Search Results

Search found 5435 results on 218 pages for 'ones and zeroes'.

Page 89/218 | < Previous Page | 85 86 87 88 89 90 91 92 93 94 95 96  | Next Page >

  • Which SATA controller is better to use with Windows Server 2008 R2 64 bit?

    - by at8eqeq3
    We're preforming some hardware upgrade on our server machines. As a part of this process, we have to install some additional disk drives. Unfortunately, total number of drives will become 7 or 8, while all of our motherboards have only 6 SATA ports. Obviously, we need additional disk controllers. For now, we've tested Silicon Image (actually, no-name) and Adaptec controllers, both on SiI3132 chip, and got some problems with drivers for them: Silicon Image drivers are not installing at all, and Adaptec ones are installing, but the system says they're not signed and becomes unbootable. We're tryed both drivers from controllers' CD's and latest versions from manufacturers' websites, and no luck. So, can you recommend some SATA controllers that will really work without tambourine dances on mentioned OS (we need just 2 SATA ports and PCI-E, while RAID and any other features are no-matter)? Thanks for any help.

    Read the article

  • Time Machine Server on Fedora

    - by Conner Stephen McCabe
    I was just wondering if anyone knew how to/or knew of a good guide to setting up mac Time Machine backup server on a fedora 17 machine. I recently ran into an issue with my HDD and lost all of my data, so I don't want it to ever happen again, as it was quite traumatising, haha! I just want to be able to back all of my data up on my fedora machine from my mac, at scheduled times when I connect to my home network. If anyone could help, it would be fantastic, I searched around on google, but all of the ones I found were for older distros. Thanks guys!

    Read the article

  • How to defend agains botnet http requests

    - by Killercode
    I have a server with WHM + CPanel and 5 of my costumer got infected with zbot. This means that the domains they have are constantly receiving requests to certain destinations. I tried to use mod_security but seems that it can't filter every requests... I don't really know why? I still see in the access log the connection comming in and it's consuming a LOT of bandwidth and server load Those accounts have already been clean so all of those requests go to error 404 (the ones catched on mod_security I am dropping the connection). Is there anymore ways to defend against this requests?

    Read the article

  • Wireless controllers vs wireless usb hub

    - by David Jensen
    For my htpc i currently only have a steerin wheel as a controller. This is wired and it looks really bad having extended usb wires from the tv to the table. However im thinking of bying some new Gamepads and now comes the question. Should i buy wireless ones or wired and connect them to a wireless usb hub? Having a wireless hub would let me manage my gamepads easily from the couch. A wireless hub also allows me to connect other things that are not input devices from the couch. However im wondering if wireless usb hubs may not be made for input devices in the way that they may not have 100% uptime and probably some delay. Am i right about this?

    Read the article

  • What Kind of Spam is This? Testing Blog Comment Limits

    - by Yar
    I received this comment on one of my blogs today (on blogger.com): Easily I agree but I about the post should acquire more info then it has. It's the third in a series. Before there was: I will not acquiesce in on it. I over precise post. Expressly the title attracted me to be familiar with the sound story. and before that Your blog keeps getting better and better! Your older articles are not as good as newer ones you have a lot more creativity and originality now keep it up! It is obviously computer-generated (well, not this last one). The comments are from Anonymous, so they're not trying to legitimate a user on Blogger. Is this a spam attack? What might its goal be? Or are they just testing my blog to see if I reject or not? Does this kind of "attack" have a name?

    Read the article

  • Transferring NS records to a new server

    - by lanemiller
    I feel like that was NOT worded well, but here is my current predicament. I recently had a GoDaddy dedicated server, and decided after their customer support failed to do anything but disappoint, to switch to Rackspace. We have 2 ns records that point to our godaddy server, and we have a few sites left on the server, that rely on it for their DNS zones, and the owners of the domains fail to respond to us. So, the question is, if I need to transfer the sites off of the OLD godaddy NS, can I point the A records from my ns1.domain.com and ns2.domain.com to match up with IP addresses of the Rackspace nameservers? OR, do I cname my NS records to match the rackspace ones? I DO know that this isn't advised, either method, but I need to get these sites moved before Godaddy tries charging another $2k for the server.

