Search Results

Search found 3650 results on 146 pages for 'technical publications'.

Page 76/146 | < Previous Page | 72 73 74 75 76 77 78 79 80 81 82 83  | Next Page >

  • Quickbooks 2009 2010

    - by Bronwyn
    I have configured my bank account within quickbooks to import bank statements. I have wxported the bank statement. Then used the convert process available within QB to convert. The file name shows the bsb then some other figures and then the account number. However it will not import. I am wondering how ot make this work. Can I change the file name to match my QB account details and thus enable the importing. This is a technical question. Many thanks Bronwyn

    Read the article

  • AMD Phenom II X4 965 crossfire motherboard

    - by Nick
    I am trying to build a cheap mining rig. I wanted to use the AMD Phenom II X4 965 (HDZ965FBGMBOX) processor as it got very good reviews and benchmarks, and is inexpensive. However, I am having trouble finding motherboards with crossfire support for 2 GPUs. AMD's website only lists five compatible motherboards, of which only one has crossfire support. Worse, it is expensive and seems to be obsolete and no longer available. I have trouble believing that there are only five compatible motherboards for that CPU. Are there any low-end motherboards that are both compatible with the AMD Phenom II X4 965 and have CrossFire support? (Is there a way to find this sort of information, like a central site that lists motherboards and their technical specifications?)

    Read the article

  • What is the impact of Windows 8 with UEFI on normal users?

    - by Sam
    I am a normal man-in-the-street computer user and so do not really understand what this is about, but I want to. Can someone please explain to me if: The Windows 8/UEFI secure boot thing will make it impossible to run normal/legacy applications in Windows 8 (as they will be unsigned)? It will turn Windows into an Apple-like system where only Microsoft approved applications can be run? As I say, I'm a normal user, and that is the overall impression I have from reading all the blogs, etc about it. If, on the other hand, all it does is make sure the system is booting a signed OS, how does this prevent malware (which is what at least two Microsoft blogs that I read seemed to be saying), given that most malware is not part of the boot process? The only way I can see this making sense is if it is ensuring that all OS components are signed. Is that it? Like I say, I'm a mortal, so please don't get technical on me, but rather explain how it will affect me, the user.

    Read the article

  • I have a dead laptop, what are my options?

    - by Michael Kniskern
    After having my previous question answered by the HP technical support, I now have a HP laptop that does not work properly. HP recommended that I replace the motherboard and processor for a bargain price of $733 US dollars. I originally purchased this laptop back when the Windows Vista was released back in January 2007 for about $2,000 US dollar, but now is an very expensive paperweight. What are my options for this laptop? Do I try to revive it on my own.... What are your suggestions?

    Read the article

  • How can I tag sequences inside videos?

    - by Antoine
    For example, let's say I find a sequence in a WWDC session (Apple videos) that explains a technical point very well. I would like to be able to store the exact range in the video, tag it with keywords, and manage all that information. And when I want to share this information, I could simply export to a plain English sentence: "Have a look at the video named …". It would be great to be able to launch a video player for local videos and go straight to the beginning of the sequence.

    Read the article

  • Strip my windows NTFS disk of all ACLs

    - by Alain Pannetier
    When you purchase a windows PC nowadays, you don't actually "own" the whole disk... There are so many ACLs on each folder that there are portions of it you actually can access only through a complex sequence of actions requiring skills well beyond the average PC user. You have to drill down to deeply buried dialog boxes accessible through concealed buttons. You have to understand at which level of the hierarchy you have to take ownership, remove ACLs etc... Yet when you think of it, that's your PC, that's what the "P" of PC originally stand for... So I'm toying with the idea of just stripping the disk of all ACLs I just purchased and leave standard file protections do the basic protection work... Just like previous century Windows used to do... (before I chmod -R 777 ;-) Has anybody done that already and nevertheless survived in reasonably good shape for a reasonable amount of time ? Any technical advice to do that ? Powershell script ? basic script using iCACLS ?

    Read the article

  • What is the best free service to host images and mp3 files?

