Mac and Windows Vista have such pretty user interfaces with all the transparencies and stuff. Is there anything for Ubuntu Linux to improve the way it looks?
My goal is to be able to make a connection to one, and only one, website through a proxy. Everything else should be dropped.
I have been able to do this successfully without a proxy with this code:
./iptables -I INPUT 1 -i lo -j ACCEPT
./iptabels -A OUTPUT -p udp --dport 53 -j ACCEPT
./iptables -A OUTPUT -p tcp -d www.website.com --dport 80 -j…
Windows 7: I have the Browse folders option set to "Open each folder in the same window" in the Folder Options dialog. Double-clicking folders opens a new window. Please, make it stop.
I have a computer running Windows XP. I am trying to run the Arduino IDE 0022. I double-click on arduino.exe, it waits about 30 seconds on the load up title screen, and then it gives me this error:
Launch 4j: an error occurred while starting the application
My only choice is to click "OK"; the error goes away, and the Arduino IDE closes. …
Everything I find seems to be about created a custom 404 page.
That is not what I am trying to do.
If I want to block access to a page I can do this in htaccess:
RewriteRule pattern - [F]
However, "Forbidden" hints that the page does exists. I want the page to appear to not even exist. So I would like to give a 404 error instead of a…
I have Ubuntu 9.10 installed inside VM of server 2008.
WHen i try to copy the data from the network and paste insid ethe Ubuntu it says error
called "Cannot allocate memory "
I have 3GB RAM attached to the Ubuntu
I tried above suggestion but still im unbale to copy file from my host machine i.e. Windows XP to my Ubuntu machine ( which is…
I know this question has probably been asked at some point in the past, but I am trying to figure out if Windows 7 supports passing TRIM commands through RAID controllers yet.
I am trying to decide between buying a single SSD drive and utilizing TRIM or
Buying two SSD drives and putting them in RAID 0 configuration
What is the fastest…
Hi all,
On my Windows 2008 R2 server with IIS 7.5 I would like to have my ASP.NET website running with forms authentication, while protecting a subfolder with the basic Windows authentication. I have done this on Windows 2003 with IIS 6 for years, but I simply can't get it to work with IIS 7.5. Your input would be highly appreciated :)
We are looking at moving our fractured code base that uses MySQL in some places and SQL Server in other places. I'm suggesting that for our purposes we don't need anything that MySQL can't do.
The argument is that we have to have SQL Server anyway because we have Exchange and SharePoint. I always thought that SQL Server didn't require…
I'm not exactly the most tech savy so please bear with me. I am trying to connect through a proxy with my Virtualbox accounts.
Initially I wanted to just set the browsers in each virtualbox under a proxy but my boss said that it can probably be done right off the bat under the virtualbox accounts itself. Could anyone guide me on how…
I have a postfix installation and have setup relaying through google apps, but when I send mail to postfix it relays it to google apps using the ONE account I have specified in the main.cf.
Is there a way to do this more dynamically. Ideally, the user would authenticate with postfix when sending mail and postfix would use that…
I have a new Dell laptop running Win7 64 with 8 meg of ram. If I leave the system running overnight I start getting low memory errors the next day. Looking at task manager it shows 6.27 gig used but looking at the processes list the totals don't show nearly that much. I am showing all processes from all users.
I have also looked…
I'm in the process of moving my email to Gmail. I used to use Outlook and I have a massive amount of email stored in various PST files (about 7GB worth). Ultimately I'd like to store this all in Gmail so I have my entire email archive available.
I imported my first PST file using Outlook's IMAP feature - dragging the folders in…
Hi,
I am working on creating some firewall rules to stop some of the SSH brute-force attacks that we have seen recently on our ESX server hosts. I have tried the following rules from the CLI to first block all SSH traffic and then allow the two ranges that I am interested in:
esxcfg-firewall --ipruleAdd…
I am using CakePHP which already contains an .htaccess file that looks like:
<IfModule mod_rewrite.c>
RewriteEngine on
RewriteRule ^$ app/webroot/ [L]
RewriteRule (.*) app/webroot/$1 [L]
</IfModule>
I want to force www. (unless it is a subdomain) to avoid duplicate content…
I've been able to use this linux command to connect Netcat to a serial port:
nc -l 80 <> /dev/ttyS0
I would like to be able to log this transaction. My backup plan is to use Wireshark to monitor the netcat stream, but ideally I'd like to do something like this:
cat /dev/ttyS0 | tee upstream.bin…
I'm searching within Java files for some occurrence of a phrase:
find . -name '*.java' | xargs grep -l 'string'
How do I change this command to print to the shell all of the lines which contain a match?
Thanks!
In 2003 I found a little utility which allowed me to select a control (like a listview) on any application, and it would copy it's contents into the clipboard.
For example, you could select the list in Windows Explorer, and all the filenames, sizes, dates, etc. would be copied for you to paste into…
I have cable, and the modem only has 1 network plug-in. They said I could buy my own router if I wanted to hook up two computers to it. I have an IBM Turbo 16/4 Token-Ring PC Card 2, which was in the laptop when I bought it, and the laptop also has the typical network plug (not a PC Card). Is there…
I recently had to change the name of my computer to log onto a public wi-fi spot, because a computer with my name was already logged on. (I asked a guy there what to do after it said there was already a computer named "(omitted)" logged on.) I've never been at a wifi spot you had to log into before.…
I recently had to change the name of my computer to log onto a public wi-fi spot, because a computer with my name was already logged on. (I asked a guy there what to do after it said there was already a computer named "(omitted)" logged on.) I've never been at a wifi spot you had to log into before.…
I have a USB Hard disk that I am using as a secondary drive just for extra storage.
When this is attached and I start my PC the second screen says searching for mass storage dives for about 5 minutes before continuing on.
The same happens when I have a USB pen disk attached upon boot. If I attach…
I am running VMWare Workatation 8.0 on a Windows7 host, hosting a Windows7 VM. It's working fine except that the host cannot see the files on the VM when it's running. The VM is running locally on the host, not on the network.
I found a page saying I simply need to share the folders on either side…
I'm running IIS v7 on a Win7 development machine. I have PHP code that saves session variables and calls them back later. This has been working on this machine for some time.
For some reason now, the session variables dissapear immediatly after saving. Code that used to work fine on…