Exactly! A shooting star without a gun is a dead star.
If train stations are where trains stop, what's a workstation?
Exactly! A shooting star without a gun is a dead star.
If train stations are where trains stop, what's a workstation?
Your profile links to a site about the software in question, so it seems like you are actually the vendor. If that's the case I doubt we will be able fix your product. Have I misunderstood? Please do clarify your connection with the product.
Something went missing from my last post...
Use a USB to IDE/SATA cable, such as this:
This one supports 2.5 and 3.5 inch IDE drives (PATA), SATA devices, and includes a separate power supply. Once connected it's no more difficult than using a USB thumb drive.
Granted, but all your teeth must first turn blue.
I wish running water would learn to walk.
Yesterday I deftly managed to submit a post with a broken image. See: retrieving photos from hard drive
The image immediately followed the first line but now returns an HTTP 404 error, possibly because I removed it as an attachement. Wasn't immediately aware of the problem because my browser had already cached the URL and displayed the image as expected.
The relevant HTML currently looks like this:
<p>Use a USB to IDE/SATA cable, such as this:</p>
<p><img src="http://static.daniweb.com/images/attachments/3/f9067ace1e4e33c0be2abfa04f623929.png" alt="" title="USB to IDE/SATA cable" /></p>
Apologies for messing it up.
Would it be possible to fix the broken image? (replacement attached herewith.) And is there a way to specify the 'alt' text?
Use a USB to IDE/SATA cable, such as this:
This one supports 2.5 and 3.5 inch IDE drives (PATA), SATA devices, and includes a separate power supply. Once connected it's no more difficult than using a USB thumb drive.
For more info try searching the web for USB to IDE/SATA cables....
Alternatively, to make use of the SATA cable you have already...
Start by opening your computer case and invalidating your warranty. Rummage a round for a spare SATA slot, taking care not to dislodge anything too important, and plug-in the SATA cable.
Attach the other end to the hard drive, assuming it has a SATA interface. If the drive is more than ten years old it'll probably have a PATA interface. Unfortunately PATA and SATA are totally incompatible no matter how far you bend pins.
The drive will also need power. Computer manufacturers know just how useful a spare power connector can be for users looking to upgrade their systems instead of purchasing new ones, so you might just get lucky. If not purchase a power cable splitter, or borrow the one from the CD/DVD drive.
On booting the system you may need to change the SATA configuration or BIOS settings to specify a drive letter for the disk. Choose a letter that is higher than any current drives. Refrain from changing the boot order.
Oh, and don't forget to switch your computer off before trying the above. Perhaps …
For the purpose of SEO promotion? If you're looking to gain Page Rank for the link, I don't believe self published links carry much weight.
If you're concerned whether it will detrimentally affect your site's ranking, you could always rel='nofollow' the link, but I doubt that will be necessary if the article is on your own blog. Guest blogging is another matter.
Regarding keywords, the link text can help search engines understand what the destination is about. If you have multiple links to the same resource, only the first link on a page counts, as far as I understand. However, too many high value keywords can upset your link profile. Having link text such as 'click here' was once considered poor SEO, but times have changed and it might now help to make a link profile look more natural.
Favorite location for the link would be somewhere near the top of the article, 'above the fold' as they say, so that it can be seen when the page loads.
Search engines seem keen to identify authorship these days and there are ways you can associate a bog article with your site that you might want to take advantage of.
Whether to pass parameters by reference or value largely depends on the type of data you're passing to a function.
Passing by reference is more efficient for complex types. Instead of copying the whole object, you need only pass a reference or pointer to the object, which is typically 32 or 64-bits in size depending on your system.
Simple datatypes like signed and unsigned integers, floats and bools, are no larger than a pointer, so there's no advantage to passing these by reference. In fact passing simple datatypes by pointer might actually be slower because the value will need to be dereferenced.
it will definetely increase your ranking in google.
Search engines consider various metrics when ranking pages but producing video content is not one of them, as far as I know. Could you explain further how video marketing affects ranking?
Have you tried jQuery? A quick example to get you started:
<!DOCTYPE html>
<html>
<head>
<script src="http://code.jquery.com/jquery-latest.min.js"></script>
<script>
$(document).ready(function(){
setTimeout(function(){ $("#img1").fadeOut("slow");
},2000);
});
</script>
</head>
<body>
<img id="img1" src="your-image.png">
</body>
</html>
When the document finishes loading the image (not included) should begin to fade out after a couple of seconds.