    - by Edward Tanguay
    I am making an educational social software silverlight application. I would like users to be able to point the application to a URL with text, images, and audio files which they have created. Many users will not have their own website to do this, so we are looking for a free service they can use to upload, and manage their own text/image/audio content. What is the best free service for non-technical users to upload and make available text, images and audio? For instance, sites.google.com allows you to upload pictures and access them via http so that would work, but that is more about making a website. For this purpose we just need the ability to upload files, without the website creation tools.

    Read the article

  • Book recommendation for learning server management and Apache

    - by japancheese
    Hello, I'm currently managing a site that I feel could be optimized and utilized to be much faster, however, I'm having difficulty finding reliable information to do it. I find the Apache documentation to be a hard read, and too technical about things I don't have a strong grasp on. I'm just looking for a good beginner/intermediate book about server administration to learn as much as possible about Apache, as well as how to create a nice secure, robust server that doesn't crash at the first hint of unusual traffic surges. Thanks to anyone who can point me in the right direction.

    Read the article

  • Does a USB to RJ-45 console cable exist?

    - by Carl Flippin
    I am aware of the RJ-45 to DB9 adapter commonly used on cisco routers to access console. I am aware of the USB to DB9 adapters to allow laptops without serial to get a serial port. I am looking for a USB to RJ-45 adapter so I don't have to chain two adapters together. I have searched everywhere but even the pre-packaged solutions seem to have the two adapters chained together. Does such a thing exist? If it doesn't is there some technical reason it cannot? It seems like a manufacturer would just have to wire the DB9 end of the USB adapter differently and it would work just fine plugged straight into the console port of the router.

    Read the article

  • How do I get Windows 7 wallpaper to display the company logo properly?

    - by David Silva Smith
    Windows 7 is not displaying our company background properly. Curves show pixelation and straight lines are jagged. I'm working with a scalable vector graphics (SVG) image that I've exported to the same resolution (pixel dimensions, to be technical) as the desktop, which is 1440x900. I have tried exporting the image as a .png, .jpg, and .bmp. All of these look correct in an image viewing program, such as Windows Photo Viewer and Paint, but when I set the Windows background to these images, curves show pixelation and straight lines are jagged. Reading online, it seems that behind the scenes, Windows is converting the image to a .jpg with low quality compression, which is causing the issue. I've tried setting the image as a background through Internet Explorer, saving it as a .jpg, and putting the file in the Windows photo directory as suggested in some online forums, but none of those solutions have fixed my issue.

    Read the article

  • Survey for OS/Browsers etc for an external Agency.

    - by ggonsalv
    We need to design an browser application accessed by a fixed set of external entities (providers). I was wondering if there is a pre-existing survey that is 1) Online 2) Determines the browsers being used etc. without the users having to type it in 3) Determine connectivity from IP address. (Like how Speedtest.com does ). It can tell what your ISP is ,etc without having the user fill it in. The ability to add other questions. So basically a recipient of the survey would navigate to the site, the survey questions that can be inferred , are prefilled so as make recipient only answer the non-technical questions of the survey.

    Read the article

  • Which window manager do you use?

    - by Stephan202
    Combining "What is your default web browser?" and "What are the differences between Linux Window Managers", I ask you: which window manager do you use, and why? Myself I prefer a minimal window manager on the one hand (in the past I used Fluxbox), but on the other hand wish to go with the main stream, to ease finding (Googling) solutions in case of problems. Hence I stick with Gnome as it is shipped with Ubuntu. Why do you use the window manager which you use? I understand some reasons may be subjective, but please try to cite technical reasons where possible.

    Read the article

  • A website hosted on the 1.0.0.0/8 subnet, somewhere on the Internet?

    - by Dave Markle
    Background I'm attempting to demonstrate, using a real-world example, of why someone would not want to configure their internal network on the 1.0.0.0/8 subnet. Obviously it's because this is not designated as private address space. As of 2010, ARIN has apparently allocated 1.0.0.0/8 to APNIC (the Asia-Pacific NIC), who seems to have begun assigning addresses in that subnet, though not in 1.1.0.0/16, 1.0.0.0/16, and others (because these addresses are so polluted by bad network configurations all around the Internet). My Question My question is this: I'd like to find a website that responds on this subnet somewhere and use it as a counter-example, demonstrating to a non-technical user its inaccessibility from an internal network configured on 1.0.0.0/8. Other than writing a program to sniff all ~16 million hosts, looking for a response on port 80, does anyone know of a directory I can use, or even better yet, does anyone know of a site that's configured on this subnet? WHOIS seems to be too general of a search for me at this point...

