Search Results

Search found 17953 results on 719 pages for 'someone someoneelse'.

Page 98/719 | < Previous Page | 94 95 96 97 98 99 100 101 102 103 104 105  | Next Page >

  • Internal Linux machine with Apache that I can access by IP address but not computer name

    - by Parris
    I have an Ubuntu machine running LAMP. While on the machine I can type localhost or the computers name to access htdocs. From another machine I can only access the machine via its IP Address. This just started happening recently when someone rearranged the network cables and removed a hub sitting between the machine and the network, which makes me think it wasn't all the stable to begin with anyways. Any suggestions on where I should start looking?

    Read the article

  • LOCAL and RADIUS authentication on ASA

    - by ghp
    Have configured local authentication which was working fine.And today I wanted to implement RADIUS too .. but after I have done, Im unable to login to my firewall user-identity default-domain LOCAL aaa authentication ssh console LOCAL and RADIUS aaa-server RADIUS protocol radius aaa-server RADIUS (inside) host xyzabc Key zzzzzz aaa authentication ssh console RADIUS aaa authentication enable console RADIUS aaa authentication http console RADIUS Can someone help me login to my firewall

    Read the article

  • Apache to Ngnix Rewrite to a Directory confusion

    - by Robin
    i could use a little help with rewrite and nginx... Basically the structure of my App looks like this Headdirectory -- -APPBase -SomeMoreStuff -WWWDirectory .htaccess So i need to redirect into the WWWDirectory when i open the Headdirectory. In Apache its done with a htaccess and the following Content : RewriteEngine On RewriteRule ^(.*) www/$1 I already tried in Nginx : location /Headdirectory { rewrite ^/(.*) /www/$1; } And i tried to create an Alias but that didnt work... Would be nice if someone could help me out. Have a nice Day

    Read the article

  • How to mount LUKS partition securely on server

    - by Ency
    I'm curious if it is possible to mount a partition encrypted by cryptsetup with LUKS securely and automatically on Ubuntu 10.0.4 LTS. For example, if I use the key for the encrypted partition, than that key has to be presented on a device that is not encrypted and if someone steals my disk they'll be able to find the key and decrypt the partition. Is there any safe way to mount an encrypted partition? If not, does anything exist to do what I want?

    Read the article

  • mutt: open reply to a message

    - by Prof. MAAD
    Hi! I am trying to find a way in mutt to jump to my reply to a mail. To be precise: I have a mail from someone else open in mutt and I replied to that mail - a copy of that reply is in the sent folder. Now I want mutt to show me that reply, when I press some key while reading the original message. Is there a way to accomplish this? Thanks in advance, Prof. MAAD

    Read the article

  • Install xenserver on iscsi target

    - by Ghassen Telmoudi
    Is is know that Xen Server is based on CentOS, and it is fact that CentOS can be installed on an ISCSI target flawlessly, but I wanted to install Xen server on an ISCSI target I couldn't find a way. I already tried the latest version of xen server 6.2, and there is no obvious way who to do the installation without a local disk. Does anybody have an idea about the subject, or did someone know how to do it? Please share your experience about this subject.

    Read the article

  • MOSS 2007 SP2 DB index maintanance

    - by Mike H
    I've read in the "About Service Pack 2 for SharePoint Products and Technologies" paper that SP2 includes an update for the Update Statistics Timer Job that causes SharePoint to run SQL Server's online index rebuild feature (p.4). I'm uncertain of the terminology here but is this the rebuild that SQL Server uses for minor fragmentation (up to around 40%) and leaves the DB online? I'm also guessing that this will therefore not rebuild severely fragmented indexes as I think this requires the DB to come offline. Can someone please confirm my belief here?

    Read the article

  • Document file format for universal adoption?

    - by Scott Muc
    I don't want to assume that someone has Word installed on their machine. What is the best file format so that everyone can read a document file? The only ones I can think of are: Rich Text Format Open Document Format Portable Document Format Plaint Text For example, what would be the best file format to write a resume in? I've actually written mine in XHTML, but some places simply demand a .doc file.

    Read the article

  • tomcat server can not be accesed remotly

    - by KItis
    I am running tomcat server on Fedora machine. when I run tomcat using following command, service tomcat start it runs on localhost , but when i try to connect to the server using public ip address of the server as follows remotly http://xxx.xxx.xxx.xxx:8080 it does not start could someone help me with this issue Thanks in advance for any help

    Read the article

  • openldap-servers-2.2.13-12.el4_8.2 RHEL 4 err=6

    - by coderwhiz
    I have been seeing these following error codes on our LDAP server: zgrep -o err=[0-9]* ldap.log.1.gz | sort | uniq -c 106664 err=0 146 err=16 288 err=4 29 err=49 8106 err=6 Can someone explain what err=6 is exactly and if its a big problem? I have been seeing lately some failures to authenticate and wonder if it is related to these errors? I have seen a possible timeout problem in the 2.2 Code base and not sure if theres a patch or if I would have to upgrade to the latest openldap version? thanks kosta

    Read the article

  • How long are the default times for greylisting? [on hold]

    - by rubo77
    In Wikipedia it sais: A mail transfer agent (MTA) using greylisting will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate the originating server will, after a delay, try again and, if sufficient time has elapsed, the email will be accepted. But how can I find out how long these delays are on my server and on the receiving side? My goal is to speed up email-traffic with partners using greylisting too and speed up the receiving of the first email someone sends to customers on my server.

