TOPIC_TITLE
stringlengths
15
156
CATEGORIES
stringlengths
2
199
POST
stringlengths
36
177
ANSWERS
stringlengths
0
51.8k
Should I ignore .bash_rc, .bash_profile etc if I'm using Zsh?
macos;bash;zsh;macos;bash;zsh
Should I ignore .bash_rc, .bash_profile etc if I'm using Zsh? Ask Question
1 But I want to know if I should be ignoring .bash_profile and those other files, and putting everything into the .zshrc file? A lot of instructions online for installation or system set-up stuff have me adding stuff to .bash_rc, etc. I assume if I’m into using zsh, I should be putting that stuff in .zshrc?This webpage explains the differences nicely, but it basically boils down to exactly what you are stating; if you are using Zsh then just place your adjustments/settings in the equivalent Zsh file:Zsh: Only cares about .zshenv, .zprofile, .zshrc, .zlogin and .zlogout.Bash: Only cares about .bashrc, .bash_profile, .bash_login, .profile and .bash_logout.So if you are reading any only tutorials or guides that refer to adding items to .bash_profile—since tons of users use bash by default—you then should just add those items to .zprofile instead.ShareImprove this answer Follow answered Apr 20, 2015 at 2:17Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badgesAdd a comment | ; 0 Not sure if its the “right way” but a ln -s them so in the event I need toUse bash for scripting.New installs without zsh or if zsh goes “dead in the water” I have a backup.But in my experience they are mutually exclusive to their respective shellsShareImprove this answer Follow edited Jan 29, 2016 at 23:18Vomit IT - Chunky Mess Style38.5k2626 gold badges7777 silver badges115115 bronze badges answered Apr 20, 2015 at 1:52linuxdev2013linuxdev20131,2521010 silver badges2121 bronze badgesAdd a comment | 
Awk to merge two files using hash
awk;terminal.app;osx-yosemite;awk;terminal.app;osx-yosemite
Awk to merge two files using hash Ask Question
1 If file2 contains (for example)The quick brownfox jumps overthe lazydog.then the first part of your awk script is settingh1["The"]="The"h2["quick"]="quick"h3["brown"]="brown"h1["fox"]="fox"h2["jumps"]="jumps"h3["over"]="over"h1["the"]="the"h2["lazy"]="lazy"h3["dog."]="dog."This doesn’t do you any good when you try to use those saved values in the second part of the script; you need to index the arrays by line number:h1[1]="The"h2[1]="quick"h3[1]="brown"h1[2]="fox"h2[2]="jumps"h3[2]="over"h1[3]="the"h2[3]="lazy"h3[3]="dog."So your script needs to beawk 'NR==FNR {h1[FNR] = $1; h2[FNR] = $2; h3[FNR] = $3; next}{print $1,$2,$3,$4,$5,$6,h1[FNR],h2[FNR],h3[FNR],$10,$11,$12}' file2 file1ShareImprove this answer Follow answered Apr 20, 2015 at 2:28Scott - Слава УкраїніScott - Слава Україні21.1k4646 gold badges6262 silver badges117117 bronze badgesAdd a comment | ; 1 What about:paste <(awk'{ print $1,$2,$3,$4,$5,$6 }' file1) <(awk '{ print $1,$2,$3 }' file2) <(awk '{ print $10,$11,$12 }' file1) paste takes input from the individual awk commandsby placing the awk commands in between '<( )', only the standard output is readpaste merges the three output files row by rowShareImprove this answer Follow edited Apr 20, 2015 at 19:23 answered Apr 20, 2015 at 2:17VincentVincent1,11277 silver badges1616 bronze badges21We’re looking for substantial answers that provide some explanation and context.  Don’t just give a one-line answer; explain why your answer is right.  Answers that don’t include explanations may be removed. – G-Man Says 'Reinstate Monica'Apr 20, 2015 at 4:232Could you please edit your answer to give an explanation of why this code answers the question? – DavidPostill♦ Apr 20, 2015 at 5:35Add a comment | 
Windows 8.1 Pro: Why does the name of the home folder end with _000? [duplicate]
windows-8.1;home-folder;windows-8.1;home-folder
Windows 8.1 Pro: Why does the name of the home folder end with _000? [duplicate] Ask Question
0 This may happen if you provide a Microsoft account during installation.If a local account is used instead, this will not happen.You may change it as described in this answer.ShareImprove this answer Follow edited Mar 20, 2017 at 10:04CommunityBot1 answered Apr 20, 2015 at 0:01thilina Rthilina R2,91355 gold badges2525 silver badges3535 bronze badgesAdd a comment | ; -1 Did you do this as an OS upgrade or a fresh install? During an OS upgrade, the original folders that hold user data will be renames (such as windows.old in older versions of Windows). If you look, you will likely find your old docs in one of the folders.Edit: Windows Live account users will have their usernames truncated.https://stackoverflow.com/questions/27408725/change-home-directory-name-windows-8-1ShareImprove this answer Follow edited May 23, 2017 at 12:41CommunityBot1 answered Apr 19, 2015 at 23:32Nathanial MeekNathanial Meek64233 silver badges99 bronze badges6No it is a fresh install. Not only that but I deleted the old partition and then formatted it before installing Windows 8.1. – AdamApr 19, 2015 at 23:33Is this system part of an AD? Did you try to migrate any files over from another location that would have been written to the User folder in question? Typically, the OS will make a different folder for the User if the username has an already existing folder in the directory. This is a common problem in AD setups when migrating profiles from one system to another. If you don't have the user logon first, when they do logon it'll create a folder "username.domain" rather than use the folder "username". – Nathanial MeekApr 19, 2015 at 23:37No. I noticed it as soon as the install was complete, so I didn't change anything. – AdamApr 19, 2015 at 23:40Is the user account in question a microsoft account or a local user? – Nathanial MeekApr 19, 2015 at 23:42It is a Microsoft Account. – AdamApr 19, 2015 at 23:43 | Show 1 more comment
How do I install Hyper-V on the Dell X 13 (2015) with Windows 8.1 [duplicate]
hyper-v;dell-xps;hyper-v;dell-xps
How do I install Hyper-V on the Dell X 13 (2015) with Windows 8.1 [duplicate] Ask Question
2 The Hyper-V feature is only supported on the 64-bit Pro and Enterprise versions of Windows 8.1.If you have only the regular version of Windows 8.1, or if you're running a 32-bit version, that would explain why you do not see the feature available.This product matrix from Microsoft's web site lists the feature differences between the various editions of Windows 8/8.1. Hyper-V is located under the Management category for some strange reason.ShareImprove this answer Follow edited Apr 19, 2015 at 23:31 answered Apr 19, 2015 at 23:14Wes SayeedWes Sayeed13.5k55 gold badges3939 silver badges7474 bronze badges4I have the regular windows 8.1 – Nitin JainApr 19, 2015 at 23:21The regular version of Windows 8.1 does not support Hyper-V. You will need to upgrade to Pro. – Wes SayeedApr 19, 2015 at 23:24Thanks. :) But I have heard that hyper-v is given as a free feature. Anyways. – Nitin JainApr 19, 2015 at 23:27In this case, "free" is a loaded phrase :-) It is free -- if you paid for it. – Wes SayeedApr 19, 2015 at 23:32Add a comment | ; 0 To enable Hyper‑V on Windows 8.1In Control Panel, tap or click Programs, and then tap or click Programs and Features.Tap or click Turn Windows Features on or off.Select Hyper‑V, tap or click OK, and then tap or click Close.Shut down your PC, and then restart it.Depending on your manufacturer, you might have to pause a few seconds with the PC off before restarting for the required changes to take effect. If you're using a laptop, you might have to remove the battery before restarting.http://windows.microsoft.com/en-us/windows-8/hyper-v-run-virtual-machineshttps://technet.microsoft.com/en-us/library/hh857623.aspxIf you Opt-ed for the Windows 7 Downgrade (or didn't spring for the Windows 8.1 Pro version), there is no option and you will be unable to use Hyper-V on your system.P.S. Excellent choice on a system. I'd be interested in getting your opinion on it but that's Off-Topic.ShareImprove this answer Follow answered Apr 19, 2015 at 23:16Nathanial MeekNathanial Meek64233 silver badges99 bronze badgesAdd a comment | 
Why does emptying disk space speed up computers?
memory;performance;disk-space;memory;performance;disk-space
Why does emptying disk space speed up computers? Ask Question
316 +50 Here, I wrote a book by accident. Get some coffee first.Why does emptying disk space speed up computers?It doesn't, at least not on its own. This is a really common myth. The reason it is a common myth is because filling up your hard drive often happens at the same time as other things that traditionally could slow down† your computer. SSD performance does tend to degrade as the drive fills, but this is a relatively new issue, unique to SSDs, and is not really noticeable for casual users. Generally, low free disk space is just a red herring.For example, things like:File fragmentation. File fragmentation is an issue††, but lack of free space, while definitely one of many contributing factors, is not the only cause of it. Some key points here:The chances of a file being fragmented are not related to the amount of free space left on the drive. They are related to the size of the largest contiguous block of free space on the drive (e.g. "holes" of free space), which the amount of free space happens to put an upper bound on. They are also related to how the file system handles file allocation (more below). Consider: A drive that is 95% full with all free space in one single contiguous block has 0% chance of fragmenting a new file ††† (and the chance of fragmenting an appended file is independent of the free space). A drive that is 5% full but with data spread evenly over the drive has a very high chance of fragmentation.Keep in mind that file fragmentation only affects performance when the fragmented files are being accessed. Consider: You have a nice, defragmented drive that still has lots of free "holes" in it. A common scenario. Everything is running smoothly. Eventually, though, you get to a point where there are no more large blocks of free space remaining. You download a huge movie, the file ends up being severely fragmented. This will not slow down your computer. All of your application files and such that were previously fine won't suddenly become fragmented. This may make the movie take longer to load (although typical movie bit rates are so low compared to hard drive read rates that it'll most likely be unnoticeable), and it may affect I/O-bound performance while the movie is loading, but other than that, nothing changes.While file fragmentation is certainly an issue, often times the effects are mitigated by OS and hardware level buffering and caching. Delayed writes, read-ahead, strategies like the prefetcher in Windows, etc., all help reduce the effects of fragmentation. You generally don't actually experience significant impact until the fragmentation becomes severe (I'd even venture to say that as long as your swap file isn't fragmented, you'll probably never notice). Search indexing is another example. Let's say you have automatic indexing turned on and an OS that doesn't handle this gracefully. As you save more and more indexable content to your computer (documents and such), indexing may take longer and longer and may start to have an effect on the perceived speed of your computer while it is running, both in I/O and CPU usage. This is not related to free space, it's related to the amount of indexable content you have. However, running out of free space goes hand in hand with storing more content, hence a false connection is drawn.Antivirus software. Similar to the search indexing example. Let's say you have antivirus software set up to do background scanning of your drive. As you have more and more scannable content, the search takes more I/O and CPU resources, possibly interfering with your work. Again, this is related to the amount of scannable content you have. More content often equals less free space, but the lack of free space is not the cause. Installed software. Let's say you have a lot of software installed that loads when your computer boots, thus slowing down start-up times. This slow down happens because lots of software is being loaded. However, installed software takes hard drive space. Therefore hard drive free space decreases at the same time that this happens, and again a false connection can be readily made.Many other examples along those lines which, when taken together, appear to closely associate lack of free space with lower performance.The above illustrate another reason that this is such a common myth: While lack of free space is not a direct cause of slow down, uninstalling various applications, removing indexed or scanned content, etc. sometimes (but not always; outside the scope of this answer) increases performance again for reasons unrelated to the amount of free space remaining. But this also naturally frees up hard drive space. Therefore, again, an apparent (but false) connection between "more free space" and "faster computer" can be made.Consider: If you have a machine running slowly due to lots of installed software, etc., and you clone, exactly, your hard drive to a larger hard drive then expand your partitions to gain more free space, the machine won't magically speed up. The same software loads, the same files are still fragmented in the same ways, the same search indexer still runs, nothing changes despite having more free space.Does it have to do with searching for a memory space where to save things?No. It does not. There's two very important things worth noting here: Your hard drive doesn't search around to find places to put things. Your hard drive is stupid. It's nothing. It's a big block of addressed storage that blindly puts things where your OS tells it to and reads whatever is asked of it. Modern drives have sophisticated caching and buffering mechanisms designed around predicting what the OS is going to ask for based on the experience we've gained over time (some drives are even aware of the file system that is on them), but essentially, think of your drive as just a big dumb brick of storage with occasional bonus performance features.Your operating system does not search for places to put things, either. There is no "searching". Much effort has gone into solving this problem, as it is critical to file system performance. The way that data is actually organized on your drive is determined by your file system. For example, FAT32 (old DOS and Windows PCs), NTFS (later Windows), HFS+ (Mac), ext4 (some Linuxes), and many others. Even the concept of a "file" and a "directory" are merely products of typical file systems -- hard drives know not about the mysterious beasts called "files". Details are outside the scope of this answer. But essentially, all common file systems have ways of tracking where the available space is on a drive so that a search for free space is, under normal circumstances (i.e. file systems in good health), unnecessary. Examples:NTFS has a master file table, which includes the special files $Bitmap, etc., and plenty of meta data describing the drive. Essentially it keeps track of where the next free blocks are, so that new files can be written directly to free blocks without having to scan the drive every time.Another example, ext4 has what's called the "bitmap allocator", an improvement over ext2 and ext3 that basically helps it directly determine where free blocks are instead of scanning the list of free blocks. Ext4 also supports "delayed allocation", that is, buffering of data in RAM by the OS before writing it out to the drive in order to make better decisions about where to put it to reduce fragmentation.Many other examples.or with moving things around for making up a long enough continuous space for saving something? No. This does not happen, at least not with any file system I'm aware of. Files just end up fragmented.The process of "moving things around to make up a long enough contiguous space for saving something" is called defragmenting. This doesn't happen when files are written. This happens when you run your disk defragmenter. On newer Windows, at least, this happens automatically on a schedule, but it is never triggered by writing a file.Being able to avoid moving things around like this is key to file system performance, and is why fragmentation happens and why defragmentation exists as a separate step. How much empty space on the hard disk should I leave free?This is a trickier question to answer, and this answer has already turned into a small book.Rules of thumb:For all types of drives:Most importantly, leave enough free space for you to use your computer effectively. If you're running out of space to work, you'll want a bigger drive.Many disk defragmentation tools require a minimum amount of free space (I think the one with Windows requires 15% worst case) to work in. They use this free space to temporarily hold fragmented files as other things are rearranged.Leave space for other OS functions. For example, if your machine does not have a lot of physical RAM, and you have virtual memory enabled with a dynamically sized page file, you'll want to leave enough space for the page file's maximum size. Or if you have a laptop that you put into hibernation mode, you'll need enough free space for the hibernation state file. Things like that.SSD-specific:For optimum reliability (and to a lesser extent, performance) SSDs require some free space, which, without going into too much detail, they use for spreading data around the drive to avoid constantly writing to the same place (which wears them out). This concept of leaving free space is called over-provisioning. It's important, but in many SSDs, mandatory over-provisioned space already exists. That is, the drives often have a few dozen more GB than they report to the OS. Lower-end drives often require you to manually leave unpartitioned space, but for drives with mandatory OP, you do not need to leave any free space. An important thing to note here is that over-provisioned space is often only taken from unpartitioned space. So if your partition takes up your entire drive and you leave some free space on it, that doesn't always count. Many times, manual over-provisioning requires you to shrink your partition to be smaller than the size of the drive. Check your SSD's user manual for details. TRIM and garbage collection and such have effects as well but those are outside the scope of this answer.Personally I usually grab a bigger drive when I have about 20-25% free space remaining. This isn't related to performance, it's just that when I get to that point, I expect that I'll probably be running out of space for data soon, and it's time to get a bigger drive.More important than watching free space is making sure scheduled defragmentation is enabled where appropriate (not on SSDs), so that you never get to the point where it becomes dire enough to affect you. Equally important is avoiding misguided tweaks and letting your OS do its thing, e.g. don't disable the Windows prefetcher (except for SSDs), etc.There's one last thing worth mentioning. One of the other answers here mentioned that SATA's half-duplex mode prevents reading and writing at the same time. While true, this is greatly oversimplified and is mostly unrelated to the performance issues being discussed here. What this means, simply, is that data can't be transferred in both directions on the wire at the same time. However, SATA has a fairly complex specification involving tiny maximum block sizes (about 8kB per block on the wire, I think), read and write operation queues, etc., and does not preclude writes to buffers happening while reads are in progress, interleaved operations, etc. Any blocking that occurs would be due to competing for physical resources, usually mitigated by plenty of cache. The duplex mode of SATA is almost entirely irrelevant here.† "Slow down" is a broad term. Here I use it to refer to things that are either I/O-bound (e.g. if your computer is sitting there crunching numbers, the contents of the hard drive have no impact), or CPU-bound and competing with tangentially related things that have high CPU usage (e.g. antivirus software scanning tons of files). †† SSDs are affected by fragmentation in that sequential access speeds are generally faster than random access, despite SSDs not facing the same limitations as a mechanical device (even then, lack of fragmentation does not guarantee sequential access, due to wear leveling, etc., as James Snell notes in comments). However, in virtually every general use scenario, this is a non-issue. Performance differences due to fragmentation on SSDs are typically negligible for things like loading applications, booting the computer, etc.††† Assuming a sane file system that isn't fragmenting files on purpose.ShareImprove this answer Follow edited Apr 25, 2015 at 3:58 answered Apr 20, 2015 at 10:08Jason CJason C10.2k99 gold badges3838 silver badges5757 bronze badges12Very comprehensive answer, thanks. Also thanks for the reminder to grab some coffee, it was much appreciated. – Hashim AzizFeb 27, 2018 at 0:19Add a comment | ; 22 In addition to Nathanial Meek's explanation for HDDs, there is a different scenario for SSDs.SSDs are not sensitive to scattered data because the access time to any place on the SSD is the same. The typical SSD access time is 0.1ms versus a typical HDD access time of 10 to 15ms. It is, however, sensitive to data that is already written on the SSDUnlike traditional HDDs that can overwrite existing data, a SSD needs completely empty space to write data. That is done by functions called Trim and Garbage Collection which purge data that was marked as deleted. Garbage Collection works best in combination with a certain amount of free space on the SSD. Usually 15% to 25% of free space is recommended.If the garbage collection cannot complete it's job in time, then each write operation is preceded by a cleanup of the space to where the data is supposed to be written. That doubles the time for each write operation and degrades overall performance.Here is an excellent article that explains the functioning of Trim and Garbage CollectionShareImprove this answer Follow edited Mar 20, 2017 at 10:17CommunityBot1 answered Apr 19, 2015 at 23:37whswhs1,30199 silver badges1010 bronze badges9Note that SSDs CAN write to partially-filled cells, by reading the partial data and writing back with more written, but it tends to only do that when it's unavoidable. This is of course also quite slow, and usually indicates the drive is so badly-fragmented that it'll take quite a lot to make it ever write quickly again. – fluffyApr 20, 2015 at 3:56That will also depend on the controller. And since there are so many variations I did not want to go into that level of detail. – whsApr 20, 2015 at 4:04The 15-25% you speak of is called "over-provisioning". Some drives have mandatory space allocated for this already (e.g. the 1TB EVO 840 has 9% reserved and not reported to the OS as free), for those you don't need to leave any free space. I believe that in some cases the over-provisioned space must be unpartitioned too, and simply leaving free space on your file system doesn't cut it, you'd need to actually leave unallocated space. – Jason CApr 20, 2015 at 14:54Over-provisioning is something else. Those are nands on stand-by to replace defective nands. The 15-25% are required for freeing up blocks (pages) and for wear levelling. You may want to read here for details ==> thessdreview.com/daily-news/latest-buzz/… – whsApr 20, 2015 at 16:38@whs It is not, and the article you link to does not imply that it is. Over-provisioned space (see also cited sources in that section, or Google) is the pool of free blocks, blocks in this pool are used for garbage collection / fast writes, wear leveling, and replacement of defective cells. As for replacing defective cells, it's all in the same pool; once it's full of defective cells, you start seeing the consistent errors. See also slide 12 in this presentation from LSI; the whole thing is worth going through, it addresses the topic directly. – Jason CApr 20, 2015 at 18:17 | Show 4 more comments; 12 Somewhere inside a traditional hard disk is a spinning metal platter where the individual bits and bytes are actually encoded. As data is added to the platter, the disk controller stores it on the outside of the disk first. As new data is added space is used moving towards the inside of the disk last.With this in mind, there are two effects that cause disk performance to decrease as the disk fills up: Seek Times and Rotational Velocity.Seek TimesTo access data, a traditional hard disk must physically move a read/write head into the correct position. This takes time, called the "seek time". Manufacturers publish the seek times for their disks, and it's typically just a few milliseconds. That may not sound like much, but to a computer it's an eternity. If you have to read or write to a lot of different disk locations to complete a task (which is common), those seek times to can add up to noticeable delay or latency.A drive that is almost empty will have most of it's data in or near the same position, typically at the outer edge near the rest position of the read/write head. This reduces the need to seek across the disk, greatly reducing the time spent seeking. A drive that is almost full will not only need to seek across the disk more often and with larger/longer seek movements, but may have trouble keeping related data in the same sector, further increasing disk seeks. This is called fragmented data.Freeing disk space can improve seek times by allowing the defragmentation service not only to more quickly clean up fragmented files, but also to move files towards the outside of the disk, so that the average seek time is shorter.Rotational VelocityHard drives spin at a fixed rate (typically 5400rpm or 7200rpm for your computer, and 10000rpm or even 15000 rpm on a server). It also takes a fixed amount of space on the drive (more or less) to store a single bit. For a disk spinning at a fixed rotation rate, the outside of the disk will have a faster linear rate than the inside of the disk. This means bits near the outer edge of the disk move past the read head at a faster rate than bits near the center of the disk, and thus the read/write head can read or write bits faster near the outer edge of the disk than the inner.A drive that is almost empty will spend most of it's time accessing bits near the faster outer edge of disc. A drive that is almost full will spend more time accessing bits near the slower inner portion of the disc.Again, emptying disk space can make the computer faster by allowing the defrag service to move data towards the outside of the disk, where reads and writes are faster.Sometimes a disc will actually move too fast for the read head, and this effect is reduced because sectors near the outer edge will be staggered... written out of order so that the read head can keep up. But overall this holds.Both of these effects come down to a disk controller grouping data together in the faster part of the disk first, and not using the slower parts of the disk until it has to. As the disk fills up, more and more time is spent in the slower part of the disk.The effects also apply to new drives. All else being equal, a new 1TB drive is faster than a new 200GB drive, because the 1TB is storing bits closer together and won't fill to the inner tracks as fast. However, attempting to use this to inform purchasing decisions is rarely helpful, as manufactures may use multiple platters to reach the 1TB size, smaller platters to limit a 1TB system to 200GB, software/disk controller restrictions to limit a 1TB platter to only 200GB of space, or sell a drive with partially completed/flawed platters from a 1TB drive with lots of bad sectors as a 200GB drive.Other FactorsIt's worth noting here that the above effects are fairly small. Computer hardware engineers spend a lot of time working on how to minimize these issues, and things like hard drive buffers, Superfetch caching, and other systems all work to minimize the problem. On a healthy system with plenty of free space, you're not likely to even notice. Additionally, SSDs have completely different performance characteristics. However, the effects do exist, and a computer does legitimately get slower as the drive fills up. On an unhealthy system, where disk space is very low, these effects can create a disk thrashing situation, where the disk is constantly seeking back and forth across fragmented data, and freeing up disk space can fix this, resulting in more dramatic and noticeable improvements.Additionally, adding data to the disk means that certain other operations, like indexing or AV scans and defragmentation processes are just doing more work in the background, even if it's doing it at or near the same speed as before.Finally, disk performance is huge indicator of overall PC performance these days... an even larger indicator than CPU speed. Even a small drop in disk throughput will very often equate to a real perceived overall drop in PC performance. This is especially true as hard disk performance hasn't really kept pace with CPU and memory improvements; the 7200 RPM disk has been the desktop standard for over a decade now. More than ever, that traditional spinning disk is the bottleneck in your computer.ShareImprove this answer Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Apr 21, 2015 at 16:54Joel CoehoornJoel Coehoorn28k1313 gold badges8686 silver badges132132 bronze badges71Seek time increase is not a result of low free space, it's a result of data organization. Freeing disk space won't decrease seek times if your data is already all over the drive. Similarly, running out of disk space won't suddenly increase seek times for unrelated data that was already well organized. More importantly, be very wary of associating either of these with "a slow computer". For example, you're not going to browse the web faster just because your browser's executable is unfragmented and on the outside of a mechanical drive, and your MP3s will still play smoothly even in worst case. – Jason CApr 21, 2015 at 19:052@JasonC Each of those points is true in isolation, but taken as a part of the whole system can add up to real slowdowns. An example is this claim: "Freeing disk space won't decrease seek times if your data is already all over the drive." I can't dispute that by itself, but I can point out the defrag service can now move this data towards the front of the drive, and now those things will improve seek times. Other points in your comment have similar counters: running out of disk space won't increase seeks for well organized data, but it does make it less likely that data stays organized. – Joel CoehoornApr 21, 2015 at 20:351@JasonC However, I did add a couple lines to my answer based on your comment, to more directly address the title question. – Joel CoehoornApr 21, 2015 at 20:40Of course; but my main points are 1) that slow down is a consequence of something else, even though low free space may be one of many factors, and 2) you have to be really careful with this topic, it's one of those ones people latch onto very quickly. If a casual user notices that their computer is slow, in reality it's highly unusual for, say, fragmentation (e.g.) to be the actual cause. But then they read a bunch of stuff on the internet, install ccleaner, 50 disk defragmenters, make a bunch of bad registry tweaks etc. Need to cater to the masses here; the wiser don't need our answers. – Jason CApr 21, 2015 at 20:51This answer hints at short-stroking (artificially limiting HD size to keep data on the faster, outer regions) and some potential problems with it. I also like it as it doesn't deny that in most cases, for most users a drive gets more fragmented as it gets more full. While it's worth noting that free space isn't the actual issue, it's pointlessly obtuse to ignore the general user experience when dealing with a general user experience question. – SmithersApr 27, 2015 at 17:47 | Show 2 more comments; 6 All of the other answers are technically correct - however I've always found that this simple example explains it best.Sorting things is really easy if you have lots of space... but difficult if you don't have the space... computers need the space too!This classic "15 puzzle" is tricky/time consuming because you only have 1 free square to shuffle the tiles around in to get them in the correct 1-15 order.However if the space was much bigger, you could solve this puzzle in well under 10 seconds.For anyone that has ever played with this puzzle... understanding the analogy seems to come naturally. ;-)ShareImprove this answer Follow edited Apr 22, 2015 at 21:26 answered Apr 22, 2015 at 17:24scunliffescunliffe1,70855 gold badges2525 silver badges3333 bronze badges52This isn't analogous to any file system behavior though. It somewhat resembles the general process of defragmentation, I guess, although defrag, relative to this puzzle analogy, lets you remove numbers from the board and re-place them anywhere you want as you solve it. – Jason CApr 23, 2015 at 4:312In addition to Jason's comment above, I want to point out the obvious: this answer relates to sorting (defragmenting), but does not explain why accessing a specific, random tile (say, the "3" tile) would be faster in the second case than in the first case. – userApr 23, 2015 at 21:24Because you're not accessing just "3". You're accessing "1-15". While I admit that's not crystal clear in the example, I took it as understood. Might be worth specifically noting something like, "this puzzle is analogous to a single fragmented file." Great answer, makes things quite mentally accessable! – SmithersApr 27, 2015 at 17:501To clarify: The primary issue with the analogy here is that, in the actual puzzle, you can only move tiles to adjacent empty spaces. That is, in the tiny example, only 6 or 13 could be moved into the empty space. That's what makes the puzzle challenging; it's the point of the tile game. When defragmenting a hard drive, though, you can move e.g. 4 to the empty space, 1 to it's correct location, and so on, quite easy to solve, in exactly as many moves as the case with lots of space. So the analogy really breaks down, since the crux of the puzzle doesn't apply: No file system works this way. – Jason CApr 27, 2015 at 22:07'Because you're not accessing just "3". You're accessing "1-15"' -- this is nonsense. The answer doesn't explain why accessing a specific random tile would be faster in the second case than in the first case because the answer is completely wrong. Not only isn't defragging limited the way the puzzle is, but "tricky/time consuming" defragging has no bearing on system performance. – Jim BalterJul 17, 2017 at 19:28Add a comment | ; 5 A computer that's had very little disk space, on a spinning mechanical hard drive, for a significant amount of time, will generally become slower as file fragmentation grows. Increased fragmentation means slow reads – very slow in extreme cases.Once a computer is in this state, freeing disk space will not actually fix the problem. You'd also need to defragment the disk. Before a computer is in this state, freeing the space will not speed it up; it will simply reduce the chances of fragmentation becoming a problem.This only applies to computers with spinning mechanical hard drives, because fragmentation has a negligible effect on the read speed of SSDs.ShareImprove this answer Follow answered Apr 20, 2015 at 13:46RomanStRomanSt9,3451515 gold badges5555 silver badges7272 bronze badges1A good, clean, simple answer that also addresses the main core issue. – SmithersApr 27, 2015 at 17:47Add a comment | ; 4 Flash disks can definitely get slower when they are full or fragmented, though the mechanisms for slowdown are unlike any that would occur with a physical hard drive. A typical flash memory chip will be divided into some number of erase blocks, each of which consists of a large number (hundreds, if not thousands) of write pages, and will support three primary operations:Read a flash page.Write to a formerly-blank flash page.Erase all of the flash pages on a block.While it would in theory be possible to have each write to a flash drive read all the pages from a block, change one in the buffer, erase the block, and then write the buffer back to the flash device, such an approach would be extremely slow; it would also be likely to cause data loss if power were lost between the time the erase was started and the writeback was completed. Further, frequently-written parts of the disk would wear out extremely quickly. If the first 128 sectors of the FAT were stored in one flash block, for example, the drive would be dead after the total number of writes to all of those sectors reached about 100,000, which isn't very much, especially given that 128 sectors would hold about 16,384 FAT entries.Because the above approach would work horribly, drive will cause it to identify some blank page, write the data there, and somehow record the fact that the logical sector in question is stored at that location. As long as enough blank pages are available, this operation can proceed quickly. If blank pages get to be in short supply, however, the drive may need to find blocks that contain relatively few "live" pages, move any live pages in those blocks to some of the remaining blank ones, and mark the old copies as "dead"; having done that, the drive will then be able to erase blocks that contain only "dead" pages.If a drive is only half-full, then there will certainly be at least one block which is at most half full of live pages (and there will quite likely be some blocks that contain few or none). If each block holds 256 pages and the least-full blocks hold 64 live pages (a moderately-bad case), then for every 192 requested sector writes the drive will have to perform 64 additional sector copies and one block erase (so the average cost of each sector write would be about 1.34 page writes and 0.005 block erases). Even in worst case, every 128 sector writes would require 128 additional sector copies and a block erase (average cost per write of 2 page writes and 0.01 block erases)If a drive is 99% full, and the least-full blocks have 248/256 live pages, then every 8 sector writes will require 248 additional page writes and a block erase, thus yielding a cost per write of 32 page writes and 0.125 block erases--a very severe slowdown.Depending upon how much "extra" storage a drive has, it may not allow things to get quite that bad. Nonetheless, even at the point where a drive is 75% full the worst-case performance may be more than twice as bad as the worst-case performance when it's 50% full.ShareImprove this answer Follow answered Apr 20, 2015 at 16:10supercatsupercat1,73999 silver badges88 bronze badgesAdd a comment | ; 3 You pretty much nailed it. You can think of a SATA HDD as a half duplex communications medium (That is, it can only accept or transmit data at a time. Not both.) so when the drive is held up for an extended time looking for a free location to write to, it can't read any data to you. As a rule of thumb, you shouldn't load your drives up over 80% capacity for this reason. The more full it is the higher the more likely it is to fragment files which causes the drive to tie up during read requests (thus blocking write requests).There are a number of things you can do to help with these issues:Reduce the amount of data you have stored and regularly defragment your drive.Switch to flash based storage.Keep bulk data stored on a separate drive from your OS.So on and so forth...ShareImprove this answer Follow answered Apr 19, 2015 at 23:12Nathanial MeekNathanial Meek64233 silver badges99 bronze badges101When using flash, the drive can read or write (Again, not both) nearly instantaneously (9ms is a pretty standard seek time on a HDD where as SSDs typically have a "seek time" in the realm of pico and nano seconds) to any location on the disk. en.wikipedia.org/wiki/… – Nathanial MeekApr 19, 2015 at 23:287Continuing poing 2: This is what e.g. the $Bitmap file is for on NTFS, or the bitmap allocator in ext4. I.e. this answer is spreading some serious misinformation. 3. There is plenty of read and write buffering and caching going on that renders much of this moot. This answer somewhat describes the effects of fragmentation, and even then limited to older filesystems, it certainly is not accurate wrt free space. Freeing disk space does not speed up a computer. – Jason CApr 20, 2015 at 4:464@JasonC, you should turn your comments into an answer. – CelosApr 20, 2015 at 7:216This does not happen: "so when the drive is held up for an extended time looking for a free location to write to, it can't read any data to you" – it just doesn't. That's not how filesystems work. Please edit your answer to stop spreading misinformation. – RomanStApr 20, 2015 at 13:382@NathanialMeek You're blending layers a bit. :) SATA's half-duplex mode means it can only transmit data on the wire in one direction. Higher level reads and writes are done in small blocks (called an FIS), in SATA-specified operation queues. They can be asynchronous, and fast reads and writes can be done to and from on-board cache and direct to system memory via DMA. SATA controllers are also free to reorder commands to optimize efficiency. Point being: The line is not held busy while physical operations complete, and SATA's half-duplex mode does not have the effect you think it does. – Jason CApr 20, 2015 at 20:45 | Show 5 more comments; 3 Following the short & sweet approach my oversimplified answer (strictly restricted to your main confusion) is:As long as yourOS has enough (for worst case scenarios) space to fulfill its duties like paging/swapping/etc.Other software also have sufficient space for their respective needs.Hard disk is defragmented.Then you can't tell difference in performances of a 80% empty disk vs 30% empty disk, and shouldn't worry about anything else but storing of more and more new data.Anything else which will need more storage will lead to poor performances as now there might be a shortage of available space.Of course disk cleaning via a tool is good as:Temporary files should be cleaned regularly to gain valuable disk space.Old Log files are nothing but waste of space.Leftovers of the Installed/Uninstalled software are very nasty.Cookies must be cleared if you value your online privacy.Invalid shortcuts, etc.All of these (and many more) reasons lead to the poorer performance as all of these keep on confusing the OS when finding the right set of bits to work with.ShareImprove this answer Follow edited Apr 26, 2015 at 6:06John Siu5,32722 gold badges2020 silver badges2323 bronze badges answered Apr 24, 2015 at 19:11HtaankHtaank3122 bronze badges1A decent summary, but not so sure about the "BUT" section. In particular: 3) Generally has no noticeable performance impact, despite common freak-outs 4) Cookies aren't inherently problematic, and regardless of opinion, privacy is not related to performance or hard drive space, 5) Broken shortcuts are ugly but generally inconsequential otherwise. None of this really "confuses" any common OS. Be very careful about the "tips" and "tweaks" you follow. Be wary of unnecessary cleanup tools as well, in particular registry cleaners often risk harm for zero benefit. – Jason CApr 25, 2015 at 15:08Add a comment | ; 2 One effect on spinning drives that I haven't seen mentioned: Access speed and data transfer speed is different on different parts of a disk. A disk rotates at fixed speed. The tracks at the outside of a disk are longer and therefore can hold more data per track than the tracks at the inside. If your drive can read 100 MB/sec from the outermost tracks, the speed on the innermost tracks will be less than 50 MB/sec. At the same time, there are fewer tracks between 1 GB of data on the outer tracks of the disk than between 1 GB of data on the innermost tracks. So on average, for data stored on the outside less head movement will be needed than for data on the innermost tracks.The OS will try to use the outermost tracks, if possible. Of course it isn't possible if the disk is full. Deleting data will make space available where the transfer speed is higher and make things run quicker. For the same reason, you should buy spinning hard drives that are bigger than needed if you want speed (as long as it is affordable), because you will end up only using the fastest portions of the drive. ShareImprove this answer Follow answered Apr 20, 2015 at 14:10gnasher729gnasher72941522 silver badges55 bronze badges2Adding: en.wikipedia.org/wiki/Zone_bit_recording, which hits on this with some detail. Worth noting: Existing data won't be moved around. This may affect storage of new data (depending on location on drive, not directly on free space), but it won't "slow down" existing files that were happily being accessed prior to writes on the inside. Fwiw the cheapest 1TB 7200RPM 3.5" drive I found on Amazon has a user-benchmarked average read rate of 144MB/s; even accounting for differences on inner and outer tracks, this may not be a bottleneck during casual use. – Jason CApr 20, 2015 at 16:06@JasonC I/O performance in terms of sequential throughput is almost never a concern in practice; even a slow 4900 rpm drive will be plenty fast enough for almost any individual user. I/O performance in terms of read/write operations per second is going to be what kills performance in the majority of cases; ask your local favorite sysadmin about rotational-storage IOPS in multiuser systems some time, if you are so inclined. That's the big reason why practically nobody is deploying rotational storage for multiuser systems these days; you can just never even approach the IOPS of SSDs. – userApr 23, 2015 at 21:28Add a comment | 
How do i suppress a ssh-add passphrase prompt?