    Read the article

  • Obsessive behaviors in sysadmins

    - by squillman
    I have been told by colleagues (mainly non-technical) that some of my admin behaviors border on / cross the line between normal and obsessive, which sometimes leads me to wonder how screwed up I really am (read "how screwed up everyone else really is"). What are your obsessive behaviors when it comes to your sysadmin tasks and job functions? What do you do religiously that would make you twitch if you didn't do it or that others just roll their eyes at? I have reasons for my actions. I want to prove to my coworkers that I'm not alone.

    Read the article

  • How to prove that an email has been sent?

    - by bguiz
    Hi, I have a dispute on my hands in which the other party (landlord's real estate agent) dishonestly claims to not have received an email that I truly did send. My questions is, what are the ways to prove that the email was indeed sent? Thus far, the methods that I have already thought of are: Screenshot of the mail in the outbox Forwarding a copy of the original email I am aware of other things like HTTP/ SMTP headers etc that would exist as well. Are these useful for my purposes, and if so how do I extract these? The email in question was sent using Yahoo webmail ( http://au.mail.yahoo.com/ ). Edit: I am not seeking legal advice here, just technical advice as to how to gather this information.

    Read the article

  • Home Server restore fails cannot find boot device

    - by Tim Heuer
    I am using Windows Home Server to backup my PCs. I recently had a hard drive failure on one of my WHS connected PCs and obtained an identical sized/speed drive for my laptop. I used the latest home server restore CD and did the restore. It said it completed successfully. Upon reboot, it says 'cannot find boot device' and lists all my drives (hard drive, cd, network book) indicating no valid operating system was found. I boot using the Win7 repair disk and while it doesn't see the operating system, it sees the drive and if I go into a command prompt, I can see all my data on the drive. My laptop is Windows 7 64-bit Ultimate. I've tried most everything I can think of. I'm a technical user (software developer) so I'm pretty aware of how things work (or should). I don't feel like I'm missing a simple step here.

    Read the article

  • Explorer hijacked by a trojan

    - by hsdb
    I managed to catch a newish trojan that my Anti virus program wasn't able to detect. I'm usually not that bad at technical stuff regarding computers but I really don't know what to do with this one anymore. The trojan somehow managed to get my Windows to recover it every time I try to remove it by deleting it's exe (called some weird name located in Programs "asdza/saddasn.exe" (example only)). It also sets an entry in my autostart. It starts a second explorer.exe and tries to connect to some server obviously trying to steal data. (glad I still have my firewall) How can I get rid of this trojan, I really need help. It is new and probably unrecognized by all major virus scanners.

    Read the article

  • Installing SSL certs with nginx on Amazon EC2

    - by Ethan
    I finally got a cert from an authority and am struggling to get things working. I've created the appropriate combined certificate (personal + intermediate + root) and nginx is pointing to it. I got an elastic IP and connected it to my EC2 instance. My DNS records point to that IP. But when I point the browser to the hostname, I get the standard "Connection Untrusted" bit, with ssl_error_bad_cert_domain. Port 443 is open - I can get to the site over https if I ignore the warning. Weird thing is, under technical details, it lists the domain I tried to access as valid! When I try and diagnose with ssl testing sites, they don't even detect a certificate! What am I missing here? domain is yanlj.coinculture.info. Note I've got coinculture.info running on a home server without a dedicated IP and have the same problem, but I'll be moving that to the same EC2 instance as soon as I figure this thing out. I thought the elastic IP would solve things but it hasn't

    Read the article

  • How realistic/easy is it to host our own web servers?

    - by morpheous
    It is increasingly looking like we will need to host our own servers, because we need modems physically attached to the server machines. I (think) we will need a T1 line to our office for starters. Dont know what else is involved other than the obvious redundancy and failover requirements. My questions are: Do we really have to do it our selves or can we find a service that allows the modems to be remote as well? If we have to host the servers ourselves, what are the steps (technical and operational) required?