    Read the article

  • How to copy protected files when an Administrator in Vista (easily)

    - by earlz
    Hello, I have a harddrive I need to backup. In the harddrive is of course things like Documents and Settings which is set to not allow other people to see inside someone's personal folders. I am an administrator though and I can not figure out how to mark these files so that I am permitted to access them and copy them. IWhen I double click on My Documents then it pops up saying You must have permission to access this and gives me an option like ok or cancel. I click ok and then it says you do not have permission to access these files I'm an administrator on the system so I don't understand why Vista is locking me out. How can I setup vista so that it will let me copy every file, even ones I don't have permission to?

    Read the article

  • How can I setup a Firewall without NAT?

    - by SRobertJames
    We have 16 IP addresses from our ISP, and are setting up a SonicWall Firewall. I'd like to have the SonicWall do NAT for the LAN, but act as a firewall only (no NAT) for the servers which are using some of the 16 addresses. How do I set this up? If I set the WAN's subnet to include the 16 IPs, the SonicWall won't route the traffic to the LAN interface. Should I set the WAN subnet to only include the ones we are dedicating for NAT, and then keep the others on the LAN? Related point: How can I set multiple IP addresses for a SonicWall LAN interface?

    Read the article

  • Looking for a router with multiple WAN ports and load balancing

    - by Cyrcle
    I'm going to be moving in a few months. The location I'm moving to is great except it's on a road with very few people, so the internet access option is limited to DSL at 1.6Mbps down, 384kbps up. This is much slower than I'm used to. One option is to get at least two of the DSL lines. There's also good possibility that I'll be able to get WiMax or similar. I've been looking around a bit and it seems like what I need is a load balancing router with multiple WAN ports. Can anyone recommend some good ones? I could also go with a small power efficient Linux box with multiple NICs. What would be good software for that? It'd need to be able to handle around 10Mbps. Thanks for any help

    Read the article

  • Why are there so few Wireless N Dual Band adapter PCI cards, only USB adapters instead?

    - by daiphoenix
    There has been several Wireless N Dual Band routers/APs out in the market for quite some time now, and there are several Wireless N Dual Band USB adapters out there. But as for PCI/PCI-X card adapters, there seems to be only one (the Linksys WMP600N). Why is that? I find it very strange. Is it because the USB adapters are easier to install, and can be used on multiple computers? But if so, why isn't it the same case with single band (2.4 Ghz) wireless N adapters? Because for these ones there as many PCI card adapters as there are USB adapters. Also, can the USB adapters, despite the lack of external antenna, offer the same level of performance as a card with external antennas?

    Read the article

  • Can I replace a router and DHCP server without disrupting traffic?

    - by SRobertJames
    I have a device which acts as a router and DHCP server. I'm replacing it, and would like to minimize down time. If I unplug it, and plug in a different device with the same IP, will all the PCs with DHCP leases keep on working? (I have DHCP Conflict detect on, so it shouldn't reassign a DHCP address already used). What if I want to change the IP (new subnet) - is there anyway to tell all the clients (Windows PCs) to release their DHCP leases and request new ones in a minute? If before unplugging the old device, I have it release all DHCP leases, will the Windows PCs automatically ask for new DHCP addresses?

    Read the article

  • HAProxy and Intermediate SSL Certificate Issue

    - by Sam K
    We are currently experiencing an issue with verifying a Comodo SSL certificate on an Ubuntu AWS cluster. Browsers are displaying the site/content fine and showing all the relevant certificate information (at least, all the ones we've checked), but certain network proxies and the online SSL checkers are showing we have an incomplete chain. We have tried the following to try to resolve this: Upgraded haproxy to the latest 1.5.3 Created a concatenated ".pem" file containing all the certificate (site, intermediate, w/ and w/out root) Added an explicit "ca-file" attribute to the "bind" line in our haproxy.cfg file. The ".pem" file verifies OK using openssl. The various intermediate and root certificates are installed and showing in /etc/ssl/certs. But the checks still come back with an incomplete chain. Can anyone advise about anything else we can check or any other changes we can make to try to fix this? Many thanks in advance... UPDATE: The only relevant line from the haproxy.cfg (I believe), is this one: bind *:443 ssl crt /etc/ssl/domainaname.com.pem