cmd.exe;io;cmd.exe;io
How do i suppress a ssh-add passphrase prompt? Ask Question
0 I'm not aware of a way to change the prompt with custom text outside of changing the code. However, there are two ways around it:remove the passphrase from the keywrite an expect wrapper around ssh-add that provides the passphrase for youShareImprove this answer Follow edited Apr 20, 2015 at 6:14DavidPostill♦149k7777 gold badges343343 silver badges383383 bronze badges answered Apr 19, 2015 at 23:59Kevin HuntlyKevin Huntly5711 bronze badge4I still want it to be passphrase protected. I just don't want the text to appear. – Kris WelshApr 20, 2015 at 10:39Then your best option is to wrap it around expect – Kevin HuntlyApr 20, 2015 at 10:52No, i don't want the passphrase stored anywhere in a file, i want to have to provide it manually. – Kris WelshApr 20, 2015 at 19:26Not 100% but I don't think you can do what you want without changing the source for ssh-add. I don't believe theres, for example, an NLS file that houses the strings, I think its all compiled in. Perhaps someone smarter than me can answer more fully – Kevin HuntlyApr 21, 2015 at 2:06Add a comment | 
Mac Mini (Late 2014) probelm when running 2 monitors
mac;multiple-monitors;mac;multiple-monitors
Mac Mini (Late 2014) probelm when running 2 monitors Ask Question
sync all Chrome extensions but keep disable/enabled options local?
google-chrome;sync;google-chrome-extensions;google-chrome;sync;google-chrome-extensions
sync all Chrome extensions but keep disable/enabled options local? Ask Question
1 This isn't a feature that I've tried (There may be dragons ahead) but it sounds like it should do what you are looking for.Open Chrome Settings.Right at the top, under Sign-in, there is an Advanced Sync Options button.Click that.Deselect the option to sync settings.It's the best bet that I've come across.ShareImprove this answer Follow edited Apr 19, 2015 at 22:23 answered Apr 19, 2015 at 22:09Nathanial MeekNathanial Meek64233 silver badges99 bronze badgesAdd a comment | ; 0 Yes. You can do it.I tried this with my desktop and laptop and disable/enable options can be kept local to the system but extension can'tShareImprove this answer Follow answered Apr 19, 2015 at 23:26Nitin JainNitin Jain944 bronze badgesAdd a comment | ; 0 in chrome settings (for the machine(s))which you wish to not have sync in the cloud simply select disconnect account ( stays locally but all syncing on OTHER devices keeps trucking along)ShareImprove this answer Follow answered Apr 19, 2015 at 23:39linuxdev2013linuxdev20131,2521010 silver badges2121 bronze badgesAdd a comment | 
How to download from a direct link using batch files and Google Chrome? [duplicate]
windows-7;google-chrome;batch;download;batch-file;windows-7;google-chrome;batch;download;batch-file
How to download from a direct link using batch files and Google Chrome? [duplicate] Ask Question
0 Bizarre to want to do it using Chrome rather than wget but it Works for meThe format is Chrome URL, (you wrote start there in between which you shouldn't)C:\>"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" http:// dl2.romhustler.net/download/MTOeeo3FWffukwoWvagsXw/1430069124/psx_full/Dino%20Crisis%20%5BU%5D%20%5BSLUS-00922%5D.rar <ENTER>And it started downloading in ChromeShareImprove this answer Follow answered Apr 19, 2015 at 22:46barlopbarlop22.6k3939 gold badges137137 silver badges215215 bronze badges2First I wanna thank u for ur replay but it doesn't work I get 403 Forbidden. Iwanted to create a direct link download frol a batch file so I can send them to my friends and when they double click it the file start downloading – mounir gamerApr 20, 2015 at 15:32@mounirgamer it works for me. What if you just enter that URL in the address bar in Chrome, do you get a 403 there too? – barlopApr 20, 2015 at 18:36Add a comment | 
How do I know all the ip address used by the ip cameras in the network
rtsp;ip-camera;rtsp;ip-camera
How do I know all the ip address used by the ip cameras in the network Ask Question
0 Use nmap. Then scan for the range of your network like 149.228.115.* y the webcam is in the same segment than yoursShareImprove this answer Follow answered Apr 19, 2015 at 21:24mario ruizmario ruiz30322 silver badges88 bronze badges3I didn't get you. Can you please explain me? – AshishApr 19, 2015 at 21:34IP format is rtsp://172.17.x.x/stream1 – AshishApr 19, 2015 at 21:38Could be enough using range 172.17.*.* – mario ruizApr 20, 2015 at 21:05Add a comment | 
compare Windows folder with smartphone folder
windows;android;usb-storage;windows;android;usb-storage
compare Windows folder with smartphone folder Ask Question
3 It appears this is an issue with lots of comparison tools and smartphones, and has been for a while. As you guessed, the main issue is that phones attached as storage are not assigned drive letters when they are connected (See here for a thread dealing with the same issue from nearly two years ago: http://www.scootersoftware.com/vbulletin/showthread.php?9696-How-to-open-a-mobile-device-%28smartphone%29-for-compare-with-no-drive-letter-assigned)One workaround is to use a comparison tool that supports FTP connections, then set up an FTP server on your Android phone and run the comparison that way. It will probably be much slower than a USB connection, but still better than nothing.In order to actually get a drive letter assigned to your Android phone, you'll need to not use the MTP connection method, which means rooting your device and using one of the various methods available to mount your phone as mass storage (https://android.stackexchange.com/questions/22979/drive-letter-for-mtp-connection-under-windows).A long term solution is to use a different tool for synchronizing files between your phone and your computer.Personally, I use Bittorrent Sync to move photos from my phone to my computer. When I remove files from the synced folder on the computer, they are moved to a hidden folder on my phone as well, and then I just delete them from there knowing they've already been dealt with on the computer.ShareImprove this answer Follow edited Apr 13, 2017 at 12:18CommunityBot1 answered Sep 22, 2014 at 17:50music2myearmusic2myear39.7k4040 gold badges8383 silver badges127127 bronze badges3The BT Sync seems like a great idea. And apparently it has an option to prevent using mobile data, so that looks like a winner ! Thanks – iDevlopSep 23, 2014 at 7:15ANd...silly me...by reading the first link you provided I realized that indeed, the pics on the phone are on the SD card, so I just could mount the SD card. Anyway I already wanted to give a try to BT Sync, and this seems a great opportunity. – iDevlopSep 23, 2014 at 7:19I love BT Sync and have begun using it in a variety of situations. It became necessary after my wife got her own smartphone and began taking oodles of pictures of kids, filling our Dropbox folders right up. As Dropbox is designed for backup, not for transfer, this was a real problem. Using BT Sync all our photos and important files end up on one very large drive in my home desktop, and from there are backed up using our cloud backup service. Easy transfer and all backed up. – music2myearSep 23, 2014 at 13:49Add a comment | ; 8 I know this post is two years old but I ran into this issue recently and I think it could be useful.I found the FreeFileSync software from freefilesync.org that supports the MTP protocol natively. So if the folder is on my SD card, it would be:mtp:\Xperia Z5 Compact\SD Card\Folder to syncShareImprove this answer Follow edited Jun 2, 2020 at 8:17 answered Jun 30, 2016 at 11:45Quentin MorrierQuentin Morrier19111 silver badge55 bronze badges21Great ! I had seen the product but did ont notice this feature. I'll give it another look. – iDevlopJun 30, 2016 at 13:151After trying a number of different tools, this one did the magic for me. – AlamNov 16, 2021 at 14:19Add a comment | ; 0 Beyond Compare.. buy it. Worth every cent. Very robust and it is highly recommended to read those silly directions to understand what exactly you can do. Makes life easy transferring and comparing files on the computer, cell phone, and network storage device.ShareImprove this answer Follow answered Sep 1, 2018 at 18:41DonkDonk111Welcome to Super User! Thanks for your contribution. Please read How do I recommend software in my answers? paying particular attention to the items in bold. After doing so, please edit your answer so it follows the guidelines. Please note that software recommendation questions (like this one) are off-topic and shouldn't actually be answered. It might also be a good idea to take the Tour and read the How to Ask and How to Answer pages to learn how this site works. – robinCTSSep 1, 2018 at 18:59Add a comment | 
virtualbox increase cpu cores script wise
linux;virtualbox;shell;cpu;bash-scripting;linux;virtualbox;shell;cpu;bash-scripting
virtualbox increase cpu cores script wise Ask Question
11 I would recommend trying hot-plug instead of powering off, changing CPU and starting it again.First, you need to mark it as cpu-hot-plug:VBoxManage modifyvm "VM name" --cpuhotplug onSecond, set a maximum CPU countVBoxManage modifyvm "VM name" --cpus 2Third and last, add or remove the "extra" cpu:VBoxManage modifyvm "VM name" --plugcpu 1# DO STUFF with extra coreVBoxManage modifyvm "VM name" --unplugcpu 1Make sure you have installed the Linux Guest Additions or the Ubuntu box would not see the new CPU and could have some issues when unpluggin.Alternatively, if you experience issues with hot-plugging, disable the feature, stop the VM, perform the CPU operation and start it again:# Disable hot-plug if it does not work for you (only once)VBoxManage modifyvm "VM name" --cpuhotplug offVBoxManage controlvm "VM name" acpipowerbuttonVBoxManage modifyvm "VM name" --cpus 2VBoxManage startvm "VM name" # DO STUFF with extra coreVBoxManage controlvm "VM name" acpipowerbuttonVBoxManage modifyvm "VM name" --cpus 1VBoxManage startvm "VM name" ShareImprove this answer Follow edited Sep 22, 2014 at 17:35 answered Sep 22, 2014 at 15:28NuTTyXNuTTyX2,5881010 silver badges1515 bronze badgesAdd a comment | ; 0 I'm curious why you want to script this: is it something you want to do repeatedly? If it's a one-time project, it is fairly easy to do in virtualbox: power down the VM, right click and go into settings -> system -> processor, and move the slider to 2. You will need hardware visualization turned on for your windows host: you need to do that from the BIOS, and the particular menu depends on the machine. For example, the IdeaPad computers have it here: https://forums.lenovo.com/t5/IdeaPad-Y-and-U-series-Laptops/How-to-Enable-Hardware-virtualization-on-IdeaPad-Y510p/ta-p/1394215 . For mine, it was actually under the BIOS -> security menu.Now within the VM, running 'nproc' as superuser should show "2" instead of "1".If you want to script this, check out VBoxManage, the command line interface to control virtualbox:https://www.virtualbox.org/manual/ch08.html I have not tried it myself, but it appears like this would be about right for you:VBoxManage controlvm "my VM" poweroffVBoxManage modifyvm "my VM" --cpus 2VBoxManage startvm "my VM"--cpus : This sets the number of virtual CPUs for the virtual machine (see Section 3.4.2, “"Processor" tab”). If CPU hot-plugging is enabled (see below), this then sets the maximum number of virtual CPUs that can be plugged into the virtual machines.ShareImprove this answer Follow answered Sep 22, 2014 at 15:22Ryan SRyan S7144 bronze badgesAdd a comment | 
Limit mouse movement to 2 montiors? (4 monitors all together)
windows-7;windows;multiple-monitors;cursor;windows-7;windows;multiple-monitors;cursor
Limit mouse movement to 2 montiors? (4 monitors all together) Ask Question
4 Ok Found a working version. Please post back if it works on your 4 Monitor setupCheck out Dual Monitor SoftwareUPDATE:Found another application Cursor lockShareImprove this answer Follow edited Jul 16, 2012 at 16:16 answered Jul 16, 2012 at 15:27David MurrayDavid Murray49422 gold badges44 silver badges1010 bronze badges3From what i gather from that webpage, Murgeemon allows you to "disable/enable" monitors. -But doing so simply turns the monitor off. I still want to be able to view them, I just dont want any acciental interaction with them. – user1055650Jul 16, 2012 at 16:00According to the site "Lock Mouse is a feature of the MurGeeMon software utility that allows one to restrict the mouse cursor movements to a single monitor or restrict mouse on a monitor to prevent accidental straying of the mouse cursor to the other monitor. " – David MurrayJul 16, 2012 at 16:06Thanks for your help David, I've now downloaded at tried both of these appications but they can only seem to restrict mouse movement to one monitor at a time. I need to restrict it so that its able to move across 2 of the 4 monitors. – user1055650Jul 17, 2012 at 8:22Add a comment | 
Can I use puphpet files to deploy a vps server without vagrant
vagrant;vps;puppet;vagrant;vps;puppet
Can I use puphpet files to deploy a vps server without vagrant Ask Question
0 You can actually use a Vagrant plugin to connect to any server you have SSH access to. It works exactly the same way the Digital Ocean, Rackspace, AWS, etc providers do, but it simply cannot create or destroy the machine. Use this plugin: https://github.com/tknerr/vagrant-managed-serversShareImprove this answer Follow answered Sep 23, 2014 at 15:22Juan TreminioJuan Treminio15155 bronze badgesAdd a comment | 
How to log initialisation script?
linux;boot;fedora;linux;boot;fedora
How to log initialisation script? Ask Question
0 Just wrap your script into another one like the next code:#!/bin/bash/opt/your_actual_script.sh 2>&1 >/var/log/script_exec.logShareImprove this answer Follow answered Sep 22, 2014 at 14:18FarDarkMistFarDarkMist8133 bronze badgesAdd a comment | 
How to transfer files between Guest OSs (all Windows) running over VMware Workstation?
vmware;vmware
How to transfer files between Guest OSs (all Windows) running over VMware Workstation? Ask Question
How do I detach a process from Terminal, entirely?
linux;bash;shell;ubuntu;terminal
How do I detach a process from Terminal, entirely? Ask Question
430 First of all; once you've started a process, you can background it by first stopping it (hit Ctrl-Z) and then typing bg to let it resume in the background. It's now a "job", and its stdout/stderr/stdin are still connected to your terminal.You can start a process as backgrounded immediately by appending a "&" to the end of it:firefox &To run it in the background silenced, use this:firefox </dev/null &>/dev/null &Some additional info:nohup is a program you can use to run your application with such that its stdout/stderr can be sent to a file instead and such that closing the parent script won't SIGHUP the child. However, you need to have had the foresight to have used it before you started the application. Because of the way nohup works, you can't just apply it to a running process.disown is a bash builtin that removes a shell job from the shell's job list. What this basically means is that you can't use fg, bg on it anymore, but more importantly, when you close your shell it won't hang or send a SIGHUP to that child anymore. Unlike nohup, disown is used after the process has been launched and backgrounded.What you can't do, is change the stdout/stderr/stdin of a process after having launched it. At least not from the shell. If you launch your process and tell it that its stdout is your terminal (which is what you do by default), then that process is configured to output to your terminal. Your shell has no business with the processes' FD setup, that's purely something the process itself manages. The process itself can decide whether to close its stdout/stderr/stdin or not, but you can't use your shell to force it to do so.To manage a background process' output, you have plenty of options from scripts, "nohup" probably being the first to come to mind. But for interactive processes you start but forgot to silence (firefox < /dev/null &>/dev/null &) you can't do much, really.I recommend you get GNU screen. With screen you can just close your running shell when the process' output becomes a bother and open a new one (^Ac).Oh, and by the way, don't use "$@" where you're using it.$@ means, $1, $2, $3 ..., which would turn your command into:gnome-terminal -e "vim $1" "$2" "$3" ...That's probably not what you want because -e only takes one argument. Use $1 to show that your script can only handle one argument.It's really difficult to get multiple arguments working properly in the scenario that you gave (with the gnome-terminal -e) because -e takes only one argument, which is a shell command string. You'd have to encode your arguments into one. The best and most robust, but rather cludgy, way is like so:gnome-terminal -e "vim $(printf "%q " "$@")"ShareImprove this answer Follow edited Aug 4, 2011 at 9:13slhck218k6767 gold badges591591 silver badges578578 bronze badges answered Mar 23, 2009 at 13:18lhunathlhunath4,41711 gold badge1212 silver badges55 bronze badges7Thanks a lot for this! Sadly I can only accept one answer. I ended up with "nohup $@ &> /dev/null &" and "alias wvim='launch.sh gnome-terminal -x vim'" – AnCMar 23, 2009 at 21:33Strange: when I am did «Ctrl-z» in terminal, and next «bg», the process should not anymore relying on terminal. But when I closed the terminal, it was closed too o.O – Hi-AngelOct 7, 2014 at 9:071@Hi-Angel when you close an interactive bash shell, bash HUPs all active jobs. When you ^Z and bg a process it is still a job, be it a background one. To remove it as a job, use disown, then the process will keep on living after you close the shell since bash won't HUP it anymore. – lhunathOct 8, 2014 at 12:473Won't using $* instead of $@ fix the problem of the separate strings already? – sjasJan 28, 2015 at 19:152What you can't do, is change the stdout/stderr/stdin of a process after having launched it. - not exactly true. Use reptyr for this. – Stefan SeidelSep 23, 2016 at 19:08 | Show 2 more comments; 235 nohup cmd &nohup detaches the process completely (daemonizes it)ShareImprove this answer Follow answered Mar 23, 2009 at 12:17dsmdsm2,49711 gold badge1313 silver badges44 bronze badges97Although succinct is valuable, completeness is more valuable. Although nohup is a GNU coreutil, a bash-only answer (or note about there not being one) would be appropriate here. Good answer nonetheless. – lmat - Reinstate MonicaJun 6, 2013 at 14:4834nohup just ignores the SIGHUP signal. It executes the process normally. No daemonization. – nemoMar 4, 2015 at 16:292@nemo Which means the process is not detached, but would become detached (and a child of init) if the shell exited... right? – NoldorinApr 8, 2016 at 0:35@Noldorin Yes. Ignoring SIGHUP, which is sent when the shell terminates, will leave the child process running and being relocated to init. – nemoApr 8, 2016 at 0:582Just to clarify: So nohup cmd &> /dev/null &disown would be the way to go (In case you don't want output in the nohup.out file)? – Steen SchüttAug 28, 2019 at 13:02 | Show 4 more comments; 77 If you are using bash, try disown [jobspec];see bash(1).Another approach you can try is at now.If you're not superuser, your permission to use at may be restricted.ShareImprove this answer Follow edited Mar 8, 2015 at 14:48G-Man Says 'Reinstate Monica'7,5572222 gold badges3939 silver badges8585 bronze badges answered Mar 23, 2009 at 12:05Randy ProctorRandy Proctor1,16188 silver badges55 bronze badges9"disown" don't seem to be an internal bash command (not available on my machine, and I use bash). "nohup", as Ben suggested, might be a much better (and standard) way of doing this. – EigirMar 23, 2009 at 12:082at to delegate execution to someone else, I like it! +1 – NinsuoApr 12, 2013 at 19:231As a point of reference, this works in zsh as well. – CodererMay 28, 2014 at 11:10at now Fantastic! – AniAug 26, 2014 at 13:004Also, disown doesn't seem to have the desired effect with gnome-terminal--disowned processes are still killed when the terminal exits. I'd love to know why/how. – Kyle StrandSep 13, 2016 at 23:00 | Show 4 more comments; 53 Reading these answers, I was under the initial impression that issuing nohup <command> & would be sufficient. Running zsh in gnome-terminal, I found that nohup <command> & did not prevent my shell from killing child processes on exit. Although nohup is useful, especially with non-interactive shells, it only guarantees this behavior if the child process does not reset its handler for the SIGHUP signal.In my case, nohup should have prevented hangup signals from reaching the application, but the child application (VMWare Player in this case) was resetting its SIGHUP handler. As a result when the terminal emulator exits, it could still kill your subprocesses. This can only be resolved, to my knowledge, by ensuring that the process is removed from the shell's jobs table. If nohup is overridden with a shell builtin, as is sometimes the case, this may be sufficient, however, in the event that it is not...disown is a shell builtin in bash, zsh, and ksh93,<command> &disownor<command> &; disownif you prefer one-liners. This has the generally desirable effect of removing the subprocess from the jobs table. This allows you to exit the terminal emulator without accidentally signaling the child process at all. No matter what the SIGHUP handler looks like, this should not kill your child process.After the disown, the process is still a child of your terminal emulator (play with pstree if you want to watch this in action), but after the terminal emulator exits, you should see it attached to the init process. In other words, everything is as it should be, and as you presumably want it to be.What to do if your shell does not support disown? I'd strongly advocate switching to one that does, but in the absence of that option, you have a few choices.screen and tmux can solve this problem, but they are much heavier weight solutions, and I dislike having to run them for such a simple task. They are much more suitable for situations in which you want to maintain a tty, typically on a remote machine.For many users, it may be desirable to see if your shell supports a capability like zsh's setopt nohup. This can be used to specify that SIGHUP should not be sent to the jobs in the jobs table when the shell exits. You can either apply this just before exiting the shell, or add it to shell configuration like ~/.zshrc if you always want it on.Find a way to edit the jobs table. I couldn't find a way to do this in tcsh or csh, which is somewhat disturbing.Write a small C program to fork off and exec(). This is a very poor solution, but the source should only consist of a couple dozen lines. You can then pass commands as commandline arguments to the C program, and thus avoid a process specific entry in the jobs table.ShareImprove this answer Follow answered Jan 22, 2014 at 17:08Stephen RosenStephen Rosen63155 silver badges55 bronze badgesAdd a comment | ; 39 nohup $COMMAND &$COMMAND & disownsetsid commandI've been using number 2 for a very long time, but number 3 works just as well. Also, disown has a nohup flag of -h, can disown all processes with -a, and can disown all running processes with -ar. Silencing is accomplished by $COMMAND &>/dev/null. Hope this helps!ShareImprove this answer Follow edited Mar 16, 2019 at 11:56Augustin Fabre333 bronze badges answered Aug 25, 2015 at 14:39Mr. Minty FreshMr. Minty Fresh58944 silver badges77 bronze badges2Short and sweet; thanks for this very helpful summary! – Jonathan HJan 10, 2019 at 10:20I can't believe I still get notifications for this post... – Mr. Minty FreshMar 21, 2019 at 0:41Add a comment | ; 17 Most simple and only correct answer for bash:command & disownYou dont have to detach the process from terminal, but from the shell.ShareImprove this answer Follow edited May 5, 2017 at 12:00 answered May 5, 2017 at 11:55ManuelSchneid3rManuelSchneid3r1,08311 gold badge1010 silver badges2727 bronze badges0Add a comment | ; 9 I think screen might solve your problemShareImprove this answer Follow answered Mar 25, 2009 at 1:51 dunkypdunkypAdd a comment | ; 9 in tcsh (and maybe in other shells as well), you can use parentheses to detach the process. Compare this:> jobs # shows nothing> firefox &> jobs[1] + Running firefoxTo this:> jobs # shows nothing> (firefox &)> jobs # still shows nothing>This removes firefox from the jobs listing, but it is still tied to the terminal; if you logged in to this node via 'ssh', trying to log out will still hang the ssh process.ShareImprove this answer Follow edited Aug 8, 2012 at 23:55Rick the Admin333 bronze badges answered Mar 23, 2009 at 14:55Nathan FellmanNathan Fellman9,2101919 gold badges6161 silver badges8282 bronze badgesAdd a comment | ; 8 To disassociate tty shell run command through sub-shell for e.g.(command)&When exit used terminal closed but process is still alive.check -(sleep 100) & exitOpen other terminalps aux | grep sleepProcess is still alive.ShareImprove this answer Follow edited Aug 7, 2012 at 5:32Sathyajith Bhat♦61.1k3838 gold badges178178 silver badges264264 bronze badges answered Aug 7, 2012 at 5:18jitendrajitendra8111 silver badge11 bronze badge1This is exactly what I needed. I was attempting to add a console shortcut for sublime text and it works perfectly, here's what I ended up with: ("/opt/Sublime Text 2/sublime_text" $@)& – Ron EDec 3, 2013 at 21:10Add a comment | ; 6 Backgrounding and foregrounding a job is probably one of the very first things every Unix sys-admin should know. Here is how it is done with bash:./script.sh# suspend process{ctrl-Z}# background processbg# list all backgrounded jobsjobs# bring it back to foregroundfgShareImprove this answer Follow edited Aug 29, 2017 at 16:27adelarsq10344 bronze badges answered May 22, 2013 at 23:00djangofandjangofan2,80599 gold badges3232 silver badges3535 bronze badgesAdd a comment | ; 4 You can run your command using the nohup command, this detach your process and redirects outputs to a given file... but I am not sure that is exactly what you need ..ShareImprove this answer Follow answered Mar 23, 2009 at 12:03BenBen14944 bronze badges1I could swear I had tried nohup before using exec - but apparently not properly, as it does work like this: nohup gnome-terminal -e "vim $@" &> /dev/null & – AnCMar 23, 2009 at 12:30Add a comment | ; 3 Try daemon -- should be available from your friendly package manager and comprehensively take care of every way of disassociating itself from the terminal.ShareImprove this answer Follow answered Mar 23, 2009 at 12:10Volker StolzVolker Stolz13155 bronze badges1This is great! You can even use it to do a bad thing, something that these other commands won't let you do (because they don't give you the chance to type your password): sudo daemon xed – mmortal03Aug 22, 2022 at 9:46Add a comment | ; 3 Just add this in your bashrc/zshrc:detach() { "$@" 1>/dev/null 2>/dev/null &; disown}Then you can run disowned commands like this:detach gedit ~/.zshrcShareImprove this answer Follow answered Feb 5, 2018 at 16:14B. BranchardB. Branchard13122 bronze badges11On bash you can just do &> /dev/null – AnnahriMay 16, 2021 at 2:07Add a comment | ; 3 To detach your program completely from your current SSH session, run:setsid nohup script.sh &.. and to redirect all logs (stderr & stdout), you can run:setsid nohup script.sh &>/tmp/script.log &To double check if your process got detache, run:ps -efj --forestand look at the hierarchical process tree.ShareImprove this answer Follow answered Aug 12, 2020 at 2:40NikolasNikolas3122 bronze badges2I quite confuse when seeing that you put setsid and nohup together. We can run setsid with -f option so it will be always running in a new process. If you don't want nohup still print out to the terminal, use your second way (can remove the part setsid away too). Anything that I don't know? – TuananhcwrsOct 24, 2020 at 17:081This is the only approach that worked for me. My use-case: I have a bash script: "start.sh" The script cleans up some stuff, runs some http server, and then tails the logs generated by the server. I run the ./start.sh script from SSH. I wanted to be able to SSH, ./start.sh, watch the log, but also be able to press Ctrl+C to exit the "tail -f..." command - but still have the HTTP server running. – eitamaAug 1, 2022 at 13:01Add a comment | ; 1 I have found on Mac OS X that I need to use both nohup AND disown to ensure that the child process is not torn down with the terminal.ShareImprove this answer Follow answered Jun 19, 2010 at 16:46aaronaaron13122 bronze badgesAdd a comment | ; 1 In my .bashrc, I have these functions for precisely that purpose:function run_disowned() { "$@" & disown}function dos() { # run_disowned and silenced run_disowned "$@" 1>/dev/null 2>/dev/null}Prefix a command with dos to run it detached from the terminal.The function is written to work with bash and zsh.ShareImprove this answer Follow answered Jun 14, 2015 at 17:53mic_emic_e29922 silver badges55 bronze badges22I am slightly confused as to why this answer uses one function wrapped into another, when its sufficient to just use one function with body like this: ( "$@" & disown) &> /dev/null . It also makes not much sense to use 1> and 2> , because you're using disown, which means you are using bash, and in bash you can just easily do &> to redirect both stdout and stderr – Sergiy KolodyazhnyyAug 7, 2016 at 18:53I have it as two functions because (1) I think it's easier to read this way, and (2) I need the run_disowned functionality in other places in my dotfiles. You're right about the &> thing, of course. – mic_eAug 8, 2016 at 7:17Add a comment | ; 1 sudo apt install ucommon-utilspdetach commandThere you go :)ShareImprove this answer Follow edited Jul 18, 2019 at 4:09 answered Jun 21, 2019 at 7:14kesarling He-Himkesarling He-Him19911 silver badge1010 bronze badgesAdd a comment | ; 1 kstart5 from KDE, available in the package kde-cli-tools can helpkstart5 my-command &We can as well manage multiple aspect of an x window if we are running a guiSources: Linuxhacks.orgDisclosure: I am the owner of Linuxhacks.orgShareImprove this answer Follow edited Aug 24, 2020 at 1:15 answered May 2, 2020 at 10:19intikaintika1,26311 gold badge99 silver badges2727 bronze badgesAdd a comment | ; 0 I use the following script to do this. It stops the process printing to the terminal, detaches with nohup, and exits with the return status if the command finishes within the TIMEOUT.#!/bin/bashTIMEOUT=0.1CMD=( "$@" )#Could have some shortcuts here, e.g. replace "somefile.c" with "gedit somefile.c"#use nohup to run the command, suppressing its output and allowing the terminal to be closed#also send nohup's output to /dev/null, supressing nohup.out#run nohup in the background so this script doesn't block#print the command for debugging and to see bash variable expansionprintf "%q " "${CMD[@]}"echonohup "${CMD[@]}" >/dev/null 2>&1 &NOHUP_PID=$!#kill this script after a short time, exiting with success status - command is still running#this is needed as there is no timeout argument for `wait` belowMY_PID=$$trap "exit 0" SIGINT SIGTERMsleep $TIMEOUT && kill $MY_PID 2>/dev/null & #ignore "No such process" error if this exits normally#if the command finishes before the above timeout, everything may be just fine or there could have been an errorwait $NOHUP_PIDNOHUP_STATUS=$?#print an error if there was any. most commonly, there was a typo in the command[ $NOHUP_STATUS != 0 ] && echo "Error: $CMD"#return the exit status of nohup, whatever it wasexit $NOHUP_STATUSUsage example:>>> run falsefalseError: false>>> echo $?1>>> run truetrue>>> run sleep 10sleep 10>>>ShareImprove this answer Follow answered Sep 21, 2014 at 4:42jozxyqkjozxyqk2,67288 gold badges3434 silver badges5353 bronze badgesAdd a comment | ; -1 If your goal is to simply launch a command line application without keeping the terminal window around, then you might try running the application after launching the terminal with alt-F2.ShareImprove this answer Follow answered Apr 5, 2017 at 13:47MattKellyMattKelly10122 bronze badgesAdd a comment | ; -2 Many answers suggested using nohup. I would rather suggest using pm2. Using pm2 over nohup has many advantages, like keeping the application alive, maintain log files for application and lot more other features. For more detail check this out. To install pm2 you need to download npm. For Debian based systemsudo apt-get install npmand for Redhat sudo yum install npmOr you can follow these instruction.After installing npm use it to install pm2 npm install pm2@latest -gOnce its done you can start your application by $ pm2 start app.js # Start, Daemonize and auto-restart application (Node)$ pm2 start app.py # Start, Daemonize and auto-restart application (Python)For process monitoring use following commands: $ pm2 list # List all processes started with PM2$ pm2 monit # Display memory and cpu usage of each app$ pm2 show [app-name] # Show all informations about applicationManage processes using either app name or process id or manage all processes together: $ pm2 stop<app_name|id|'all'|json_conf>$ pm2 restart <app_name|id|'all'|json_conf>$ pm2 delete <app_name|id|'all'|json_conf>Log files can be found in $HOME/.pm2/logs #contain all applications logsShareImprove this answer Follow answered Feb 15, 2017 at 4:16hacckshaccks9799 bronze badges53Using a NodeJS application (versus a small and robust command like nohup) in order to control unix processes seems ... really overkill, and to be honest, rather weird. I would use monit if you need the restart functionnality. – SergioMay 28, 2017 at 21:56@Sergio it's your choice to use depricated application. – haccksMay 28, 2017 at 22:13Several releases have been made this year (one 4 days ago), so i don't see how/why you may think monit is a deprecated application. @see mmonit.com/monit/changes – SergioJun 11, 2017 at 17:31I was talking about nohup. – haccksJun 11, 2017 at 17:392nohup is a plain standard POSIX command, so same remark : no way it is deprecated. @see unix.com/man-page/posix/1p/nohup – SergioJun 11, 2017 at 17:49Add a comment | 
How can I make Sublime Text reload the file being edited?