    Read the article

  • Sendmail Alias for Nonlocal Email Account

    - by Mark Roddy
    I admin a server which is running a number of web applications for a software dev team (source control, bug tracking, etc). The server has sendmail running solely as a transport to the departmental email server over which I have no control. We have someone who is still in the department but no longer on the dev team so I need to configure the transport agent to redirect all outgoing email (which would be coming from these applications) to the person that has taken their place. I added an entry in /etc/aliases like such: [email protected]: [email protected] But when I run /etc/init.d/sendmail newaliases I get the following error: /etc/mail/aliases: line 32: [email protected]... cannot alias non-local names So clearly I'm doing something I shouldn't. Is there a way to get aliases to work with non-local names or alternatively is their a way to accomplish my goal of redirecting outgoing mail for this user to another one? Technical Specs if the matter: Ubuntu 6.06 sendmail 8.13 (ubuntu provided package)

    Read the article

  • Remove noise from a recording

    - by essamSALAH
    I used to record important technical meetings and demos using Camtasia Studio, using a Mic to capture the speaker voice. Sometimes we invite attendees by asking them to call us in the meeting, and they would call on a cell phone then we switch it to loudspeaker so we can hear and talk to them and also record the conversation on Camtasia. The problem I am having now is that playing back those recording produces the regular noise that results from the microphone being close to the mobile phone (the kind of noise you hear when your mobile phone rings and it is near a speaker). Any advice on removing this noise?

    Read the article

  • What would you use to keep track of all the random information about your LAN/Enviroment?

    - by agnul
    Say you work in your average anarchy... no appointed IT guy, no Office-Manager whatsoever, just developers working in free-for-all mode and a couple of non technical people around for admin (non IT) stuff. What would you use to keep track of Hardware / Software inventory Backups of OS images, Drivers, and all that LAN configuration information Passwords for all the systems Currently I'm thinking of having some sort of wiki + web server on our only ''server-class'' machine, but then I fear I'd be the only one who would go through the hassle of adding information in the wiki... So, have you been through that? What would you suggest?

    Read the article

  • How to solve my black screen at boot?

    - by Juanillo
    I've got a friend with a weird problem. When he starts his computer the screen is completely black until the computer is completely started. So the screen is black until it suddenly shows the Windows desktop. He said that this is happening since a technical service repaired his computer, but that repair is not now in warranty. Recently the computer stopped working, but as the screen is black he cannot access to BIOS or start in safe mode (by pressing F8). When he inserts the Windows Vista DVD the system doesn't boot from DVD (it mustn't be configured in this way in the BIOS). Maybe there´s a problem with the hardware (maybe the graphic card)? Can anyone explain a reason why the screen is black during start-up? Any idea of what to do with the computer to restore it?

    Read the article

  • Is it possible to combine two internet connections to increase performance?

    - by cornjuliox
    I've got a small home network, 3 PCs plus a laptop or two when the relatives come to visit, connected to a single cable internet connection. Now, as soon as everyone starts using the 'net the performance starts to suffer and if the load is heavy enough nobody can get anything done and everyone complains. At one point it was so bad that only one of us could use it at a time. I was researching possible solutions to this problem and I heard that internet cafes that utilize 2 internet connections, possibly from different providers, and have some sort of router that allows them to split the traffic between the both of them, with online games going through one and web traffic going through another. Is this possible? What is the technical term for it, and can/should it be applied to a home network setup or is there another solution to this problem?

    Read the article

  • How to make the jump from consumer support to enterprise support?

    - by Zac Cramer
    I am currently a high level consumer break/fix technician responsible for about 300-400 repairs a month. I am good at my job, but bored, and I want to move into the enterprise side of my company, dealing with Server 2008 R2 and exchange and switches and routers that cost more than I make in a month. How do I make this transition? Whats the best thing to learn first? Is there a standard trajectory for making this leap from consumer to business? I am full time employed, so going back to school is not a great option, but I have no life, so spending my nights and weekends reading and practicing is totally within my realm. I am basically overwhelmed by the number of things to learn, and looking for any advice you may have on the best way to proceed. PS - I apologize if this is a not quite the right forum for this, I know its not a technical question exactly, but I also know the sorts of people I want to answer this question are reading this website.

    Read the article

< Previous Page | 72 73 74 75 76 77 78 79 80 81 82 83  | Next Page >