that file. If this PowerShell were a Bash I would do this in .bash_aliases file: alias htdocs='cd D:\xampp\htdocs' Is it possible to maintain Bash aliases like file and alias any command in PowerShell?

    Read the article

  • How can I turn my server box into an internet modem?

    - by Robbie Mckennie
    I've been trying to learn about networking, network maintenance, network administration, stuff of that nature (I want to be a network engineer when I get out of university after I get out of high school) and I want to set up my older PC (running Slackware) as a modem, as a project to help me learn. I want to know what kind of hardware I'll need. Pretty much all I know is that my current modem uses ADSL2+ and PPPoA, which I think is a software thing anyway. How can I accomplish this?

    Read the article

  • Hardening Word and Reader against exploits

    - by satuon
    I have recently heard a lot about exploits for PDF and DOC files on Windows, which when opened in Reader or Word would infect the computer. I'm assuming most of those exploits rely on some kind of active content, I've heard that Reader allows JavaScript for example. I already have antivirus, but I've heard they often don't catch those types of exploits, so I want to try a little proactive defense. Is there a way to harden Reader and Word by disabling plugins or options that are often used by exploits?

    Read the article

  • Exchange 2007 | Mailbox DB Size 180GB

    - by rihatum
    Hi All, I have a Exchange 2007 SP1 server running on Windows 2008 6 HD Drives in a RAID-1 OS, DB, Logs on separate RAID-1 Disks Size of the Mailbox Database is 183GB and increasing We only have First Storage Group and Second Storage Group There is no more space on the server to install new Physical Disks and create a Storage Group Q - Can I resize the RAID-1 Partition where the DB is ? Q - Any other suggestions as to how I can decrease the Mailbox DB Size ? Will be grateful for your suggestions on this. Kind Regards

    Read the article

  • Can I use BitLocker on a Windows 8 Tablet? How?

    - by Coderer
    I hear that Windows 8 Pro can use full disk encryption. I also understand that Win8 is targeting the "slate" / "tablet" form factor specifically. But all my previous experience with BitLocker requires you to put in some kind of PIN or password at boot time -- how can I do this without a (hardware) keyboard? This preview of an upcoming Win8 tablet mentions BitLocker but doesn't address the PIN issue. Am I missing something?

    Read the article

  • Is CSF overkill?

    - by A4J
    My server runs just my own sites (vBulletin forums - which are always patched with security fixes) and Rails sites using the latest version) so do I really need CSF? (http://configserver.com/cp/csf.html) Or is it unnecessary for this kind of server set-up? I have already done the usual (disable SSH login, pub-key auth, very strong passwords everywhere else etc) It was often recommended by users over at the cPanel forums - but I guess most of them are hosts there.

    Read the article

  • Splitting a MySQL DB in two may ease server from "Too many connetions"? I don't think so

    - by Petruza
    I was requested to split a MySQL in two, it's kind of a horizontal partition, in which some rows correspond to one site, and some other correspond to another site. But they want to split it in two DBs in the same MySQL server. I'm no DB expert but I guess keeping them in the same MySQL server with the same amount of memory and processor and the same platform won't improve things. What we're trying to avoid is the "Too many connections" problem.

    Read the article

  • Windows 2003 - Isolate mailserver on webserver with VMware Server

    - by user43279
    Hi, I've a Virtual Private Server with Windows 2003 and root access. This server mainly acts as a web hosting machine (IIS, Apache). Additionally it is used as a mail server. Is it possible to isolate a mailserver (for example HMailServer) by using VMware Server on Windows 2003 in order to avoid potential viruses moving from the guest into the host system? Is this is a good direction to protect the web server from viruses? Kind regards, Jakub

    Read the article

  • Is there an alternative to Windows-Down to minimize?

    - by RoboShop
    I remember with Windows XP, minimize used to be like alt m - n or something. In Windows 7, it is Windows - Down. The problem with that though is that you have to use both hands (the Window button is too far away from the directional buttons), which is kind of annoying because generally, one of my hands is on the mouse. Is there any other keyboard to minimize a window besides Windows - Down in Windows 7?

    Read the article

  • Secondary Monitor Flickers Off

    - by David Robison
    I have a Windows XP computer with two monitors attached. The secondary monitor occasionally flickers off and then back on. It kind of looks like it is going into power saving mode, then immediately exiting. I have tried swapping the two monitors, and this consistently happens on the whichever one is connected as the secondary one. The video card I am using is a "Gigabyte GeForce 9600GT 512MB Silent".

    Read the article

  • Can you get any program in Linux to print a stack trace if it segfaults?

    - by Neil
    If I run a program from the shell, and it segfaults: $ buggy_program Segmentation fault It will tell me, however, is there a way to get programs to print a backtrace, perhaps by running something like this: $ print_backtrace_if_segfault buggy_program Segfault in main.c:35 (rest of the backtrace) I'd also rather not use strace or ltrace for that kind of information, as they'll print either way...

    Read the article

  • Windows: View "all" permissions of a specific user or group

    - by peterchen
    For a Windows domain, is there a way to see for a certain user or group, where the user/group has permissions? Primarily: List which files / folders the user can access on a certain network share. (Kind of a recursive "effective permissions") However, other permissions would be cool as well. I believe I've seen such a tool in action, but I can't remember anything beyond that - so this might be a false memory. Recommendations?

    Read the article

< Previous Page | 69 70 71 72 73 74 75 76 77 78 79 80  | Next Page >