text-editors;sublime-text-3;sublime-text;text-editors;sublime-text-3;sublime-text
How can I make Sublime Text reload the file being edited? Ask Question
92 To re-load the current file, you can revert the file, either through the menu entry File | Revert File or through the command File: Revert (open the command palette by pressing Ctrl+Shift+P and type revert).To make it easier in the future, you can bind a shortcut to the revert command, for example F5, simply by adding an entry to your key bindings (Preferences | Key Bindings - User):{ "keys": ["f5"], "command": "revert"}ShareImprove this answer Follow edited Sep 23, 2014 at 17:59Anton Dozortsev2,9841818 silver badges2121 bronze badges answered Sep 22, 2014 at 13:50aknuds1aknuds19,29866 gold badges2727 silver badges2626 bronze badges523"revert"?! Uggh. I thought that did something else. Thanks! – Wes AlvaroApr 1, 2015 at 2:32Reverting causes the file to go blank :( Sublime build 3114. – AlikElzin-kilakaJul 28, 2016 at 11:47Right answer, but this keybind is unwise a bit – ApeironSep 26, 2016 at 9:502@Apeiron why do you say the keybind is unwise? – Matthew WooFeb 17, 2017 at 18:56this does not reload files loaded via FTPS – snh_nlMar 29, 2020 at 9:37Add a comment | ; 9 Although there is an accepted answer, it requires that we have to refresh manually everytime by pressing F5. Try this package Auto Refresh here. This automatically refreshes the file in x seconds which is configurable.ShareImprove this answer Follow answered Jan 18, 2016 at 11:22RamValliRamValli22322 silver badges77 bronze badges11I'm guessing "automatic" was the original intention of the question though not explicitly stated. – Pete AlvinMar 26, 2016 at 10:14Add a comment | ; 1 Though asked more than a year ago: you can also use "File->Reopen with encoding..." command. Note, all your changes made so far will be discarded while performing reload/revertShareImprove this answer Follow answered Nov 15, 2015 at 11:00Aleksey DashevskyAleksey Dashevsky1111 bronze badge21how can we do this to all files, not just individually, manually? and how can we make it do this right away, rather than having to trigger it manually after a merge or checkout? – ahnbizcadNov 30, 2015 at 22:33What's the point of making such a note. How do I open a door? Well, you open a door, but note the door will be open. Wow. Thanks. – poigeFeb 2, 2018 at 10:56Add a comment | ; 0 In addition, I just realized that when switching from the search bar to the main editor panel, it refresh the view.So ctrl+F then escape.Not the best, but no configuration or clicking required. Also, I would expect it not to work if you have unsaved edition.ShareImprove this answer Follow answered Jul 12, 2021 at 13:13Juh_Juh_43155 silver badges66 bronze badgesAdd a comment | 
Where or how do I register a new phone number intended to be used with voip? [closed]
voip
Where or how do I register a new phone number intended to be used with voip? [closed] Ask Question
1 Each country has it's own top level "regulator" that is responsible for telphone number management.In Germany it is the Bun­desnet­za­gen­turis responsible for structuring the national numbering space, setting the conditions for allocating and using numbers, and processing applications for numbers and number blocks.In the UK it is OfcomThis section provides information about UK Telephone Numbers, and allows Communications Providers to apply for Telephone Numbers from the National Numbering Scheme. In the UK you have to be a communications provider to apply for a number or block of numbers.As a consumer you are allocated a number by the provider you sign up with.ShareImprove this answer Follow answered Sep 22, 2014 at 14:28DavidPostill♦DavidPostill149k7777 gold badges343343 silver badges383383 bronze badgesAdd a comment | 
Lost VirtualBox Snapshots When Moved to a New Machine
windows-7;virtualbox;virtual-machine;windows-7;virtualbox;virtual-machine
Lost VirtualBox Snapshots When Moved to a New Machine Ask Question
0 I was thinking last night, that maybe I need to get the VirtualBox.xml file from my old machine and copy that over. Then I would need to change the drive letters, etc. around and see if that fixes it.Whilst the System Admin was changing my drives, I was reading how to Open / Import a Pre-configured File in VirtualBox. And you need to go to: Machine > Add and navigate to the .vbox that you want to add. When you add it, all the snapshots are included, and if the VM was in a group, it would add it to the group.ShareImprove this answer Follow answered Sep 23, 2014 at 8:15Kevdog777Kevdog77744722 gold badges77 silver badges3131 bronze badgesAdd a comment | 
When I plug my Windows 10 laptop into a projector, the screen blinks endlessly
windows;graphics-card;windows-10-preview;projector;windows;graphics-card;windows-10-preview;projector
When I plug my Windows 10 laptop into a projector, the screen blinks endlessly Ask Question
1 The Fact that your graphics card is identified as Intel HD Graphics most likely means that Windows 10 cant find a driver for it. You can: Right click > properties > update driver online.Go to the manufacturer website and try the most recent driver.You could install in comparability mode by right click the install exe if they don't have a driver for Windows 10 yet, which I'm sure they don't and wontPretty safe to say that your graphics card is integrated on an Intel mother board. If you need to view your hardware in Windows 10 go to All Apps > Windows Administrative Tools > System information.I personally prefer using an application like PC Wizard.ShareImprove this answer Follow edited Aug 3, 2015 at 3:26Mokubai♦86.7k2525 gold badges198198 silver badges222222 bronze badges answered Aug 3, 2015 at 0:43user1342670user13426701111 bronze badgeAdd a comment | ; -1 Go to "My Computer"Try to disable the built in-video cardEnable the external video cardRestartGo to "My Computer"In "Properties," disable the external video cardEnable the built-in video cardEnable the external video card(It's all automatic detection.)ShareImprove this answer Follow edited Aug 7, 2015 at 17:33Jamal45511 gold badge66 silver badges1717 bronze badges answered Aug 7, 2015 at 12:47asdasdasasdasdas1Add a comment | 
Accidentally told Chrome to ignore Protocol Handler?
google-chrome;google-chrome
Accidentally told Chrome to ignore Protocol Handler? Ask Question
2 After a little Googling, I found the answer.Ensure Chrome is completely closed. No lingering extensions or icon in the system tray. Navigate to %LOCALAPPDATA%\Google\Chrome\User Data and there is a file named local state. Inside the file, look for protocol_handler and under that you'll find magnet: true, change it to false and save the file.Following these instructions fixed my magnet problem.ShareImprove this answer Follow answered Dec 18, 2014 at 18:54Corey OgburnCorey Ogburn66422 gold badges1212 silver badges2828 bronze badges3Everything online says to do this, but it doesn't work on OSX, there is nothing matching the protocol handler I'm looking for :'( – MeekohiApr 10, 2017 at 17:51@Meekohi It is in file ./Preferences instead. – yuxuanAug 13, 2017 at 3:01This did not work for me on windows 10. There is no protocol_handler section in local state file. Also, cant find any Preferences file on the machine. – John LittleSep 30, 2017 at 13:16Add a comment | ; 0 For Google Chrome version 108.x on Windows 10Close Google ChromeGo to %LOCALAPPDATA%\Google\Chrome\User Data\Default\Open file Preferences with a text editorLook for protocol_handler and you will find <protocol>: true. Set it to false and save the fileShareImprove this answer Follow edited Dec 5, 2022 at 23:41 answered Dec 5, 2022 at 10:40Mahfud HarunMahfud Harun10133 bronze badgesAdd a comment | ; -1 The answer above did not work for me. But this one worked: (dont upvote my answer but his)1) Goto URL chrome://settings/clearBrowserData 2) Select duration "Past week". 3) Select only "Cookies and other site data"4) Click "Clear Browsing Data" and browse site again.ShareImprove this answer Follow answered Oct 10, 2017 at 20:42J. DoesJ. Does15166 bronze badgesAdd a comment | 
How do I determine who the ISP of an IP is?
ip;isp;ip;isp
How do I determine who the ISP of an IP is? Ask Question
7 You'll need to perform a whois lookup to get information about an ip address. There are a few major organisations who keep track of IP addresses for certain areas, such as North America, South America, Europe, Asia, etc.There are also sites that will use all these databases and let you query globally.One of these sites is http://who.isEnter the IP Address in question in the search bar and you'll see which organisation is responsible for this IP address, including contact information for abuse etc.ShareImprove this answer Follow answered Dec 18, 2014 at 18:33LPChipLPChip57.5k99 gold badges9292 silver badges135135 bronze badgesAdd a comment | ; 3 If you use one of the many "whois" sites, they will tell you who owns any IP you specify.ShareImprove this answer Follow answered Dec 18, 2014 at 18:21AFHAFH17k33 gold badges3030 silver badges4848 bronze badges9This does not provide an answer to the question. To critique or request clarification from an author, leave a comment below their post. – warrenDec 18, 2014 at 19:51@warren - On the contrary, it answers the question precisely. The question was perfectly clear, and I do not require clarification. I did not spell the answer out in the same detail as LPChip, because I thought the questioner might learn from doing a little research on "whois". – AFHDec 18, 2014 at 21:23that comment was left by the review system, and was NOT typed by myself. – warrenDec 18, 2014 at 21:411@warren - Sorry if I was a bit abrupt: I didn't know "the review system" could make comments in one's name. I'll need to be careful of that in the future when making my own critiques. Does that mean that one-line answers are always deemed unacceptable? – AFHDec 18, 2014 at 22:13typically ultra short answers get flagged as needing review because they tend to be spam/comments posing as answers. I wish I knew reviewing your answer (which, ftr, i upvoted) would leave a comment. I'd've come by and clarified/deleted the auto-generated comment had I known. I know now :) – warrenDec 18, 2014 at 23:26 | Show 4 more comments; 1 A simple call to the whois command-line binary with the IP address of your choice will return many information including a field named org-name that contains what you refer to as the name of the ISP.Another solution is to use a service such as Ipregistry (disclaimer: I run the service) that returns among others, this information. ShareImprove this answer Follow answered Sep 19, 2019 at 14:38LaurentLaurent15155 bronze badgesAdd a comment | 
HDMI dissapeared from xrandr
hdmi;ubuntu-14.04;xrandr;hdmi;ubuntu-14.04;xrandr
HDMI dissapeared from xrandr Ask Question
0 Strange, i reinstalled xserver-xorg-video-intel and restarted notebook, all work ok now. Don't know where was problem.ShareImprove this answer Follow answered Dec 18, 2014 at 19:35fpointfpoint122 bronze badgesAdd a comment | 
What are MINIMAL necessary reqirements to run Perl CGI scripts on Apache server?
linux;apache-http-server;perl;cgi;linux;apache-http-server;perl;cgi
What are MINIMAL necessary reqirements to run Perl CGI scripts on Apache server? Ask Question
0 mod_perl isn't necessary to run Perl CGI scripts in Apache. (But it may speed up some of them.)What may be missing but isn't clear due to the rather incomplete configuration shown above, is, if mod_cgid or mod_cgi are loaded. In Apache 2.2, it depends on the MPM which of those two you have to use.If you're on Debian or Ubuntu, calling a2enmod cgi or a2enmod cgid plus a service apache2 restart may already suffice to solve your issue. Not sure if these helper scripts are available on other distributions, too.ShareImprove this answer Follow answered Dec 18, 2014 at 19:53Axel BeckertAxel Beckert57411 gold badge66 silver badges2020 bronze badgesAdd a comment | 
Is installing a different distro over ubuntu on a dualboot system possible? Or deleting partition necessarily?
ubuntu;partitioning;windows-8.1;multi-boot;ubuntu;partitioning;windows-8.1;multi-boot
Is installing a different distro over ubuntu on a dualboot system possible? Or deleting partition necessarily? Ask Question
-1 Paragraph 2 - install overtop of Ubuntu partition should work. Don't need to remove the partition, but erasing files or reformatting couldn't hurt, I don't know if every distro will erase old files or try to use some.May need to repair your windows bootloader if it's gone after deleting Ubuntu & decide not to install another linux.-> After reading updated info, I thought since you had Ubuntu installed before then installing another one would be ok. I'm not sure what to think about Elementary OS, it's screenshots look nice but apparently it couldn't install itself? You may find help in this post "Installing Ubuntu on a Pre-Installed Windows 8 (64-bit) System (UEFI Supported)".Or maybe the problem is: It sounds like you've got multiple hard drives with a changing boot order, if pressing "F1/F12" gets to a boot menu of some sort you may be choosing the windows drive to boot from successfully, or at least the drive with a good boot menu... but booting from a different drive each time would mix things up.Or if it's just grub, a tool like Boot Repair might help to configure grub... it is theoretically possible to use grub from the "GRUB>" prompt, but I wouldn't try it without a few pages of instructions on another computer next to me.ShareImprove this answer Follow edited Apr 13, 2017 at 12:23CommunityBot1 answered Dec 18, 2014 at 19:07Xen2050Xen205013.5k44 gold badges2323 silver badges4242 bronze badges5I tried an overtop installation but didn't went well. Se my first post for information. – user3216616Dec 19, 2014 at 3:22I have only one hard drive. But with different partitions. I think a solution might be to get rid of grub so i tried:askubuntu.com/questions/489929/… but it didn't work. Or can i delete grub with Boot Repair? Or how do I get rid of grub? – user3216616Dec 19, 2014 at 19:47That's what I was hoping the "repair your windows bootloader" link I posted would do, that askubuntu question looks friendlier/easier though – Xen2050Dec 19, 2014 at 19:51I managed to install linux mint and after the installation of the OS was done then grub changed like I wanted to. So get rid of grub didn't work but no problem with overinstall it like the OS did do I guess? That solved my problem, thx Xen2050 for your time – user3216616Dec 23, 2014 at 1:04You're welcome. The last OS to install often writes it's own bootloader, overwriting whatever used to be there. Linux like Ubuntu & Mint should make a boot entry for any existing OS's, but Windows will often overwrite with it's own, ignoring any Linux. Mint does have the "Install Linux Mint" on the Desktop/Start menu after it boots "live", I run it from a multiboot USB with a different boot menu (just copy iso file & edit a grub config file using linux - instructions here (using ext3 instead of FAT32 for me) pendrivelinux.com/… – Xen2050Dec 23, 2014 at 10:13Add a comment | 
Deleting some cells in Excel 2013
microsoft-excel;worksheet-function;microsoft-excel;worksheet-function
Deleting some cells in Excel 2013 Ask Question
1 Probably the simplest way is to add a filter to the top-most row of your data, then for the email column, set it so only "blanks" is selected. This will temporarily hide all of the other rows and only display the ones with a missing email address. You can now just highlight them all and delete. Once they are gone, remove the filter and the rest of your data will reappear. ShareImprove this answer Follow answered Dec 18, 2014 at 18:44techturtletechturtle8,9061111 gold badges4141 silver badges7575 bronze badges1Depending on what the email column may or may not contain, filtering on Text Filters, Does not contain @ might be a better option. – user385793Dec 20, 2014 at 1:13Add a comment | 
How do you get an SNI certificate for internal host-names?
ssl;synology;x509;ssl;synology;x509
How do you get an SNI certificate for internal host-names? Ask Question
5 Public CAs will only issue certificates for public domains. There was a time when they did but abandoned this behavior because this caused problems with newly introduced top-level domains. Also, CA only issue certificates for domains which are only owned and used by a single party, which is not the case for internal names.Which means: either you accept the self-signed certificate once on all internal devices or you need to roll your own private PKI structure and import the relevant root-CA on all devices.ShareImprove this answer Follow answered Dec 18, 2014 at 18:07Steffen UllrichSteffen Ullrich5,3221717 silver badges2121 bronze badgesAdd a comment | ; 1 I'm assuming the general problem you're trying to solve is how to enable robust HTTPS for the device for both internal and external clients, and you don't actually care if it has two different names. If that's true, you may have another option. If you have control over the DNS server for your internal network, you could have it resolve home.notarealdomainname.com to the internal IP address for internal clients. Then you just need a certificate for the public name, and you can use that name to access it both internally and externally. Here's how I do that in BIND on Ubuntu Server 14.04:/etc/bind/rc.conf.local:...zone "home.notarealdomainname.com" in { type master; file "/var/lib/bind/db.home.notarealdomainname.com"}.../var/lib/bind/db.home.notarealdomainname.com:$ORIGIN .$TTL 86400home.notarealdomainname.com IN SOA dnsserver.domain.local. myemail.emaildomain.com. ( 1 ; serial 86400 ; refresh (1 day) 3600 ; retry (1 hour) 172800 ; expire (2 days) 3600 ; minimum (1 hour) ) NS dnsserver.domain.local.$ORIGIN home.notarealdomainname.com.@A 192.168.1.123Basically, it's telling your local DNS server (here assumed to be dnsserver.domain.local) that it's the authority for the home.notarealdomainname.com zone (but not notarealdomainname.com, so it won't interfere with other hosts in that domain), and returning the NAS's local IP (here assumed to be 192.168.1.123) for it.ShareImprove this answer Follow edited Dec 18, 2014 at 19:05 answered Dec 18, 2014 at 18:39glibdudglibdud18311 silver badge66 bronze badges1This is pretty much what I did in the end : a few months after I posted this question, I recreated my home's Active Directory domain using a subdomain of my public domain name as the AD domain name (home.example.com) and now operate a "Split-brain" DNS set-up so nas.home.example.com resolves to my NAT's public IPv4 address (with port-forwarding to the NAS) on the Internet side, but my NAS's internal IPv4 address within my LAN. This is acceptable for now, but ideally I'd just use IPv6 from my ISP so I don't need to use port-forwarding. – DaiJun 21, 2019 at 15:54Add a comment | ; 1 I would like to install an SNI certificateThere's no such thing as an SNI certificate. That's a TLS extension, and it means the server name is sent in the ClientHello.certificate that supports both the hostnames nas.domain.local. in addition to home.notarealdomainname.com.The CAs probably won't issue that certificate because of nas.domain.local.But its not clear to me where issuing it is prohibited under the CA/Browser (CA/B) Baseline Requirements documents (CA's and Browsers do what they agree upon in the CA/B Forums; they don't follow anything from the IETF or RFCs).Because of home.notarealdomainname.com, you will satisfy section 11.1.1, Authorization by Domain Name Registrant. Section 11.3 prohibits *.local, but that's due to the wildcard (and not the local name).Since I can't find where the CAs are prohibited from issuing the certificate, you should ask CAs about issuing a certificate that includes a local name (in addition to the public name you control).I don't want to issue my own certificate as, for expediency in use, I would like browsers to trust the certificate.You should perform the following steps (even though you don't quite want to do it):create your own CAcreate a CSR with all the names you want the server to haveissue a cert based on the CSRsign the cert with your CAinstall your CA on your devices and machinesThe only difference between the pre-trusted list of CAs in browsers and certificate stores and your CA is you have to install your CA manually.If you need to use OpenSSL to create a CSR with multiple Subject Alt Names (like nas.domain.local and home.notarealdomainname.com), then see this question on Stack Overflow: Certificate with Extended Key Usage only works in Firefox. In particular, see the OpenSSL configuration file.Finally, this is a known problem with the Internet of Things; and it currently lacks a solution. It was recently brought up on the Web App Security mailing list. See Proposal: Marking HTTP As Non-Secure:I'd like to propose consideration of a fourth category: Personal Devices (home routers, printers, IoT, raspberry pis in classrooms, refrigerators): - cannot, by nature, participate in DNS and CA systems - likely on private network block - user is the owner of the service, hence can trust self rather than CAShareImprove this answer Follow edited May 23, 2017 at 12:41CommunityBot1 answered Dec 21, 2014 at 6:10jwwjww11.6k4040 gold badges113113 silver badges203203 bronze badgesAdd a comment | 
Is the voice command "transfer" to transfer text from the dictation box to the application supposed to work?
windows-7;dragon-naturally-speaking;windows-7;dragon-naturally-speaking
Is the voice command "transfer" to transfer text from the dictation box to the application supposed to work? Ask Question
0 It is a typo.To create a "transfer" voice command:Sub Main HeardWord "transfer", "text"End SubShareImprove this answer Follow answered Dec 19, 2014 at 0:50Franck DernoncourtFranck Dernoncourt19.3k4444 gold badges172172 silver badges293293 bronze badgesAdd a comment | ; 0 No, it is not a "typo". You need to use the correct command, which is "click transfer" since this is a mouse action.Alternately, if you don't want to say "click" before mouse actions you can go to Tools>Options>Commands and uncheck the various Require "Click" to... options to get the desired behavior.ShareImprove this answer Follow answered Jun 14, 2015 at 2:43Toneloc427Toneloc4271122 bronze badgesAdd a comment | ; 0 I'm using Dragon Dictate 13 with Word Perfect. In spite of downloading the fix for Word Perfect, I kept getting shuttled over to the Dictation Box. After dictating and clicking on "Transfer" I lost what I had done. Not being stupid I only tried it six more times. To fix it, I went to Dictation Box Settings. Manually using Ctrl-C to copy the Dictation Box contents and Ctrl-V to paste it solved the problem. PC 101. Hard to believe. A major booby trap by Nuance. ShareImprove this answer Follow edited May 17, 2016 at 21:13fixer123426.7k6161 gold badges7171 silver badges115115 bronze badges answered May 17, 2016 at 20:45Kaye RicheyKaye Richey1Add a comment | 
Multiple htpasswd user entries [closed]
apache-http-server;amazon-web-services;htaccess;apache-http-server;amazon-web-services;htaccess
Multiple htpasswd user entries [closed] Ask Question
0 Figured it out. To allow multiple users to access your site via htpasswd the instructions are in the link below.Section "Letting more than one person in"http://httpd.apache.org/docs/current/howto/auth.htmlShareImprove this answer Follow answered Dec 18, 2014 at 22:20LuiLui2911 gold badge11 silver badge33 bronze badgesAdd a comment | 
Mirroring all router traffic (openwrt) to a snort sensor?
