Search Results

Search found 48390 results on 1936 pages for 'space used'.

Page 96/1936 | < Previous Page | 92 93 94 95 96 97 98 99 100 101 102 103  | Next Page >

  • Radeon 4670 Card Has 2 DVI Outs But Only Works When One is used in Win7 x64

    - by ssmith
    I have an ATI XFX Radeon 4670 1GB video card in a Windows 7 Ultimate x64 setup. If I only use one monitor, all is well. If I plug in a second DVI cable to the card, both monitors go dark. I can get one or the other to display, but only when it is the only one plugged into the card. I'm really hoping for a dual-monitor setup here as that was the point of the card. I'm using ATI Radeon HD 4600 Series video drivers dated 11/24/09 (8.681.0.0) which are the latest from their site and are supposed to work with Vista or Win7 x64. When the computer boots with both displays connected, both monitors display the inital bios and boot screens. The Win7 splash screen also displays, but by the time it goes to the login screen, one monitor is offline.

    Read the article

  • My Tablet PC has a jog dial (typically used for scrolling up and down) but it does not work by defau

    - by techtechmo
    I have an HP Compaq TC4400 and I recently was able to make most of the Tablet PC functions work in Ubuntu 9.10. (The step-by-step guide can be found in my blog.) Unfortunately I have yet to make the jog dial work. This would be particularly useful for scrolling up and down websites and documents when the TC4400 is in slate mode (with no access to the keyboard). I would be much obliged if anybody could tell me: How to find out the input button/key assignment that Ubuntu 9.10 has for jog-up and jog-down; How to assign jog-up to scroll up (D-pad key UP, or PAGE UP) and jog-down to scroll down (D-Pad key DOWN, or PAGE DOWN). I am using xbindkeys to assign different shortcuts to the quick launch buttons, perhaps I could use the same program for the jog dial? I would have done that, except I do not know how to find the proper button/key assignment for xbindkeys to use. Thanks in advance!

    Read the article

  • Using local proxy to specify used NIC on Windows 7?

    - by Nico
    I'm running Windows 7 and have 2 NIC installed, both are connected to the Internet (nic#1 LTE, nic#2 DSL). Windows 7 will only allow me to specify a binding order and a metric on which interface to chose but i can't specify this on an application level. My Idea was to use a local proxy server and use the proxy server whenever i want to use nic#2. I tried wingate and free proxy, both applications will let me chose the interface i want to use but this setting seems to have no effect? This is how i configured the applications: http://imageshack.us/photo/my-images/69/freeproxysettings.jpg/ http://imageshack.us/photo/my-images/811/wingateproxysettings.jpg/ Is what i'm trying to do in anyway possible?

    Read the article

  • Someone used or hacked my computer to commit a crime? what defense do I have?

    - by srguws
    Hello, I need IMMEDIATE Help on a computer crime that I was arrested for. It may involve my computer, my ip, and my ex-girlfriend being the true criminal. The police do not tell you much they are very vague. I was charged though! So my questions are: -If someone did use my computer at my house and business and post a rude craigslist ad about a friend of my girlfriend at the time from a fake email address, how can I be the ONLY one as a suspect. Also how can I be charged. I noticed the last few days there are many ways to use other peoples computers, connections, etc. Here are a few things I found: You can steal or illegally use an ip addresss or mac address. Dynamic Ip is less secure and more vulnerable than static. People can sidejack and spoof your Mac, Ip, etc. There is another thing called arp spoofing. I am sure this is more things, but how can I prove that this happened to me or didnt happen to me. -The police contacted Craigslist, the victim, aol, and the two isp companies. They say they traced the IP's to my business and my home. My ex was who I lived with and had a business with has access to the computers and the keys to bothe buildings. My brother also lives and works with me. My business has many teenagers who use the computer and wifi. My brother is a college kid and also has friends over the house and they use the computer freely. So how can they say it was me because of an angry ex girlfriend.

    Read the article

  • What tools can be used to monitor a web application? Beyond "doesn't 404"

    - by Freiheit
    I have an internal web application that has recently gone through a major version upgrade. I would like to monitor this application over the weekend and look for 'soft' errors. I will still need to spot check things by hand, but there are some common failure patterns that I think I can automate. Examples include data with bad formatting, blank rows in tables (indicates missing non-critical data), patterns for identifiers ("TEST" means one of my devs left a testing feed on), etc. I think there are applications out there that can be scripted to do things like: 1. log in 2. Go to $URL 3. select 3rd link in $LIST or $PATTERN 4. Check HTML from that link for $PATTERNS 5. Email report Are these goals sane? What applications/tools can help with this?

