Search Results

Search found 17953 results on 719 pages for 'someone like you'.

Page 83/719 | < Previous Page | 79 80 81 82 83 84 85 86 87 88 89 90  | Next Page >

  • How to make a 100% UNIQUE dvd? [closed]

    - by sajawikio
    Is it possible to make a DVD which would be next to impossible to replicate exactly even with special equipment? To be clear, not in the sense of making the data itself resistant to piracy - nothing like that. More like as an analogy to antiques - a reproduction of a furniture would be able to be spotted to a trained eye, that it is not the original. Is it possible to do this for a dvd? Like, say a dvd is copied, even by someone who is trying to use even special equipment and is hypothetically dying to copy the dvd exactly for whatever reason - even such copied dvd would be detectable that it is not exactly the original dvd somehow (as if it were a reproduction of an original antique, but not the original), and would be almost or even preferably impossible to actually copy 100% exact the dvd ever again. Just some ideas below on the sort of thing i might go about doing to do this, but really am not sure how or what programs, media, hardware, etc. would do the trick Not sure what would do the trick -- but for instance do there exist any blank dvd's that already come pre-recorded with some sort of serial number or bar code, or other metadata, or an encrypted hash, or something like that? Maybe any blank dvd will do but i should get a special software to extract hardcoded metadata? If so which software? Or special hardware even maybe? Such dvd which the "secret" can be: Well, to know what the "secret" is and if it is present on the disk, it probably should be readable by some software or maybe a particular hardware (i guess preferably only if some sort of key is known and input into the software, even better, only then such secret data on disk can be read, otherwise nothing shows up and it looks like just a regular disk with no secret on it), and Would be impossible to actually replicate, especially not with regular burning hardware and preferably not at all. Other idea: Is there any special software that can direct the write head of laser to physically "mar" the dvd in such a way that, when played in dvd player, makes a particular visual pattern or something like that, also say the mar itself shows up as faint scratch on disk, but would be impossible for someone to do themselves exactly? EDIT: Also to clarify suppose the dvd contains video and music that should be playable on dvd players, maybe a menu too (i.e not a dvd containing software), and also to clarify the question is about how to make dvd 100% unique, not how to make the actual content of dvd protected from "piracy".

    Read the article

  • Dell inspiron 1525 laptop won't boot up.

    - by Becca
    It comes to a page called "Dell Media Direct" and then loads another page where it says "A problem has been detected and windpws has been shut down to prevent damage to your computer." then it has a bunch of info about why it may be the cause. can someone please help?

    Read the article

  • Apache LDAP authentication (mod_auth_ldap) on MacOS Server (10.5)

    - by Ursid
    A - Is there a LDAP authentication module (mod_auth_ldap) for the version of Apache that comes built into MacOS Server 10.5? (I'm pretty sure no, but maybe someone compiled one.) B - If not, can it be compiled into MacOS' version of Apache? (Man, that would be nice.) 3 - If I can't use the Apple version of Apache for this, what is the best way to get Apache LDAP authentication working on MacOS Server 10.5? (Preferably one that works with MacOS Servers management software)

    Read the article

  • network endpoint accessible via hostname only, not address?

    - by Dustin Getz
    someone told me that this piece of network hardware (NAS) has a security setting such that it can only be accessed by hostname, not by IP address. I don't understand, as I thought DNS resolved the hostname to an address on the connecting client's side, then at protocol level always used the raw address, so how can this 'security' measure be possible?

    Read the article

  • Email delivery error

    - by Tim
    I sent an email, but immediately got a reply saying: Final-Recipient: rfc822;[email protected] Action: failed Status: 5.0.0 (permanent failure) Diagnostic-Code: smtp; 5.1.2 - Bad destination host 'DNS Hard Error looking up smtpint.xxx.edu (MX): NXDomain' (delivery attempts: 0) I was wondering what this error report means, where in the delivery route the error happened, who should be contacted to solve this issue and how to solve it? Thanks and regards! I also appreciate if someone can explain a bit more about the mechanism behind the email delivery.

    Read the article

  • Access to Windows 7 log from a remote machine

    - by robob
    I'm trying to access with EventViewer (from a Windows XP Prof) to a remote machine with Windows 7 (Seven). Before I started the Service "RemoteRegistry" I received an "Access Denied". After started the service I can connet to the machine Log (in EventViewer app) but when i clik on any log as "Application" or "Security" I receive a "privilege" error. Could someone help me, please?

    Read the article

  • AMD Opteron BSOD - A clock interrupt was not received on a secondary processor within the allocatio

    - by laurens
    On one of our servers we got an -for me new- BSOD with the error message: "A clock interrupt was not received on a secondary processor within the allocation time interval" The server's specs: HP XW9400 2x Dual-Core AMD Opeteron 2224 SE 3,20Ghz (4CPUs) 16GB HP ECC RAM Windows 2008 R2 Enterprise 64bit Nvidia Quadro 4xxx graphics (?) Sounds familiar to someone ? Thanks in advance

    Read the article

  • SFTP File Restrictions.

    - by The Rook
    Is it possible to use SFTP on Linux and restrict a user account to ONE directory such that no other directory listing can be obtained? Yes, I must use SFTP, FTP is only used by people that love getting hacked. For instance I want someone to modify files in /var/www/code/ but I don't want them to be able modify anything else. I don't even want them to see the contents /tmp/. (I will accept a "quick and dirty" solution, as long as it is secure.)

