- Upvotes Received
- 3
- Posts with Upvotes
- 3
- Upvoting Members
- 3
- Downvotes Received
- 0
- Posts with Downvotes
- 0
- Downvoting Members
- 0
61 Posted Topics
I'm testing out wdcalendar, a jquery based calendar for a wesbite. Some info on it: [url]http://www.webappers.com/2010/06/08/wdcalendar-jquery-based-google-calendar-clone/[/url] The installation instructions are simple, but not detailed so maybe im screwing up somewhere. They go as follows: Copy the unzipped directory into the apache www directory/sub-directory. For a database: Create a database, execute … | |
Re: There's not much in one package like this. Really your best bet is use virtual box, create a web server mimicking their setup, or something similar. And access it from your laptop. Switches and routers are unlikely to affect the experience. | |
Re: Does it need to be a service? You can just have an executable on disk run as a scheduled task. Just set it to run as the SYSTEM account. If it needs to be running constantly, uncheck the option to disable the task after 3 days. If you want a … | |
Re: Your keyboard is fine. It's probably an issue with a driver failing to load properly or something for your keyboard to function. Try booting into safemode and see if it makes a difference. If it does, try doing a system restore to a date before the problem started occuring. If … | |
I've got an XML file that looks like this: <routingTable> <router> <id>1</id> <ip>1.1.1.1</ip> <nexthop>1.1.1.2</nexthop> </router> <router> <id>2</id> <ip>2.2.2.1</ip> <nexthop>2.2.2.2</nexthop> </router> </routingTable> With possibly more than two router entries as time goes on. What I would like to do, is take each router instance and throw it into a dictionary. This … | |
I'm trying to get the available disk space on a remote linux host using python. The best way I could think to do this would be to os.popen a df command, and use regex to get the available space from the output. I then need to apply a variable to … | |
Re: You have the right Idea that the wired router will basically be a switch.Now you probably wont need a cross over cable, i've connected linksys routers to one another using straight through. One thing to consider, if you connect the cable to one of the wired routers switch ports, you … | |
Re: a project that will take one year? that would have be quite a large project. Most configurations should only take a few months of work at most (on one server anyway). Could checkout the various firewall projects to start: pfsense, m0n0wall | |
Re: When you mentioned this question, i could of sworn readin about software that does KVM over IP, but i couldnt find it googling. Some other things you can do is setting up remote desktop from windows to linux (though linux to windows is easier). Ubuntu comes with rdesktop and works … | |
Re: On a network device? sounds like a desktop problem to me. please provide more information on what you're using. Im thinking desktop so check the connection from the case to the USB header on the mobo. | |
Im just doin some testing with a local webserver. i have one user: hybrid who can login to the webpage fine and has for a while. But when i added a few users: usa, can with simple passwords using: ubuntu # htpasswd passwd can thats works fine. But I cannot … ![]() | |
Re: Can you explain this in more detail, when you say 12 billion packets, do you mean the number show on the connection in windows? Also re-explain this: "I connect on another pc on my lan to copy files from there to my pc." , i dont quite get what you're … | |
Re: just because the memory is shown in xp, doesnt mean its ok. Get an iso of memtest x86. Burn that, boot off it and let it run for a couple hours if you can, or just overnight. Whichever works best. When you check on it, if theres any red, its … | |
Re: run the command [I]tracert [url]www.google.com[/url][/I] and post the output | |
Re: There's no real loss to creating it on the host vs in a vm, except that a vm requires more resources to run than just apache/ftp. With that said, make the host OS as light as possible, to allow more resources for the vms. Dont install a GUI, or anything … | |
Re: Its possible that your machine is clean, but that it removed the system files for that application. to be safe run malwarebytes. If still nothing, you may need to reinstall. Im not sure if theres a way to install this application without a reinstall | |
Re: Before purchasing anything try different wireless channels: 1,6 or 11. Better antennas will certainly help, but if the distance is pretty far, consider putting another wireless device somewhere in the house and connect that to the main router with a cable | |
Re: Im pretty sure the tomato firmware which can go on most linksys devices has bandwidth graphs that you can watch. | |
Re: WoL requires certain network properties. It needs to be enabled in the motherboard settings. If its not there, the motherboard does not support wake on lan, which means no remote boot. | |
![]() | Re: I'm not sure why you need NAT for this, you need a router to route between the VLANs. If you can connect the switch to a router, and trunk the VLANs to the router, then tell the router about the various networks on the one interface (sub interfaces) it will … ![]() |
Re: Sounds like a lot of work for a school project. But maybe take a look at the dijsktra algorithm to get you started. Its used in OSPF and ISIS [url]http://en.wikipedia.org/wiki/Dijkstra%27s_algorithm[/url] | |
The idea here is I want the initial hash to be run into the child function, have changes made, send the changes back to the parent. Then send the changed hash into the child for more changes to take place. I've been making a poker program to help me learn, … | |
