Search Results

Search found 5185 results on 208 pages for 'just asking'.

Page 90/208 | < Previous Page | 86 87 88 89 90 91 92 93 94 95 96 97  | Next Page >

  • Putting two physical hard drives in a single 2.5" bay?

    - by dgw
    My crazy brain came up with this ridiculous idea. "Why can't I have a single 2.5" drive device that actually contains two independent hard drives? I want RAID 1 data mirroring and the security of having redundant drives. This is a thing that must exist!" To be clear, I am not asking if I can somehow shoehorn two 2.5" drives into a single bay, replace an optical drive with an additional HDD, or anything like that. What I have in mind is a single 2.5"-form-factor device that houses two independent hard drives, with separate housings (likely) and distinct controllers. Probably all they'd need to share is the power & SATA connections. Probably no such thing exists, but because I know there exist hard drives the physical size of a stack of postage stamps (roughly), I have to ask.

    Read the article

  • Straight-forward to Virtualise with XEN or KVM on IBM Server System x3650 M4 791562G?

    - by ChrisZZ
    I want to built a virtualised Server Environment using XEN or KVM. The virtual machines should be purely debian systems - so XEN or KVM should be a sane choice. Now while buying servers, I am confronted with the fact, that the vendors obviously only support commercial solution. I think, on a good server, one should be able to install uncommercial software as well - but of course sometimes systems have hardware, that requires drivers, that are not found in the OS Community. So I am asked the question: Is it straight-forward to use Debian with IBM Server System x3650 M4 791562G with Debian - or even virtualising the IBM Server System x3650 M4 791562G using XEN or KVM. I am sure there will always be a way to achieve this goal - but this way might have a high milage - so I am not asking, whether this is theoretical possible, but whether this should be straight-forward and practically easy to do, no major headaches to be expected.

    Read the article

  • Is it possible to track down who or what changed a shared permission?

    - by user45574
    Today I received an email from one of my users asking why he couldn’t access his shared folder on one of our servers. Example: \\servername\share\ = access denied. When I checked the share permissions on the folder I was surprised to see that the user had been removed from the "shared permissions" list. Now my question is: Is it possible to track who or what deleted the users share permissions on the folder? I have studied the different event logs, but couldn’t find any indication of anyone who had changed the share permissions. Kind Regards Martin

    Read the article

  • Survive a Software Audit

    - by rosepost1150
    I received a letter from Autodesk asking for a "License Assessment". I understand it as a software audit. They plan to do it remotely. The thing is, I'm a freelancer, I don't use any Software Asset Mangment software, and I just recently swap out my hard drive for a new one, and did a complete clean install, and then I received this request from Autodesk. There is almost nothing on my hard drive now. What do software auditors do when they experience this? Will they (are they allowed) to contact my clients (that info is all over the web..) to get information since they found nothing here?

    Read the article

  • Networking conflict - What is the most common default computer name for Windows?

    - by John
    I recently had to change the name of my computer to log onto a public wi-fi spot, because a computer with my name was already logged on. (I asked a guy there what to do after it said there was already a computer named "(omitted)" logged on.) I've never been at a wifi spot you had to log into before. I didn't even notice what the computer's name was before. My question is what are the most common default computer names. I'm curious. How often does this sort of problem happen? (For some reason my previous post was closed as off topic - so now I included the reason I'm asking. If it's still considered off topic (networking conflicts) I'll take it elsewhere, but the other forums I know of (ehow.com, answers.yahoo.com) are full of people that couldn't begin to answer a question like this.) Thanks.

    Read the article

  • Networking conflict - What is the most common default computer name for Windows?

    - by John
    I recently had to change the name of my computer to log onto a public wi-fi spot, because a computer with my name was already logged on. (I asked a guy there what to do after it said there was already a computer named "(omitted)" logged on.) I've never been at a wifi spot you had to log into before. I didn't even notice what the computer's name was before. My question is what are the most common default computer names. I'm curious. How often does this sort of problem happen? (For some reason my previous post was closed as off topic - so now I included the reason I'm asking. If it's still considered off topic (networking conflicts) I'll take it elsewhere, but the other forums I know of (ehow.com, answers.yahoo.com) are full of people that couldn't begin to answer a question like this.) Thanks.