It makes use of jQuery's fadeOut method, documented here:
http://api.jquery.com/fadeOut/
I have used JavaScript's setTimeout method to simply delay the start, but wouldn't be surprised if you discover there's a more jQuery-esque way of doing it.
Suppose http://www.abc.com and...
As a side note it's better to use www.example.com or one of the other top level DNS names that have been reserved for this purpose. You can't guarantee what any other domain might point to in the future.
Thanks for the response. I attempted to kill the process as suggested, by specifying a username filter, but still get the 'Access is denied' message. Same result when filtering by PID.
I can imagine how terminating processes owned by other users might lead to access denied warnings, but I don't believe this is the case here. All instances of WINWORD.EXE are owned by the current user, the account from which I wish to call taskkill.
I need to kill a process from the command line:
taskkill /f /IM WINWORD.EXE
The command works just fine when using an administrator account, but fails for standard user accounts with "Access is denied."
Is it possible to grant a standard user rights to kill a specific process? What privilleges might be required?
The OS is Windows 8.1.
Google looked over every file in the sitemap, and discarded those it did not care for.
The most likely reason :-)
We cannot schedule the indexing process nor can we tell the exact time period.
But you can give search engines a hint by using sitemaps, see: <changefeq>.
Just wait for sometime since it would take longer for indexing certain pages.
Yes, it can take a while to crawl every page, but why would certain pages take longer than others :-s
You can identify exactly which pages a search engine has crawled and when by checking your web server logs. Visits by Google will contain 'GoogleBot' in their User Agent string. User Agent strings sometimes lie but you can discover whether a visit is genuine or not by using a reverse DNS lookup, see: Verifying GoogleBot
There are quite a few things that can prevent pages from getting indexed. Google Webmaster Tools will help you to identify many of these but not all. For example, if Google has found identical content on another site, and decides that is more authoritive than yours, I suspect you won't find the issue reported in GWT.
Is it possible you have some URLs listed more than once in your sitemap?
as far as it stands, WinXP -(IE+ActiveX) -(MS software) +(multiple security installations (aside from MS SE)) +(Secure Browsers (not Chrome or FF)) will keep you far more secure and protected than ANY WinVista (and up) installation.
There has been thousands of updates to Windows since the release of XP. Are you suggesting the various bug fixes, security patches and other improvements have actually made Windows less secure?
no I'm not delusional...
Prove it :-)
Gray hat SEO walks the line between the white and black hats of search engine optimization.
Could you give us an example? Any will do.
Reality TV shows and repetition. Just when we're about to find out which useless contestant going home, the screen fades out for a second, and then we're treated to a replay of "And the person going home is..."
We might just as well be watching Teletubbies.
Take a look in the documentation for System.Net.Mail. The MailMessage Class page contains some example code you might find useful. Does this help?
Grey hat is acutally the combination of both black hat and white hat.
It's not like mixing paint you know. SEO methods either violate guidelines or they do not. If you disagree, please feel welcome to prove me wrong. Could you show us an example of a combined technique?
Is the date and time on your system correct?
Issue 1. Currently i am getting enough search impressions but clicks are not considerbly good in number.
The top 3 slots on search engine result pages (SERPs) tend to steal the lion's share of clicks. If your results appear too far down, you'll see plenty of impressions but few clicks. If you're lucky enough to appear near the top of a SERP but still don't enjoy a good click-though rate (CTR), consider alternative page titles and meta tag descriptions.
Issue 2 - Keyword ranking not improving though i tried all optimization techniques in 1 month.
SERPs change gradually over time. In my experience changes are never instant and optimizations sometimes take several months to make a difference. At least this seems to be true of highly competitive keywords.
I imagine you may see faster results for less competitive keywords, targeted at a narrow audience. For example, if you're in the business of selling pizzas, targetting a specific geographic location. You'd stand a better chance of ranking for "hong kong pizza delivery" than just "pizza delivery".
Hmmm, that makes me feel hungry.
Blank screens don't tell us much. Was there anything unusual in your boot log?
The forum rules can be found here:
http://www.daniweb.com/community/rules
In other words, we can help with homework related questions, but we're unable to do homework on behalf of students.
Pinky, if you still need help with your project, tell us about the parts you don't understand. Break the tasks down and tackle them one at a time - you can always begin a new thread for each problem. Only show code that is relevant to your question. Avoid revealing so much code that other students will be able to take advantage of your work, otherwise you'll run the risk of being accused of plagiarism - something you really don't want to happen.
Why are you attempting to activate Windows with KMSpico? Please be aware of the forum rules.
