Search Results

Search found 5322 results on 213 pages for 'answers'.

Page 82/213 | < Previous Page | 78 79 80 81 82 83 84 85 86 87 88 89  | Next Page >

  • Find out ESXi host from VM? [duplicate]

    - by Kyle Brandt
    This question already has an answer here: Determining the name of the VMware host of a VM guest - from the guest 3 answers I have a monitor that is running on all guests, Windows and Linux. I'd like to send back the Parent host of the guest with this monitor, How can I found out the VM host from within a ESXi VM? Ideally I'm looking for a universal way to do this from both Windows and Linux, but if they are separate paths that okay. Using something from VMWare tools would be fine, but I'm not currently using anything running the vSphere API.

    Read the article

  • windows seven disk check error

    - by crazybmanp
    i have gotten the error in the microsoft KB article 975778 (http://support.microsoft.com/kb/975778/en-us) i was able to get onto my computer luckily, but when i went on to get the hotfix that is stated in the article, it gave me this error when i ran it: "the update is not applicable to your computer." is there any way of getting the disk check error to stop, or to get this fix to work. i will answer any questions on hardware if you post the questions in the comments. answers to questions this is the a full version that i got from ASUS as an upgrade disk from windows vista (hopefully more specific than you were asking)

    Read the article

  • Number Tabs in Chrome or Firefox

    - by Bruce Connor
    I like to use the Ctrl or Alt + Number shorcut to jump quickly to a specific tab. Problem is: When you have a lot of tabs open it is hard to look at them and quickly know which one is tab number 7. Is there a way (extension possibly) to show a tab's number in its title? This way each tab would have a number added to its title right beside the favicon. This way you could immediately tell which number you need to press to jump to a specific tab. I use both Chromium and Firefox, so I'm accepting answers for either one (though I'd prefer both =) ).

    Read the article

  • Does this inheritance design belong in the database?

    - by Berryl
    === CLARIFICATION ==== The 'answers' older than March are not answers to the question in this post! Hello In my domain I need to track allocations of time spent on Activities by resources. There are two general types of Activities of interest - ones base on a Project and ones based on an Account. The notion of Project and Account have other features totally unrelated to both each other and capturing allocations of time, and each is modeled as a table in the database. For a given Allocation of time however, it makes sense to not care whether the allocation was made to either a Project or an Account, so an ActivityBase class abstracts away the difference. An ActivityBase is either a ProjectActivity or an AccountingActivity (object model is below). Back to the database though, there is no direct value in having tables for ProjectActivity and AccountingActivity. BUT the Allocation table needs to store something in the column for it's ActivityBase. Should that something be the Id of the Project / Account or a reference to tables for ProjectActivity / Accounting? How would the mapping look? === Current Db Mapping (Fluent) ==== Below is how the mapping currently looks: public class ActivityBaseMap : IAutoMappingOverride<ActivityBase> { public void Override(AutoMapping<ActivityBase> mapping) { //mapping.IgnoreProperty(x => x.BusinessId); //mapping.IgnoreProperty(x => x.Description); //mapping.IgnoreProperty(x => x.TotalTime); mapping.IgnoreProperty(x => x.UniqueId); } } public class AccountingActivityMap : SubclassMap<AccountingActivity> { public void Override(AutoMapping<AccountingActivity> mapping) { mapping.References(x => x.Account); } } public class ProjectActivityMap : SubclassMap<ProjectActivity> { public void Override(AutoMapping<ProjectActivity> mapping) { mapping.References(x => x.Project); } } There are two odd smells here. Firstly, the inheritance chain adds nothing in the way of properties - it simply adapts Projects and Accounts into a common interface so that either can be used in an Allocation. Secondly, the properties in the ActivityBase interface are redundant to keep in the db, since that information is available in Projects and Accounts. Cheers, Berryl ==== Domain ===== public class Allocation : Entity { ... public virtual ActivityBase Activity { get; private set; } ... } public abstract class ActivityBase : Entity { public virtual string BusinessId { get; protected set; } public virtual string Description { get; protected set; } public virtual ICollection<Allocation> Allocations { get { return _allocations.Values; } } public virtual TimeQuantity TotalTime { get { return TimeQuantity.Hours(Allocations.Sum(x => x.TimeSpent.Amount)); } } } public class ProjectActivity : ActivityBase { public virtual Project Project { get; private set; } public ProjectActivity(Project project) { BusinessId = project.Code.ToString(); Description = project.Description; Project = project; } }

    Read the article

  • What is the "Apple" key and what key is it that is depicted as part of an upper case X?