    Read the article

  • Can i create a virtual machine on my laptop to be used with another monitor?

    - by Ranhiru
    OK, the scenario is like this... I have my laptop... and I have another user without a unit. He has only a keyboard, mouse and a monitor. Is there anyway that I can make him use my computer by creating a virtual environment which he will access, BUT, without interfering with my work. I use my laptop and view my OS from the laptop monitor. I create a virtual environment (some OS probably XP) and run it. The virtual environment is displayed in the connected monitor and the other user uses it using the extra keyboard/mouse and the monitor but without interfering my screen! Is this possible? Stupid? Futuristic? Need more hardware?

    Read the article

  • Is WEP used in conjunction with a wireless access list adequate security?

    - by LeopardSkinPillBoxHat
    I use a Netgear wireless router, with various wireless devices connecting to it. One of my wireless devices doesn't support WPA2 security, so I had to downgrade the security on the router to WEP. We all know WEP is broken, so as an added measure I enabled a wireless access list on the router so that only devices with specified MAC addresses which are in my access list are permitted to connect to the router. I know it is possible to spoof a MAC address from a device for the purposes of accessing a secure network like this. But is it easy? Is using WEP and a wireless access list good enough to prevent most hacking attacks? Or should I do whatever I can to ensure all devices support WPA2 in the future?

    Read the article

  • Is there a specific name for the ".\" (dot-slash) shorthand used to log onto a Windows machine?

    - by HopelessN00b
    I guess the title just about says it all. And yes, .\, not that obsolete \. thing. :) For those who don't know, .\ is a shorthand way of saying "this computer" in Windows at a logon screen, which comes in very handy when you don't know or care about the local computer name but need to authenticate against it anyway, such as through RDP or scripting against a set of shared local users and passwords or even locally, if you're unlucky enough to have to physically go to a machine. Anyway, does this have an actual name, and if so, what is it? I feel kind of stupid saying the dot-slash thing, which is how I've been referring to this.

    Read the article

  • What ever happened to vim-full package that used to be available in ubuntu?

    - by stephenmm
    Why was it removed and is there a way to get it? I know about this post but I am curious as to why it would have been removed? Also if you do an install like this: apt-get install vim vim-scripts vim-doc vim-latexsuite vim-gui-common vim-gnome What is actually happening? Are there different versions of vim installed or does it compile vim with all those options or ...??? Sorry about the multiple questions here but it would seem silly to break them out into individual questions since they are all very related. BTW I am using 10.04 LTS

    Read the article

  • Why has ESXi 5.0 not used the software RAID configuration on my test server?

    - by kafka
    I've got a test server which was running WS 2008 Enterprise on the bare metal. It was correctly using the software RAID 1 configuration (2x250 GB disks which appeared as one disk), setup on the Dell Poweredge T110 (which meets compatibility requirements) without requiring any extra setup from me. (As an aside I'm fairly sure it's software RAID, as we didn't spec a hardware RAID controller, if that's of any importance in this situation). I am now testing installing ESXi 5.0 on this server to run some VMs. I've successfully installed ESXi, and imported a VM fine, but it's showing 2 x 250 GB disks available as datastores. However they should be appearing as one volume. When I boot the server, there is a RAID configuration screen you can enter, and I'm guessing this is what I'll have to do at some stage, but now need to be very careful because there is one disk which contains data that I want to be mirrored on the other disk. What is the best thing to do in this situation?

    Read the article

  • Can NULL RRs still be used or should be generally avoided?

    - by Mose
    I'm searching for a way for a placeholder in my bind zone files. I found some information on the NULL RR which would be perfect, but wikipedia states it's obsolete by RFC 883. I read through this RFC but could not find any reference for this statement. Is the NULL RR obsolete or not? Is it acceptable to use it as placeholder? At the moment I use this: somename IN TXT "placeholder"

    Read the article

  • Could a HomePlug be used to connect 2 routers?

    - by tigermain
    I have 2 routers that I would like to connect together (they are wireless but dont have an AP mode) could I simply buy a pair of homeplugs and connect them in order for all machines to have complete visibility of each other?! The DHCP will only be enabled on one, so the other will simply be acting as a switch

    Read the article

  • Windows: "net use" equivalent that shows the username used to mount a share?