    Read the article

  • How to disable auto-assume in Google Chrome

    - by Ieyasu Sawada
    I've noticed that whenever I sign in in Google Chrome version 21.0 it automatically assumes and it automatically knows what I want to search. I basically use the address bar to search(my default search engine is Google) I don't go type Google.com on the address bar and then search from there. So what happens is that when I type something for example "vernier" for vernier caliper I'm automatically redirected to my facebook account which has a user account name of vern.ancheta. It's really getting annoying, this happens for every search term that I used maybe even ones that I haven't used before in my entire search history in Google. It always assumes as if it knows what I'm really thinking. What's the solution for this? Is this a bug in Google Chrome or just one of its annoying features. Please enlighten me on this.

    Read the article

  • Remote execution in Workgroup network

    - by ayyob khademi
    Consider this scenario: Please don't say that it would be better if I created a Domain network; Just consider this scenario. 10 PCs are all interconnected via a switch to a workgroup network named WORKGROUP; PCs specs(all are the same): Windows XP SP2 en (build:2600.xpsp_sp2_rtm.040803-2158) I have full physical control over my own PC (one of those 10 PCs) and what I know about the other ones: IPs of all 10 PCs. Administrator account name of all 10 PCs. Administrator account password of all 10 PCs. How can I execute an application on the other PCs???(without touching them) How can modify their registry settings???(without touching them)

    Read the article

  • How to delete old pagefile.sys and hiberfile.sys on secondary disk (old windows install)

    - by Silvermist
    A while ago I swapped my main hard disk for a SSD. Now the old one is used as a secondary hard disk, and my OS is a fresh windows install on the main SSD disk. Nevertheless, there are still huge pagefile.sys and hiberfile.sys on that secondary hard drive. Those are not the ones used by the current windows, as those do exist on C:. I tried to attrib -s -h them, but it refused with "Access denied". Any idea how to delete those old unused system files and reclaim the space?

    Read the article

  • Is there a way to rsync in batches?

    - by Chris
    I have a huge chunk of data (11G) in a subversion repository that I'm using rsync to migrate to Alfresco, which lucene indexes new files as they hit the file system. I'm using a dav mount as a proxy to allow me to rsync. The issue I'm having is the indexing post-rsync is quite an expensive operation for such a huge chunk of data, so I was wondering whether there's a way I could logically separate the rsync into identically-sized batches (say 500MB each) so I could schedule them in cron. At the moment, I'm traversing the top level folders and taking the smallest ones across first, but once I'm done with those, the much larger sub-directories are going to be quite troublesome. Please let me know if you need any further info. Thanks in advance.

    Read the article

  • Cannot Delete "Account Unknown" account in Windows XP SP3

    - by naspinski
    If I Right click on My Computer, Select Properties, then click on Advanced-User Profiles-Settings, I get a list of user accounts on my machine and I see a few that are "Account Unknown" in there with large profiles and I want my space back. I am assuming this is because these users are long gone and AD no longer recognizes their SIDs. The problem is that the Delete button is grayed out, but only for the accounts, the ones that are recognized, I can delete jsut fine. These accounts do not show up in Computer Management at all, and I am an administrator on my machine - any ideas on how to delete them?

    Read the article

  • Whats a good secure Windows FTP server?

    - by Keith Nicholas
    Whats a good FTP server? I have been running FileZilla, which seems okish. But I've noticed that a lot of people try to hack ftp servers and FileZilla only has very basic controls to prevent people from hacking. (so far no ones actually managed to get in... so thats good!) I was wondering if there were better options out there? Especially interested in recommendations from people who know they get targeted by hackers.

    Read the article

  • Why the different coarse threaded screws?

    - by Luke
    I'm seeing more and more of these screws (pictured below), which are almost triangular. I find I can only put them into Power Supplies and PCI(e) cards in cases, but they will break/strip away if I put them into a hard drive or a standoff for a motherboard Notice the triangular shape on it? On the Root Access chat, I started asking, but no concrete answer yet. I don't assume it's a production flaw, as I've seen hundreds and replaced them with the "proper" round screws. It is coarse-threaded, not fine-threaded (i.e. for a DVD drive or floppy drive). What are they for, and why do we need them instead of the regular round ones?