openwrt;openwrt
Mirroring all router traffic (openwrt) to a snort sensor? Ask Question
6 Yes iptables TEE works. I have a tplink router and I am mirroring the traffic exactly for the same reason as you.Install all the necessary modules and packages for TEE.Assuming your monitoring IP address is 10.1.1.205, run:iptables -A POSTROUTING -t mangle -o br-lan ! -s 10.1.1.205 -j TEE --gateway 10.1.1.205iptables -A PREROUTING -t mangle -i br-lan ! -d 10.1.1.205 -j TEE --gateway 10.1.1.205ShareImprove this answer Follow edited Nov 10, 2018 at 21:24AK_18811 gold badge22 silver badges1515 bronze badges answered May 26, 2014 at 1:51MethosMethos17633 bronze badgesAdd a comment | ; 3 A patch for OpenWrt to enable port mirroring on your hardware is available, though it has received only limited testing. You can, of course, apply and test it yourself.ShareImprove this answer Follow answered May 17, 2014 at 3:06Michael HamptonMichael Hampton13.5k44 gold badges4343 silver badges7575 bronze badges7I refered to this feature in my question. The problem is when mirroring the WAN port - you only get the public router IP and IP of the destination server. But I want the internal IPs of the clients and their exact connections to feed the snort sensor with. – user3200534May 17, 2014 at 3:32If you want to mirror a different port, then you need to select that port! – Michael HamptonMay 17, 2014 at 3:38Yes, you can choose between 1-4 LAN slots (ports). No WLan! No VPN! Only eth-ports at backside of the device or port 0 (= WAN). That is very far from all traffic of the router. – user3200534May 17, 2014 at 3:44Hmm. I don't think you can mirror all traffic. This is, after all, a function of the hardware switch. So you won't get WLAN traffic, for instance, or traffic on virtual interfaces. Someone else in a similar situation may find this useful, though. – Michael HamptonMay 17, 2014 at 7:09can you share details how would you apply this patch? – AK_Nov 10, 2018 at 20:30 | Show 2 more comments; 3 It is now possible to set up port mirroring on OpenWrt via the Switch configuration. This can be done using the OpenWrt web interface (LuCI) by going to the Network->Switch menu then enabling 'Enable mirroring of incoming packets' and/or 'Enable mirroring of outgoing packets' and setting the desired interfaces (The 'Mirror source port' is where you want to mirror traffic from and the 'Mirror monitor port' is where it is mirrored to). It may also be necessary to alter VLAN settings on the switch interface and the monitor interface on the monitoring device to see the traffic of interestOtherwise this can be achieved on the command line by editing the switch section of the network config file (/etc/config/network).Update: With the newer versions of OpenWRT (v21 onwards) on some platforms they have started migrate to the new Distributed Switch Architecture (DSA) which is controlled via the Interfaces UI. It can also be configured on the command line using tc command to configure the mirred action the appropriate ports.Note: There are often limitations to port mirroring as the switch hardware in many platforms may not connect directly to all interfaces - this means that you might only be able to mirror LAN or WAN traffic. But you should be able to setup some iptables rules (as desicribed above) to redirect/mirror that remaining traffic.ShareImprove this answer Follow edited Nov 15, 2021 at 17:08 answered Apr 6, 2019 at 18:47PierzPierz1,7592020 silver badges1515 bronze badges3Network -> Switch does not exist in version 2021 – mamaNov 15, 2021 at 14:39In OpenWRT release 21 they have started to introduce the newer Distributed Switch Architecture (DSA) on some platforms: openwrt.org/releases/21.02/notes-21.02.0 - I'll update the answer. – PierzNov 15, 2021 at 16:19Thank you ! :-) – mamaNov 15, 2021 at 16:21Add a comment | 
Can the linux kernel enumerate pcie devices beyond what the bios can?
linux;pci-express;linux;pci-express
Can the linux kernel enumerate pcie devices beyond what the bios can? Ask Question
0 A bit late, but perhaps useful to other people ending up here with a similar question:According to the specification, the PCI(e) bus must be enumerated depth first. This means that when a switch or transparent bridge is found, it must be configured and enumeration must continue with devices behind this newly found switch/bridge. After that, it can continue enumeration of devices on the same level the switch/bridge was found. To reduce complexity and memory usage, some BIOSes are limited in the maximum depth it scans. Because you're mentioning multiple backplanes I'm assuming this is the case.The Linux kernel does not have this limitation. And you can stimulate it to rescan the bus by typing this at your terminal:echo "1" > /sys/bus/pci/rescanShareImprove this answer Follow answered Aug 11, 2017 at 14:10RobertRobert111 bronze badgeAdd a comment | ; 0 The simple answer: no.The truthful answer: sometimes.The ugly answer: once upon a time, yes, but now days, no.The sad answer: Intel and AMD CPU/chipset implementations have broken this, and made it impossible for OS to adjust I/O memory maps using standardized P2P bridge locations. BIOS do a poor job, and cannot deal with hot-plug in most cases, and even when they can, still do a bad job, and the OS can no longer change root port assignments as was intended by the specification. Intel and AMD do not seem to care. ShareImprove this answer Follow answered Mar 12, 2020 at 3:35MesaGuyMesaGuy1Add a comment | 
SQL 2012 in Hyper-V. Why are my queries slow until I drop and create any spatial index?
performance;hyper-v;sql;sql-server-2012;gis;performance;hyper-v;sql;sql-server-2012;gis
SQL 2012 in Hyper-V. Why are my queries slow until I drop and create any spatial index? Ask Question
1 Unfortunately it seems to be the cost of Virtualization in some scenarios. If you are running with dynamic memory which uses a memory balloon driver try configuring the VM to have a set amount of RAM. Watch teh memory utilization of both the host and guest. If you see that memory is increasingly getting consumed try disabling lock pages in memory. One thing that you can try is with all guests powered off and the host freshly booted, just boot the single guest running SQL. If the queries run as they should then the other guest machines are robbing that VM of the needed resources. This can happen when a server isn't sized properly and is quite common. A way around this is to add an additional array of disks and dedicate it to just that VM. Another way to cheat the system in a way is to use SSD caching for the database. A couple of other things to consider is if you shutdown the SQL service and use a tool like UltraDefrag and run a full optimization and defrag, then bring the service back up if the query performs any faster. You can get UltraDefrag which is opensource and free at http://ultradefrag.sf.net lastly Microsoft has a paper you might want to check your configurations with. Check out: http://www.slideshare.net/ManuelCastro8/high-performance-sql-server-workloads-on-hyper-vOne other thing to try is use ESXi instead of Hyper-V, or the latest Hyper-V 2012 R2. Lastly, with the full version of SQL what exact version is being ran? What exact OS is being ran for the guest and host? Do you have the latest integration services installed?ShareImprove this answer Follow answered Jul 15, 2014 at 15:23BradBrad25033 silver badges1010 bronze badgesAdd a comment | 
How do I fix these iptables?
linux;networking;ssh;firewall;iptables;linux;networking;ssh;firewall;iptables
How do I fix these iptables? Ask Question
0 First of all "Filter access from ports 20,21,22,80,443,9987,20117,25565 through mc rules" with this rule: iptables -A INPUT -p tcp -m multiport ! --dports 20,21,22,80,443,9987,20117,25565 -j mc will not work because of exclamation mark. Your rule works for every port except 20,21,22,80,443,9987,20117,25565. If you want "filter access from ports 20,21,22,80,443,9987,20117,25565 through mc rules" you should use: iptables -A INPUT -p tcp -m multiport --dports 20,21,22,80,443,9987,20117,25565 -j mcFor now in your configuration you allow ssh access only for one source addresses cache.ovh.net - in your main INPUT rules.For connections to other ports you have rule:iptables -A mc -m state --state RELATED,ESTABLISHED -j ACCEPTthat allows related and established connections to work. I think connections with source addresses from you mc custom rules should work fine, but for your main INPUT rule you should add something like this:iptables -A INPUT -i eth0 -p tcp --dport 22 --source cache.ovh.net -m state --state RELATED,ESTABLISHED -j ACCEPTright after this line:iptables -A INPUT -i eth0 -p tcp --dport 22 --source cache.ovh.net -j ACCEPTAlso you should check DNS settings. Does ping.ovh.net resolves to the right IP address?ShareImprove this answer Follow edited May 17, 2014 at 5:57 answered May 17, 2014 at 5:39AlexAndersanAlexAndersan65155 silver badges99 bronze badgesAdd a comment | 
How to speed up data transfer between Portable HD and NAS (QNAP)?
nas;rsync;file-transfer;qnap;nas;rsync;file-transfer;qnap
How to speed up data transfer between Portable HD and NAS (QNAP)? Ask Question
1 It looks like my little NAS CPU was dying. So I connected my external HD to my laptop, plugged in my laptop in the router and now I get a transfer rate of 3-4Mb/sec.ShareImprove this answer Follow answered May 17, 2014 at 19:21MartinMartin55522 gold badges1010 silver badges1919 bronze badgesAdd a comment | 
What is the keyboard shortcut to go to inbox in outlook mac 2011
microsoft-outlook;mac;keyboard-layout;microsoft-outlook;mac;keyboard-layout
What is the keyboard shortcut to go to inbox in outlook mac 2011 Ask Question
2 Tab key?did you try the Tab key - maybe together with Shift, Alt or Command?I don't have Outlook:Mac, but in MS Windows you can use Tab (or Shift-Tab backwards) to cycle through the window panes.As this is not always very easy and quite limited, I'd suggest a more general and flexible approach to use MS Outlook mostly with keyboard shortcuts.Maybe not the exact answer to your question, but it finally lets you do even more than you asked:VBA macros and Special menuSimilar to you, I was missing shortcuts in Outlook 2007 on MS Windows which let me change the current folder/view without using the mouse and finally chose the following solution, which works very well for me: write some short VBA macros which activate the views/folders, I'm using most oftencreate my own Menu in the Menu bar (I called it "Special")Added those VBA macros to this menu anddefined a short key for every one of them (by typing & before the corresponding letter in the name of the menu entry)With Alt+s I activate my "Special" Menu and then by typing the short key for an entry, I can easily activate the macro and let Outlook switch its perspective.I'm currently not on the PC where I made this setup, so I can add more details next week, if you're interested. EDIT: it seems that Outlook 2011 for Mac does not support VBA (see http://answers.microsoft.com/en-us/mac/forum/macoffice2011-macoutlook/does-mac-outlook-2011-support-vba-macro-programs/c6515223-1431-424f-851d-b7f5c6dc7df8). Alternatively, you could create Apple Scripts. I am not sure how to integrate them into the MS Outlook GUI - maybe with the Apple Script menu. However, Quicksilver (see below) could let you define keyboard shortcuts to launch those scripts from within MS Outlook (or even from within another application, if you wish).Use Quicksilver or a similar toolOn MacOS X there is also the excellent (and free and open source!) software Quicksilver (http://qsapp.com/) which lets you define your own shortcuts, they are called Triggers (tutorial: http://vjarmy.com/archives/2006/01/quicksilver_gold_trigger.php )ShareImprove this answer Follow answered May 17, 2014 at 3:18MostlyHarmlessMostlyHarmless1,86877 gold badges2929 silver badges4949 bronze badges22I will give quicksilver a try. On microsoft forum it is mentioned that vba macros are not supported for outlook mac 2011. – vaichidrewarMay 17, 2014 at 22:13thanks for your feedback! See my edit (maybe AppleScript+Quicksilver) is an alternative for you. If that works for you, you can "accept" my answer by clicking on the check mark below the up/downvote arrows. Learning and using Quicksilver is really helpful if you want to get rid of unnecessary mouse-usage. – MostlyHarmlessMay 18, 2014 at 2:24Add a comment | ; 1 As suggested by Martin I played some more with using TAB. 1) If focus is on list of emails then shift + TAB takes focus to side panel 2) Pressing option + up arrow selects the top most folder in the side panel which happens to be Inbox folder.So in two steps I am able to select the inbox folder without using mouse. ShareImprove this answer Follow answered May 20, 2014 at 0:01vaichidrewarvaichidrewar1,03822 gold badges1313 silver badges1616 bronze badges1I think this is as close as it gets. I'd still like to be able to move to a different folder without relying on the side panel. My goal is to completely hide the side panel to maximize the footprint of message list and reading pane. – JAponteApr 19, 2019 at 16:32Add a comment | ; 1 There is no built-in keyboard shortcut, so you have to create an Applescript and then assign a shortcut using the Keyboard control panel.Step 1Create the Applescript. Here's the code I used. Feel free to copy and paste.on run {}tell application "Microsoft Outlook" tell the first main window set view to mail view end tell set selected folder to inboxend tellend runStep 2Create your shortcut. Rather than re-create the wheel and explain how to create the shortcut, I'll link you to the page where I learned how to. Go here.ShareImprove this answer Follow answered Jan 20, 2016 at 19:26Michael E. RubinMichael E. Rubin6177 bronze badgesAdd a comment | ; 1 Cmd-Sh-[ will move the focus to the sidebar pane with inbox and other folders, from there you can use up/down arrows to navigate.My overall Outlook Mac 2011 shortcut buffet has:cmd-1 mail viewcmd-2 calendar viewcmd-arrow forward or back in calendar viewctl-cmd-2 work week view in calendarcmd-sh-[ previous panecmd-sh-] next panecmd-opt-n new message (any view)cmd-sh-m move mail item to foldercmd-sh-j mark as junk ctl-1 flag follow up todayctl-0 flag completecmd-opt-' flag clearcmd-f find in mailIn the mail sidebar I use several custom folders in the server inbox and a local archive folder, as well as a few folders added to Favorites which can be helpful.ShareImprove this answer Follow answered Jan 20, 2016 at 23:00MerlinMerlin11366 bronze badgesAdd a comment | 
Windows 7 computer crashing while applying updates
windows-7;boot;windows-update;windows-7;boot;windows-update
Windows 7 computer crashing while applying updates Ask Question
1 If you are able to boot into recovery mode from the installation DVD, you can typedism.exe /image:C:\ /cleanup-image /revertpendingactionson the recovery command prompt. This will rollback pending updates.ShareImprove this answer Follow answered May 17, 2014 at 13:47Áxel Costas PenaÁxel Costas Pena90044 gold badges1313 silver badges2929 bronze badges2Useful to know. I have discovered that though all my data files are there, there is no Windows folder - so I am now doing a clean install and then restore data. – Steve FallowsMay 17, 2014 at 14:55Sad to hear that. Surely you initially suffered a BSOD during the first attempt to install those updates, while Windows were writing itself to the system folder, so the file index corrupted, then you achieved current situation. – Áxel Costas PenaMay 17, 2014 at 17:56Add a comment | 
Recording microphone and computer audio at the same time in Windows 8
windows-8;audio;audio-recording;windows-8;audio;audio-recording
Recording microphone and computer audio at the same time in Windows 8 Ask Question
3 Voicemeeter is typically made to allow that ! It is a virtual audio device Mixer able to mix/route several audio sources (for example your MIC and computer sound) to different audio points (for example to your speaker and to Audacity or whatever audio recorder applications)! More info and complete documentation on www.voicemeeter.com (get latest version on their facebook/G+ pages).Many tutorial on youtube...ShareImprove this answer Follow answered May 20, 2014 at 9:39user258609user25860935111 silver badge66 bronze badges1Thank you, this works so well. I set it up in a matter of 10 minutes, and now I just need to tweak the volumes a little bit. This takes like 75% of the stress out of recording... – Jonny BMay 21, 2014 at 4:42Add a comment | ; 2 You can record your System audio + microphone on Win 8 or 10 using Audacity.Steps:STEP 1: Right Click on Speaker/Volume icon on your task bar then click "Open Sound Settings".Step 2: On the left side of the newly open window you'll find Related Settings. Click on "Sound Control Panel"Step 3: Now Click on Recording Tab ---> Right click on your Microphone icon then clik on "Properties"Step 4: Goto Listen Tab then Tick/Check the box that says "listen to this device"STEP 5: Open Audacity then Select WASAPI (Windows Audio Session API) as your audio HOST.Select Your default playback Device (Headphones or Speakers) as Recording Device.STEP 6: Press"Record" and now you should be able to capture both your microphone and system audio.Here is a short YouTube Video version of what I wrote above:How To Record Speakers & Microphone at the same time in AudacityShareImprove this answer Follow answered Nov 5, 2020 at 16:29UG PlaysUG Plays2111 bronze badge1This works, but also leads to your microphone playing on your headphones the entire time, which is not a great experience – DownloadPizzaJan 8, 2022 at 13:36Add a comment | ; -2 It's very big and serious question.Firstly:You need specialized software like Adobe Audition, Steinberg Cubase and etc.Secondly: If you wand make quality product you also need specialized hardware. For example external sound devices (aka USB sound cards) and/or mixing console.It all depends on what exactly you need and what you specifically want to record: sound, voice, music (even depends on the genre of music).ShareImprove this answer Follow answered May 20, 2014 at 11:02PhoenixPhoenix82411 gold badge66 silver badges1414 bronze badgesAdd a comment | 
Shell script to check all the URLs from a file or list
linux;bash;shell;shell-script;nagios;linux;bash;shell;shell-script;nagios
Shell script to check all the URLs from a file or list Ask Question
1 You will have to install wget is you don't have it already:#!/bin/bashIFS=''LIST='http://www.google.comhttp://www.drk.com.ar/daphne.phphttp://www.google.com/this-is-an-errorhttp://serverfault.com/questions'for I in $LISTdo wget -q --no-cache --spider $I if [ $? != 0 ]; then echo Error: $I fidoneShareImprove this answer Follow answered May 17, 2014 at 0:35drkblogdrkblog2,5751414 silver badges1313 bronze badgesAdd a comment | 
"Hunk #1" message after apply a patch
ubuntu;patch;ubuntu;patch
"Hunk #1" message after apply a patch Ask Question
13 If the file to be patched has changed slightly since the patch was created, but the specific section remained the same, patch can detect that and apply the patch appropriately.The message you see means the file was successfully patched, but the first section that was patched was 27 lines earlier than was originally specified. ShareImprove this answer Follow answered May 17, 2014 at 2:10user55325user553254,9531818 silver badges2323 bronze badges3does it need manual review or is it safe to assume that patch applied correctly ? – raj guptaAug 4, 2015 at 11:095In my experience, the "succeeded" message always means the patch applied correctly. I assume that patch is smart enough to give me an error if there are any issues. – user55325Aug 6, 2015 at 2:39But it's always a good idea to give a quick manual review. – Dilip Raj BaralAug 18, 2018 at 9:42Add a comment | 
Firefox: H.264 Video Support
firefox;video;html;h.264;firefox;video;html;h.264
Firefox: H.264 Video Support Ask Question
1 Found answer here:Note: Firefox currently uses OpenH264 only for WebRTC and not for the tag, because OpenH264 does not yet support the high profile format frequently used for streaming video. We will reconsider this once support has been added.ShareImprove this answer Follow answered Dec 12, 2014 at 14:27AntonioAntonio61711 gold badge1010 silver badges2121 bronze badgesAdd a comment | 
Align paragraph to the bottom of the page in Microsoft Word
microsoft-word-2007;microsoft-word-2007
Align paragraph to the bottom of the page in Microsoft Word Ask Question
3 Just like in the old days of HTML, creating a table that has the size of the entire page with two rows will do the trick. You can anchor the table to the page. Inside each table cell, you can select horizontal and vertical alignment. As an alternative, you can create one table cell, make sure the document text goes around or above & below it and anchor the table to the bottom of the page. Set the row height to fit. This way, you don't have the disadvantages of the table (eg different behavior of tab) in the regular body text. Actually, I've seen official internal document templates of a company that used this trick to layout its text for project templates etc. ShareImprove this answer Follow answered Dec 13, 2014 at 1:44agtoeveragtoever6,20411 gold badge2323 silver badges3737 bronze badges2This is quitte useful for me, as what I would like to align to the bottom is a table. However it has a preceeding title-like non-table-row paragraph before it. Do you have any suggestion how can I align that table with that paragraph before it? I would not like to use textboxes either. I wanted to use Vertical alignment with Word 2016, but that would stretch the table of contents before it. – Adam L. S.Jun 3, 2016 at 14:[email protected]. you can achieve this with two-rows-one-column table. Put title-like paragraph into the top row and configure vertical alignment to top for it. Put the second paragraph into the bottom row and set alignment to bottom for it. You can change height of rows to move text in the top row. Make table borders invisible (0px or white color) – Hirurg103Apr 5, 2020 at 8:43Add a comment | ; 4 This is an old question but it is possible with frames, an old feature of Word that Microsoft, for some reason, no longer exposes by default in the Word user interface. Frames are similar to text boxes but the text in them remains part of the main document. Note that this means that if you add text before the framed paragraph, it can move off the page you set it up on and onto the next one!Select the paragraph you want to alignIn the Ribbon, choose View, Macros, View Macros or hold down ALT and type T M, M. The Macros dialog box will open.Type InsertFrame and click Run (this is a poorly-documented feature of Word; if you know the name of a command, typing its name into the Macro dialog will run it). Word will convert the paragraph into a frame.Double-click the Frame border, or right-click and choose Format Frame. The Frame dialog will open.Change the Vertical Position drop-down to "Bottom" (the Relative To drop-down should update automatically to "Margin) and click OK.By default, Word puts a border around frames. Right-click and choose Borders & Shading to get rid of it.If you find yourself using frames a lot, you can put it back on the user interface by using the Customize dialog.ShareImprove this answer Follow answered Jul 16, 2019 at 15:32Ken KeenanKen Keenan33533 silver badges77 bronze badges11This, I believe, is the best answer. – afaolekNov 22, 2020 at 19:52Add a comment | ; 4 The cleanest way to do this is to use page setup dialogue (under Layout in the ribbon)Make sure to add section break before and after the text you wish to be on the bottom of the page. Always start new section on a new page.ShareImprove this answer Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered May 3, 2020 at 20:37MalantheonMalantheon7344 bronze badges1What about when you have a section at the end of a page that you want to align to the bottom? – Toivo SäwénMay 18, 2022 at 14:54Add a comment | ; 2 I came across slightly different way to do this.Create a single cell table (it can be border-less) Put your text in the single cellGo to the table propertiesOn the Table tab, set the "Text Wrapping" to "Around"Click on the "Positioning" buttonLeave the Horizontal Position and Relative fields as is (Left/Column)Set the Vertical Relative field to "Page"Set the Vertical Position field to a reasonable values (e.g., a single line worked well at 9.5" on letter sized pages - you can override the defaults in the pull down).Click OK to leave the Table Positioning window.Click OK to leave the Table Properties windowYour table (and contained text) will now float at the bottom of the page. You'll have to update the position if you change the page size of course, but you don't have to pad the bottom of the table with white space so the text doesn't sit in the footer.ShareImprove this answer Follow edited Nov 3, 2017 at 20:09 answered Nov 3, 2017 at 20:03BIBDBIBD1,54666 gold badges2222 silver badges3232 bronze badgesAdd a comment | ; 0 Increase the bottom margin and adjust the footer to accommodate the text. Place the text in the footer and add a page number under the text, if needed. (You can use page field code if you want.) Place a section break at the bottom of the page so that the bottom margin and footer for the subsequent pages can be restored to their desired settings.ShareImprove this answer Follow answered Oct 25, 2019 at 23:33SpongeBobbySpongeBobby1111 bronze badgeAdd a comment | ; -3 Simply create a textbox and under format>arrange>align select align bottomShareImprove this answer Follow answered Feb 6, 2016 at 14:04LucasLucas111The OP has specifically requested a solution that does not use text boxes – BurgiFeb 29, 2016 at 10:03Add a comment | 
Add unallocated space to free space
windows-7;windows-8;partitioning;ssd;windows-7;windows-8;partitioning;ssd
Add unallocated space to free space Ask Question
2 If the 65GB Free space is in an extended partition, that means the 50GB unallocated is not in any partition at all, so you should be able to expand the 65GB Free/Extended partition all the way to the left, overtaking the 50GB unallocated. That should work with gparted but I'm not too sure about windows.But they are both empty space you want to re-use, so deleting the 65GB "free space" extended partition and then creating a new (extended) partition with all the then-unallocated space should accomplish the same thing, and may even be a better idea in case the program decides to try to move the "free" extended partition first, or if it can't grow an extended partition.ShareImprove this answer Follow answered Dec 12, 2014 at 15:23Xen2050Xen205013.5k44 gold badges2323 silver badges4242 bronze badges22Indeed. Deleting and recreating the extended partition (aka “Free space” aka the green thingy) is perfectly safe because it’s empty. – Daniel BDec 12, 2014 at 15:31Oh, nice! When I actually deleted the "Free space" it merged with the "Unallocated" automatically. I did not perform this before, because I was afraid of the deleting it will result in it becoming inaccessible. Thanks, guys! – MilkncookiezDec 13, 2014 at 0:09Add a comment | 
MS Excel query on conditional summing [duplicate]
microsoft-excel;microsoft-excel
MS Excel query on conditional summing [duplicate] Ask Question
1 If I understand you're question correctly, you can use the SUMIF function. If the color names are in Column A, rows 1-3, and the values in Column B, rows 1-3, your formula might look like this: =SUMIF(A1:A3,"Red",B1:B3).ShareImprove this answer Follow answered Dec 12, 2014 at 17:28JIntorcioJIntorcio3111 silver badge33 bronze badgesAdd a comment | 
What can go wrong when connecting a PSU? [closed]
power-supply;power-supply
What can go wrong when connecting a PSU? [closed] Ask Question
1 You aren't going to damage the PSU but you could damage other components if you don't connect them correctly. That being said, the plugs from the PSU usually only plug in one way. Plus, a good PSU will have each plug labelled as to what it is, its voltage, etc. I echo the above when I say refer to the manual of both the PSU and the motherboard/devices before you begin. Be careful to use safety precautions like a static wrist guard or at the very least be sure to discharge any static on metal before touching any components on the motherboard.ShareImprove this answer Follow answered Dec 12, 2014 at 13:46John ReaJohn Rea3611 bronze badge2Thanks for the reply. How should I test if the wires are connected properly? Should I turn on the computer only when everything is plugged? This PSU has more wires than it is needed, how do I determine how much I need? – user3757605Dec 12, 2014 at 14:28My computer specifications:Motherboard: MB H77 S1155 MATX GA-Z77-DS3HCPU: i7-3770 3.4 GHz Memory: 2x Kingston Beast 16GB DDR3 1600MHz KHX16C9T3K2/8XVideo card: GIGABYTE GV-N970G1 GAMING-4GD GeForce GTX 970 4GB Hard drive: Samsung 500GB ST500DM005 SATA Optical drive: Samsung SH-224BB/BEBE – user3757605Dec 12, 2014 at 14:29Add a comment | 
Access another subnet beside wan through router
routing;router;routing;router
Access another subnet beside wan through router Ask Question
0 The key word here is VLANs; both the switch and router need to support 802.1Q. That way you divide your network to smaller segments. Traffic between the segments is possible only through a router. You need three VLANs, one for the PC, one for the server and one for the Internet.On the router:VLAN 1 for PCIP address in range 192.168.1.0/24port connecting to the PC an untagged member of this VLAN (access port)VLAN 2 for the serverIP address in range 192.168.10.0/24 port connecting to the switch a tagged member of this VLAN (trunk port)VLAN 3 for the InternetIP address in range 10.2.2.0/26port connecting to the switch a tagged member of this VLAN (trunk port)On the switch:VLAN 2 for the serverport connecting to the server an untagged member of this VLAN port connecting to the router a tagged member of this VLAN VLAN 3 for the Internetport connecting to the Internet an untagged member of this VLAN port connecting to the switch a tagged member of this VLANIf the router supports 802.1Q, it should be able to route between directly connected VLANs without configuring static routes. By default a port on the network device can only carry traffic of one VLAN. Tagging is necessary to allow the port to allow traffic from multiple VLANs. VLAN configuration needs to match on the opposing sides of the link - untagged to untagged, tagged to tagged. A regular PC NIC does not support 802.1Q, hence the edge ports are left untagged.To get the traffic flowing you need to use the router's IP interfaces as default gateways for the server and the PC. The router's default route should point to the Internet. The switch does need IP addresses unless you want to configure them to test connectivity. Router on the other hand must have them on each network - routing between two networks isn't possible if the router does not have an IP interface on both. This is a bit unusual way to connect the devices. More common is to connect the Internet directly to the router:PC ------ SWITCH ------ ROUTER ------ INTERNET |SERVER ------'On the switch:VLAN 1 for the PCport connecting to the PC an untagged member of this VLANport connecting to the router a tagged member of this VLANVLAN 2 for the serverport connecting to the server an untagged member of this VLANport connecting to the router a tagged member of this VLANOn the router:port connecting to the Internet an untagged member of VLAN 3port connecting to the switch a tagged member of VLANs 1 and 2IP addressing as aboveShareImprove this answer Follow answered Dec 12, 2014 at 14:49 ArimoArimo2Thanks for the detailed answer. But can't we do something simpler ? I can't use managed switch here because of cost. Actually I want to run openmeetings on the server and connect other computers to this switch so that they both have access to internet ( different public ip given by isp) and also can video conference with each other. – ArkaDec 13, 2014 at 13:42Not really. While you can run 2 subnets on one LAN, but it doesn't make really any sense. One VLAN / subnet is the recommended standard practice. That does require a managed switch, but it doesn't need to break the bank - you can get a gigabit 8-port "smart managed" switch for ~$100 nowadays. "Smart managed" switches have web based configuration, and some capabilities available in fully managed devices are missing, but I think that'd fit your needs. But if you do want to run everything on same flat L2 LAN, why don't you just give the server an IP address in 192.168.1.0 -range? – Peregrino69Dec 13, 2014 at 15:50Add a comment | 
Mouse pointer in Android-x86 inside Oracle Virtual Box
virtualbox;mouse;android;android-x86;virtualbox;mouse;android;android-x86
Mouse pointer in Android-x86 inside Oracle Virtual Box Ask Question
12 You can do the following:Make sure the VM is powered offClick on the VM nameSettings > System > MotherboardChange Pointing Device to PS/2 MouseShareImprove this answer Follow edited Sep 25, 2017 at 16:59Glorfindel4,05988 gold badges2323 silver badges3737 bronze badges answered Sep 25, 2017 at 14:58Sohel AhmedSohel Ahmed13111 silver badge33 bronze badges11worked like a charm for me – JoSSteJul 2, 2018 at 20:41Add a comment | ; 11 Yes, it is possible to see normal mouse operation... by turning off the Mouse Integration option as you alluded to. And:"In VirtualBox 5.1.22, the Mouse Integration option is in the Input menu."On Virtual Box for Mac, there is an Input menu when the virtual box is running:On other platforms, I imagine it would be in the equivalent to a menu bar that you have in that platform. If you tell what platform you are running virtualbox on, perhaps I could help with that.ShareImprove this answer Follow edited Sep 5, 2017 at 9:57mtak16.1k22 gold badges5151 silver badges6262 bronze badges answered Sep 5, 2017 at 9:47meelashmeelash21922 silver badges55 bronze badges3If you have comments about how moderation is handled, please check in on Meta Super User – mtakSep 5, 2017 at 9:58"If you tell what platform you are running virtualbox on, perhaps I could help with that." - The author's screenshot is the Windows version of VirtualBox – RamhoundSep 25, 2017 at 16:01The screenshot was added after I answered the question. – meelashMay 23, 2018 at 11:19Add a comment | ; 0 You can use Machine->Disable Mouse integration or Host + IShareImprove this answer Follow answered Mar 4, 2017 at 15:43Tiebe GroosmanTiebe Groosman2133 bronze badges0Add a comment | 
Connecting to PCIe 3G modem as Serial device through COM port in Windows 8.1 on Dell E7440
wireless-networking;windows-8.1;modem;3g;wwan;wireless-networking;windows-8.1;modem;3g;wwan
Connecting to PCIe 3G modem as Serial device through COM port in Windows 8.1 on Dell E7440 Ask Question
1 +50 The Sierra Wireless MC8805 doesn't have a COM port. Refer to their specifications listed under "UART" interface.ShareImprove this answer Follow answered Dec 18, 2014 at 0:29JasonJason7,35544 gold badges2727 silver badges4242 bronze badges3Dang it. If I bought one of the modules that lists a UART (i.e. MC9090 or MC809x or MC5728V would I be able to access the COM port though the UART? – ChrisDec 18, 2014 at 0:341@Chris It would at least be possible. It might depend on the particular driver/firmware being used. – JasonDec 18, 2014 at 0:35It seems I'll struggle to get hold of those models. Your answer is correct and I'll accept it. Do you have any suggestions of Mini PCIe modems available that have an accessible COM port? – ChrisDec 18, 2014 at 0:40Add a comment | ; 1 I have some experience with Sierra Wireless MC7710 (connecting it to Mikrotik Router). It not have physical UART, but driver give to OS 5 serial interfaces in Linux . But Windows 8.x use for Qualicomm modems special native mode QMI (Qualcomm MSM Interface), where all configuration done over driver API (or maybe over IP)https://stackoverflow.com/questions/25411383/how-to-send-qmi-api-request-to-the-device-like-sierra-wireless-card-by-cShareImprove this answer Follow edited May 23, 2017 at 12:41CommunityBot1 answered Dec 24, 2014 at 15:36Mikhail MoskalevMikhail Moskalev1,9681515 silver badges1313 bronze badgesAdd a comment | 
Automate alignment of columns in CSV
microsoft-excel;csv;microsoft-excel;csv
Automate alignment of columns in CSV Ask Question
0 You can export it as a PRN file, but you can not keep the comma as a delimiter. The delimiter will be the spaces.ShareImprove this answer Follow answered Dec 12, 2014 at 19:47SunSun6,11299 gold badges3333 silver badges5353 bronze badgesAdd a comment | 
What does %Path% mean at the end of PATH?