    - by Marnix A. van Ammers
    I read in some answers about using the "Apple" + "Space bar" keys. Which is the "Apple" key? Also, I see in my Mac OS X Safari menu bar that to open the download window I can use a 3 key combination. The last of the 3 keys are the Command key (depicted with a clover leaf symbol) and the 'L' key. The first key is the one I don't see anywhere. It is depicted by a symbol that looks to me like an upper case 'X' with most of the forward slash part removed. What key is that? OK, just discovered by trial and error that it must be a symbol for the "option" key. What is that symbol called and why is it not on the keyboard?

    Read the article

  • Apache server doesn't create directory or file under www-data user [duplicate]

    - by Harkonnen
    This question already has an answer here: What permissions should my website files/folders have on a Linux webserver? 4 answers very newbie to Apache here I installed Apache 2.4 on my Arch server where I installed newznab (a newsgroups indexer). I have noticed that all files newznab needs to create are created under my login user, and not apache default user (www-data). I read here that it's bad security practice to allow www-data to write files. I agree. But as an apache newbie, I would like to know where (in the httpd.conf I suppose ?) the user allowed to write files can be configured, because I want another account to be allowed to write files instead of my main account.

    Read the article

  • How do you stop scripters from slamming your website hundreds of times a second?

    - by davebug
    [update] I've accepted an answer, as lc deserves the bounty due to the well thought-out answer, but sadly, I believe we're stuck with our original worst case scenario: CAPTCHA everyone on purchase attempts of the crap. Short explanation: caching / web farms make it impossible for us to actually track hits, and any workaround (sending a non-cached web-beacon, writing to a unified table, etc.) slows the site down worse than the bots would. There is likely some pricey bit of hardware from Cisco or the like that can help at a high level, but it's hard to justify the cost if CAPTCHAing everyone is an alternative. I'll attempt to do a more full explanation in here later, as well as cleaning this up for future searchers (though others are welcome to try, as it's community wiki). I've added bounty to this question and attempted to explain why the current answers don't fit our needs. First, though, thanks to all of you who have thought about this, it's amazing to have this collective intelligence to help work through seemingly impossible problems. I'll be a little more clear than I was before: This is about the bag o' crap sales on woot.com. I'm the president of Woot Workshop, the subsidiary of Woot that does the design, writes the product descriptions, podcasts, blog posts, and moderates the forums. I work in the css/html world and am only barely familiar with the rest of the developer world. I work closely with the developers and have talked through all of the answers here (and many other ideas we've had). Usability of the site is a massive part of my job, and making the site exciting and fun is most of the rest of it. That's where the three goals below derive. CAPTCHA harms usability, and bots steal the fun and excitement out of our crap sales. To set up the scenario a little more, bots are slamming our front page tens of times a second screenscraping (and/or scanning our rss) for the Random Crap sale. The moment they see that, it triggers a second stage of the program that logs in, clicks I want One, fills out the form, and buys the crap. In current (2/6/2009) order of votes: lc: On stackoverflow and other sites that use this method, they're almost always dealing with authenticated (logged in) users, because the task being attempted requires that. On Woot, anonymous (non-logged) users can view our home page. In other words, the slamming bots can be non-authenticated (and essentially non-trackable except by IP address). So we're back to scanning for IPs, which a) is fairly useless in this age of cloud networking and spambot zombies and b) catches too many innocents given the number of businesses that come from one IP address (not to mention the issues with non-static IP ISPs and potential performance hits to trying to track this). Oh, and having people call us would be the worst possible scenario. Can we have them call you? BradC Ned Batchelder's methods look pretty cool, but they're pretty firmly designed to defeat bots built for a network of sites. Our problem is bots are built specifically to defeat our site. Some of these methods could likely work for a short time until the scripters evolved their bots to ignore the honeypot, screenscrape for nearby label names instead of form ids, and use a javascript-capable browser control. lc again "Unless, of course, the hype is part of you

    Read the article

  • Windows XP waits for usb drive on almost every operation.

