Search Results

Search found 4861 results on 195 pages for 'renato person'.

Page 77/195 | < Previous Page | 73 74 75 76 77 78 79 80 81 82 83 84  | Next Page >

  • How can I make skype calls in Linux?

    - by Grzenio
    Hi, Today I spent more than an hour trying to get Skype set up on my Linux box (Debian testing), but I couldn't make my microphone to work correctly. So I hear the other person talking, but they can't hear me. I am running KDE 4.3 and Skype 2.1 Beta. What do I need to do to get it working?

    Read the article

  • Insertion of rows without changing formulas on anohter sheets

    - by julie
    I have two separate spreadsheets which feed each other (one person completes the main one so all others autofill). I have set up formulas so it autofills but when I insert new lines into the main spreadsheet the other spreadsheet takes information from the wrong line, even though the new data was put in the place of the old data. (The new inserted lines were put in where the data was before). can anyone help me to "protect" the formulas from movement? I will appreciate any help.

    Read the article

  • LDAP users as OU

    - by vpereira
    Hi, i'm facing a strange LDAP configuration. Some admin, just created users as OU in OpenLDAP. To do it, the admin, changed some attributes in the OU like posixAccount, inetOrgPerson, organizationalPerson and person.. my question is what is the advantage to do it? It works, but i would like to know the drawbacks about it.

    Read the article

  • What's a good(affordable) business router that can limit traffic to certain machines(ips/ports)?

    - by Ryan Detzel
    We are using the basic Verizon router but it sucks so we're looking for a new one that allows us to limit users and our hadoop cluster to certain limits. Our problem is one person can start downloading something and kill the network and every hour we download logs into our cluster but it floods the network unless we rate limit it. Ideally we want to be able to say: total: 35 mbps Hadoop Cluster (15 mbps) Phones (1 mbps) Office(25 people) (19mbps but no one machine can have more than 5mbps)

    Read the article

  • Make windows XP ask for password

    - by daramarak
    We have software that have some features that are so sensitive that we want to verify the identity of the user. Instead of using a own user/password scheme we would really like to either test the password against the user password in XP, or even make Windows self reauthenticate the user so we can make sure that it is an authorized person that accesses the function. Or software is only running on windows XP embedded. I do not know if this is possible at all, does windows have any such features?

    Read the article

  • Windows 64bit Sandboxing software alternatives

    - by Pacifika
    As you might know sandboxing software doesn't work in 64bit Windows due to patchguard. What are the alternatives for a person looking to test untrusted / temporary software? Edit: @Nick I'd prefer an alternative to VMs as I'm not happy with the extended startup time, the extra login sequences and the memory overhead that accompanies booting a VM solution to test something out ocassionally as a home user. Also it's another system that needs to be kept secure and up to date.

    Read the article

  • Prevent Concurrent File Changes: Windows Server 2003

    - by ThinkBohemian
    I have a program installed that writes configurations to disk installed on Windows Server 2003. When two administrators log into the machine at the same time, the last admin to save will persist their configurations, while the first admin's saves will be lost. Is there any way I can restrict access to a only this program so that only one person can edit it at a time? If not, is it possible to restrict user access to only one program?

    Read the article

  • Mac internal mic not working with Xlite

    - by Pablo Fernandez
    I've used xlite for a while now but all of the sudden the internal mic from my mac stopped to work with it. It does call, and you can see the red bar rising but the other person can't hear a thing. The mic does work when using Skype so I think it's a problem with Xlite Things I've already tried: Reconfigure Xlite Reinstall Xlite Install Xlite Beta (After every step I rebooted the macbook) Obviously none of them worked. Thanks

    Read the article

  • Switch User in RedHat like XP

    - by rd42
    In our cluster, RedHat4 & 5 machines, if someone locks the computer and walks away no body can use it. Is there a feature in RedHat5, Gnome, KDE etc that would allow for the option of switching users at the lock screen, so more than one person can be logged in? Thanks, rd42

    Read the article

  • Text to speech during IPhone call

    - by Jonathan
    Is there way to be able to type instead of speak during an iPhone call. For example when you text a landline (in the uk at least) the text message will be converted to speech. I would like to be able to do a similar thing in real time on my iPhone to another mobile. For example it would be useful for a mute person who can not speak to be able to "participate" in phone calls.

    Read the article

  • Resources for a new Windows Small Business Server administrator?

    - by 80bower
    I've recently taken over management of a Windows 2003 Small Business Server and network for a small, less than ten person company. I have some (antiquated) sysadmin experience, but I've little experience with Exchange. The documentation of the existing infrastructure leaves much to be desired, and I was wondering if there's any sort of "So you've just become sysadmin" guides that anyone could recommend.