    Read the article

  • Giving SSH access to a user, and security issues.

    - by Kris Sauquillo
    Okay, so I have a VPS and I made an account for a friend so he can host his own domains (using the reseller features in DirectAdmin). He's asking for SSH access, and I know that this is probably a bad idea. Does he have access to my whole server, such as executing commands, accessing my domains that I host on my server? I logged into my SSH using his account details and it let me navigate around all of the root folders/files, and his account is under /home/AccountName/. Is there anyway to restrict his access to his folder only? And the commands he can use?

    Read the article

  • Remote desktop auto start session on workstation login

    - by me2011
    I am setting up Remote Desktop Services for use by one of our remote offices. The workstations at the remote office are all Windows 7 Pro, joined to the domain. There is nothing installed on the local workstation othern than the Win7 OS. The remote and main office are linked via VPN. The workers will login to the local workstation, using their domain login, then right now double click an icon on the desktop which will do the RDP to the Remote Desktop Server. This does work fine, but requires some user education. Is there a way that when the user logs into the local workstation, it will start the RDP session right away and pass their username/password through as well? Would using a thin client PC do what I am asking? Thanks.

    Read the article

  • Moving to an SSD with Windows 7

    - by Nick Gerakines
    Disclaimer: I've been digging around for a few days and didn't get what I was looking for in terms of answers, so I'm asking here. I've recently purchased an 80g SSD drive to use as my boot up and OS parition. I've got a windows 7 desktop with two 1TB (raid0) disks currently and I'm not sure where to start in terms of copying / moving the OS. I suppose that doing a fresh install isn't out of the question, but I've got an upgrade disk from Vista that I'd have to deal with. Where do I begin?

    Read the article

  • Zentyal Server : Setting up secure VPN Client

    - by JustShrey
    I have officially exhausted pretty much all my google-fu trying to set this up so I'm asking my question here. For the record, I am a mid level rookie who has played around with servers in his spare time but have never worked with Zentyal Server. Now, I have been able to set up the server as a gateway, with one Network card being external and the other facing the internal Network. The Internal network computers are able to access the internet without any issues. What I need to do is to setup a open-vpn client on the central server so that all Internet data goes though the secure VPN session. As far as I can see, I can't set up the vpn session through the web admin page. Could somebody point me in the right direction? How would I go about doing this? Regards Shreyas

    Read the article

  • What security changes are necessary when connecting DSL modem directly to PC instead of router?

    - by Mike B
    Windows XP I have a user with a single PC that was connected to the internet via a standard home router. The router is now having hardware-related issues and to save money, they're considering connecting the PC directly to the DSL modem since they don't need to share the internet connection or need wireless functionality. If they decide to do that, I'm concerned that this will introduce additional security concerns. Is the Windows Firewall sufficient and Microsoft Security Essentials sufficient for protecting a computer directly connected to a DSL Modem? Or is other security software needed here? Ideally, I'd like to avoid having third-party firewall software constantly bringing up alerts and asking them to approve everything. Also, just to clarify, their use cases are just internet browsing and email.

    Read the article

  • How can one one-handed ease working in Emacs?

    - by N.N.
    My right hand is temporarily immobilized. I would like to do some minor work in Emacs, mostly in Org-mode, but also some in AUCTeX. Is there some way to ease one-handed work in Emacs such as some mode or particular work flow? For instance I noticed pressing C-x u is easier than C-_ for undoing and that it is easier to mark text with methods involving C-Space than with combinations of S- and movement commands. I have found http://stackoverflow.com/questions/2391805/how-can-i-remain-productive-with-one-hand-completely-immobilized but that is not what I am asking for. I want to ease whatever little time spent one-handed in Emacs and this is also interesting for situations where there is no injury involved, such as when one hand is occupied. I also do realize I should avoid unnecessary strain.