    - by Tomasz Kowalczyk
    Hello everyone, I have a problem with my Windows XP operating system, particularly with the USB device that is plugged in - 1TB WD My Book external drive. I haven't found any information about such behaviour when searching in Internet, so I have to ask You. The problem is: when I am using computer, especially during work (programming), when I try to access any information on a hard disk ("internal" one), Windows seems to "consult" it with the external drive. For example, when I open file selection dialog window, if I try to change directory, system activates external drive, reads something (I hear the disk's operational noise) and after some seconds of such pause it makes the operations I requested. There are many situations in which I can reproduce this behavior - opening My Computer, shutting down system, opening partition folder from My Computer - every operation involves the usage of external drive. Please understand me properly - this is not something that happens EVERY time, but at least "many" times a day. What causes such behavior and how can I "turn off" external drive when it's not needed? Thanks in advance for your answers.

    Read the article

  • How do I get my server to recognise a change in users?

    - by Gareth
    I'm new in post running a small charity. As a result I've inherited a system from the previous manager that was poorly run. In my enthusiasm to change login details etc. I appear to have killed my microsoft outlook account. When trying to access outlook it prompts me for my user name, domain name and password - which I'm obviously not filling in correctly because it's not accepting my answers. Is there a way to determine that information from the server side? I have access to the server and the staff computers.

    Read the article

  • Compress, encrypt and upload a directory to an FTP server in Linux

    - by Kristoffer L
    I want to accomplish something rather simple (at least it would seem to be): Compress a directory Encrypt the compressed file Upload the compressed & encrypted file via FTP I also want to accomplish this in an automated fashion on Linux server. TrueCrypt is not really an option in this case as it seems it can't compress a single file. Instead you have to make a volume that you mount and move the files into. This question answers how to do the the upload and I know how to compress a directory. It is just the encryption that's giving me problems.

    Read the article

  • What can go wrong with a GLIBC upgrade?

    - by Sevenless
    I recently installed a piece of software that my group needs for a research project starting next September. Turns out the software has a known crash bug when used with glibc 2.12.1. My boss asked if we can upgrade glibc on the server that's supposed to run it. Cue my skeptical silence.... At some point, I got it into my brain that messing with glibc was about as good an idea as messing with a hungry puma; however, I've been unable to determine the source of this belief. So, if I go ahead with this: Am I doing something flagrantly stupid (e.g. I won't fix my problem, I will brick my server, or I will initiate a zombie apocalypse)? What can go wrong? What is likely to go wrong? How do I avoid the answers to 2 and 3?

    Read the article

  • Ubuntu Kernel Panic on Inserting Network Cable

    - by Skizz
    I've been having a recurring kernel panic with my Ubuntu 9.04 installation (see other posts by me). Today, I was fiddling around trying to get some cable attached when the system panicked. Looking at the layout, the only cable in the vicinity was the network cable. Upon further investigation, it seems that the system reliably panics whenever I insert a network cable. Removing the cable does not cause the panic. How do I stop the system panicking when I insert the network cable? If more information is needed, please add comments/answers and I'll post the required data.

    Read the article

  • Configure Iptables to allow a PHP-app accessing a port-nr

    - by Camran
    I have a php-application which connects to another app called Solr (database search engine). I can via this php app add/remove documents (records) from the Solr index. However, the Solr security is low, and anybody with the right port nr can access Solr and remove documents (records). I wonder, is it possible to ONLY allow my own php-app to have access to Solr somehow? Prefferably via Iptables. I am thinking I can only allow my own servers IP to that port, and it would solve my problem, because PHP is a server-side code. But I am not sure. About the Php-app: The website is a classifieds website, and when users wants to add or remove classifieds, they do so through a php app, which is this one. The app has a function which connects to solr and updates the database (index). I appreciate detailed answers... Thanks

    Read the article

  • What is your IT-department to staff ratio?