windows;windows-xp;command-line;path;windows;windows-xp;command-line;path
What does %Path% mean at the end of PATH? Ask Question
4 That looks like a mistake in some other script / batch command where a literal%PATH% was appended to the PATH instead of the contents of the PATHenvironment variable. This would have happened if the PATH wasn’t already setwhen the script set the PATH environment variable. If an environment variableisn’t actually set, %PATH% expands to a literal %PATH%.Unset the PATH environment variable:C:\>set PATH=See what %PATH% expands to:C:\>echo %PATH%%PATH%Attempt to prepend a directory to the current PATH (which isn't actually set):C:\>set PATH=C:\Perl;%PATH%C:\>echo %PATH%C:\Perl;%PATH%ShareImprove this answer Follow edited Dec 12, 2014 at 16:46 answered Dec 12, 2014 at 14:10Anthony GeogheganAnthony Geoghegan3,6512020 silver badges3838 bronze badges8You write "By the way, there are other entries listed in your path that don’t look valid for MS Windows." <-- can you expand on that? – barlopDec 12, 2014 at 14:34@barlop Tomas has since edited his question to remove ... as one of the directories in his PATH. C:\dwimperl \c\bin; (with space in directory name) also didn't look right given that C:\dwimperl\perl\bin and C:\dwimperl\perl\site\bin (without space) have already been listed. – Anthony GeogheganDec 12, 2014 at 14:51better to have quoted what you meant, because even if he hadn't edited his question, it's still a hassle to have to scroll up and look at his question to see what you might've been referring to. And it has the further advantage that it doesn't become clear if he edits it out of his question. (though he should've used strikethrough). – barlopDec 12, 2014 at 15:11Thanks Anthony! This looks like an explanation! I removed the confusing ... part from my answer. – TomasDec 12, 2014 at 15:221It won't do any harm. It just means that running a command from the command line will take an extra few micro-seconds for the command interpreter to determine that the %Path% directory (probably ) doesn't exist. -- I say "probably" because the percentage sign is a valid character for a Windows file / directory name. – Anthony GeogheganDec 15, 2014 at 10:07 | Show 3 more comments
Reorder email accounts in Thunderbird
thunderbird;email-client;thunderbird;email-client
Reorder email accounts in Thunderbird Ask Question
9 You can use add-on Manually sort folders 1.1.EDIT: Now the link is: Manually sort folders 2.1.1 (TB ver 68+).2nd EDIT: Since few last versions of TB, currently 91.5.0, you can order account in Account Settings by dragging the account you wish to move.Share Follow edited Jan 22, 2022 at 13:12 answered Jun 5, 2014 at 23:42pbiespbies2,56122 gold badges2020 silver badges2323 bronze badges4Thanks, you have to restart Thunderbird after sorting again, but that works fine – rubo77Jun 5, 2014 at 23:[email protected]: which version of Thunderbird did you test? I'm running version 68.10 and added the add-on via Tools - Add-ons - Search for "sort folders" and installed "Manually sort folders" to Thunderbird. After install I selected Tools - Manually sort folders and followed to UI. – Mikko RantalainenOct 9, 2020 at 10:02Thunderbird 78.10.0 (64-bit) definitely use Add-On Manager, via the Tools Menu – Andrew DobsonApr 30, 2021 at 17:22For today the current version is 2.0.6. – pbiesMay 6, 2021 at 16:09Add a comment | ; 24 To do this without a plugin:Close ThunderbirdBackup your profile directory (and most especially prefs.js)Using the built-in config editor (or editing prefs.js directly), find the mail.accountmanager.accounts preference, and change the sequence of the comma-separated account references in it.Find mail.accountmanager.defaultaccount and change it, if necessary, to be equal to the account you want to come first.For example, if the value of accounts is account4,account5,account12, reflecting a well-worn profile, and you want the third account to be first, change it to account12,account4,account5. Then change defaultaccount from account4 to account12.If you aren't sure which account is which, figure out which server configuration is right by looking for mail.server.serverN.name, mail.server.serverN.realhostname, and/or mail.server.serverN.userName (where N are different numbers), and then find mail.account.accountM.server set to the correct serverN.Inspiration for this answer came from Thunderbird/Change account orderShare Follow edited Jul 28, 2019 at 20:18 answered Jan 15, 2017 at 21:54neirbowjneirbowj55411 gold badge44 silver badges1111 bronze badges42It's the best answer since the add-on mentioned above is not compatible with the last version of Thunderbird. It's also possible to do this via the Configuration editor as described there: ghacks.net/2015/06/16/… – laurentApr 26, 2017 at 17:252This seems to not work anymore. Nothing happens when you edit this setting. – phil294Jul 28, 2019 at 10:513Can confirm this works with TB 68. @phil294, make sure you're doing the mapping between server and account numbers, and using account numbers for the mail.accountmanager.accounts pref. – Greg BellMar 25, 2020 at 1:42@phil294 : you need to do it while Thunderbird is not running. Otherwise, it will overwrite your changes to prefs.js when exiting. – mivkFeb 5, 2022 at 21:49Add a comment | ; 6 Since Thunderbird 91, there is an even simpler way without addons and hacks:Right-click any account and select 'Settings' from context menuDrag&drop accounts in the list to the leftDone!Share Follow edited Oct 28, 2021 at 14:03 answered Oct 24, 2021 at 17:55CodeguardCodeguard92311 gold badge88 silver badges1111 bronze badges3How exactly this does not work for you? Which step fails and how? – CodeguardOct 26, 2021 at 12:56Right, this seems to be a feature of Thunderbird 91. I have updated the answer. – CodeguardOct 28, 2021 at 14:02It seems to be possible to install directly from thunderbird.net instead of using a slightly outdated Ubuntu package. – CodeguardOct 28, 2021 at 14:04Add a comment | 
FFMPEG DirectShow: Could not run filter
ffmpeg;webcam;directshow;ffdshow;ffmpeg;webcam;directshow;ffdshow
FFMPEG DirectShow: Could not run filter Ask Question
How to get a text list of files names in a folder in windows
windows-7;file-extension;windows-7;file-extension
How to get a text list of files names in a folder in windows Ask Question
3 From a command prompt window, CD into the directory in question and then typedir /b > c:\<folder of your choice>\files.txtThat will dump the directory listing to a file instead of showing it on the screen.The /b lists only the file names and none of the date/time stamps, sizes, and other junk you're not interested in.Share Follow answered Jun 5, 2014 at 22:46Wes SayeedWes Sayeed13.5k55 gold badges3939 silver badges7474 bronze badgesAdd a comment | ; 0 In Windows Explorer you can set the View to Details.But to see the file extensions you need to make a a change to some settings.If your using Windows 8 > open File Explorer and click on View and then tick File extensions.If your using Windows 7 > open Windows Explorer > View > Folder Options > View and tic show file extensions.Then when in the Details view showing all the columns, tick in the Name heading and the files will be sorted according to name.If you want to print this, use the Dos command as stated in the previous answer.Share Follow answered Jun 5, 2014 at 23:02askbill49askbill491Add a comment | 
Deleting Google Chrome address bar suggestion [duplicate]
windows-7;google-chrome;windows-7;google-chrome
Deleting Google Chrome address bar suggestion [duplicate] Ask Question
0 If you have ever visited the site before, the following will help get rid of the suggestion.Download and install SQLite Browser if you don't already have it.(the portableApps version will do.)Copy my instructions somewhere and close Chrome. (this won't work with chrome open.)Navigate to %LOCALAPPDATA%\Google\Chrome\User Data\Default and open the Shortcuts file in the sqlite browser that you just downloadedUnder the Browse Data tab, select omno_box_shortcuts from the Table: dropdown.Under the 'contents' column, in the Filter box, type www.sport.ro and delete the row the shows up below.That should do it. Open Chrome and let me know how it goesShare Follow answered Jun 6, 2014 at 10:41ShazviShazvi1,25099 silver badges1313 bronze badgesAdd a comment | 
What is the hexadecimal system?
terminology;hexadecimal;terminology;hexadecimal
What is the hexadecimal system? Ask Question
31 Hexadecimal is a number system that is very common in computing. You may have heard of binary before, which only has 1s and 0s.Humans mostly use the decimal (base 10) system, in which we have 10 numerals:0, 1, 2, 3, 4, 5, 6, 7, 8 and 9Though, computers don't operate using decimal system. They have a binary state (something is either true or false) and therefore operates in base 2 (binary numbers are usually prefixed 0b) with the only numerals being 0 and 1.In earlier days, octal (or base 8) was used. It was good because "10" in base 8 was "0b1000" in binary (10 in decimal is 1010 in binary). Octal is usually prefixed "0o" when writing numbers (but is prefixed just '0' in most programming languages). It's called base 8 because we have eight numerals.Octal is still being used today, mostly when setting permissions in Unix and LinuxAs time went on, we needed an easier way to represent larger numbers, as computing power and space was rapidly increasing. It became the standard to use hexadecimal, or base 16, because 16, like 8 is a power of 2, which makes it easy to do digit-by-digit conversion (see this comment.Because there are 16 numerals, letters were used for the other numerals. Also, hex is usually prefixed with 0x.Hex numbers are also useful as since a hex number is 4 bits (1 octal number can represent 2), and therefore two numbers in a byte. In most hex editors, this is how a byte is represented.CountingIn base 10, we have 10 numerals. After 9, what do we do? We're out of numerals. We create a "tens" place to the left of original number, have that be 1 and the rightmost becomes 0. Same thing happens in hexadecimal as well:0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F, 10, 11, etcUntil we get to 0x1F, and then the process repeats up until 0xFF (255 in decimal) and then we get 0x100. More information about counting can be found here.Here is a chart showing conversions between decimal, hexadecimal, octal, and binary:Share Follow edited Apr 3, 2017 at 0:00Stephen Rauch2,9911010 gold badges2323 silver badges2626 bronze badges answered Jun 5, 2014 at 22:21Justine KrejchaJustine Krejcha2,15722 gold badges1616 silver badges2727 bronze badges1421The main benefit is that, because 16 is a power of 2, you can do digit-by-digit conversions. – TRiGJun 5, 2014 at 22:242Note that many languages use the 0 prefix and not 0o for Octal numbers. – ysapJun 5, 2014 at 22:302Your note about 16 being a multiple of 2 is incorrectly copied from TRiG's comment. Being a multiple is not the relevant relation. – Ryan ReichJun 6, 2014 at 4:272@justcool393, may be worth mentioning that the name for what you call "base 10" is actually "decimal." This may help make clear the relationship between base 8 (octal), base 10 (decimal) and base 16 (hexadecimal). – HalosGhostJun 6, 2014 at 4:403Arrrg. Every base is base 10! stale.soup.io/post/114652207/every-base-is-base-10 – woliveirajrJun 6, 2014 at 18:43 | Show 9 more comments; 4 What is the hexadecimal systemThe hexadecimal system is the base-16 numbering system that uses 16 digits (0123456789ABCDEF), as opposed to binary which uses 2 (01), or decimal which uses 10 (0-9). Since there are only 10 numeral digits (in our system), letters from A to F are used to describe "digit #10," "digit #11," etc. instead.why is it used so much in computing16 is a power of 2, which makes it easy to convert hexadecimal numbers to binary numbers, and as you noted, "computers use 0s and 1s to store data." Since each digit stores exactly 4 bits of data, a hexadecimal digit can be converted into 4 binary digits (1 bit) very easily, and vice versa.| hex bin | hex bin || 0 0000 | 8 1000 || 1 0001 | 9 1001 || 2 0010 | A 1010 || 3 0011 | B 1011 || 4 0100 | C 1100 || 5 0101 | D 1101 || 6 0110 | E 1110 || 7 0111 | F 1111 |how come we use hexadecimalIt makes it easier than binary to represent large numbers. Just two hexadecimal digits can represent 256 different values, as in:dec 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ...hex 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F 10 11 12 13 14 15 16 17 ...Four hex digits can represent 65536 values, and so on. Hex makes it much easier to inspect data with something called a hexdump, as letters, numbers, and punctuation are stored in a format that maps each character to a number between 0 and 256 (called ASCII, or sometimes using other encodings). Furthermore, many other file formats (like PNG) are tailored so that each piece of information that the file is made up of contains 256 bits.In summary, 16 is a power of 2 and 256 is a power of 16. This makes it a nice way to represent both binary numbers and text or other data.Share Follow answered Jun 6, 2014 at 16:37DoorknobDoorknob75711 gold badge88 silver badges2121 bronze badgesAdd a comment | ; 2 What is the hexadecimal system?If you have a number abcd then in this is equivalent to ((a* + b) + c) + d. So this is like:abcd(binary) = ((a*2 + b)*2 + c)*2 + dabcd(octal) = ((a*8 + b)*8 + c)*8 + dabcd(decimal) = ((a*10 + b)*10 + c)*10 + dabcd(hexadecimal) = ((a*16 + b)*16 + c)*16 + dIn a hexadecimal system you need 16 digits, but we have only ten digits available (0..9). So for the missing 6 digits the characters A..F are used with A=10, ..., F=15.Of course you could also think about many other number systems, for example with base of 5 or 7.For calculation with numbers it does not matter which base you are using. You can add and multiply in the binary system, you can do it in the decimal system and you can do it in the hexadecimal system. We are used to calculate in the decimal system, computers do it in the binary system.Why is the hexadecimal system used so much in computing?As said above it does not matter in which number system you give a number. The underlying number is the same, only the representation changes. The computer will internally always store and use (e.g. calculate with) numbers in binary.So why do programmers (like me) use different number systems? There are two reasons to choose a number system based on a power of 2. First is shortness and the second is a good view of which bits are set.ShortnessIf I have a function that is writing the content of a buffer to the console then I could write code that prints in decimal, which is 1 to 3 digits (decimal: 0..255). If I am writing the number in binary format then I would end up with output of 1 to 8 digits (binary: 0..11111111). I could also use octal system and end up with 1 to 3 digits (octal: 0..377) or hexadecimal with 1 to 2 digits (hexadecimal: 0..ff).This was for one byte only. Let's now assume you want to write a 32 bit number:binary: 0..11111111111111111111111111111111octal: 0..37777777777decimal: 4294967295hexadecimal: 0..ffffffffAs you can see the hexadecimal output is the shortest.Seeing the bitsA common pattern to store information packed is to use each bit in a byte individually. Let's take for example file attributes (see MDSN). You want the attributes "hidden", "archive", "readonly", "temporary" and others. You could store each attribute in one byte or you could pack the information into one byte (or multiple bytes) where each bit represents exactly one attribute. If you look at the dwFlagsAndAttributes in the MSDN article you can see that Windows is using this pattern.Staying at the MSDN page let's take FILE_ATTRIBUTE_ENCRYPTED as an example, this flag is decimal 16384 and hexadecimal 0x4000. The leading "0x" is just a C programmer's convention to mark hexadecimal numbers, so we'll just look at 4000. When you want to know which bits are set, then you'll need to convert 16384 to binary first - nothing you could normally do with mental arithmetic. But let's take hexadecimal 4000. This is quite easy. 16 is 2 * 4, so every hexadecimal number is exactly 4 bits. Therefor we just convert 4 to binary 0100 and the zeroes to binary 0000 and we are done.Often it is not about individual bits but programmers tend to align things to powers of 2. We like to load programs not to a random address but to an address with the 16 least significant bits set to zero. That way if you have an address 0x12345678 you can easily see that this address belongs to the program loaded to 0x1234 and not to the one loaded to 0x03810000.Prefer binary, octal or hexadecimal?That is a question of flavor. If you directly want to see the bits binary might be fine. For long numbers binary might be frustrating if you have to count the digits to see if bit 23 or bit 24 is set. This is easier with hexadecimal because each digit represents 4 bits, so you have less counting involved. Personally I seldom use octal. It is very uncommon.But why not use base 32?Base 32 is a power of 2, this is great. But you would need 32 digits like 0..9, A..V. This is much more digits to remember (can you easily spot which number 'S' would respond to?). Another caveat is that with base 32 you loose the nice feature that two hexadecimal digits are exactly one byte, which comes in really handy if you take a look at memory contents! Also with base 32 you still need 2 digits to represent the values one byte can have. For a 32 bit value you only need 7 digits instead of 8 hexadecimal digits, but that is not so much to live with the disadvantages of the base 32 system.Share Follow answered Jun 11, 2014 at 9:52Werner HenzeWerner Henze4,78933 gold badges1717 silver badges3333 bronze badgesAdd a comment | ; 1 Different number representation systems in use today are (=include):binary, octal, decimal and hexadecimal.Which one to chose is often dependent on ease of use for the task at hand. binary is used within computer systems and digital technology in general, as it is easy to represent within electronics; functions for base-2 numbers are easy to build, as is representation of on/off, true/false, or any other similar repeating two-state information. octal is nice to have if there are groups of three binary digits, e.g. as is the case in permission settings in Unix/Linux.skipping decimal for a moment, hexadecimal is nice in the same manner as octal but for four binary digits, and the fact that 8 bits, one byte, fits nicely into two hexadecimal digits. (= the answer)Of this follows that the even-8-bit-groups in a computer is easily written down, represented and understood - that is; very convenient in daily use when writing software, handling data (e.g. rgb color values in HTML/CSS), forming data structures and anything else similar.decimal. One could guess that the decimal system developed from the fact that we have ten fingers and toes. A single digit represent the number of items counted, one for each finger up to the maximum ten.These represent number systems with a base of:2, 8, 10 and 16.Generally the base tells how many single digit "items" you may count, e.g. binary has two, decimal has ten.As hexadecimal has 16 single digit items, the system requires 16 "numbers", therefore using 0-9 and a-f (6 extra, compared to decimal), where "a" equals 10 and "f" equals 15 in the decimal system. To continue with general mode: any base 2 or higher works as well as anything else, as long as you have a nice single digit representation. Numbers in decimal is formed by: ... d*10³ + c*10² + b*10¹ + a*10⁰for a decimal number "dcba" - with d,c,b,a, picked from 0123456789 Now change that to: ... d*base³ + c*base² + b*base¹ + a*base⁰and you have a more general form that shows how any base 2 or higher "works";e.g. a five digit, base 5 could be just as convenient as any of the others above, or why not a 12 digit (one dozen) system for time (12 hours ="10" base 12, with the first "decimal" telling which 1/12th [5 minutes] of an hour it is)Note: ⁰¹²³ - superscript 0123 if your screen shows something elseShare Follow edited Jul 30, 2019 at 17:59 answered Jul 28, 2019 at 7:59HannuHannu8,30833 gold badges1919 silver badges3737 bronze badges1Currently this might be a 'stub' of what it actually can become. – HannuJul 28, 2019 at 7:59Add a comment | 
Refreshing all tabs in FileZilla at once?
windows-7;filezilla;windows-7;filezilla
Refreshing all tabs in FileZilla at once? Ask Question
Make sure command entered is Read Only
bash;security;read-only;bash;security;read-only
Make sure command entered is Read Only Ask Question
2 I don't think that this is possible. You could make sure that anything written to stdout or stderr, for example, gets redirected to /dev/null. However, if the utility wants to write to a file, there's no way that you can prevent or even know that.Standard security practice is to never run untrusted programs with root privileges.Share Follow answered Jun 5, 2014 at 21:35savantosavanto49922 silver badges1010 bronze badgesAdd a comment | ; 2 I don't think there is any way to, in the general case, ensure that a random program will not write anything anywhere. You are looking at something akin to solving the halting problem, with a twist (stdout and stderr are exposed as file handles, too).You could however create a small library that overrides the relevant handful of standard library calls, like creat(2), open(2), write(2) and some others, to not persist anything on disk. This would likely be something similar to libfaketime, and should be reasonably doable. It would be portable to any application through the LD_PRELOAD library preload mechanism of the dynamic loader.However, that would almost certainly not be a full solution. Especially a process that runs as root could quite easily override any of that, if it knows to expect it and wants to do evil. For one thing, it depends on any such calls going through the common interfaces like the C library, which is not guaranteed; a process could just as easily copy the C library code directly into its own code. It could make direct calls to the kernel's syscall interfaces. The C library isn't some magical thing; it's userspace code like any other. And the binary could be statically linked, in which case the dynamic loader won't be invoked at all. It's probably possible to work around these limitations and prevent writes, but...Making write(2) and friends no-ops is also very likely to break things at some other end, when the process expects a file it wrote into to hold the data that was written.And what if it doesn't really write anything, but simply reads a couple of security-critical configuration files (/etc/crypttab, /etc/shadow, /etc/bind/rndc.key, ... you get the idea) and passes that data somewhere else; over the network, perhaps, or dumps it so that it becomes accessible through a side-channel attack?I'd go one step further than savanto. Standard security practice should be to not run untrusted software, period. And you most definitely should not run untrusted software as root. For anything that runs as root, you can put a couple of roadblocks in the way, but you cannot guarantee that it won't do whatever at all it wants to do. SELinux can help, and probably goes quite a long way when used correctly, but is a beast to configure and it will likely make any policy violations lead to the call in question failing with an error condition and possibly a hard process abort, so it won't be graceful at all.The closest to what you seem to want to do that I can think of, which will work in the general case, would be an isolated virtual machine with the capability of rolling back modifications made to the disk (usually referred to as snapshot rollback capability). That however will be far from seamless, and will come at a large overhead since you are for all intents and purposes running a second operating system instance, with all of what that means.Share Follow edited Apr 13, 2017 at 12:37CommunityBot1 answered Jun 5, 2014 at 22:09useruser29.1k1111 gold badges9999 silver badges144144 bronze badgesAdd a comment | ; 0 This is not a direct answer, but I would look for sandbox or virtual machine.Share Follow answered Jun 6, 2014 at 0:33pbiespbies2,56122 gold badges2020 silver badges2323 bronze badgesAdd a comment | 
Autounattend.xml not being recognized in VirtualBox
windows-7;virtualbox;unattended;answerfile;windows-7;virtualbox;unattended;answerfile
Autounattend.xml not being recognized in VirtualBox Ask Question
0 I'm sure this will solve your issue. It is the type of usb that I believe causes the issue as in my experience the older ones never had this issue of the Autounattend.xml not being picked up by the installer. The process integrates the Autounattend.xml into the boot.wim and it is always picked up.The answer can be found here http://social.technet.microsoft.com/Forums/windows/en-US/82410df7-2e70-47c7-a9dc-7dba7c17fbf8/autounattendxml-will-not-load-from-usb-hdd?forum=w7itproinstall in a post by Robbert VennikYou need the following items beforehandWAIKThe USB disk you make into a Windows 7 installation diskA Windows 7 working machine from which you do all the commandsThen do these steps:Mount the boot.wim image located on your USB HDD disk (in this example H: is the USB disk) using ImageX from WAIKimagex /mountrw H:\Sources\boot.wim 2 C:\temp(assumes you have a folder "C:\Temp")(the number 2 stands for Index 2 within the boot.wim image)Fire up your Windows Explorer and navigate to C:\Temp. Tadaa you will see your boot.wim image mounted and all. Drop your "autounattend.xml" file you created directly into this folder (right next the the Setup.exe file)Close Windows Explorer and unmount the image:imagex /unmount /commit c:\tempRemember to the unattend.xml or autounattend.xml from the root of the HDD!Share Follow edited Jun 6, 2014 at 4:08Jason Aller2,29066 gold badges2323 silver badges2121 bronze badges answered Jun 6, 2014 at 2:46bigblokebigbloke163Belated thanks for the response. I'm still struggling a bit, but definitely making progress thanks to your assistance! – beagleJun 6, 2014 at 17:40By following the steps it definitely solved the problem of the Autounattend.xml not being picked up by the installer for me. Maybe if you outlined the issues you are experiencing someone might be able to help you. I was only dealing with a simple file that was just designed to install a single copy on a single machine chose the version of windows and install the oem key so it was easy to do and trouble shoot as it was either picked up and worked or if it didn't I knew it hadn't been picked up. – bigblokeJun 7, 2014 at 1:44Got it sorted in the end, thanks. It took a bit more work to get VirtualBox to install from the USB instead of looking for a DVD but once I managed that your approach did the trick. Much appreciated. – beagleJun 7, 2014 at 7:15Add a comment | ; 1 The issue I had was drivers not loaded. I slipstreamed the drivers into the boot.wim file for USB and for Sata inside the boot.wim file on image 2 (for setup)Share Follow answered Jul 8, 2016 at 14:57TechAdminTechAdmin1111 bronze badge21So After imagex /mountrw H:\Sources\boot.wim 2 C:\temp – TechAdminJul 8, 2016 at 14:59Dism /image:C:\temp /Add-Driver /Driver:"path to driver.inf" – TechAdminJul 8, 2016 at 15:00Add a comment | 
confused about variables in bash
bash;bash
confused about variables in bash Ask Question
3 You should make sure to quote variables that may have spaces in them. In your case, tail is receiving three files: /cygdrive/c/workdir, (newco, and LLC) because $tmpdir has three words separated by spaces.I know you escaped the space when assigning $tmpdir, but that merely served to avoid each word being interpreted as a separate command during assignment. If you then echo $tmpdir, you will get/cygdrive/c/workdir (newco, LLC), and that's what's being passed to tail.To avoid this, quote $tmpdir:tail -n +2 "${tmpdir}/workfile.txt" > "${tmpdir}/workfile2.txt"Share Follow answered Jun 5, 2014 at 20:59savantosavanto49922 silver badges1010 bronze badges2Thanks. What's the difference between "${tmpdir}/workfile.txt" and "$tmpdir/workfile.txt"? – gappyJun 5, 2014 at 21:182Curly braces are used to ensure proper parsing of variable names. If you had a variable called tmp you could do something like ${tmp}dir/workfile.txt to substitute it instead of entire $tmpdir (assuming that one exists too). – gronostajJun 5, 2014 at 21:21Add a comment | ; 0 Type the first line in bash and then echo that variable, this is what you'll see:$ tmpdir=/cygdrive/c/workdir\ \(newco\,\ LLC\)$ echo $tmpdir/cygdrive/c/workdir (newco, LLC)If it's not clear yet what's the culprit, add echo at the beginning of your second line and wrap it in double quotes. You'll see what command is actually executed:$ echo "tail -n +2 $tmpdir/workfile.txt > $tmpdir/workfile2.txt"tail -n +2 /cygdrive/c/workdir (newco, LLC)/workfile.txt > /cygdrive/c/workdir (newco, LLC)/workfile2.txtYou have properly escaped variable assignment, but that's not enough. Bash performs simple substring substitution, thus inserting additional spaces and breaking your command.As @savanto suggested in his answer, you can wrap variables in double quotes to ensure that extra spaces aren't treated as argument separators. This line:tail -n +2 "${tmpdir}/workfile.txt" > "${tmpdir}/workfile2.txt"will look like this after variable substitution:tail -n +2 "/cygdrive/c/workdir (newco, LLC)/workfile.txt" > "/cygdrive/c/workdir (newco, LLC)/workfile2.txt"This is the most common and preferred way of solving that issue. If you desperately want to avoid double quotes, you can try double escaping: first when assigning, then after substitution.$ tmpdir=/cygdrive/c/workdir\\\ \\\(newco\\\,\\\ LLC\\\)$ echo $tmpdir/cygdrive/c/workdir\ \(newco\,\ LLC\)Quick explaination of triple backslashes: a backslash means: "treat next character as a regular character, ignore any special meaning" (i.e. escape it). First backslash is an escape character, so second one will be treated as a backslash character, not escape character. Thus, double backslash produces a single backslash. Third one simply escapes following character, like space or parenthesis. For example a\\\ b will become a\ b.Now if we substitute variables in your command, it will be escaped properly:tail -n +2 /cygdrive/c/workdir\ \(newco\,\ LLC\)/workfile.txt > /cygdrive/c/workdir\ \(newco\,\ LLC\)/workfile2.txtShare Follow answered Jun 5, 2014 at 21:23gronostajgronostaj54.7k1616 gold badges117117 silver badges174174 bronze badgesAdd a comment | 
How can I explode an animated PNG?