    - by Jeroen Wiert Pluimers
    Sometimes you need to use different credentials to map different shares, for instance net use z: \\myserver\myshare /user:mydomain\myusername mypassword You can use net use to show you the shares that are mapped, but it does not show the mydomain\myusername. What can I use to show that information? I'm looking for output like this from the imaginary command NetUseX: H:\>NetUseX New connections will be remembered. Status Local Remote Username Network ---------------------------------------------------------------------------------------------------------- OK D: \\MyServer1234\SomeData MyServer1234\MyUserA Microsoft Windows Network Unavailable E: \\MyServer4321\SomeApps MyDomain\MyUserB Microsoft Windows Network OK H: \\MyServer4321\HomeDAta MyDomain\MyUserB Microsoft Windows Network Disconnected W: \\MyServer6789\WorkData MyDomain\MyUserB Microsoft Windows Network OK \\MyServer9876\Shortcuts MyServer9876\MyUserC Microsoft Windows Network The command completed successfully.

    Read the article

  • Both nginx and php5-fpm init.d startup scripts are non-functional and returning no errors..? But they used to work perfectly

    - by Ollie Treend
    I have been using nginx and php5-fpm on my Ubuntu box for a while now. Everything has been configured and setup correctly, and it ran like a charm. I have been keeping the packages updated & upgraded as usual, but haven't touched the nginx OR php5-fpm config files at all (thus I'm pretty sure this isn't my fault... ) Basically, I noticed nginx wasn't running as it should be. I ran the command sudo service nginx start, and the script did nothing. The same thing happens when trying to do anything - start, stop, restart or reload. This also happens for the "php5-fpm" init script - although all other init scripts seem to be functioning correctly. When trying to start nginx OR php5-fpm, this is what happens: root@HAL:/etc# service php5-fpm start root@HAL:/etc# I can't understand what is going wrong. The script isn't returning errors, but similarly it isn't starting the daemon or reporting success as usual. For reference, both installations are from the official nginx and php5-fpm PPAs. The fact that both started doing this at the same time has thrown me - since they are both unrelated packages. I have since purged both sets of packages from my system with apt-get purge ... and also apt-get remove --purge ... both of which have successfully removed the packages, their config files, and their init.d startup scripts. After having reinstalled nginx, I now have a functioning startup script again - I can start the web server as usual. However, php5-fpm is still experiencing the strange premature exiting of the startup script.. and I really can't figure out what's causing it. I have no idea what caused this to occur initially, but have managed to fix nginx. I now need to fix the php5-fpm startup script. If anybody could shed some light on this situation, I would be very grateful! The chances are both these issues are related - and they were caused by me doing something stupid. But now I need to fix it. This time I was lucky - because these problems are just on my development server. But I have 2 other live servers which are configured in a similar way, and I am worried the same thing will happen to these two as well! Has anybody else come across this? Do you have any words of advice? Thank you

    Read the article

  • How do I keep a table in Sync across 4 db's to be used in SQL Replication Filtering?

    - by Refracted Paladin
    I have a Win Form, Data Entry, application that uses 4 seperate Data Bases. This is an occasionally connected app that uses Merge Replication (SQL 2005) to stay in Sync. This is working just fine. The next hurdle I am trying to tackle is adding Filters to my Publications. Right now we are replicating 70mbs, compressed, to each of our 150 subscribers when, truthfully, they only need a tiny fraction of that. Using Filters I am able to accomplish this(see code below) but I had to make a mapping table in order to do so. This mapping table consists of 3 columns. A PrimaryID(Guid), WorkerName(varchar), and ClientID(int). The problem is I need this table present in all FOUR Databases in order to use it for the filter since, to my knowledge, views or cross-db query's are not allowed in a Filter Statement. What are my options? Seems like I would set it up to be maintained in 1 Database and then use Triggers to keep it updated in the other 3 Databases. In order to be a part of the Filter I have to include that table in the Replication Set so how do I flag it appropriately. Is there a better way, altogether? SELECT <published_columns> FROM [dbo].[tblPlan] WHERE [ClientID] IN (select ClientID from [dbo].[tblWorkerOwnership] where WorkerID = SUSER_SNAME()) Which allows you to chain together Filters, this next one is below the first one so it only pulls from the first's Filtered Set. SELECT <published_columns> FROM [dbo].[tblPlan] INNER JOIN [dbo].[tblHealthAssessmentReview] ON [tblPlan].[PlanID] = [tblHealthAssessmentReview].[PlanID] P.S. - I know how illogical the DB structure sounds. I didn't make it. I inherited it and was then told to make it a "disconnected app."