    Read the article

  • Outlook 2010 keeps losing the search index for emails

    - by Igor K
    Hoping someone can help here, this is driving me insane. Outlook 2010 keeps losing the search index so when I search for an email it has the yellow bar saying: search results may be incomplete because items are still being indexed Clicking on the bar says eg: 49200 items remaining to be indexed If it makes any difference, this is an IMAP account. If I leave Outlook open all day it will eventually index everything. But then say a week/month later it happens all again.

    Read the article

  • pdf printer in wine ?

    - by Arkapravo
    I wish to convert (print) my MS Word files to pdf on the fly ! I am on Ubuntu 9.10 and using Wine 1.1.40. Can someone help ? I have heard that pdf printer can be installed using Wine Cups ! Thanks !

    Read the article

  • Portable voice recorder

    - by Quintin Par
    Where should I look for if I need a good voice recorder? Can someone point me to good reviews? I remember seeing this Olymbus model sometime back, but not sure if it’s the best. Also it seem be to be a bit pricy... Should not be expensive USB Really good battery power Bluetooth Small size English Translator

    Read the article

  • Sonicwall 3500 (Creating VLANS for usage of multiple SSID)

    - by Thomas Chia
    I have an issue here. Here is my setup: X0 - STAFF network | X2 - AGENT network | X4 - Wireless AP (for multiple SSID) Okay, basically I'm going to set up the wireless AP to be broadcasting 2 SSID, STAFF-WIFI and AGENT WIFI. When connected to STAFF-WIFI, the users will be connected to the STAFF network, while connected to the AGENT WIFI, the users will be connected to the AGENT network. Can someone explain in details how to go about setting up this configuration? Thanks!

    Read the article

  • Root, Local and Authoritative name server?

    - by thedp
    I've tried to read in Wikipedia about the key features of Root, Local and Authoritative name servers... But I have a problem understanding what each type of dns server does. Can someone please give me a short explanation of the three? Thank you

    Read the article

  • What software will run the new Windows 8 in virtualization under OS X?

    - by bmike
    I've read a lot about the new Windows OS, but would like to run it first hand. I've got several Macs with Mountain Lion (10.8) and presume I can use this evaluation license to test the OS for my consulting company. What else do I need to run Windows 8 in virtualization (as I'd rather not mess with BootCamp for several reasons)? Any other gotchas from someone who has gone down this path would be appreciated as well.

    Read the article

  • Nginx redirect requests to sub-domains that do not exist to custom 404 page when wild card A record is set?

    - by Anagio
    Is there a way to capture all requests to arbitrary sub-domains which do not have a virtual host setup, and redirect to a custom 404 page in nginx? I will have a wild card A record setup *.example.com and all our users will have a sub-domain username.example.com. If someone enters a sub-domain which does not exist how can I redirect to a custom 404 page rather than have it resolve since wild card is setup?

    Read the article

  • Office Communicator 2007 (MOC): How to make chat history visible to newcomers

    - by Thomas L Holaday
    How can someone who joins an existing Microsoft Communicator chat see the history of what has gone before? For example: Larry: [describes problem] Moe: [enhances problem] Curly: We should ask Shemp [Shemp joins] Shemp: What's going on in this thread? Is there any way for Shemp to see what Larry and Moe have already typed? I have tried copy-pasting the whole thing, but that invokes an error with no error message - possibly "too much text."

    Read the article

  • Best practices for SQL Server audit trail

    - by Ducain
    I'm facing a situation today where it would be very beneficial to me and my company if we knew who had logged into SQL and performed some deletions. We have a situation where at least 2 (sometimes 3) people login to SQL using SQL Server Management Studio, and perform various functions. What we need is an audit trail. If someone deletes records (mistakenly or otherwise), I'd like to know what was done. Is there any way to make this happen?

    Read the article

  • Installing windows 8 on windows 7

    - by ZainShah120
    I had windows 7 installed on my Laptop,I installed windows 8 on it, without formatting the System Drive,Therefore now I can see two folders windows.old and Windows,The windows folder contain my new Windows 8, IS there any way that I can go back to Window 7? without formatting, This question is not programming related but I hope I can find some good answers here, If someone think that it is not fruitful, please comment on it, and I will delete that instead of down vote.. Looking forward to hear from you Thanks

    Read the article

  • How would health insurance businesses be able to stay viable if the Senate bill is passed?

    - by Clark Edison
    As I understand it, the bill forces all Americans to have health insurance. However, I think that the fine for having no health insurance is around $750. But after the year 2014, health insurance companies will not be able to turn customers away for preexisting conditions. Why wouldn't someone pay the fine or buy low end coverage until they got ill and supplement the coverage or buy an extensive plan?

    Read the article

  • What is reverse DNS?

    - by Pitto
    *.in-addr.arpa domains: lot of requests in my OpenDNS account. I know this should be normal and it's about reverse DNS. I've been reading here and there but still I can't really get how it works and why I get so much requests (higher number than www.google.com). I'd just need someone that, like Einstein suggested, could explain to me what this reverse dns is used for like he would explain it to his grandmother :) Thanks a lot!

    Read the article

< Previous Page | 79 80 81 82 83 84 85 86 87 88 89 90  | Next Page >