Re: Another main use for the backbone is it sends traffic between networks and large subnets. So from the server farm to client machines, or one building to another building. If you lookup some cisco ideologies and designs, its the core network. It will have high bandwidth links and fast devices … | |
Re: Well what kind of CD/DVD you putting in there? A manufactured music or dvd disc? A manufactured program? or something you burned? | |
Re: There should be an option to delete any existing partitions. Look under the partition list it should say which key you hit. It's either D or C(Win XP). In vista and 7 its a button you click. So delete all of them. Then i would recommend creating a new one … | |
Re: The subnet mask is something you can set depending on how large you want the network to be. Basically a 255.255.255.0 translates to 11111111.11111111.11111111.00000000 Theres 24 1s and 8 0s. To figure out how many hosts you have raise 2 to the number of hosts. Then you subtract 2 for … | |
Re: One thing that comes to mind: there was an update microsoft released for win 7 that checked for genuine/not genuine copies. I remember seeing posts not to download it because it cause issues with the OS. Its possible, but not likely that this is your problem. I suggest you format … | |
Re: So just change the resolution in desktop settings. Also make sure you get the latest ATI or Nvidia drivers installed, whichever pertains to the make/model of your video card. | |
I'm learning perl, been reading some pdfs and such which doesnt really help sink the info. So i decided to do what I did to help me with python, build something of a poker game. The cards are successfully dealt, now im working on splitting up the card terms to … | |
Re: This smells like a faulty drive to me. Can you boot recovery console and run chkdsk /f | |
Im following a perl book, and one exercise has you enter a number, sum them up until you type 999(the exit code). Their example works, but when I try using use strict, I cant figure out how to get the variable in the while loop to go global Here's what … | |
Re: Typically documents and such are rarely infected. Its usually system files and such. Considering the problems you're experiencing it could be difficult to remove things. But malwarebytes is a good tool, there are some rootkit removal tools as well. To attempt safebackup of your stuff, run a linux boot cd … | |
I'm new to perl, some experience in python. I've been tasked to create a script to remove comments in files. So basically id like to remove <!-- comment here --> from every line that has it in an assortment of files in a directory tree. Some comments may span multiple … | |
![]() | Re: Check if your router has WPS enabled. If your wireless card doesnt support it, or if Ubuntu doesnt support it, you wont be able to connect to the network. Also check that your encryption settings for WPA are the same as the router. ![]() |
Re: get ophcrack as the windows xp boot cd, and boot off that. you'll want to clear the password, not find out what it is(that takes too long) | |
Re: You have a wire tester to test the cable after you make it? Ethernet has a limit of 100m so you're not breaking that | |
Re: I'm assuming they need to communicate over the internet. Probably the best way to approach this is to have them use a remote access VPN(virtual private network) technology to connect to the central site where your application and SQL server are located. Openswan is a free VPN server for Linux. … | |
Re: That first line there seems like a good clue. change the permissions of /dev/map/control to 755 and see what happens. Try 777 if 755 doesnt work. | |
Re: Curious how you would get this to work. Spoofing a MAC changes the MAC address that is printed on each packet coming from the computer. You would need another piece of ID to identify each machine it would seem. | |
Re: Pinging the computer from the DC may not work simply because of a firewall. A ping from any device will allow the return reply, but not a request if blocking ICMP. I'm guessing other machines can view the network. Try pinging [url]www.google.com[/url]. If that works, not sure what to suggest … | |
Re: GNS3 is a cool piece of software, I just dont have the IOS to use it :( | |
Re: Seems people on the easypeasey forums recommend installing LAMP rather than just individual packages. You could also try installing Ubuntu OS instead, my apache2 folder has never deleted on that. | |
Re: google for an anonymous proxy in italy, and punch that into your ftp client. It's weird they would block it like that though. | |
Re: You want to use the Linux scheduler crontables. Here's a howto: [url]https://help.ubuntu.com/community/CronHowto[/url] | |
Re: Well the issue with the wired dropping. Could be a bad cable, could be a bad network port on the router or the computer. Or could be the whole router itself. Any event if wireless is what you want: easiest way to get wireless is with a USB wireless dongle. … | |
Re: A site survey is where a device will look at the wireless in the area. This should basically get your netgear to connect to the 2wire's wireless. Like techshaven said, you want to set the same wireless settings into the netgear that are on the 2wire, and enable repeater mode. | |
Re: If the script is sending this data over the internet, then yes it is unsafe. Sending the password data over the local LAN from a script is the same as you opening the web page and entering it. The person would have to be on your network and fully authenticated … | |
Re: Post your ebtables config so we can help. Its not something ive worked with before, but might have some insight for you |
The End.