windows;png;image-editing;windows;png;image-editing
How can I explode an animated PNG? Ask Question
3 Download APNG Disassembler (for Windows). They have a GUI version and a command line version of the program. I tried the GUI version and it's pretty simple: specify the APNG input file and a prefix for all the output files, and click a button. It will output a PNG file (with the prefix you specified along with a number) representing each frame, along with a TXT file for each frame containing the delay for that frame.Share Follow edited Jun 5, 2014 at 21:57 answered Jun 5, 2014 at 21:33pacoverflowpacoverflow1,77955 gold badges3131 silver badges4949 bronze badgesAdd a comment | 
Removing identical element from all pages of a pdf
pdf;adobe-acrobat;pdf;adobe-acrobat
Removing identical element from all pages of a pdf Ask Question
1 It depends on how the objects are organized inside the PDF.Sometimes for Acrobat XI, you can first try:Tools, Content, Edit Object.Select your objectDelete ItOther times, you may need to do this before you can delete:Tools, Protection, Mark for RedactionMark your text or objects to redactApply RedactionsThen Edit Object, select, and then deleteIn terms of automation, you can attempt to create an Action Wizard to automate some steps. I am not a programmer, so I could never consistently select the objects I needed to delete.So, my hacky solution is to use AutoHotKey and utilize the AutoScriptWriter to create one loop of selecting the object, deleting it, and going to the next page.I'm sure there's a better way to do this, but it works for me.Share Follow answered Sep 13, 2014 at 4:33SunSun6,11299 gold badges3333 silver badges5353 bronze badgesAdd a comment | 
DD-WRT goes to Web GUI on port 80
networking;wireless-networking;router;port-forwarding;dd-wrt;networking;wireless-networking;router;port-forwarding;dd-wrt
DD-WRT goes to Web GUI on port 80 Ask Question
2 Most likely, you you need to uncheck Security -> Firewall -> Filter WAN NAT Redirection.Share Follow answered Sep 13, 2014 at 5:52MariusMatutiaeMariusMatutiae46.4k1111 gold badges7979 silver badges128128 bronze badges1It is unchecked and the firewall is disabled anyway. It's worth mentioning that port 80 is the only one that doesn't behave. Minecraft and SSH seem to work. 80 always goes to the info page. – Osmium USASep 13, 2014 at 11:59Add a comment | ; 0 This thread is old, but there is a software solution which still applies to older builds of DD-WRT. I had the same problem and found the answer here.The command is:iptables -t nat -A POSTROUTING -j MASQUERADESimilar commands are listed here.Share Follow answered Jan 18, 2016 at 22:28nedned111Although this may answer the question, you should give a more detailed description of the linked content and explain how it relates to the question. This will help ensure that this answer remains useful in the event the linked page is removed or goes offline. For more information, see this Meta Stack Exchange post. – bwDracoJan 18, 2016 at 22:45Add a comment | 
Remote user password does not work for SSH
macos;ssh;osx-mavericks;macos;ssh;osx-mavericks
Remote user password does not work for SSH Ask Question
2 After updating to Catalina, I had a similar problem. The reason was in the strict rules of the sshd set by default.To solve it, in the config file /private/etc/ssh/sshd_configAdd the following strings:PasswordAuthentication yesChallengeResponseAuthentication yesUsePAM yesThen do not forget to reload the sshd server:sudo launchctl unload /System/Library/LaunchDaemons/ssh.plistsudo launchctl load -w /System/Library/LaunchDaemons/ssh.plistUsePAM. Enables the Pluggable Authentication Module interface. If set to “yes” this will enable PAM authentication using ChallengeResponseAuthentication and PasswordAuthentication.That is a powerful framework for managing the authentication of users. Using PAM you can enforce rules during the authentication (i.e. limiting access based on login count).Share Follow answered Jan 16, 2021 at 18:11Constantine KurbatovConstantine Kurbatov12155 bronze badgesAdd a comment | ; 1 Have you tried logging in with an administrator account?Have you tried enabling the root user?Steps to enable root user:Open Users & Groups preferences, click Login Options, then click the lock icon to unlock it. If necessary, type your password, then click Unlock.In the Network Account Server section, click Join or Edit.Click Open Directory Utility.Click the lock icon to unlock it, then enter your administrator name and password.Do one of the following:Choose Edit > Enable Root User, then enter a root user password in the Password and Verify fields.Choose Edit > Disable Root User.Choose Edit > Change Root Password, then enter a new root user password.Share Follow answered Sep 13, 2014 at 5:50TimDTimD18377 bronze badges3Why do you suggest to enable the root account just to enable the connection via SSH? In many Linux distributions the remote root access (via SSH) is disabled by default (because risky, you can always connect as normal user and do su - after the login). – HasturSep 13, 2014 at 11:05@Hastur Yes you're right but it would help to know if there is a problem connecting or a problem with the user connecting. – TimDSep 14, 2014 at 2:42Right point. In that case, since is needed to have root access, it's better to create a new (fresh, ordirary) account on the server just for this purpose, and delete it after. BTW the ssh program itself can help if invoked with -v tags, -vv -vvv without root privileges and without holes to fix in the security. It can happens that when you are so happy because you fix your problem, it becomes heavy(boring) to fix all the modification you have done before... – HasturSep 14, 2014 at 7:32Add a comment | ; 0 Logging in as root is not a good solution for several reasons.I had this problem, too, when trying to ssh from a Debian 10 box to a mac. As a workaround, I added a key to .ssh/authorized_keys on my mac manually (i.e. not using ssh, chicken and egg problem). Then it worked.Share Follow edited Mar 7, 2020 at 22:20zx4852,1701111 gold badges1616 silver badges2323 bronze badges answered Mar 7, 2020 at 19:56user1310789user13107891Add a comment | 
Can't get HTTP connection to Amazon Web Services EC2 Windows Server 2012 Instance
networking;apache-http-server;http;xampp;amazon-web-services;networking;apache-http-server;http;xampp;amazon-web-services
Can't get HTTP connection to Amazon Web Services EC2 Windows Server 2012 Instance Ask Question
0 Sounds like Apache may be configured to only accept connections from the local host. Have you tried accessing the website from the hosting server via the public address? Also, for testings sake, I would probably put the 0.0.0.0/0 rule back into place until you figure out the issue. Simplicity!Share Follow answered Sep 13, 2014 at 5:25Spencer5051Spencer505132111 silver badge55 bronze badges4Hi Spencer, thanks for your response. I have changed the http rule to allow connections from anywhere, as you suggested, for testing. Anyway, from within the instance, I am able to connect via the public dns as well. But from outside, still not able to connect. – user2606742Sep 13, 2014 at 20:06Just an update, I also posted on aws forums, and was suggested to check if the instance is running a firewall, which it is, so I turned it off. But I still cant connect from outside. Also, I ran netstat -anp tcp | find ":80" and got this output, so it seems it is listening: C:\Users\Administrator>netstat -anp tcp | find ":80" TCP 0.0.0.0:80 0.0.0.0:0 LISTENING TCP 172.31.34.244:49397 199.193.196.18:80 CLOSE_WAIT TCP 172.31.34.244:50988 169.254.169.254:80CLOSE_WAIT – user2606742Sep 13, 2014 at 20:19aha, I had only turned off the firewall for the domain profile, not for the public profile. Now it works! – user2606742Sep 13, 2014 at 20:261Just for completeness, I now turned the firewall back on, but created a rule to allow communication via port 80 for http and another port for my BOSH service. – user2606742Sep 13, 2014 at 20:32Add a comment | ; 0 Create a second instance on the same subnet and on the same security group and see if you can access the http server. If so that points to security group or ACL issues. If not, thenCheck if the http server accepts connections on 0.0.0.0/0 or only 127.0.0.1 (localhost). One allows it to accept only local connections while other allows it to accept incoming connections.Share Follow answered Jun 24, 2017 at 2:40PerennialPerennial22122 silver badges55 bronze badgesAdd a comment | 
How do I know if my Postgres table is clustered?
postgresql;postgresql
How do I know if my Postgres table is clustered? Ask Question
4 You can query all the clustered tables from the data dictionary:SELECT relname AS table_nameFROM pg_class cJOIN pg_index i ON i.indrelid = c.oidWHERE relkind = 'r' AND relhasindex AND i.indisclusteredShare Follow answered Sep 26, 2014 at 14:58MureinikMureinik3,9341111 gold badges2727 silver badges3131 bronze badges41This doesn't seem to include primary keys that are clustered? – jontejjFeb 24, 2015 at 9:241And it doesn't say which index was used for the clustering, is there a way to add that? – chrismarxMar 29, 2017 at 15:01As best I can tell this answer is very wrong in the context of the question. It only queries what indexes are used for clustering - it gives no information on when or even if such clustering was performed. The better answer is to look at stats as given in: stackoverflow.com/questions/53299733/… – Alex StoddardMay 7, 2020 at 15:16Based on the comments, which I have not verified, it seems this answer does not apply to all situations. So I removed the answer mark. – David S.May 7, 2020 at 23:25Add a comment | ; 1 The accepted answer appears to be incorrect. It seems that when (or even if) clustering was performed is not available from the query but stats can be queried to see how good clustering is: https://stackoverflow.com/questions/53299733/how-to-tell-when-a-postgres-table-was-clustered-and-what-indexes-were-usedShare Follow answered May 7, 2020 at 15:22Alex StoddardAlex Stoddard11133 bronze badgesAdd a comment | ; 1 Building off @alex-stoddard's answer and the StackOverflow question he linked, I was able to construct this query, which seems to show all index-table pairs used for clustering:SELECT indisclustered, index_name, cls.relname AS table_nameFROM pg_class cls INNER JOIN ( SELECT indexrelid, indrelid, indisclustered, relname AS index_name FROM pg_index ndx INNER JOIN pg_class cls ON cls.oid=indexrelid WHERE indisclustered='t' ) tmp ON cls.oid=tmp.indrelid;Note that clustering is per-index, not per-column (although indices are often based on columns), but that performance stats are collected by column. If you also want to get some per-column stats, you can try:SELECTtablename,attname,correlation,index_name,indexdefFROM (SELECTindisclustered, index_name, table_name, indexdefFROM (SELECTindisclustered,index_name,cls.relname AS table_nameFROM pg_class cls INNER JOIN ( SELECT indexrelid, indrelid, indisclustered, relname AS index_name FROM pg_index ndx INNER JOIN pg_class cls ON cls.oid=indexrelid WHERE indisclustered='t' ) tmp ON cls.oid=tmp.indrelid) clusteringINNER JOIN pg_indexes indxsON indxs.tablename=clustering.table_name AND indxs.indexname=clustering.index_name) indexesINNER JOINpg_statsON indexes.table_name=pg_stats.tablename AND indexes.indexdef LIKE CONCAT('%', pg_stats.attname, '%');Share Follow edited Apr 26, 2022 at 14:42 answered Apr 26, 2022 at 14:06Sarah MesserSarah Messer11133 bronze badgesAdd a comment | 
Dusting Inside All-In-One computer
cleaning;cleaning
Dusting Inside All-In-One computer Ask Question
3 All-In-One systems such as the HP Pavilion 20 are much like laptops for cleaning, as they are designed to be difficult to take apart, and even attempting to do so can void your warranty. There are no user-friendly side-panels to take off, and removing the machine screws will mean HP will not support the machine for hardware failures.You should still be able to clean it. HP recommends a small battery-powered vacuum to clean out the cooling vents, which are located on the back of the machine around the perimeter of the screen. As your HP Pavilion is so thin, this should be very successful, as long as there is not a significant buildup and are not in a damp, dusty environment.Fans should be held steady to prevent damage to them. If the fans are close to the vents, you can hold them steady with a toothpick in one hand while you vacuum with the other.A can of compressed air could also be used in combination with the vacuum to assist loosening material, but if you do not use it in combination with a small vacuum you run the risk of blowing the dust further inside the machine and clogging it even more.Share Follow answered Sep 13, 2014 at 2:05cathoocathoo65544 silver badges1212 bronze badges1+1 I like answers with references (link to HP recommendations). – KamilSep 13, 2014 at 2:16Add a comment | 
Is there any advantage to using only part of a file in Hide X's library?
linux;file-management;linux;file-management
Is there any advantage to using only part of a file in Hide X's library? Ask Question
8 It's mostly just to give the user freedom of choice, but it can be beneficial under a few circumstances. For exampleif a file is deleted your library will be less dependent on it, if someone try's to steal your data by reconstucting iton a new database they MUST use the same length settings (you can make it even harder for them by throwing in a few filesthat have unique lengths), and it allows you to use files of varying sizes while making sure that each shares the sameweight in the library (in the case of fragmented files with low length settings you could see a performance increase!).Share Follow answered Sep 13, 2014 at 1:49Charlie CountrymanCharlie Countryman8122 bronze badgesAdd a comment | ; 4 There is no benefit to using only part of a file. The option exists, because the authors have a sense of humor. Hide X has loads of silly little useless things added in, for example the corrupt option which can be used to corrupt specified files. :PShare Follow answered Sep 13, 2014 at 1:28cmdEXEcmdEXE4111 bronze badgeAdd a comment | ; 3 To my knowledge there is no benefit to using only part of a file, but there can be a disadvantage. Hide X needsa good variety of data, by using less of a file you'll likely need to use more files in order to meet the minimumamount of different data to build the library. Like you, I use full length +length="1/1".Share Follow answered Sep 13, 2014 at 1:36Robot TalkRobot Talk3111 bronze badgeAdd a comment | ; 3 Not really, it's just a useless option someone added in for fun. The only only advantage would be that if a libraryfile were damaged, or deleted you'd lose less data because Hide X would be less dependant on that file. That's no reasonto use the feature though, as you can achieve the same result by using smaller files.Share Follow answered Sep 13, 2014 at 1:44ILBBAICNLILBBAICNL3111 bronze badgeAdd a comment | ; 3 The length feature is just a junk option. Since anyone can contribute to the project, lots of useless (but interesting) options are added. While it is true that using a smaller length means loss of the file will result in less loss of data this doesn't matter, because if your goal is to not loose data you should be using files that won't be moved/deleted/altered. Out of all the junk options added my favorite is "ignore", which makes Hide X ignore the commandand all the attached options, esentially you just typed everything out for nothing, lolz.Share Follow answered Sep 13, 2014 at 1:55Rainy DayRainy Day3111 bronze badge13The ignore tag is not junk, it was made specifically to protect noob users that copy & paste example codes without altering values (or thinking). – Charlie CountrymanSep 13, 2014 at 2:08Add a comment | 
Reasons to use adaptive and energy saving power plans
energy-saving;energy-saving
Reasons to use adaptive and energy saving power plans Ask Question
1 1. Energy saving. Well, some people have habit to turn on "Maximum performance" profile on every computer they use. No matter if you are average, rich or poor - you can save money.I have energy meter. My old laptop with Core 2 Duo (35W TDP) and Nvidia Quadro GPU (10W TDP) consumes energy worth about 6$/month when I'm using "Maximum performance". On "Adaptive" - it uses 4$/month. I see no difference in performance and I can have free beer every month :) If I had desktop with 70-90W CPU and 60-70W graphics card - I probably could save 5$/month or more and buy pizza :)2. Reducing generated heatCPU and GPU generate heat. Heat amount depends on CPU voltage. When CPU is running on maximum frequency - it uses "normal" voltage. When you use Speed Step on Intel CPU and reduce frequency - CPU can work stable at lower voltage. Lower voltage means less heat.3. Fans wear out fasterBut what if you don't care about heat? You may not care, but when you have maximum performance profile - your fans on CPU and GPU have definetly more work. Bearings wear out faster when they work at faster speeds and higher temperatures.4. Cooling system becomes dirty fasterWhen fans work at higher speeds - dust settles on radiators faster. If you have no air conditioning with air filters - after year or more - your radiator may be really dirty.5. Laptop battery wears out suprisingly fast...if you use maximum performance on battery. If you need to work on battery for only 30 minutes and your battery can run 1h on maximum performance - use energy saving anyway, especially on fast laptops. Reducing discharge current can double your battery life. I mean battery wear out, not discharge time.So, if you always turn on "Maximum performance" on your computer - just try to use "adaptive" or "automatic" power plan and see if you have any performance problems. If not - you can extend your computer life or at least extend time between failures :)Share Follow edited Sep 13, 2014 at 1:40 answered Sep 13, 2014 at 1:31KamilKamil2,61411 gold badge1818 silver badges2828 bronze badgesAdd a comment | 
Helvetica fonts always rendering as bold in Chrome
google-chrome;browser;fonts;google-chrome;browser;fonts
Helvetica fonts always rendering as bold in Chrome Ask Question
4 This is a common problem with browsers on Windows. When sites specify Helvetica as the first font in their CSS "font-family" stanza Windows uses whatever first Helvetica font it can find to render the page.I've often had to fix this in IE for customers and the solution was always to delete all Helvetica fonts, or use another browser if the customer required Helvetica to be installed. Strange it's now also affecting Chrome. I've mostly seen it in IE when Helvetica Compressed is installed and the website text is unreadable due to the kerning of that particular font.If they specify something other than Helvetica (e.g. Arial) as the first font in the font-family stanza there's never any problem with Windows browsers rendering text.Share Follow answered Sep 13, 2014 at 1:56GeoffGeoff5111 bronze badgeAdd a comment | ; 3 Ok, so as I was writing the question I think I stumbled on the fix. In my installed fonts (Start/Run/Fonts), I somehow had Helvetica Black, but not any other version of Helvetica. It seems Chrome was picking the black version making everything look super bold. I certainly didn't manually install Helvetica Black on two computers in the last week, but it's possible that Chrome recently changed how it picks fonts or I used/installed some other software that installed Helvetica Black?To recap, my fix was:Go to your fonts folder (Start/Run/Fonts)Find and delete Helvetica BlackShare Follow answered Sep 13, 2014 at 0:32JerSchneidJerSchneid26011 gold badge22 silver badges88 bronze badgesAdd a comment | ; 3 The problem can be solved by the following two ways:Permanent Solution:I believe you don’t want to delete the font, do you? If no, then this is not of much importance to you. However you if you wish to do so, simply restart your computer in safe mode and delete the font from the Control Panel (See other answer)Temporary Solution:Here we would be modifying the chrome file and hence would solve the purpose.Open your Windows Explorer.Go to — > C:\Users[YourName]\AppData\Local\Google\Chrome\User Data\Default\User StyleSheets\custom.cssNow open the file custom.css. This could be done using a notepad.3b. Chrome stopped supporting this custom user stylesheet, but an addon can provide same functionality: https://chrome.google.com/webstore/detail/stylish/fjnbnpbmkenffdnngjfgmeleoegfcffe?hl=enSimply add the two CSS given below. Your problem is solved! @font-face { font-family: 'helvetica neue'; src: local('Arial'); } @font-face { font-family: 'helvetica neue'; font-weight:bold; src: local('Arial'); } @font-face { font-family: 'helvetica'; src: local('Arial'); } @font-face { font-family: 'helvetica'; font-weight:bold; src: local('Arial'); }The above four lines are a simple code that replaces the fonts Helvetica Neue and Helvetica in the browser with Arial Font. You could repeat this process, or edit, by simply changing the name of the font, and get the font replaced by a local font you prefer.Share Follow edited Jul 28, 2016 at 17:31Burgi6,4061414 gold badges4040 silver badges5252 bronze badges answered Feb 23, 2015 at 16:56kimlivkimliv20511 gold badge33 silver badges99 bronze badges1Thanks for this! Newer versions of Chrome did away with custom stylesheet, so I have updated your answer with a link to Stylish addon which can provide the same functionality. – Patrick MooreJul 28, 2016 at 15:03Add a comment | 
mkfs - The device apparently does not exist; did you specify it correctly?
linux;partitioning;linux;partitioning
mkfs - The device apparently does not exist; did you specify it correctly? Ask Question
7 The kernal does not see the changes as you are partitioning your boot drive...This is because you could have removed the partition that contains your kernel.You need to reboot or run partprobe.Share Follow answered Sep 13, 2014 at 0:35mjz19910mjz1991012311 silver badge88 bronze badges2Yes, after i reboot i get /dev/sda6 is apparently in use by the system; will not make a file system here. Also, i am preparing for RHCSA in which i won't have the opportunity for restart. So i am looking to do it without restarting the system. – linux_rhcsaSep 13, 2014 at 1:27partprobe was all that was needed for me – lfender6445Oct 29, 2017 at 21:19Add a comment | 
Sound, Videos stop playing after computer has been on for a bit
audio;video;audio;video
Sound, Videos stop playing after computer has been on for a bit Ask Question
Simple proof-of-concept stunnel configuration
linux;https;stunnel;linux;https;stunnel
Simple proof-of-concept stunnel configuration Ask Question
4 Problem is with the localhost part. Most servers does not respond if you use localhost as its name.How to resolve this:first, do a nslookup on the server you want to reach and choose one of the multiple IP, i.e. 12.34.56.78 (not a true Google IP, just made it up)Configure your stunnel.conf to point to that IP:connect = 12.34.56.78:443Set on your client's /etc/hosts (I'm assuming it is the same machine as the stunnel, if not, use the correspondig IP) this new line:127.0.0.1 www.google.comUse the URL http://www.google.com:1337NOTE: if you still get errors, try to change the accept from 1337 to 443.ShareImprove this answer Follow answered Aug 10, 2014 at 15:30NuTTyXNuTTyX2,5881010 silver badges1515 bronze badges4Ok, so the host actually gets preserved. Funny that not a single source mentioned anything about this. Doing as you said did indeed help, and I was finally able to get to an https site, so thank you (!!), and I'm accepting the answer. Still, my original purpose is not yet fulfilled. The problem is I only have the IP of the server where the service runs... so I have nothing to put into my hosts file. Is there a way to get away in this situation? – kaqqaoAug 10, 2014 at 21:50Btw, now that I knew what to look for, I found more mentions of this, e.g. comments.gmane.org/gmane.network.stunnel.user/5696 – kaqqaoAug 10, 2014 at 22:06Does https://<ip of the remote site> work from your server? If so, it will be probably work also if you use localhost. Nevertheless, you could guess the name of the server by doing openssl s_client -connect <ip>:443 and searching for the line starting with subject and looking for the name after the CN= (that is the certificate of the remote server). It is very uncommon for a site to have a certificate issued for an IP, so you could still try my suggestion. – NuTTyXAug 10, 2014 at 22:25yeah, host gets preserved. some hosts require that you have the correct IP address and port in the "Host:" http request header sending a redirect if you don't, if you've got that problem you'll need to mess with firewall rules (eg:iptables) to get that to work, or setup s local proxy of some sort. it might be easier to took for a client that does support HTTPS. – JasenAug 31, 2014 at 2:18Add a comment | ; 0 Two problems:Generate your own self-signed certificate with these commands, in the directory /etc/stunnel:openssl genrsa 1024 > stunnel.key openssl req -new -key stunnel.key -x509 -days 1000 -out stunnel.crt cat stunnel.crt stunnel.key > stunnel.pemand make sure the two lines in the file /etc/stunnel/stunnel.conf ;cert = /etc/stunnel/mail.pem ;key = /etc/stunnel/mail.pemare modified as follows: cert = /etc/stunnel/stunnel.pem key = /etc/stunnel/stunnel.pemThe invocation in your browser, given your [test-https] label, must not be http://localhost:1337 but instead it must be test-https://localhost:1337ShareImprove this answer Follow answered Aug 10, 2014 at 15:06MariusMatutiaeMariusMatutiae46.4k1111 gold badges7979 silver badges128128 bronze badges1All the clients I could come up with, expectedly, failed to parse the inexistent protocol. I tried changing the label to a more obvious "http" to no avail. While I've seen references to invoking Stunnel in this fashion, I think it does not apply to recent versions. Also, I'm only using Stunnel in client mode and I've disabled SSL verification, so the cert and key should not matter, as far as I understand. – kaqqaoAug 10, 2014 at 22:05Add a comment | 
How can I remove or deactivate the Windows system32/find.exe?
windows;cygwin;mingw;command-line-tool;windows;cygwin;mingw;command-line-tool
How can I remove or deactivate the Windows system32/find.exe? Ask Question
16 Rather than removing Windows' find.exe, I strongly recommend putting GNU in your path before Windows\System32. For example, with Cygwin, you can use something like: path c:\cygwin\bin;c:\windows\system32;c:\windows;c:\program files\foo;c:\program files\bar;c:\windows\system32\wbemShareImprove this answer Follow answered Aug 10, 2014 at 13:05salehigalsalehigal36111 silver badge33 bronze badges2No need to do this manually, of course—it’s simply how this stuff works. From MSYS’ /etc/profile: export PATH=".:/usr/local/bin:/bin:/mingw/bin:$PATH" – Daniel BAug 10, 2014 at 13:191If you go this route, it's better to limit the scope as much as possible. Don't change PATH for the entire system; change it only for the application you use (e.g. have a special batch file to launch a prompt with set PATH=\path\to\cygwin;%PATH%). This limits potential surprises later when you or someone else expects a Windows utility and instead gets a *nix one. – BobAug 10, 2014 at 14:56Add a comment | ; 1 You can gain access to all protected files by changing the ownership.For Windows 7, on the file or folder that you want to edit:Go to Properties->Security->Advanced->OwnerChange owner to either Administrators or your own UserOn Properties->Security grant rights to the new ownerSource: Windows 7 – How to Delete Files Protected by TrustedInstallerShareImprove this answer Follow edited Aug 14, 2014 at 17:56Linger3,2441010 gold badges3232 silver badges4646 bronze badges answered Aug 10, 2014 at 12:19th3falc0nth3falc0n29833 silver badges1414 bronze badges32Please include necessary steps in your answer. If the link dies at some time your answer will become much less useful. – gronostajAug 10, 2014 at 12:27And then any Windows Update (be it a bug fix, security fix, Service Pack or otherwise) could replace find.exe with the "correct" version again. This is a "global" solution to a "local" problem and they're invariably always a bad idea.. – RobAug 10, 2014 at 15:092You guess why I marked salehigal's answer as correct?, Mine is the solution to the problem I asked for, salehigal's solution is for the problem I actually had. – th3falc0nAug 10, 2014 at 15:29Add a comment | 
Windows 7 repair installation on SSD creates huge pagefile making it unsuccessful
windows-7;windows;ssd;pagefile;repair-install;windows-7;windows;ssd;pagefile;repair-install
Windows 7 repair installation on SSD creates huge pagefile making it unsuccessful Ask Question
1 I had to remove seven RAM modules to get just 8 GB. Then it created just 8 GB pagefile. Moving pagefile to a different drive didn't helped !ShareImprove this answer Follow answered Aug 10, 2014 at 14:13SpacedustSpacedust40011 gold badge55 silver badges1717 bronze badgesAdd a comment | 
OfflineIMAP: Attempts to resync all emails if I define a reverse nametrans
offlineimap;offlineimap
OfflineIMAP: Attempts to resync all emails if I define a reverse nametrans Ask Question
0 OfflineIMAP is currently in stable version 6.5.6.I suggest upgrading to the latest release, or, if that doesn't work, to the latestdevelopment version via its github home.If the problem still exists, you should report the problem to the developers.ShareImprove this answer Follow answered Aug 16, 2014 at 9:15harrymcharrymc429k3030 gold badges493493 silver badges873873 bronze badges1Thanks. I followed this advice, resulting in this report: permalink.gmane.org/gmane.mail.imap.offlineimap.general/6520 (unfortunately the email archive system partly snips the debug log). – Antonis ChristofidesAug 17, 2014 at 21:02Add a comment | 
How to keep some files from old hard disk (which currently has Windows 8.1 and will be formatted) after clean-installing Windows 8.1 in SSD
hard-drive;partitioning;installation;ssd;windows-8.1;hard-drive;partitioning;installation;ssd;windows-8.1
How to keep some files from old hard disk (which currently has Windows 8.1 and will be formatted) after clean-installing Windows 8.1 in SSD Ask Question
1 If you can plug in both drives at the same time:Unplug the old drive. Plug in the new drive. Install Windows 8. Plug in the old driveonce installation is complete. Transfer files.As for the old one being bootable after you've made your new drive, it shouldn't be an issue. Your machine will most likely boot from the last booted device which would be your newly formatted SSD, otherwise it will ask you which drive you want to boot from, select one, if it's wrong, reboot and select the other one. Now you can transfer files and format your old drive.ShareImprove this answer Follow answered Aug 10, 2014 at 18:13AndrewAndrew62333 silver badges1515 bronze badgesAdd a comment | ; 0 Sorry for the late reply, but unfortunately my SSD proved faulty soon after I bought it and I had to RMA it.A few days ago I got the replacement.The point is that unfortunately my question was based on a misunderstanding:I thought, that if both the SSD and the HD were bootable, then some kind of conflict would occur during boot, and the system wouldn't stary. But that was not the case:when I installed the replacement SSD,I forgot to disconnect the older one.But it proved that didnt matter,because windows manages the multi boot options great,so, during boot I was able to choose to choose from which of the disks to boot: So, I can boot with either the SSD or the old hard disk without a problem,in other words, the old drive remained bootable after installing windows to the SSD.and there was no extra partition created in the SSD: Anyway, thank you for the replies, and sorry for my misconception. ShareImprove this answer Follow answered Oct 16, 2014 at 0:21darkreddarkred20233 silver badges1414 bronze badgesAdd a comment | 
When I move files to desktop, I cannot open, delete or move them
windows-7;permissions;desktop;windows-7;permissions;desktop
When I move files to desktop, I cannot open, delete or move them Ask Question
In a Linux shell, why does backslash-newline not introduce whitespace?