    Read the article

  • Assist me access my firewall using ASDM

    - by ghp
    Have configured my asa 5520 with all the interfaces inside -- 10.11.12.1 outside - 70.71.72.4 Have not connected the management interface ..left it as is. Im remotely accessing this firewall from a different location by SSH, but would like to use the asdm to access it remotely. I have configured the HTTP SERVER enable and assigned http 10.11.12.254 255.255.255.255 inside Please can someone let me know the config which can help me access this firewall using ASDM.

    Read the article

  • Outlook 2003: How to display my own messages in conversation view?

    - by Godsmith
    When I select View-Arrange By-Conversation in Outlook 2003, the messages I sent myself are not shown in the message threads (unlike the conversation view in say, Gmail). To show my own messages I have to go to the Sent Items folder, if not someone has replied to one of my messages and included my original text. Is there a way to make my own messages visible in the conversation threads? Thank you! /Filip

    Read the article

  • "Switching users" in Lotus Notes

    - by r.tanner.f
    I am using a computer previously used by someone else. I logged in to Lotus Notes under my .nsf file, but I'm getting many errors. It seems Notes is trying to access the previous user's data still, in many different places. The Mail button on the home page tries to go to the previous user's inbox, and some settings are inaccessible. What can I do to make a clean break from the previous user's settings?

    Read the article

  • iptables intercept local traffic

    - by Anonymous
    i hope someone can help me out with somewhat simple task. I'm trying to redirect a client in my router through my desktop PC, so i can dump the traffic and analyze it (its potential source of poisoning the network with malicious packets). However i don't have a second NIC on my hands and i was hoping i can redirect all the traffic from that IP through my PC. In essence to become MITM for the client. Does anyone have any idea where to start: Current state: (localip)-(router)-(internet) And what i want to do: (localip)-(pc)-(router)-(internet)

    Read the article

  • The wireless connection could not be detected by other computer

    - by Rienna
    i tried to configure router pc in my linux ubuntu 10.04 . I use 2 connection to connect 2 client. 1st computer use LAN connection and 2nd use wireless connection. when i make new wireless connection in my ubuntu, the wireless that i make could not be detected by other computer that use wireless connection.i have tried to use windows and ubuntu as a client but it doesn't work. Maybe there's someone who know about it. Please share :)

    Read the article

  • Secure linux distro that sends traffic through Tor

    - by gravestone
    I'm looking for a live Linux distro that is secure and preserves my anonymity online. For what I need, Tor seems to do the job – but such software requires configuration that someone who is not knowledgeable in how it works might find difficult. I was looking at 'Lightweight portable security' but it does not specify whether it sends all traffic through Tor. Does anyone know more information about it and/or any other such live Linux distro?

    Read the article

  • Gnome Evolution on Windows 7

    - by Willi
    Hallo, I use Evolution on Windows 7. The language of Windows 7 is German, but the language of Evolution is Englisch and i'm not able to change it to German. Can someone please help me? Thank you in advance! Willi

    Read the article

  • MKV video suddenly stops playing after random time - what could this be?

    - by MEM
    I have this HP USB drive (16GB, NTFS formatted) that has, a MKV video. The USB is always detectable, so is the MKV, but when I connect that USB drive with that MKV video on my HT-C5530 home cinema USB port, the playback just suddenly stops after random time, and it returns to the main menu when I can see the pen and it's contents. I really have no clue about what could be the issue here, has someone else experience something similar? That may help me out on this.

    Read the article

  • Postfix sends every mail twice

    - by Savvas Sopiadis
    Could someone please tell me, why Postfix sends each message twice? I noticed that one message is correctly send and the other may (or may not) have a problem with the encoding. To be honest i did some adjustments for virtual domains, users,.... but i cannot find why these configurations should not work. I have the slight feeling it has something to do with virtual users, but i could also be wrong! Thanks in advance

    Read the article

  • Automating MySQL configuration with kickstart

    - by Nimmy Lebby
    I've been testing deployment for a website with some virtual servers. I have most of my deployment steps done via kickstart file (package installation and user creation). However, for MySQL I have to: Run mysql_secure_installation (sets up root password, deletes anonymous users, disallows root login remotely, removes test databases) ./ Then, create the website's databases and the database user. I'm not sure if this is possible in kickstart---especially the prompts in mysql_secure_installation. Perhaps someone has some suggestions or examples?

    Read the article

  • Setting Keyboard Shortcuts in Ubuntu

    - by joemangrove
    Is it possible to do the following in Ubuntu? If so can someone point me in the right direction. Say you want to set a keyboard shortcut to do the following: For examples sake, set Alt+F to open Firefox and maximize it, but only if Firefox is not already running. If it is running and not maximized, then maximize the most recently touched Firefox window. If it is maximized, then minimize Firefox. Thanks, Joe

    Read the article

  • Good free guide for mod_security?

    - by Josh
    I have looked at the official sites documentation, and it is a little tough to find starting points. Is there a free comprehensive guide that is easy to understand for someone that has never dealt with mod_security?

    Read the article

< Previous Page | 94 95 96 97 98 99 100 101 102 103 104 105  | Next Page >