It's difficult to say what might be causing the long boot time, the possible causes are too numerous. Although a slow boot and missing DVD drive might suggest some common factor like a driver for the ATA controller. See if you can find or generate a boot log and check it for errors. Let us know if you see anything unusual.
We don't do homework for students.
That's not entirely true, is it? Daniweb's rules say: "Do provide evidence of having done some work yourself if posting questions from school or work assignments."
So Pinky, if you happen to be stuck on a particular aspect of an assignment, don't be afraid to request help. Show us a snippet of your code, the relevant bits, or some other evidence of your work.
Welcome to DaniWeb.
Try setting the CSS style to clear: left
for the DIV elements on lines 1, 11, and the other one not shown in your snippet, i.e. the DIVs that are the immediate ancestors of the image tags.
-Primary IDE channel no 80 conductor cable installed
The primary IDE channel is where older PCs normally expect to find a boot disk. Check the cable between your motherboard and harddisk. Has it been inserted correctly and in the right orientation? Also check that the jumper settings on the boot disk are set to 'master'.
If your motherboard supports ATA-133 you can take advantage of the faster interface by using an 80-pin cable to connect the harddisk, instead of the more common 40-pin connector.
-Keyboard error or no keyboard present
Before the advent of USB keyboards PCs were typically supplied with PS2 keyboards (not PlayStation2). You should find there's an option to turn off keyboard errors in the system BIOS. If you disable the halt on keyboard errors, I expect you'll find the system will boot and discover the USB keyboard once the OS has loaded. Otherwise try a PS2 keyboard.
-CMOS checksum error -defaults loaded
It's not unusual to see BIOS checksum errors after replacing a CMOS battery. Try resetting the BIOS to its defaults if the problem persists.
It's usually a good idea to check a distro's Hardware Compatibility List before installing Linux to see which devices are supported. Something you may want to do before ordering your laptop.
For Ubuntu the information you need is possibly found in their forums.
As a general rule though, the more popular your hardware is the more likely it is to be supported. Newer laptop models seem to be fairly well supported, especially those from big brand names.
Ubuntu has one of the largest community of users for a distro, so should anything go awry with your install, someone else may already have found a solution. Give it a shot!
It's possible you may be getting some interference from other devices. Cordless phones for example commonly use 2.4 GHz.
Remember, 5GHz has a shorter range than 2.4GHz, but by also having a shorter wavelength, it will better penetrate things like walls, floors, etc.
Surely it's the other way around, i.e. longer wavelengths have better penetration than short?
Exactly! Good to see you've got it working.
The load method is asynchronous, is it not? Although it needs time to retrieve serverstats.php, the call itself should return almost immediately.
So how long does it take to call lines 5, 6 and 7? I suspect it's just a few milliseconds, and then your blank message displays for the remainder of two seconds.
The load method accepts a callback function as an optional parameter, which is executed after the task completes. What happens if you move line 7 to inside the callback?
Log on as an administrator, take ownership of the file, then change its permissions.
Using a command prompt you could try the following:
takeown /F myfile.txt
icacls myfile.txt /grant Everyone:f
Note that permissions on a file or folder can be changed by its owner, regardless of any existing permissions. You'll need to log on as an administrator because other accounts don't usually have the right to take ownership.
Microsoft Security Bulletin MS11-083 - Critical
A vulnerability in TCP/IP can allow remote execution if an attacker sends a continuous flow of specially crafted UDP packets to a closed port on a target system.
Still feeling secure?
Firewalls cannot protect you from this type of attack. And remote execution can enable the attacker to take full control of your system, disable your anti-virus or anti-malware software, and steal your credentials, etc.
This is possibly why Microsoft suggest only running Windows XP disconnected from the Internet from now on. I also suspect they don't want to be held responsible for enabling the worlds largest bot net, given that 1/3 of computers are still running XP.
Thankfully the vulnerability was patched in later editions of Windows and doesn't affect Windows XP SP3. But the point I want to make really clear is that vulnerabilities like MS11-083 can and do exist, and it is only a matter of time before another exploit is discovered. Only next time Microsoft will not patch it.
Anyone who still believes Windows XP can be made secure definitely has (as another member kindly suggested) their heads buried in the sand. It's time to ditch XP!
It would be easier if your could provide us with the code you have already, but here goes.
To get your code to return the MemoryStream as a PDF you'll need server-side code that looks something like...