linux;bash;shell;linux;bash;shell
In a Linux shell, why does backslash-newline not introduce whitespace? Ask Question
10 Quoting man bash, section QUOTING:A non-quoted backslash (\) is the escape character. It preserves the literal value of the next character that follows, with the exception of <newline>. If a \<newline> pair appears, and the backslash is not itself quoted, the \<newline> is treated as a line continuation (that is, it is removed from the input stream and effectively ignored).This allows you to break very long commands / command sequences (piping and transforming output etc.) in scripts into multiple lines for readability.To get it to treat the newline as you expect, just wrap the value (and any later use of the variable) in quotes.$ A="B> C"$ echo "$A"BCFrom the same section:Enclosing characters in single quotes preserves the literal value of each character within the quotes. ...Enclosing characters in double quotes preserves the literal value of all characters within the quotes, with the exception of $, `, \, and, when history expansion is enabled, !. The characters $ and ` retain their special meaning within double quotes. The backslash retains its special meaning only when followed by one of the following characters: $, `, ", \, or .ShareImprove this answer Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Aug 10, 2014 at 11:12Daniel Beck♦Daniel Beck108k1414 gold badges285285 silver badges330330 bronze badges0Add a comment | ; 5 Answering the "why" as "why is this useful":The Backslash-newline is used for line continuation to split ovely long lines:A backslash at the end of a line in a shell script makes the shell ignore the newline for the purposes of executing the script. This is normally used to split long lines in a script file into multiple text lines, which will be handeled as a single script line by the shell.For example, the commandgit log --tags --branches HEAD FETCH_HEAD ORIG_HEAD --graph --decorate --pretty=oneline --simplify-by-decorationcan be written asgit log --tags --branches HEAD FETCH_HEAD ORIG_HEAD \ --graph --decorate --pretty=oneline --simplify-by-decorationShareImprove this answer Follow answered Aug 10, 2014 at 11:33Volker SiegelVolker Siegel1,4321111 silver badges2121 bronze badgesAdd a comment | ; 3 Caveat: Backslash continues a line only if it is the very last character in the line.This is somewhat off-topic; I add it here as an easily-overlooked show-stopper. If you inadvertently end a line in your shell script with \ (backslash followed by space or tab) rather than \ you may find your script stops running or otherwise behaves unexpectedly even though backslash appears to be the last character.If you are editing with vi it is easy to spot this problem with the command :set list, which will place a $ at the end of every line, allowing you to spot trailing spaces or tabs. :set nolist turns this feature of vi off.ShareImprove this answer Follow answered Aug 5, 2020 at 14:53CODE-REaDCODE-REaD43522 silver badges1616 bronze badgesAdd a comment | ; 0 A=B\Cmeans "A is equal to the string B, followed by a newline that I'm ignoring, followed by a C"There is no CR in what you've typed, so far as the shell sees it. Linux/Unix End Of Line is a Line Feed (LF), not CR. The CR is emitted as part of the terminal handling. Most terminals need a Line Feed to drop a line, and a Carriage Return to send the cursor back to the left. The CR is inserted by the kernel, when sending a Line Feed to the terminal, when the terminal needs that - IOW, it is not visible to the shell. Note that, for example, a visual editor might separate the use of CR and LF - the fewest characters to the next piece of screen to be rewritten may well involve an LF (to go straight down the page without changing column).Slightly more confusing, there is also a input translation for keyboards. The Enter key usually sends a Carriage Return (Control-M). But to recognise a command has been entered, the shell needs to see an End Of Line. An additional stty parameter therefore describes to the kernel terminal handling, that an input CR should be translated to an End Of Line. So the shell still doesn't see a CR.The end result is that the terminal sends:A=B\<CR>C<CR>The shell receives:A=B\<LF>C<LF>The shell parses that as "oh, backslash newline - I just ignore that" and ends up with:A=BC<LF>And on output the kernel modifies the sequence sent to the terminal during command input as:A=B\<CR><LF>C<CR><LF>The kernel processing of terminal handling is managed by the shell command stty and depending on the implementation (Linux, Mac OS X, *BSD), underlying details should be under man termios, man tty_ioctl. man console_ioctl, etc.ShareImprove this answer Follow edited Aug 11, 2014 at 8:17 answered Aug 10, 2014 at 11:35JezCJezC56022 silver badges55 bronze badges1Do you have any materials recommended for me to know more about input translation for keyboards and "The CR is inserted by the kernel, when sending a Line Feed to the terminal, when the terminal needs that - IOW, it is not visible to the shell." – user3872279Aug 11, 2014 at 6:32Add a comment | 
What is introducing quoted-printables into my PGP-encrypted emails?
macos;thunderbird;arch-linux;gnupg;pgp;macos;thunderbird;arch-linux;gnupg;pgp
What is introducing quoted-printables into my PGP-encrypted emails? Ask Question
0 This was fixed by checking the following in the OS X Thunderbird.Account settings > [Specific account] > OpenPGP Security > Use PGP/MIME by default.This has the additional advantage of allowing sending of html emails, and attachments. However, support for decryption is lacking in many clients (e.g. with Android K-9 + APG).ShareImprove this answer Follow answered Aug 11, 2014 at 6:39SparhawkSparhawk1,7331414 silver badges2525 bronze badges2Are there any desktop mail clients that's relatively widely used that doesn't support PGP/MIME yet? – remmySep 20, 2014 at 15:25A few. The main thing for me is not being able to decrypt email on my Android phone. – SparhawkSep 20, 2014 at 15:33Add a comment | 
How do I speed up my PC or what should I replace?
performance;desktop-computer;performance;desktop-computer
How do I speed up my PC or what should I replace? Ask Question
4 Like Carles Fenoy said, start with the RAM. 1 GB is the minimum required for 32-bit Windows 7, which generally means something like "the system will boot, and you will be able to start Notepad, but expect to get plenty of coffee while you wait for it to open". It also doesn't take into account the requirements of other applications that you may want to use to actually get useful work done.Upgrade your RAM to at least 2 GB, preferably 3 GB. (Note that you may need to alter the boot parameters in order to have Windows make use of the range 2-3 GB.) Don't go above 4 GB on a 32-bit system; Windows won't use the additional RAM, so you'll effectively be wasting your money by installing more than 4 GB. The DG31PR sports two DIMM slots, which means that you should be able to move to 3 GB by installing a second 2 GB DIMM; moving to 4 GB would require replacing the existing DIMM. Note that it appears to use DDR2 RAM, not DDR.After that, a 5400 rpm hard disk is not very fast by any measure. I would replace it by at least a 7200 rpm model, and would seriously consider a SSD which would greatly help with I/O latency, which is most likely the limiting factor in your disk I/O. (Use the system performance monitor to look at disk I/O queue length; that'll tell you if the disk is a bottleneck. Higher numbers are worse.) Get an overprovisioned model, put a system-managed swap file on it, and accept that it might wear out slightly sooner than a spinning-platter hard disk drive perhaps would. From a flash wear perspective, it'll last long enough to serve a useful life; you're more likely to see e.g. controller failure than flash wearout with reasonable use. You can get an external enclosure and relegate the current drive to serve as backup storage if you wish (you can never have too many backups). A SSD should also cut the power consumption of the computer by somewhere around 5-10 W compared to a spinning-platter hard disk, as well as lower the noise level of the computer because there are fewer moving parts.With these two changes (upgrading to a total of 3 GB RAM, and a SSD) you'll probably find the performance of that system to be quite acceptable.ShareImprove this answer Follow edited Apr 13, 2017 at 12:14CommunityBot1 answered Aug 10, 2014 at 12:39useruser29.1k1111 gold badges9999 silver badges144144 bronze badges31Considering the age of the system, and endurance on modern drives, I suspect the SSD may outlive the rest of the system. – Journeyman Geek♦ Aug 10, 2014 at 12:50@JourneymanGeek Certainly possible, but my previous system served for the better part of a decade (2004 to 2012, IIRC; incremental upgrades, but some parts remained the same throughout that time). I mostly wanted to point out that flash wear is not likely to be what eventually kills the SSD. – userAug 10, 2014 at 12:54Platter density makes a bigger difference than whether it's 5400 vs 7200 RPM, which means a 5400RPM HD could be as fast or faster than a 7200. – vol7ronAug 10, 2014 at 14:37Add a comment | ; 2 From my point of view your configuration seems to be very short on RAM. The high HDD usage is because of the use of the disk as paging file, so when there is not enough memory available some is freed and moved to the HDD. So increasing the amount of RAM should considerably increase the performance.ShareImprove this answer Follow answered Aug 10, 2014 at 12:27Carles FenoyCarles Fenoy16144 bronze badges1Note that 32-bit Windows can support up to ~3 GB of RAM, which should already greatly improve performance. – gronostajAug 10, 2014 at 12:35Add a comment | ; 1 First, I will say what you're running and what you're opening could have an extreme impact on the perceived time to open applications and will also have impact on what you need to upgrade, or if you need to upgrade a component. Ctrl + shift + Esc, and open the resource monitor and keep it open while opening those applications to see what the memory usage is like - it is most likely the culprit.Biggest BetIn general, based on your specs, upgrade:RAMI'd suggest 4GB for your system. Unlike what others have said, 4GB can be used in a 32b system. If you want to test out a 64b system for free you could download one of the Linux distros (e.g., Ubuntu).Why not HD?Unlike what other users have said, you do not need to upgrade your HD. Granted a 2009 5400RPM HDD is a little dated, but sometime around then many 5400RPMs were performing the same or better than 7200RPMs, so it is a matter of manufacturer. I've "invested" thousands in SSDs for many many years now and yes, while they will speed up application loads and boot times, you are experiencing a lag that will exist if you get one. Also, SSDs are still expensive than getting another stick of RAM.What else could it be?For 1, if you're running antivirus or other background applications/service, they could certainly be consuming memory (and CPU cycles) that you may desperately need. Furthermore, applications like Photoshop and video games may need a considerable GPU with a decent proc and GDDR, so yes, upgrading your video card may also help performance.Also, over time, parts go bad, especially when they've been exposed to extreme heat or cold. That means that the RAM you have could have bad blocks, as well as the HD. So there is the possibility that you might need to upgrade one of the other components in addition to giving it some more temp memory (RAM). Lastly, one thing you should do is open up that case and make sure to use some compressed air to blow out dust. Dust is bad for the computer as it could bridge paths on the motherboard that should not be connected. Due to failsafes, many times the computer will still operate, but slower, eventually leading to overheating and a crash. Regardless, your computer is an engine, and like a car it should be maintained.ShareImprove this answer Follow edited Aug 10, 2014 at 14:22 answered Aug 10, 2014 at 13:26vol7ronvol7ron45511 gold badge77 silver badges1414 bronze badges151"over time certain addresses will fail" RAM doesn't work the same way as a storage device, which will (eventually, hopefully) relocate problematic blocks to spare locations (often this happens only after data is already lost). Faulty RAM will simply mean that you'll see corruption, or crashes, and won't be able to determine the cause of those because by the time you investigate, the cause will likely be gone. And I'll bet you a dollar (any country's dollar) that looking at the I/O queue length when the system is under stress will show that storage (swap) is a problem. – userAug 10, 2014 at 13:54Yes, but when it builds the address table, it will not use those faulty blocks in the future. Unless my understanding was incorrect, or somethings changed. I thought it would be excluded from the page table – vol7ronAug 10, 2014 at 13:561"when it builds the address table, it will not use those faulty blocks in the future" Citation needed. Note that RAM corruption can be caused both before, during, and after a value is stored at a location. And even if this was true, those tables could just as easily be corrupted as well due to RAM problems. – userAug 10, 2014 at 13:571Actually, in this case, I'd say citation is needed. If you make a statement of fact, you should be prepared to back it up with references, especially if it goes against reasonably expected behavior. I could say on SO "the .NET jitter is written in assembly language by extraterrestrials", make the same claim as you do (basically "I've used it and this isn't Wikipedia") and it'd still very likely be shot down. – userAug 10, 2014 at 14:062"when bad blocks are encountered I believe they are removed from the paging table" With non-ECC RAM (which something like 99.999% of non-server systems use), there is no way to know whether you're retrieving a correct or incorrect value from RAM. HDDs dedicate gobs of room to FEC data to guard against corruption and be able to repair it when it happens. (Look at the SMART raw read error count attribute some time. You might be surprised.) Non-ECC RAM has no similar provisions. The only way to reliably detect memory problems is by using ECC, which very few home computers do these days. – userAug 10, 2014 at 14:15 | Show 10 more comments; -1 After putting in more and faster RAM (2x 1 GB 800 MHz PC2-6400 RAM, enabling the dual memory architecture of you MoBo), consider replacing your HDD. A 5400 rpm HDD is quite slow. Consider a 7200 rpm SATA disk or even better a SSD disk. Use the SSD for Windows and Applications, while retaining your old HD for data/documents/media. ShareImprove this answer Follow edited Aug 10, 2014 at 12:40 answered Aug 10, 2014 at 12:34agtoeveragtoever6,20411 gold badge2323 silver badges3737 bronze badges532-bit edition of Windows won't support 4 GB of RAM. – gronostajAug 10, 2014 at 12:37Agree. Changed it to 2x 1 GB. – agtoeverAug 10, 2014 at 12:411I'd rather go for additional 2 GB stick. Additional 1 GB should compensate lack of dual channel, plus there's no need to replace perfectly good 1 GB stick with two (a bit faster) 1 GB sticks. – gronostajAug 10, 2014 at 12:43RAM latency is virtually never a noticable bottleneck in anything resembling a modern system. It might be under some specialized workloads, but for general office-type use, I can't see it matter. My system is 32 GB at DDR3-1333 (same memory clocking as the OP) and I've never felt RAM latency to be a performance-limiting factor. – userAug 10, 2014 at 13:073@gronostaj That is WRONG. 32 bit Windows 7 can out of the box utilize up to 4 GB of RAM (and with PAE extensions even more). Some of the 4 GB is may not be addressable because of overlap with memory space required by video-card and other hardware. That still leaves you with minimally 3 GB usable (in most cases as much as 3.75 GB). – TonnyAug 10, 2014 at 13:16Add a comment | ; -1 Upgrade your RAM.Go through the task manager tasks and check which is keeping your hard drive busyOpen a CMD and enter: powercfg -getActiveScheme. Copy the GUID.Open a CMD and enter: powercfg -setacvalueindex [GUID without the square brackets] 54533251-82be-4824-96c1-47b60b740d00 893dee8e-2bef-41e0-89c6-b55d0929964c 100andpowercfg -setdcvalueindex [GUID without the square brackets] 54533251-82be-4824-96c1-47b60b740d00 893dee8e-2bef-41e0-89c6-b55d0929964c 100. This will decrease battery life but increase performanceShareImprove this answer Follow answered Aug 10, 2014 at 16:49DividedByZeroDividedByZero35066 silver badges2121 bronze badges41What this does is set the minimum processor clock rate to 100% of full speed. This does nothing to solve the OP's problem, and the OP is not running a laptop. – bwDracoAug 11, 2014 at 2:20It's also totally opaque. If you want to suggest setting the CPU power to always be at 100%, it's much better to tell them to go through Control Panel -> Power Options -> Edit plan settings -> Change advanced power settings -> Processor power management -> Minimum/Maximum processor state. That way, one doesn't need to worry about what the numbers mean. – userAug 11, 2014 at 7:34At the very least, with things like these, you should include an official reference for the relevant GUIDs so that they can easily be verified. Googling for these finds PowerEnumerate (official documentation) for the group GUID but nothing clearly official for the specific GUID (the 893dee8e one), which means that what this does can change at any time since Microsoft are not bound to maintain those specific GUIDs for those specific values. Only official documentation is an interface contract. – userAug 11, 2014 at 7:35I'm only going off an E6600 I have in a workbench somewhere, but I thought that series proc didn't have the turbo. I thought there wasn't a power up/down, only a dual-core proc. – vol7ronAug 11, 2014 at 13:22Add a comment | 
How can I use advanced text editing in Notepad ++?
notepad++;text-editing;notepad++;text-editing
How can I use advanced text editing in Notepad ++? Ask Question
1 Ctrl + H (Replace), in search mode select Regular expressionFind: ((/)([^//]+))$Replace: {nothing}Do it only once, of courseShareImprove this answer Follow answered Nov 19, 2014 at 13:55DolmayanDolmayan9233 bronze badges3Well, the thing is that I have a LOT of different albums and artists so I doubt that I can do this like that... Don't you think? – SaynomoreNov 19, 2014 at 15:21Of course you can do it for all albums, if they are in format as your example. To get final alphabetical list with unique albums, copy cleaned result of Replace to Excel, select all, Data and use Remove Duplicates. Last task is using Sort. – DolmayanNov 19, 2014 at 15:31This is simply perfect!! :) Thanks a lot for your help Dolmayan! – SaynomoreNov 19, 2014 at 18:07Add a comment | ; 1 Notepad++ is a great text editor but this is more an automation thing.If I might recommend another tool called AWK it might take some time to get a script right but once right it is a matter of seconds to get your desired output over and over.I'm not familiar with Mac so I don't know if it will run without any problems but this does it for a windows. Asuming dir.txt is your file containing the listing and dir.awk is your script.The contents of the file dir.awk, your script.{print $2 " - " $3}Then the way to run your script is: `awk -F "/" -f dir.awk dir.txt > result.txt' which will output a result file looking;Mephista - Black Narcissus Mephista - Black Narcissus Mephista - Black Narcissus Mephista - Black Narcissus Mephista - Black NarcissusMephista - Black Narcissus Mephista - Black Narcissus Mephista - Black Narcissus Mephista - Black NarcissusThat is a start, with uniq you can filter the result file for duplicates.ShareImprove this answer Follow edited Nov 19, 2014 at 17:59 answered Nov 19, 2014 at 14:02Rik VerbeekRik Verbeek18144 bronze badges2Yea... but I can find a way to do that... I just want, on my 10.4 mac, to have a list of all the hard-drive content, but just folders and subfolders. And I can't find a way. So I try some stuff like that. But AWK like automation seems a bit harsh, particularly when I just want to do it once and considering I need that soon... :/ – SaynomoreNov 19, 2014 at 15:241Oh... Darn it, I just see your details at the moment and I've already cleaned this up with Dolmayan technique... :/ Sorry! But thanks for the tip, I will try it anyway and keep this page in bookmarks for the future! ;) – SaynomoreNov 19, 2014 at 18:12Add a comment | 
Windows was unable to complete the format
ntfs;format;fat32;ntfs;format;fat32
Windows was unable to complete the format Ask Question
1 Trash it, buy a new one.They are not worth fixing once they start to fail. I get through literally hundreds of them for work, with 'write few, read many' deploys - fail rates are high.Caveat: don't use SD for mission-critical storage.ShareImprove this answer Follow answered Nov 19, 2014 at 11:39TetsujinTetsujin42.9k77 gold badges9696 silver badges122122 bronze badges4So finally did I lost my data forever. – WaseemNov 19, 2014 at 11:42If you want to try recover data from it, try Recuva [piriform.com/recuva] or similar. Don't keep trying to format it, you'll just make it worse... THEN throw the card away. – TetsujinNov 19, 2014 at 11:45sorry bro but the link you gave is not working – WaseemNov 19, 2014 at 11:48stoopid link thinks the ] is part of it - piriform.com/recuva – TetsujinNov 19, 2014 at 12:00Add a comment | ; 1 The error "Windows was unable to complete..." or "The drive is write protected..." means the flash drive gets damaged, usually physical damage, such as bad sectors or memory chip problem.I've searched solutions of this problem for a long time, and I found there are mainly three solutions:Format memory card with Disk Management, which works for few cases.Format with Command Prompt. Users who are not good at computer operations will feel it's difficult to try this solution. Formatting with command line works for many flash drive.The last solution is a third-party tool. You need to find the correct tool to help you.It's very possible that none of them works and you need to but a new memory card in that case.Reference: http://www.eassos.com/how-to/windows-was-unable-to-complete-the-format.phpShareImprove this answer Follow edited Jun 25, 2015 at 4:38Ayan2,89333 gold badges1818 silver badges2222 bronze badges answered Jun 25, 2015 at 3:14paulpavlov23paulpavlov231111 bronze badgeAdd a comment | ; 0 You can recovery the sd card by some recovery software like Recuva, but just like the others said, it is not worth to fix.ShareImprove this answer Follow answered Jun 25, 2015 at 4:52BiloBilo1,49633 gold badges1515 silver badges3232 bronze badgesAdd a comment | 
What is the policy for permissions on /proc/<PID>/environ?
linux;permissions;process;proc;linux;permissions;process;proc
What is the policy for permissions on /proc/<PID>/environ? Ask Question
3 On most systems, /usr/bin/screen is installed with the setuid bit for root, meaning it will first start with effective UID 0, and only later drop privileges (returning to your normal UID).(This is used for implementing the "session sharing" feature, as your Screen wouldn't be allowed to connect to other users' Screen sockets otherwise.)But, since privileged processes could potentially keep sensitive information in memory, the kernel gives them special protection – even if they drop all privileges and switch to your UID, you still cannot send them signals, attach a debugger, or create core dumps.The "no core dumps" option, also known as the fs.suid_dumpable sysctl setting, is what causes Screen's /proc files to be permanently owned by root regardless of its effective UID.ShareImprove this answer Follow edited Nov 19, 2014 at 11:44 answered Nov 19, 2014 at 11:36user1686user1686399k5858 gold badges839839 silver badges910910 bronze badgesAdd a comment | 
How to change language of Fritz!Box from German to International
firmware;fritzbox;firmware;fritzbox
How to change language of Fritz!Box from German to International Ask Question
8 ruKernelToolYou'll need a Windows image for the process, but ruKernelTool allows you to do what you want. The tool and website is in german, but the process is pretty straightforward:Start the tool and agree to everything.Click the download tab and allow it to update its links to the AVM serversSelect the firmware you want, in this case 7390 International 84.06.20. Click Download.Switch to the Network-tab (Netzwerk) and click the Media-Sense item to turn it off. Windows will reboot.Go back to the Downloads-tab and select you downloaded firmware and click the kernel source button. (als Kernel-Quelle verwenden)You should switch to the Upload-parameter-tab and enter your WLAN key from the bottom label on the box.On Upload-tab click the Validate button and it will list out if your choices check out. It will provide warnings in German so you might want translate.google.com handy. (Uberprufen)Finally start the upload to the device. (Upload starten)If all goes well your router should reboot, Windows will reactivate Media-Sense and reboot, and your router should have a language selection option. Your router should be accessible via http://fritz.boxShareImprove this answer Follow answered Nov 19, 2014 at 10:50Cameron Lowell PalmerCameron Lowell Palmer46111 gold badge44 silver badges88 bronze badges5This question has been viewed over 10000 times, but only a score of 2?! – Cameron Lowell PalmerMar 10, 2017 at 8:30In my case, the reason it that it doesn't work. I've tried many approaches: wifi, ethernet cable (both to the Powerline and the router), but I always end up getting "Adam2-IP-Adresse setzen... fehlgeschlagen!" after I plug the Powerline back. It might be because I'm using W7 on Virtualbox, but I really can't get a "real" Windows machine. – Andrea SciamannaMar 24, 2017 at 15:08Here's the full output (I've only changed MAC addresses and hashes, just in case), provided it's useful: gist.github.com/sciamannikoo/2a7bc54ebe676ee2cbeea628b7f06a7d – Andrea SciamannaMar 24, 2017 at 15:151If you're still using a Fritz!Box ask yourself, why? I highly recommend you look at the modern world of mesh WiFi devices from Linksys, Netgear, Google and the like or on the focused networking devices from companies like Ubiquiti. The single all-in-one device model of Fritz!Box has not shown itself to work well in today's challenging RF environments. – Cameron Lowell PalmerJan 8, 2018 at 10:041Apparently the ruKernel Tool site and others are down, due to personal issues and GDPR compliance being difficult. – Journeyman Geek♦ Jul 5, 2019 at 10:10Add a comment | ; 0 On FRITZ!Box 7520:Login to the admin console (try https://192.168.178.1 if unsure)In the right hand vertical menu find the German equivalent of SystemUnder System find the German equivalent of Region and LanguageSelect the desired languageShareImprove this answer Follow answered Jul 25, 2021 at 16:08David SorokoDavid Soroko10133 bronze badgesAdd a comment | ; 0 the formal way is to go to AVM website click here and download the correct firmware for your device, in many cases and especially the new routers, they have an international firmware.Here is the FTP archive and I am pointing to a firmware for router 7330, it shows an English firmware. There is one more piece of information to add here, in Germany we have Annex B which means ISDN and DSL can be on the same line simultaneously, most of the rest of the world is Annex A. You need to adjust the Annex type to be able to connect to your DSL company. Most international firmware has an option to change the Annex.ShareImprove this answer Follow edited Dec 29, 2021 at 20:12 answered Dec 29, 2021 at 10:01Dr.Sherif OmranDr.Sherif Omran10133 bronze badgesAdd a comment | 
i cannot able to see the file in system 32 folder
windows-7;windows-7
i cannot able to see the file in system 32 folder Ask Question
0 It's probably a hidden file. Open 'Folder Options' and check 'Show hidden files, folders and drives' under the View tab.Also, press F5 to reload your folder after copying the file.ShareImprove this answer Follow answered Nov 19, 2014 at 11:44JenteJente37633 gold badges88 silver badges1919 bronze badges1no its a normal file and i check show hidden files and folders and press f5 and try but no change remains same .please let me know any other – Deva_1990Nov 19, 2014 at 12:08Add a comment | 
Ignoring .DS_store preferences clientside
macos;finder;file-server;.ds-store;macos;finder;file-server;.ds-store
Ignoring .DS_store preferences clientside Ask Question
0 It might be better to try persuade it not to write them in the first place...Open Terminal.Execute this command: defaults write com.apple.desktopservices DSDontWriteNetworkStores trueEither restart the computer or log out and back in to the user account.From Mac OS X v10.4 and later: How to prevent .DS_Store file creation over network connections which apparently has never been superseded or indeed maintained for a long time, but is still the recommended way.You might also find this interesting - Got a Mac? Prevent OPSEC leakage by cleaning hidden OS X files from USB drives The recommended freeware from that report CleanMyDrive claims to be able to handle network volumes too [I'm just testing it myself so have no results as yet, but reviews are good on the app store]ShareImprove this answer Follow answered Nov 19, 2014 at 11:29TetsujinTetsujin42.9k77 gold badges9696 silver badges122122 bronze badges3That would be better, but is not possible in this case. The network is shared by a large amount of OSX machines. I'm asking specifically for a client-side solution to ignore the files. – dubbeljNov 19, 2014 at 12:00judging by the number of hits you get on Google for 'disabling creation' vs 'ignoring' & an identical question on SE from a year ago with no solution, I'm guessing it can't be done that way. Looks like prevention will be better than cure. – TetsujinNov 19, 2014 at 12:09Yup, i know there's not an easy to find solution. Hence my question here. Thanks for you efforts though. – dubbeljNov 19, 2014 at 13:18Add a comment | 
How to change Google Mail's smart labels? [closed]
gmail;label;redmine;typo3;gmail;label;redmine;typo3
How to change Google Mail's smart labels? [closed] Ask Question
1 I moved (with drag&drop) the e-mails from Forge manually from the "wrong" tab to the tab I wanted the message to show up. GMail then asks if you always want to perform this action on all e-mails from this sender, which you can answer with "yes". That fixed the problem for me.Edit: This is some kind of strange. This (see screenshot below) appears when I move messages around in tabs.ShareImprove this answer Follow edited Nov 19, 2014 at 10:39 answered Nov 19, 2014 at 10:23derhansenderhansen11144 bronze badges1When I move mails to correct category (by drag&drop) in Inbox, I don't get such message. – ArminNov 19, 2014 at 10:31Add a comment | ; 0 I've found an option for that.Just open the menu and click "Report wrong category" (screenshot is in german)And then you can switch to the right category:If this really helps, time will show.Update: The steps above just report the wrong category. You are also able to set your own filter in the gmail settings. There you can set a label to a mail and/or a category. I just did not find this category rule option. That's the solution for my question.ShareImprove this answer Follow edited Nov 24, 2014 at 20:32 answered Nov 19, 2014 at 10:28ArminArmin13322 silver badges88 bronze badgesAdd a comment | 
Bash Process output status
bash;process;status;bash;process;status
Bash Process output status Ask Question
0 To get the exit code for a background process, use wait:$ (sleep 1; false) & pid_1=$!; (sleep 1; true) & pid_2=$![1] 29111[2] 29112$ wait $pid_1$ echo $?1$ wait $pid_2$ echo $?0ShareImprove this answer Follow answered Nov 19, 2014 at 9:44l0b0l0b07,03733 gold badges3131 silver badges5454 bronze badges1Yes Thank you, But wait will stop my parent script and waiting for particular bg process, And I need executing other tests so far and do not wait for bg processes. I need get output status when bg process ends and to not wait for it to end. – TomyOneNov 19, 2014 at 10:00Add a comment | ; 0 How about writing the PIDs and output status to a temp file, e.g. via 'mktemp'. After finishing a TEST and checking its status, simply delete the temp file and create a new one when the next TEST runs. Or keep all the temp files for later reference and check the timestamps of the temp files to get the one related to the currently running TEST.ShareImprove this answer Follow answered Nov 19, 2014 at 10:34Ge2rtGe2rt122 bronze badgesAdd a comment | 
Notepad-like text editor with autosave [closed]
windows-xp;notepad;autosave;windows-xp;notepad;autosave
Notepad-like text editor with autosave [closed] Ask Question
2 I would consider using Notepad++ it has a backup function which recovers your previous session. Including unsaved files.ShareImprove this answer Follow answered Nov 19, 2014 at 9:24Rik VerbeekRik Verbeek18144 bronze badges2Thanks Rik. Do you have personal experience with the Notepad++'s autosave feature? I've been looking around and it seems there are lots of problems: stackoverflow.com/q/24471044 superuser.com/q/483218 – TomasNov 19, 2014 at 9:373The latest version of Notepad++ is using a built-in backup function (Settings->Preferences->Backup) and is not relying on a plugin. That is what they are talking about in the other question. – Rik VerbeekNov 19, 2014 at 9:41Add a comment | ; 0 You can always use Evernote - https://evernote.com/It's free and it auto saves the notes you make. It can also be synced to other devices like your cellphone, tablet and computers at home, so that you can have more than one source of your notes if the computer freezes again. ShareImprove this answer Follow answered Nov 19, 2014 at 9:22MornéMorné9311 gold badge11 silver badge33 bronze badges3Interesting, thanks. Is it actually a plain text editor? – TomasNov 19, 2014 at 9:361No unfortunately it's a Rich Text Editor. – MornéNov 19, 2014 at 9:46Evernote grew up with serious usability problems -- mostly related to rich text handling, honestly -- which were not addressed before the company went into cash-grab mode and severely limited the free version. Not a good option since 2016 or so. – UmopepisdnSep 19, 2018 at 19:19Add a comment | 
How to connect to VPN through Proxy Server
vpn;proxy;vpn;proxy
How to connect to VPN through Proxy Server Ask Question
4 I found myself in a very similar situation more than once. If you follow IANA port assignment rules, it is as slhck says: you cannot do it without asking the administrator to allow an outgoing connection to your VPN (e.g. port 1194 UDP is the default for OpenVPN).However, I managed to solve that problem by breaking the rules and assigning TCP port number 443 (HTTPS) to my VPN server. This worked for me because the network that I connected from did not actually proxy TCP port 443: they simply forwarded TCP:443 packets transparently -- probably to avoid the hassle of configuring an HTTPS proxy. This post here discusses HTTPS proxies, which might prevent this solution from working.Recently I also learned that OpenVPN supports proxies, as shown in this OpenVPN howto page. I haven't tested that, but it might work.It all depends on how strict is network security at the place you are... In the end it might just be easier (and more ethical) to just ask your client's IT folks to help you.Please notice that using TCP for a VPN is not advised, as it introduces an extra layer of TCP overhead, as discussed in this post.ShareImprove this answer Follow answered May 30, 2017 at 0:41fsrechiafsrechia5622 bronze badgesAdd a comment | ; 6 It's not possible. Proxies (in companies) are basically meant to funnel all outgoing traffic through, for several reasons (policy enforcing, content caching, monitoring, etc.). Mostly, outgoing requests are only allowed via HTTP, HTTPS and maybe FTP, and even that, only on specific ports.VPN on the other hand uses a tunneled connection, much like SSH (or SFTP, for that matter). These also use a different port than the typical ones you find for HTTP (80) and HTTPS (443). It won't work for various reasons: It's very likely that the company network you are in does not allow outgoing connections on any port other than predefined ones (i.e., 80, 443), or anything that is not requested via the proxy serverProtocols other than HTTP(S) or FTP may be forbiddenThe proxy may just be a simple HTTP proxy, with no means of forwarding any other traffic (which is what a SOCKS proxy could do)Your only option is to get an exception rule in the company firewall to allow an outgoing connection to your VPN endpoint, using a specific port.ShareImprove this answer Follow answered Nov 19, 2014 at 9:06slhckslhck218k6767 gold badges591591 silver badges578578 bronze badges1The tool corkscrew allows SSH to work through HTTP/HTTPS proxies. See wiki.archlinux.org/index.php/… for usage details. – youR.FateJun 30, 2016 at 15:24Add a comment | ; 1 Please specify which VPN software you are using.Most VPNs with own client software (IPSec, PPTP, L2TP) cannot connect through proxy server. If you are using SSL-VPN, you can configure the browser to use the proxy.ShareImprove this answer Follow answered Nov 19, 2014 at 9:08user3767013user37670131,39711 gold badge99 silver badges66 bronze badgesAdd a comment | 
Router with VLAN support [closed]
networking;router;vlan;networking;router;vlan
Router with VLAN support [closed] Ask Question
1 I would suggest to consider the use of a custom firmware on a compatible router,like dd-wrt, tomato, OpenWRT etc.You will find more options for VLAN features that way.Share Follow edited Sep 8, 2014 at 14:54 answered Sep 8, 2014 at 14:01MarceloMarcelo89866 silver badges99 bronze badges2Yes yes. And let’s not forget OpenWrt, which will let you do just about anything and is at least ten times more flexible. ;) – Daniel BSep 8, 2014 at 14:53I knew I was forgetting a big one!. Thanks. Edited to add OpenWRT. – MarceloSep 8, 2014 at 14:55Add a comment | 
How to configure action on plugging in an usb MTP device on windows 8.1
windows;windows-explorer;android;mtp;windows;windows-explorer;android;mtp
How to configure action on plugging in an usb MTP device on windows 8.1 Ask Question
1 Figured it out alreadyComputer Configuration / Administrative Templates / Windows Components / Autoplay PolicesThe setting is Disallow Autoplay for Non-Volume devices and should be set to EnabledShare Follow answered Sep 8, 2014 at 14:07Jürgen SteinblockJürgen Steinblock36822 silver badges1010 bronze badgesAdd a comment | 
What's the difference between mobile and desktop processors?