    - by Bart Silverstrim
    This is a topic that may be rather political but it related to system administration still...how many people do you have supporting your users in your IT department? We have three people supporting something near 1500 systems and around 2400 people and a recent question was raised about why we have long times to get systems replaced, repaired, work orders fulfilled, etc. along with the system admin duties of maintaining the servers (mail, proxy, filters, VOIP, wireless, backup, etc.) Does anyone have numbers on what the "best practices" average is of support people to employees in an organization? EDIT:...from some of the answers that are appearing I'm starting to feel depressed...

    Read the article

  • Suppressing / Accepting warning windows automatically in commands executed through batch file

    - by David Somach
    I am automating the uninstall of IE9 through executing the command in these instructions inside a batch file: http://answers.microsoft.com/en-us/ie/forum/ie9-windows_7/how-to-uninstall-ie9-beta-64-bit-it-is-not-in-the/863d8f3d-c4ab-43e6-9d57-e163ea3baddd The instructions say to run the command twice. The first time the command runs, I get the following error window (3 times): "Windows Package Manager Operation failed with 0x80070005 Access id denied." I click OK for each of these windows, and the rest of the script runs fine and IE8 is usable after restart. Is there a way to suppress these windows? I want this to be fully automated and these windows block the script until the user presses "OK".

    Read the article

  • Running Java 32bit and 64bit on same computer

    - by Joris Meys
    I ran into a rather puzzling problem, trying to install Vuze 4.2.0.2 on my Windows 7. I have a Java 6 JDK 64bit, but Vuze complains that it can't find a correct 32bit JRE. Yet, as far as I know it shouldn't matter which Java is installed on the computer. (See also these answers). Now I was wondering : if it makes sense running a 32bit and a 64bit Java on the same machine, Whether that is possible, and if so what I should pay attention to in order to make sure that the correct Java is found. Thank you in advance PS : I have my reasons no to use the latest Vuze, so please don't tell me to update Vuze. I know.

    Read the article

  • Information System for an Academic Institution

    - by birukw
    Hi, The University I am working for is undergoing a major renovation of the ICT system. The team currently undertaking the task is designing a centralized system with the intent of providing most (if not all) services of the institution electronically. Most of us are academicians with little practical experience. The questions we need answers for are What are the systems (preferably free, as in Beer, and/or open) and best-practices in use in other academic institutions? What are the experiences of people administering academic ICT systems? What are the overheads of attempting to provide services through an intranet cloud (like UEC) for us (a medium-sized academic institution, in a third-world country)? We would very much appreciate it if you could give us your take on the situtation. Thanks

    Read the article

  • Setup symbolic link where users can access it with FTP

    - by Dan Shields
    I have a folder on a server where a client of mine has a bunch of folders that they upload images and what not for a site, I do a symbolic link to those folders to the root of the website. This way I can give them ftp access to upload whatever they need without having access to the root level of the website. I have another folder that I can't setup as a symbolic link to their folder, which has images they need to upload to. I know that if I create a symbolic link the other way around where the sym link is in their folder, they can't access it through FTP. There has to be a way without creating two separate FTP accounts and give a user the ability to upload to a different directory that is outside of their home directory. I see that it is ftp specific and that there are some settings that can be changed but I haven't seen any clear cut answers for the best way to handle this.

    Read the article

  • Limiting use of filesharing services

    - by EpsilonVector
    I live in an apartment with 3 other roommates, and we share the internet connection though a wireless router (Level One WBR-3406TX). One of the roommates is always running utorrent, and it is slowing down everybody's connection way too much. Unfortunately, he feels like he shouldn't have to give up on downloading stuff, and is refusing to stop hogging the bandwidth. I was wondering if there's something I can do to the router configuration that would disrupt his use of utorrent just enough to to make the internet usable for the rest of us, and still have it work well enough for him so that he doesn't start poking around looking for answers.

    Read the article

  • portal/forum for small companies to get technology help

    - by thomas
    I understand this is an open ended question and not quite sure how to add this to community wiki, if that is appropriate. I am doing a little research on where small companies would go on the internet to get answers for technology related questions. Could be around sales, servers, programming, etc. Clearly superuser.com, serverfault.com, and stackoverflow.com are excellent starting points. I am just wondering if anyone has heard of any others. Think a "facebook" that links technology providers with small companies to help answer questions and potentially provide/offer solutions. Thanks!