    Read the article

  • Why are the Volume and other indicators missing on my eMachines eM355?

    - by Propeller
    I just bought an eMachines eM355. The default installed OS is MeeGo so I installed Windows 7 into it instead. The problem, however, is that, the on-screen indicators have disappeared. The ones I'm talking about are the small dark boxes that appear at the bottom part of the screen when you, for example, press Fn + Up Arrow (to adjust volume). The same goes for the brightness adjusting and the rest of the Fn key combinations. The keys do work but I'd still prefer to see a prompt on the screen. Another reason why I want to solve this is because I can't effectively toggle the Bluetooth and Wifi since I don't get any prompts when pressing Fn + F3. I wanted to include a picture of what I'm looking for but I couldn't find the exact term for such.

    Read the article

  • How to list down hosts with nmap 5.51

    - by Wild Bill
    I was using nmap 5.21 with the -PN, -F and --reason flags in version 5.21. I was outputting the results to an XML file. It would list ALL hosts (say I gave it a /24 subnet to scan. I then updated to 5.51 and ran the exact same command, but it no longer lists down hosts, just ones that are up. Is there a new flag to list down hosts? OR did this get removed in 5.51? My full options are: -sS -n -PN -SV -F --reason I've also used and removed --open but it will not list down hosts in my XML output.

    Read the article

  • How to restore default iPod playlists on Amarok?

    - by obvio171
    I wanted to "reset" the collection on my iPod and ended up accidentally deleting, through Amarok, all the playlists, including the default ones like "Most Played" and "Highest Rated". Since these are dynamic playlists with a special meaning for iPod, I don't think creating new, normal playlists with the same name will bring their special behavior back. How do I restore them with the same dynamic functionality? Is there a way to do that on Amarok? Rhythmbox? GTKPod? Command line? P.S.: not entirely sure what the policy about iPod questions are, but this one in particular seems to me to be very computer-related because, although it's about interfacing with a device, everything has to be done on my computer, using standard PC libraries/programs, etc. If it's still off-topic, please point me to where I could post it.

    Read the article

  • No Drivers in Ubuntu 9.1!!!

    - by Chris
    I have a Lenovo G550 and I installed Ubuntu on it through Windows and I have no drivers. No sound, no wireless. I previously had installed it through Windows Vista with no problems at all. I now run Windows 7 and cannot seem to get it to function properly. I tried installing the recommended drivers to make sure the proper ones were installed and that still did nothing. Any one have ANY idea what could be happening? I just don't feel like dealing with it.

    Read the article

  • Why is Windows 7 so slow to log-on when my Wireless USB dongle is plugged in?

    - by Sam
    I'm using an Edimax Wireless USB dongle (model EW-7711UTN) on Windows 7 64-bit. The dongle works brilliantly (it was truly plug-and-play) except for one thing. I've noticed that if the dongle is plugged in whilst I'm logging on to Windows it introduces a massive delay - after I type in my password and hit enter, Windows shows the "Welcome" screen, then the screen goes black for 2 minutes or so (with just the cursor showing) before finally displaying my desktop. If I unplug the dongle before I enter my password, Windows goes straight to my desktop. Even though the dongle didn't appear to need drivers for Windows 7, I did try downloading the latest ones from the Edimax website, but that made no difference.

    Read the article

  • How do you explain ethernet cable problems to non networking people?

    - by Bryan McLemore
    We've recently been doing a large network migration in our datacenter. We've had a few cables in this start to deliver really bad pings (in excess of 500ms on a LAN) before they could be replaced. The cables we were replacing weren't made the best. They where all hand made and the runs were so short on some of them that the bend radius was definitely too tight. Some of them ran in bundles right in front of the heat exhaust of the power supplies. The cables were running ok until we started pulling the ones surrounding them out. Then a few started having the problem I mentioned above degrading performance and causing reliability issues. I'm trying to figure out the best way to explain this to non networking people. Is there any documentation that people could recommend or other methods?

    Read the article

< Previous Page | 85 86 87 88 89 90 91 92 93 94 95 96  | Next Page >