    Read the article

  • Chrome logs me out of everything when I exit--tried cookie-related stuff already

    - by GreatBigBore
    I've been using Chrome very successfully for a long time. It has always kept me logged in to all my sites even after exiting the app. Recently it started logging me out of everything when I exit Chrome. I've fooled around with all the various advanced cookie settings, and I've cycled through the options hoping that Chrome just needed a wakeup call or a reset or something. I've also deleted all the cookies in case a corrupted one is confusing Chrome. Nothing works! I see cookies when I log in, but they all go away when I exit Chrome. I've searched all over the place and seen only the standard answers relating to resetting cookies, local data, sessions, that sort of thing. Any Chrome gurus out there, please send a telepathic message to my browser asking it to resume its previous excellent behavior. Alternatively, you could suggest other possible solutions.

    Read the article

  • Can I restore closed tabs after quitting Chrome?

    - by Sammy
    I closed Chrome by accident. Now all the tabs I had open are presumably gone. I don't want to risk anything by starting Chrome now before asking for help. I fear that they will be permanently lost (overwritten files) if I do that. I know from past experience with Firefox that restoring tabs and browser sessions can be a tricky business. What can I do at this point? Is there a file or something I need to copy or rename? I know about the Ctrl+Shift+T command. But I normally use this while browsing. Will this work AFTER closing Chrome?

    Read the article

  • Laptop monitor being very dark, no backlight?

    - by ldigas
    I'm asking for a diagnose of what is probably the problem. Here goes ... laptop monitor (hp 6715s) went dark. I'm using also an external monitor with the laptop, and since it kept its picture, I'm guessing it's not the graphics card. When the night came, and I turned on my desk lamp, I noticed that the laptop monitor is not really not showing anything, but is actually showing my desktop picture - only it's very very very dark. You cannot see anything on it, unless the lamp is focused on it, then you can see the picture, only very dark. Does anybody have any clue what it could be? I'm just looking for informed guessed here, so I have at least some idea of where the problem lies. The closest repair shop is quite some distance away, so going for a bit of self-diagnose before thinking of taking it to them.

    Read the article

  • Windows 8: Multiple monitors with varying DPI? [closed]

    - by Sid
    Possible Duplicate: Dual monitors on Windows - How do I set a different DPI or text size on each monitor? I'm running Windows 8 on my Macbook Pro Retina (220dpi) which has an external 24" monitor (~96 dpi). In Mac OS 10.8.2, the display settings seem ok and I can actually use both displays without usability issues. I don't know what scaling settings etc it uses but it looks fine. On Windows 8, however when I boost the DPI settings to take advantage of the retina display, it blows up the display on the external monitor - text is giant sized. How can I tell Windows 8 to use the real DPI settings of each monitor? NOTE: I'm not asking for Windows 7.

    Read the article

  • How do I set up a working GUEST USER account in Win XP Pro?

    - by user6501
    I have two user accounts within my WinXP Pro PC. One I'd like to erase. But I'd also like to setup a GUEST user account. I've already gotten 2-step instructions on how to get rid of the extraneous account: a) use an MS tool called delprof.msi b) manually delete the former users files in Documents & Settings. But I guess my original question was too complex -- kind of like a bill in Congress. So now I am just asking the final part of the question: How do I create a GUEST ACCOUNT -- then define what it will authorize/grant access to? i.e. internet browser(s), specific programs and files etc

    Read the article

  • Unable to access my gmail after moving to another country

    - by Gilgamesh
    I am completely fed up with google's useless security policy for emails. I hope there is any method to solve this. What is happenibg is that I used to use my gmail account from Turkey and recently I had to move to Sweden. When trying to gain access to the same account from there, google tells me that 'something has changed'since my last access and it is asking that I verify myself using methods that I forgot them all because I created that account two years ago when I had a different phone number and email and when I did not care much to answer the'secret' question. I also tried google's incompetent recovery survey that judged that I did not provide sufficient information for them to give me access again. Is there any way to solve this,please help. I desperately need to access that account. Thanks

    Read the article

  • Google maps later traffic

    - by bobobobo
    Google maps has this feature of showing you how long it will take to get somewhere based on current traffic. But what about history, or asking for a prediction of how long it will take to get somewhere, during rush hour, for example? So, how long will it take to get there on this route if I leave at 5, vs how long it will take if I leave at 3. (A difference of 30 minutes on the road sometimes!) If google maps doesn't provide this service, iis there anywhere that does?