    Read the article

  • Which built-in account is used for Anonymous Authentication in IIS 7?

    - by smwikipedia
    We know that Microsoft IIS 7.0 offer a slew of authentication methods such as Anonymous Authentication, Form Based Authentication, Digest Authentication, etc. I read from Professional IIS 7 published by Wrox that: When we use Anonymous Authentication, the end-user does not supply credentials, effectively mak- ing an anonymous request. IIS 7.0 impersonates a fixed user account when attempting to process the request (for example, to read the file off the hard disk). So, what is the fixed user account impersonated by IIS? Where can I see it? If I don't know what this account is, how could I assign proper permissions for the clients who are authenticated as anonymous users? Thanks.

    Read the article

  • Can gedit on mac be used to edit files over ssh?

    - by Dave
    I use a linux machine at work and a mac at home. I can ssh from my machine at home to my work machine. But the only editor that I have access to on the command line then is vi, which I don't like. Is there a way to use gedit on my mac to edit files remotely over an ssh connection? This page says that it can be done, but I think that it assumes that you are using gedit on ubuntu. On my mac (os 10.5.8) I don't have the "bookmark" option when I click "connect to server". http://thecodecentral.com/2010/04/02/use-gedit-as-remote-file-editor-via-ftp-and-ssh-ubuntu/comment-page-1#comment-50558

    Read the article

  • I want to buy a second hand laptop, how to get the real technical specifications of a used laptop?

    - by Steven
    I want to buy a second hand laptop. I need to examine a laptop's configuration before I make a decision to buy it. I know the information the information about the components of a laptop can be intentionally fabricated.So the information I go through my computer/properties/hardware/device manager to see may not be reliable. So how can I get the real technical specifications of a second hand laptop?

    Read the article

  • What are the Windows G: through Z: drives used for?

    - by Tom Wijsman
    In Windows you have a C: drive. The first things labeled beyond that seems to be extra stuff. So my DVD drive is D: and if you put in a USB stick it becomes F:. And then some people also have A: and B:. But then, what and where are G: through Z: drives for? Is it possible to connect so many things to a computer to make them all in use? Or more than them? Would it give a BSOD? Or would this slow down the system somehow? Or what would happen? What if I want to connect even more drives to the computer? Because with the hard drive limits it's more efficient to buy more drives than to buy a single drive with a lot of capacity. Is it possible to create drive letters like 0: through Z: or AA: through ZZ:?

    Read the article

  • Can ZFS ACL's be used over NFSv3 on host without /etc/group?

    - by Sandra
    Question at the bottom. Background My server setup is shown below, where I have an LDAP host which have a group called group1 that contains user1, user2. The NAS is FreeBSD 8.3 with ZFS with one zpool and a volume. serv1 gets /etc/passwd and /etc/group from the LDAP host. serv2 gets /etc/passwd from the LDAP host and /etc/group is local and read only. Hence it doesn't not know anything about which groups the LDAP have. Both servers connect to the NAS with NFS 3. What I would like to achieve I would like to be able to create/modify groups in LDAP to allow/deny users read/write access to NFS 3 shared directories on the NAS. Example: group1 should have read/write to /zfs/vol1/project1 and nothing more. Question The problem is that serv2 doesn't have a LDAP controlled /etc/group file. So the only way I can think of to solve this is to use ZFS permissions with inheritance, but I can't figure out how and what the permissions I shall set. Does someone know if this can be solved at all, and if so, any suggestions? +----------------------+ | LDAP | | group1: user1, user2 | +----------------------+ | | | |ldap |ldap |ldap | v | | +-----------+ | | | NAS | | | | /zfs/vol1 | | | +-----------+ | | ^ ^ | | |nfs3 |nfs3| v | | v +-----------------------+ +----------------------------+ | serv1 | | serv2 | | /etc/passwd from LDAP | | /etc/passwd from LDAP | | /etc/group from LDAP | | /etc/group local/read only | +-----------------------+ +----------------------------+

    Read the article

< Previous Page | 92 93 94 95 96 97 98 99 100 101 102 103  | Next Page >