    Read the article

  • Resources for a new SysAdmin? (Emphasis on Windows SBS, Exchange, networking and general SysAdmin in

    - by 80bower
    I've recently taken over management of a Windows 2003 Small Business Server and network for a small, less than ten person company. I have some (antiquated) sysadmin experience, but I've little experience with Exchange. The documentation of the existing infrastructure leaves much to be desired, and I was wondering if there's any sort of "So you've just become sysadmin" guides that anyone could recommend.

    Read the article

  • How do you keep track of installed/used software/systems/services in your organisations server infr

    - by edgars
    I'm interested in any software, experience or guidelines listed that help to deal with listing installed services, their primary user (or business person that is responsible for this service), domain names, ip addresses, ports in your servers. Servers are both Windows and Linux, so licenses are also good to track with all of this information. Scale of the infrastructure in question - 20-50 servers. Currently we have no better idea as to use Excel for it.

    Read the article

  • How would I recognize the "spoon-feeding problem" on a dynamic webapp server?

    - by Don Spaulding
    The "spoon-feeding problem", as it was recently explained to me, happens when connections to your application server are tied up feeding data across slow network connections to your clients. This makes sense to me and now I understand the importance of putting a highly-concurrent proxy in front of my app servers. My question is, how did the first person to recognize this problem figure it out? What *nix tools and troubleshooting techniques would help me to recognize this problem if I hadn't had it explained to me?

    Read the article

  • Google Apps Question

    - by Andy
    I was recently hacked by a person I know who I happened to make an account using my hacked email. I was wondering how I can close off Google Apps without logging in. (I have FTP and such, and I deleted the nameservs already)

    Read the article

  • Google Chrome Omnibox truncating searches after "#" - I.E. "c# foo" becomes "c"

    - by tony722
    I have recently been finding myself stymied trying to perform searches for c#-related things in Chrome. The problem is that the omnibox truncates the # and everything after it. This means typing c# foo" in the omnibox in Chrome and hitting enter returns highly unhelpful search results for "c" Google. Any tricks or extensions that would allow me to type "c# foo" into the omnibox and return results that are related to c# and foo? Am I the only person with this problem?

    Read the article

  • Is auto-logon on laptop with encrypted hard drive secure?

    - by Tobias Diez
    I have the complete hdd of my laptop encrypted (with the Windows built-in Bitlocker) and thus have to login two times upon booting (Bitlocker and user account). Since I'm the only person using the computer (and knowing the Bitlocker password), I was thinking about automatically login into the user account to make the boot process smoother and quicker. In which cases/scenarios is this a bad idea and the additional login gives a true additionally layer of security?

    Read the article

  • Can Amazon VMs be used as Active Directory domain controllers?

    - by mrdenny
    I've got a client who wants to move his companies servers off site. As he is only a 10 person company I'm looking for some pretty in-expensive options. One option is the smallest of the Amazon cloud machines. The question becomes can I make one of these machines a domain controller? Cost wise the Amazon machine is cheaper than the power costs of keeping a server (or a PC) up and running in his home office 24x7 thanks to the high cost of power in Southern California.

    Read the article

  • How to configure mercurial access controls using apache and hgweb?

    - by Gj1
    I have set up a mercurial repo to be served using apache+wsgi+hgweb on OS X. It is now completely open to anyone who stumbles upon my server on the correct port number.. How can I set it up so that only people with a username+password pair that I approve can pull and/or push from the repo? I know how to very easily achieve this using ssh, but in this specific case the requirement is that the solution doesn't require defining full fledged user accounts on the machine for each person whom I'd like to give access to the repo.

    Read the article

  • 403 error with codeignitor

    - by DJB
    When I type in the standard web address for my site, I get a 403 error. However, when I type in a more exact address, say pointing to an index.php file, everything shows up fine. I'm using Anodyne Productions' Nova (SMS 3) which uses codeignitor. All accompanying software (PHP/MySQL) is compatible. I'm not a very technical person, so I'm hoping that this is an easy fix. Thanks for taking the time to answer.

    Read the article

  • Rundown on Jira Permissions

    - by Jay
    Hi there, I'm trying to setup Jira for some company projects, and also some personal projects, and I'm running into some confusion with the permissions. Would someone running a Jira server be able to give me a basic rundown of the most efficient way to setup company projects (where a group of people will be working on the project), and a personal project (where only myself, and perhaps one other person will be working on the project)? Any help on this, or a very basic "best practices" guide for Jira permissions would be extremely helpful. Thanks very much

    Read the article

< Previous Page | 73 74 75 76 77 78 79 80 81 82 83 84  | Next Page >