    Read the article

  • Host file in browser?

    - by acidzombie24
    Instead of changing my host file i'd like firefox to think my domain is on my own server while my other browser to use the real ip address. I use to edit my host files but that forces both browsers to change the ip address. I found change hostbut it doesnt appear to use the alternative host file. I also saw a comment asking when it will work on firefox 6+ I tried Host Admin and it fails. It works but the alternative IP address must be in your host file already (which i dont want) and it lets you deselect a domain so the host file is ignored. Not what i want.

    Read the article

  • Cannot log-in in the install of phpmyadmin on Ubuntu

    - by Sylario
    I just installed phpmyadmin and i am trying to login in /phpmyadminpath/setup. I am greeted by an invite similar to an apache protected folder (log/password displayed in a browser pop-up, not an html popup) asking for login pass. I cannot login using system password(root) or mysql passsword(also root) I already have rails app using this mysql, and i checked the mysql password in the config files. I cannot run any mysql command in my console because of the following error : ERROR 1045 (28000): Access denied for user 'root'@'localhost' (using password: NO) What is wrong with phpmyadmin and mysql?

    Read the article

  • mongodb replication: no primary elected

    - by Max
    I have three servers with mongod installed on it running as a replication set. Suddenly the two secondories became unavailable (the mongod process died) - I think because they were too stale. The problem is that the original PRIMARY is now the SECONDARY and my application doesn't work because it can't connect to a PRIMARY. I mean, in which way does that help me? If the replica set can't do failover?! Am I missing something? Furhtermore I am asking myself why did the SECONDARIES die / why are they too stale? What can I do about it? FYI: My database is quite big (40GB on disk).

    Read the article

  • Deployed Web Application Requests for User Name and Password

    - by user43175
    Deployed Web Application Requests for User Name and Password I recently deployed a .NET web application into the server. Authentication mode is set to Windows (since the application is accessible only to Intranet users. Testing some machines, the application loads up properly. For some machines, a logon dialog window appears asking for User Name or Password. These dialog windows are those that you also normally see when you are trying to log into a Windows domain. Any idea why this happens randomly? Thanks.

    Read the article

  • How can I get all my itunes files from multiple computers onto my new PC?

    - by jasondavis
    Managing my itunes files (music,video,tv shows, iphone apps) is a really hard task and I have not had much luck yet. If I had a single PC for the rest of my life with the same hard drive, it would work great but infortunately it cannot be that simple. I just build a new PC as my old hard drive crashed with all my itunes purchased songs, video, etc. So is there anyway to get itunes to recognize that I own all them and let me re-download everything? As I see it so far, it knows what I own by my itunes account login (it knows if I purchased a file or not ever) but does not seem to let you just re-download everything to a new PC or new hard drive. I realize I should of had backups but I didn't. My backup plan is a work in process and it is getting much better but that doesnt help with my situation at the moment. So I am asking for any help, ideas of how to retrieve all my previous itunes purchases?

    Read the article

  • How do I create yum repo file?

    - by max
    I know there is a previously asked question, but I still have some doubts so asking again. How do I create a yum repo file? I know that in the /etc/yum.repos.d/ I have to create .repo file. Below is the pattern: 1 [name ] 2 name= 3 baseurl= 4 enabled=1 5 gpgcheck=1 6 gpgkey= Here in the baseurl which link should I give? I'm fully confused about this. How do I get that baseurl link? Can anyone please explain to me clearly? I am using CentOS 6.2.

    Read the article

< Previous Page | 86 87 88 89 90 91 92 93 94 95 96 97  | Next Page >