    Read the article

  • Assign PowerShell script to run at startup using PowerShell on Window Server 2012

    - by James Toyer
    I'm trying to write a PowerShell script that will run when a Windows 2012 instance is created on AWS using the configuration tools provided by AWS. My problem is that I want to change the name of the machine once it has started up, restart the machine and carry on set up process after. The main reason for this is that one of the applications, Boundary, installed in the set up process takes the name of the server when first installed. It is then doesn't seem possible to change it's name in their portal. Ideally I would have two PowerShell scripts, one to start the set up process, initialised through AWS and another that runs the first time the machine restarts. This second script would ideally be queued to run on the next start by the initial set up script. So I guess my question are: Is this possible? How would I go about doing this. My Google foo is letting me down here so any answers would be appreciated.

    Read the article

  • Windows redirect traffic to different DNS name not fixed IP address (hosts file equivalent)

    - by Arik Raffael Funke
    Using the Windows hosts file, one can redirect traffic for a domain to a specific IP address, e.g. domainA.com -- 127.0.0.1 I am looking for a SIMPLE way to do the same, but for a target domain name not for a target IP address (as this is dynamic), I.e. domainA.com -- domainB.com Addition: After the getting some initial answers I think I need to concretise my question. Situation: I have an application which looks up the IP of the target domain via DNS and then connects via HTTP to the IP address. I do not have control over any proxy settings. Option 1 Basically I am looking for a way to: intercept DNS requests for a domainA.com launch a DNS request for a domainB.com serve the IP of domainB.com in response to the request for domainA.com Without running an entire DNS server. Option 2 If a DNS server is the only way, in the alternative I would also be happy with an solution to how to define a non-standard DNS-server for a single application. Any ideas for wrapper applications, etc?

    Read the article

  • Stop a particular key getting captured by rdesktop

    - by user18151
    Hello, I want F12 to be not capture by my rdesktop while in fullscreen, so that I can do whatever stuff I'm doing on my remote Windows computer, but pressing F12 would bring down yakuake, and I can type down my commands, or use vim etc for whatever I'm doing. Is there any possible way to do this? I tried playing with keymaps, but that didn't help. I set F12 to inhibit, but that seems to have stopped sending F12 altogether, rather than let gnome catch it and let yakuake pop up. Would be really grateful for answers. I am ready to do my homework, if someone could please just give me pointers etc. Thanks :). Sidenote: My current arranement stems from my large monitor in lab, and small personal laptop monitor, and the laptop has Windows 7. My lab computer has Linux, on which I do my coding work.

    Read the article

  • 'Game Show' presentation

    - by albatross
    I work at a state university, and every day of summer orientation we have a little jeopardy-like game that new students' parents play. We run it in an auditorium. Right now the game is a powerpoint presentation (set up similar to jeopardy) off an old laptop running Powerpoint 2003. What I want to do is to purchase & use a smaller tablet/mini-book with a touchscreen. The touchscreen would be much more professional than dragging a mouse around the screen to select category questions. I also want to use hot keys during the presentation for sound effects (for correct + incorrect answers), and I want to play music and show an automated slideshow (photos from the day). This device would need vga or hdmi and audio out. I've been looking at iPads and iPad alternatives, but figured someone out there might have a better idea or done this before.

    Read the article

  • How to config DNS onto TCP from UDP

    - by Dante Jiang
    Google DNS (8.8.8.8 and 8.8.4.4) are blocked (or polluted) by all ISPs available to me (and DNS by ISPs just return wrong answers for some sensitive sites!!), and it is said that if we change DNS from UDP onto TCP, the problem can be temporarily solved. My question is: how to config that on Windows 7? The solution provided by the original post: Windows 7 Ultimate DnsApi.dll v6.1.7601.17570 .text:6DC08FC8 8B 46 10 mov eax, [esi+10h] .text:6DC08FCB 89 45 F4 mov [ebp+var_C], eax var_C - 2 85A0: 90 90 90 90 90 -> 33 C0 40 EB 25 85C8: 8B 46 10 -> EB D6 40 I have not figure out how the original solution works so far. It needs to modify the .dll file, and the post provides a .dll after modification. However, I wish there was a solution without this kind of hacking.

    Read the article

< Previous Page | 78 79 80 81 82 83 84 85 86 87 88 89  | Next Page >