Response.Clear();
Response.ContentType = "application/pdf";
Response.AddHeader("content-disposition", "inline; filename=dummy.pdf");
Response.AddHeader("content-length", myMemoryStream.Length.ToString());
Response.BinaryWrite(myMemoryStream.ToArray());
Response.Flush();
Response.End();
where 'myMemoryStream' is the stream holding your PDF document. The document needs to be well-formed, otherwise the browser's PDF plug-in will complain. If you have any doubts, try saving the stream to a binary file and opening it directly into Acrobat.
On the HTML page that is to display the PDF, you'll can use something like...
<object data="myPdfScript.aspx" type="application/pdf" width="420" height="594">
<span>Hey, a plug-in is required to view PDFs!</span>
</object>
Where 'myPdfScript.aspx' is the name of the resource that generates your PDF documents, the one containing the aforementioned server-side code.
See if it works for you. If not, post back your own code and I'll take another look at it.
Another option might be to convert it to Flash. There are software components available that will do that for you.
Regarding authorization, the PDF format allows you to restrict certain rights, such as the ability to view, print or modify. I'm wondering if there may be another way to achieve what you want to do. What exactly are you trying to restrict?
Could you show us an example of the code you have so far?
Did you set the HTTP response headers for caching? If not, try setting Cache-control to something like "max-age=0, no-cache, no-store", and Pragma to "no-cache". Does it make a difference?
While HTTP headers allow you to specify what should and should not be cached, I suspect there are no guarantees here. A resource might get cached by a bad client, or perhaps cached by a proxy, or end up in page file on the client's system.
What's your reason for not storing the PDF on disk?
Windows 8 features a new interface and support for touch-screen displays, which might interest a few people, but I see no compelling reason for desktop users to upgrade.
PDF is not HTML. If you want to display the PDF inside a DIV element you'll probably need to convert it to HTML.
Alternatively you might use an IFrame. Let the browser request the resource from your server - you can set headers in the response stream to tell the client it's a PDF and whether to cache it or not. How the PDF is displayed depends on the browser and typically requires an appropriate plug-in.
Another option, you could render the PDF to a bitmap format such as PNG or JPEG, which practically all browsers support.
Are you hoping to avoid creating the PDF on the client or server harddrive?
They should be available on python.org. Look for the x86 MSI installers.
http://www.python.org/download/releases/2.7.6/
http://www.python.org/download/releases/2.7.3/
need I mention again that XP support was removed since Vista.
Support for XP is ending on 8th April, 2014.
See: http://windows.microsoft.com/en-us/windows/end-support-help
Firewalls and anti-virus software aren't going to protect you. Sooner or later a vulnerability will be discovered in Windows XP and Microsoft is not going to patch it. That's what they mean by withdrawing support.
And when an exploit becomes common knowledge hackers will target it. At this point the only effective security measure will be to run Windows XP disconnected from the Internet.
Results we get from this are permanent.
How can the benefits of SEO be permanent? Search engines periodically change their algorithms. Can you be sure what works today will still provide a benefit six months from now? Take keyword stuffing for example - if you applied that old SEO technique today it would do more harm than good.
I would imagine that if you are in possession of an original disk with the activation number then you are legal.
Not necessarily. Simply being in possession of the original media and license key doesn't mean Microsoft has granted you permission to use it. Can you be certain the real owner is no longer using XP and has completely removed the software from their workstation? What if they have already exceeded the number of transfers permitted under Microsoft's end user license agreement? Although Microsoft is unlikely to come after you, I'd clear it with the neighbor first.
(everyone raid your neighbors trash and see if they threw out a perfectly usable and valuable XP installation) :P
That there's an incitement to commit a crime! Seriously though, in some countries you'd be committing an offence. Taking from a dumpster in the UK or Germany is considered theft. Italians, they don't care. But if you're in to dumpster diving it's always better to know where you legally stand. Do you run or put up a fight?
Anyone here got busted?
Granted, now bend over while we give you a good crank.
I wish Ford would bring back the Model T.
they really new hold to throw parties!
Couldn't wait to open a bottle, eh? Happy New Year everyone!
Line 16, document.getElementById("demo") is returning null. There is no element with the ID demo.
Insert something like <p id="demo"></p>
at line 11 and you should find it'll work.
The user-agent string contains the information you need. Using JavaScript you can access it through the browser's navigator object, e.g. navigator.userAgent
.
Check the HTML source and you'll discover Facebook and Twitter links are marked as rel='nofollow'. They are not 'do follow links'.
The same is true for DaniWeb.
In fact most sites that allow guest posting mark links as 'nofollow' to deter spammers. Links marked as 'nofollow' will not pass page rank.
Goaway would be a great name for a tour company. What do you think?