cpu;tablet;cpu-speed;cpu;tablet;cpu-speed
What's the difference between mobile and desktop processors? Ask Question
118 Note: This answer is written with the assumption that the CPUs being compared consist of commercially-available Intel, AMD, and ARM-based SoCs from approximately 2006 to 2015. Any set of comparison measurements will be invalid given a wide enough scope; I wanted to provide a very specific and "tangible" answer here while also covering the two most widely used types of processor, so I made a bunch of assumptions that may not be valid in the absolutely general case of CPU design. If you have nitpicks, please keep this in mind before you share them. Thanks!Let's get one thing straight: MHz / GHz and number of cores are no longer a reliable indicator of the relative performance of any two arbitrary processors.They were dubious numbers at best even in the past, but now that we have mobile devices, they are absolutely terrible indicators. I'll explain where they can be used later in my answer, but for now, let's talk about other factors.Today, the best numbers to consider when comparing processors are Thermal Design Power (TDP), and Feature Fabrication Size, aka "fab size" (in nanometers -- nm).Basically: as the Thermal Design Power increases, the "scale" of the CPU increases. Think of the "scale" between a bicycle, a car, a truck, a train, and a C-17 cargo airplane. Higher TDP means larger scale. The MHz may or may not be higher, but other factors like the complexity of the microarchitecture, the number of cores, the branch predictor's performance, the amount of cache, the number of execution pipelines, etc. all tend to be higher on larger-scale processors.Now, as the fab size decreases, the "efficiency" of the CPU increases. So, if we assume two processors which are designed exactly the same except that one of them is scaled down to 14nm while the other is at 28nm, the 14nm processor will be able to:Perform at least as fast as the higher fab size CPU;Do so using less power;Do so while dissipating less heat;Do so using a smaller volume in terms of the physical size of the chip.Generally, when companies like Intel and the ARM-based chip manufacturers (Samsung, Qualcomm, etc) decrease fab size, they also tend to ramp up the performance a bit. This puts a hamper on exactly how much power efficiency they can gain, but everyone likes their stuff to run faster, so they design their chips in a "balanced" way, so that you get some power efficiency gains, and some performance gains. On the other extremes, they could keep the processor exactly as power-hungry as the previous generation, but ramp up the performance a lot; or, they could keep the processor exactly at the same speed as the previous generation, but reduce the power consumption by a lot.The main point to consider is that the current generation of tablet and smartphone CPUs has a TDP around 2 to 4 Watts and a fab size of 28 nm. A low-end desktop processor from 2012 has a TDP of at least 45 Watts and a fab size of 22 nm. Even if the tablet's System On Chip (SoC) were connected to an A/C mains power source so it doesn't have to worry about power sipping (to save battery), a quad-core tablet SoC would completely lose every single CPU benchmark to a 2012 low-end "Core i3", dual-core processor running at perhaps lower GHz.The reasons:The Core i3/i5/i7 chips are MUCH larger (in terms of number of transistors, physical die area, power consumption, etc.) than a tablet chip;Chips that go into desktops care MUCH less about power savings. Software, hardware and firmware combine to severely cut down to performance on mobile SoCs in order to give you long battery life. On desktops, these features are only implemented when they do not significantly impact the top-end performance, and when top-end performance is requested by an application, it can be given consistently. On a mobile processor, they often implement many little "tricks" to drop frames here and there, etc. (in games, for example) which are mostly imperceptible to the eye but save battery life.One neat analogy I just thought of: you could think of a processor's "MHz" like the "RPMs" meter on a vehicle's internal combustion engine. If I rev up my motorcycle's engine to 6000 RPM, does that mean it can pull more load than a train's 16-cylinder prime mover at 1000 RPM? No, of course not. A prime mover has around 2000 to 4000 horsepower (example here), while a motorcycle engine has around 100 to 200 horsepower (example here of the highest horsepower motorcycle engine ever just topping 200 hp).TDP is closer to horsepower than MHz, but not exactly.A counterexample is when comparing something like a 2014-model "Haswell" (4th Generation) Intel Core i5 processor to something like a high-end AMD processor. These two CPUs will be close in performance, but the Intel processor will use 50% less energy! Indeed, a 55 Watt Core i5 can often outperform a 105 Watt AMD "Piledriver" CPU. The primary reason here is that Intel has a much more advanced microarchitecture that has pulled away from AMD in performance since the "Core" brand started. Intel has also been advancing their fab size much faster than AMD, leaving AMD in the dust.Desktop/laptop processors are somewhat similar in terms of performance, until you get down to tiny Intel tablets, which have similar performance to ARM mobile SoCs due to power constraints. But as long as desktop and "full scale" laptop processors continue to innovate year over year, which it seems likely they will, tablet processors will not overtake them.I'll conclude by saying that MHz and # of Cores are not completely useless metrics. You can use these metrics when you are comparing CPUs which:Are in the same market segment (smartphone/tablet/laptop/desktop);Are in the same CPU generation (i.e. the numbers are only meaningful if the CPUs are based on the same architecture, which usually means they'd be released around the same time);Have the same fab size and similar or identical TDP;When comparing all of their specs, they differ primarily or solely in the MHz (clock speed) or number of cores.If these statements are true of any two CPUs -- for instance, the Intel Xeon E3-1270v3 vs. the Intel Xeon E3-1275v3 -- then comparing them simply by MHz and/or # of Cores can provide you a clue of the difference in performance, but the difference will be much smaller than you expect on most workloads.Here's a little chart I did up in Excel to demonstrate the relative importance of some of the common CPU specs (note: "MHz" actually refers to "clock speed", but I was in a hurry; "ISA" refers to "Instruction Set Architecture", i.e. the actual design of the CPU)Note: These numbers are approximate/ballpark figures based on my experience, not any scientific research.Share Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Sep 8, 2014 at 14:16allquixoticallquixotic34k77 gold badges112112 silver badges142142 bronze badges194"Today, the best numbers to consider when comparing processors ..." -- You're just replacing the single-metric fallacy of comparing MHz with TDP and fab size. – sawdustSep 9, 2014 at 22:498Linking TPD with performance is totally bogus. Modern processors which have significantly greater performance than older processors in the same family line from the same manufacturer actually have much higher TPD. There is no correlation. I suggest you rethink your entire answer. – hookenzSep 10, 2014 at 4:2714"TDP is closer to horsepower than MHz, but not exactly." - I disagree completely. Why not use some performance metrics, such as FLOPS, MIPS or Geekbench? To keep with automotive analogies, MHz would be engine capacity, horsepower would be, Geekbench score and TDP is fuel efficiency. – el.pescado - нет войнеSep 10, 2014 at 9:046It should be obvious that if you fab the same CPU on 22nm vs 32nm the TDP will decrease. But that doesn't mean because the TDP has decreased it's performance is lessened, quite the opposite. Which is why I think you really should throw TDP out the door as a measure of relative performance. Again, it should be obvious that TDP should never ever ever be used as a measure of relative performance. And in terms of your pie graph, it should be at zero on the importance scale. This is why people actually write benchmarks like the Linpack to try to guage relative performance. – hookenzSep 10, 2014 at 9:393Compare generations of Intel processors over the years they all have variations with TDP of 60,80 or 120W and yet these vary vastly in performance per generation. TDP has nothing whatsoever to do with performance. – JamesRyanSep 10, 2014 at 15:12 | Show 14 more comments; 19 Hm.. This is a good question.The answer is NO, Samsung Galaxy is most likely not as powerful as your Desktop PC. And this would be obvious if you would run a comprehensive CPU benchmark test.I will try to put together the answer the way I see it. Other, more experienced members will probably add more details and value later.First of all, due to the difference in CPU architecture, mobile device processors and desktop PC processor support different instruction sets. As you have probably guessed, the instruction set is larger for PCs.Another thing is false advertising. The speed advertised for PC CPU is often achieved and, CPU can run at that speed for long periods of time. This is possible because of excessive power supply from the mains, and decent cooling system that allows to remove the heat from the core. This is not the case for mobile devices. Advertised speed is maximal possible speed but it is much higher than the average speed. Mobile devices will often slow down their CPU, because of overheating and to save battery.And the last but not the least is the availability of additional components like main memory (RAM), cache memory, etc. The amount of RAM is not the only criteria. There is also RAM clock speed that defines how quickly can data be stored and retrieved in/from RAM. These parameters also vary between mobile devices and PCs.You could come up with more differences but the root cause is power consumption and size requirements. PCs can afford to draw more power from the mains and can also afford to be bigger, so they will always deliver higher processing power.For additional reading I recommend: Processors: Computer vs MobileShare Follow edited Sep 8, 2014 at 14:22 answered Sep 8, 2014 at 14:11Art GertnerArt Gertner7,0691111 gold badges4141 silver badges7272 bronze badges41The "Size" of the instruction set (in terms of number of instructions) is almost completely orthogonal to performance. More complicated architectures have shown to be more flexible across more workloads -- for instance, SIMD helps enormously with vectorizable workloads -- but they don't strictly make it faster. This is mostly a red herring. The ISA makes less of a difference than the TDP and fab size factors I pointed out in my answer. – allquixoticSep 8, 2014 at 14:21wrong. Instruction sets make an enormous difference to performance. I write code for a living. Some code we've optimised for Haswell and in many cases it runs between 10 - 300% quicker on Haswell chips compared to the previous generation at a higher clock speed. This is unrelated to TDP. – hookenzSep 10, 2014 at 4:42@MattH: Having some well chosen extra instructions can help a lot. But NOT just "the instruction set is larger." After all, almost half the ISA in a modern Intel x86 chip isn't even used! Old compatibility instructions in 16 bit. Segment registers. An initial power-on sequence straight out of 1980. – Zan LynxSep 12, 2014 at 1:03@ZanLynx, very true regarding well chosen instructions. Not all advanced instructions are available on all processors. AVX is available on Haswell, but not the older generation and obviously not on ARM. – hookenzSep 12, 2014 at 1:24Add a comment | ; 9 Actually MHz rating has little relevance between different manufacturers processors. It only has some relevance to CPU's in exactly the same family. While phone processors are becoming pretty fast and might well beat the pants off those old Pentium 4's, you still cant compare them to even a low end core i3.You should be aware that there are quite a number of factors that influence overall performance and not just from the CPU. For example,CPU clock speedNumber of processor coresNumber of instructions per cycleBranch predictionInstruction setInstruction widthBus widthMemory SpeedCache sizeCache designSilicon layoutSoftware optimisationetcSo the clock speed or MHz rating is just one part of a number of different things that you can use to gauge performance. An AMD processor is rather a different kettle of fish than one from Intel or ARM. It's long been known that an AMD CPU at 3GHz and the same core count does not perform as well as an Intel CPU with the same core count and similar spec and GHz rating.And you'll also note that memory speed affects performance too as well as cache. Noting that server processors have large L1 caches compared to desktop counterparts and those you'll find in your phone. So they spend less time waiting for data than what a phone CPU might.The reason I've added instruction set and software optimisation is that some software can algorithms run better one one chip than another because they can make use of special instructions to speed up certain operations that might otherwise take dozens of instructions. This should not be underestimated.It should be pointed out the TPD has nothing to do with performance. An identical CPU build with a smaller manufacturing process, e.g. going from 32 to 22nm for example will result in a lower TDP in the 22nm vs the 32nm die. But has performance decreased? no, quite the opposite. There does exist cross platform measurements that attempt to gauge relative performance such as the Linpack benchmark. But these are artificial measures and rarely are benchmarks a good indicator of performance for a particular application. Share Follow edited Sep 10, 2014 at 9:42 answered Sep 10, 2014 at 4:46hookenzhookenz4,01333 gold badges3232 silver badges4646 bronze badgesAdd a comment | ; 6 allquixotic's answer gives you the practical side of things very well. I think it'd also be useful to have a short bit on the specifics of a 'clock' is and why all clocks are not created equal. And unless I err, this should hold true across all microprocessors real or theoretical.5 GHz means 5 billion cycles or clocks per second. But what happens in a cycle is not represented in the frequency 5 GHz. If a wheel turns 25 times per second, how far does it travel? It depends on the circumference of course.With a processor, the amount of possible work that can be achieved would be the cycles multiplied by the work per cycle (minus limitations and waiting times).The maximum amount of work done per cycle can be any amount (theoretically). And historically, CPUs have been increasing the amount of work they can do in a cycle. They can do this in a number of ways:When the instruction set's size is increased, they are capable of solving a larger variation of problems in a single cycle.More complex instructions allow for solving more complex problems.Logical optimization allow for solving problems with less steps.These optimization have led to and been made possible by adding hardware to the CPU's cores. Certain mathematical operations become more efficient when you have specialized hardware for them. For instance, working with decimal numbers is quite different from working with integers so modern CPUs have a specialized part of each core to deal with each type of number.Since the cores have become complex, not all parts are used in every cycle, so a recent trend has been to implement some type of "hyper-threading" that combines two completely separate operations into a single cycle since both operations mainly use different parts of the core.As you can see, this makes CPU frequency a very poor indicator of performance. This is also why benchmarks are used in almost any comparison between them since calculating the theoretical performance per cycle is a complicated mess at best.SummarySince the definition of a "core" is arbitrary and varies hugely from processor to processor, the amount of work done per cycle of said core is also arbitrary.Share Follow edited Sep 2, 2017 at 19:53Peter Mortensen12k2323 gold badges6969 silver badges9090 bronze badges answered Sep 9, 2014 at 18:26DanielSTDanielST16111 gold badge22 silver badges77 bronze badges0Add a comment | ; 4 What's the difference between mobile and desktop processors?The salient differences between mobile and desktop processors are:power comsumption: The mobile processor has to powered from small batteries of low voltage and small capacity. Therefore power efficient is a major concern for operational performance and marketing claims. For desktop processor power efficiency is a minor concern. For the gaming segment of the market, power efficiency is practically irrelevant. physical dimension factors: The mobile processor has to be physically small and light as possible. For a desktop processor, size and weight are essentially irrelevant, and have no design targets except for perhaps manufacturing and cost issues.I/O expansion: The mobile processor is for a single-board computer with well-defined and a limited number of peripherals, ports and essentially no expansion capability (i.e. no PCIe bus). Even its main memory capacity is likely to be constrained to a few GiB to minimize the MMU requirements. A desktop processor, on the other hand, has to be capable of large installable main memory, and expansion capability for adapters and peripherals using the (high speed) PCIe and USB buses. The computational power of a mobile processor is severely constrained by these design goals. Fortunately semiconductor/processor technology is advancing so that the latest mobile processors can compare favorably with the computational power of older desktop processors.But for any given point in time, the "best" mobile processor will not computationally outperform the "best" desktop processor. Combined with the restricted I/O expansion, the more-expensive mobile processor would probably only be used in a self-contained all-in-one "desktop" system. My question is does this mean that the new Samsung gadget is more powerful than my desktop?You have to define "powerful" and chose metrics. Almost any single metric (which marketing types like to use) can be manipulated to produce bogus comparisons. Some computers have been known to have been redesigned solely to perform well for specific benchmarks (e.g. measuring FLOPS) while their overall performance may be no better than the competition.A single metric such a CPU clock speed (i.e. GHz) or TDP or fab size can become less relevant and not comparable for evaluating performance as technology changes. Share Follow edited Sep 10, 2014 at 0:19 answered Sep 10, 2014 at 0:08sawdustsawdust16.9k11 gold badge3333 silver badges4646 bronze badgesAdd a comment | ; 4 Power vs PerformanceMobile processors must conserve power (a lot of it) and generate a lot less heat than desktop processors. To serve such a requirement, mobile processors ALWAYS use a much simpler architecture (ARM) than desktop processors (x86/AMD64/x86_64) of the same generation. Indeed, the most useful metric to compare CPUs is the underlying architecture. All the MHz, feature size and number of cores may help only if you are comparing CPUs with similar or related architectures.The CPU architecture/micro-architectureThe architecture of a CPU decides how it executes programs and what algorithms it uses to perform computation and also how it accesses cache and RAM. The architecture also includes the "language"(instructions) the CPU understands. A desktop processor understands language is much more complex than what a mobile processor can understand. Desktop processors understand the complex x86/x86_64 language while mobile processors understand the ARM32/64/Thumb2 language which is a lot simpler so requires more "words" to describe an algorithm and is size inefficient when compared to x86. The reason mobile chips understand simple language is because there is an area and power constraint on the number of transistors that can go into it. A typical desktop processor might execute 8+ CISC(Complex) instructions in parallel and in an out-of-order fashion to offer high performance at the cost of increased power dissipation while a mobile processor might execute only 2 RISC(Simple) instructions out-of-order to conserve power. Desktop processors have a lot more cache (6MB+) than mobile devices(1MB) giving a large performance boost. Further, CISC architectures (Intel x86_64 used in desktops and laptops) offer high code density allowing a larger amounts of information to be packed into a smaller space while RISC architectures (ARM64 used in mobiles) use uncompressed instructions that tend to put more pressure on memory bandwidth since more space is required to convey the same meaning. What I mean is that a 1MB CISC program conveys more information that a 1MB RISC program requiring the RISC program of similar function to perform more memory transfers causing a performance loss.As a general rule, desktop architectures are performance oriented. For example, an SIMD operation on a modern intel processor (desktop) takes only 25% of the time a typical ARM processor (mobile) takes due to the fact that desktops can stuff in more transistors into the CPU since area and power are not constrained.Effect of feature sizeAs a general rule, if a processor of architecture A is ported to a lower technology (say, 22nm to 12nm), its performance improves while its power consumption reduces due to improved transistor performance and efficiency. Thus, for example, a typical ARM Cortex A-5 fabricated at 12nm will offer a higher performance and will run cooler than an ARM Cortex A-5 fabricated at 28nm. However, an ARM Cortex A-15 (a better micro-architecture than the A-5) fabricated at 32nm will run a lot faster than the A-5 at 12nm (it will consume more power, though). Thus, while feature size is an important metric, it sort of loses footing when comparing different micro-architectures/architectures especially when one is far better than the other.Effect of coresDo not get fooled by the core count. They are terrible indicators of CPU performance. Comparing CPUs on the basis of core counts is only useful when they are of the same micro-architecture. Of course, a faster micro-architecture with more cores beats a slower micro-arch with fewer cores. However, a slow quad core will most likely offer worse performance than a high performance dual core processor. A weak quad core may be good at handling 4 simple tasks in time T while a strong (4x faster per core) dual core might be able to handle 4 simple tasks in half the time frame (T/2) since it should be able to process 2 of them in T/4 other 2 for the other T/4 (T/4 + T/4 = T/2). Also beware of quasi-octa cores(most mobiles are quasi in the sense that only 4 cores may be active at any time to save power). Desktops typically offer complete cores with little sharing of resources to enable higher performance at the cost of high power consumption.Effect of Clock FrequencyThis heavily depends on the micro-architecture of the processor.To illustrate this, consider the following problem,3 * 3.Say processor A converts the problem into 3+3+3 and takes 3 clock cycles to execute the problem while processor B directly performs 3*3 using a look-up-table and gives the result in 1 clock cycle. If manufacturer A says the processor frequency (clock cycle) is 1GHz while B says it is 500MHz, B is faster than A since A takes 3ns to complete 3*3 while B takes only 2ns (B is 33% faster than A even though B is running at a 50% slower in clock). Thus, clock speeds are good comparisons only when comparing similar micro-architectures. A better uarch with a lower clock speed might beat an older uarch with a much higher clock speed. Also low clock speeds save power. A high performance uarch at a higher clock speed surely will beat a lower performing uarch with a similar or lower clock speed (sometimes higher as well). So clock speed is not at all a good measure of CPU performance just like core count. Note that mobile processors implement simpler and slower algorithms to compute than desktop processors in order to save power and area. Desktop processors often feature algorithms that are almost two to four times (or more) as fast as their mobile counterparts giving them a distinct edge in performance over mobile processors.** Effect of cache **Cache plays a major role in processor performance than the core speed itself. Cache is high speed RAM inside the processor to reduce requests to RAM. Desktop caches are bigger and faster (there is no restriction on size or power for desktops) than mobile caches thus giving desktops an edge over mobile CPUs. Add the CISC efficiency and desktop caches have an advantage over mobile caches. A 2MB desktop cache beats 2 MB mobile cache simply by instruction density itself (more information in the same space). Caches are very important in determining CPU performance. A processor with a big fast cache will outperform a processor with a small slow cache. However, there is a trade off between speed and size of cache which is why systems have levels of cache. As technology shrinks, caches become a lot faster and more efficient. Of course, the cache architecture also plays a very important role in this regard. It simply isn't that simple to compare caches but cache comparisons are a LOT less perverse than comparisons involving cores or clock speeds.Thus, assuming a constant generation, desktop processors will almost always outperform mobile processors in terms of raw performance while mobile processors almost always consume less power to make up for their relatively poor performance.Share Follow edited Jul 11, 2015 at 3:07 answered Jul 10, 2015 at 5:15Revanth KamarajRevanth Kamaraj14133 bronze badgesAdd a comment | ; 2 Lets use a loose analogy to think of and understand the characteristics of a CPU.Imagine that a CPU is a factory assembling cars. Parts (data) come in, gets sent on conveyer belts where they are assembled. Finally a completed car rolls out the other end (processed data).A simple group of parts like a door might move forward on one step, get a new part added on the next and so on. One process might be used for more than one group so for example the line that makes the door handle assembly would pass on door handle to both the front and rear doors. A more complex group like an engine goes on a longer conveyer route and might take several steps to gather all the parts, more than a single step to put them in a complex arrangment, etc. So in your CPU different commands take a different number of clock cycles to complete and use different parts of the CPU that are dedicated to a task (but might be used as part of more than one type of command).clock speed might be the speed of your conveyer. On every tick the conveyer moves forward to the next step. Running a conveyer faster gets more cars through but you can't do this any faster than the tasks take to complete (in the CPU the limit is the electrical properties of a transistor)die size is the size of your factory (chip). A bigger one can have more going on at once and so get more done.fab size is how big are the assembly robots/people (transistors). When they are smaller you can fit more into the same space. Smaller transistors can run faster and use less power/give off less heat.TDP is how much power your factory can use when running at full capacity. In a CPU this is important because it indicates how much power the CPU will use under full usage but also how much heat it will generate. You can see this only gives a rough indication that there is something going on, TDP can't be used as any indication of performance because the efficiency is dependant on all the other variables. This is common sense really because otherwise how could your PC today be thousands of times faster than one from 5 or 10 years ago without using thousands of times more electricity.When I can't optimize or make my assembly line any quicker, I can simply have another one running alongside, this is like your number of cores. In the same way a factory might share the same access roads/delivery bay cores of a cpu share access to memory, etc.All of these are measurable but there is one fundamental factor left that is not so easy to put a figure on, architecture. My car factory can't easily make a truck, and even less so a boat. The assembly lines are setup for one thing and to make another can still be done but means moving parts from one line to another in a way that is not optimal, wasting a lot of time. Processors are designed for specific tasks, the main CPU in your PC is quite generalised but even so has quite specialised optimisations such as multimedia extensions. One CPU might be able to do a command in 2 steps that another has to split down to 20 basic operations. Architecture can be THE most important factor in determining performanceSo comparing even very similar CPUs on the same platform is quite difficult. An AMD FX and Intel i7 are better at different tasks for any given clock or TDP. A mobile PC processor like an Atom already even harder to compare, the CPU in your phone tough to compare between an ARM cortex and a Qualcomm Snapdragon let alone with a desktop processor.So to conclude, none of these stats let you compare the performance of different types of processor. The only way is to take benchmarks based on particular tasks you are concerned about and running them on each to compare. (Bearing in mind that each platform is very good at specific ones, there is often no clear 'fastest')Share Follow edited Sep 11, 2014 at 11:01 answered Sep 11, 2014 at 10:47JamesRyanJamesRyan1,66111 gold badge1212 silver badges2020 bronze badgesAdd a comment | ; 1 As others stated MHz and GHz should not be used to compare CPU's with each others. They can be used to compare processors with the same architecture or family (you can actually compare i3 4000m with i3 4100m GHz wise because they share same architecture). CPU performance in modern processors is average of factors like die size, architecture, number of cores and frequency. All of those factors taken into account togheter can allow you to position CPU's in terms od performance. Desktop and mobile processors however should not be compared directly.Because they are different on many levels. They have different architecture, different instruction set, mobile processors are much smaller in size and they have to work in different circumstances. Which means that power usage and working temperatures are also important as they are mainly used in mobile devices that have limited supply of power. Also GHz in most of high end mobile processors are empty values. You can't use their full potential for long (in most of the cases) because they tend to throttle (Nexsus 5 is a great example of this, it spots Snapdragon 800 which is throttling even in benchmarks) a lot and MHz and voltage are getting reduced to save chip from getting damaged because of overheating. If you really want to compare them, the most reliable way would be to use linpack (compared to some silly multiplatform benchmarks), refer to this site: Linpack Still this should be used as a resource for sheer curiosity rather than educational purposes as being most reliable doesn't mean being reliable in general.My question is does this mean that the new Samsung gadget is more powerful than my desktop?No and it won't be for many years propably as mobile processors are still very weak compared to desktop ones.Share Follow edited Sep 11, 2014 at 8:18 answered Sep 11, 2014 at 8:13shadovravenshadovraven1133 bronze badgesAdd a comment | ; 1 When processors run they generate heat. Lots of heat. Because mobile devices are considerably smaller than computers, the heat generated by a running mobile processor is often amplified and can seriously harm components, or even melt them. Therefore, the developers and designers of the devices limit, or throttle, the speed at which a mobile processor can run. This means that if a processor is getting hot, it will limit its speed, which equates to slower performance.Because of this throttling, the processor on many phones will actually run slower than the advertised speed. In fact, the advertised speed of mobile processors is normally the maximum. Compare this to most computer processors, where the advertised speed is usually the average running speed, and you begin to see why computers are more powerful.SourceShare Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Mar 17, 2015 at 6:16user3079242user30792422111 bronze badgeAdd a comment | ; 0 My question is does this mean that the new Samsung gadget is more powerful than my desktop?Is the 2.7GHz the same kind of GHz as non-mobile devices (is it scaled up, or compared etc)?For answer of this I will ask a question.Will Intel dual core cpu with 2.7 GHz is more powerful then the Intel core I3 cpu( 2 cores) 2.7 ghz.absolutely not na.....!!!So there are lot of differences in Desktop cpu's only with reference to there cache, size, speed, heat, power , cores etc...Hence The Mobile and Desktop CPU are also be different ...Desktop CPUs are made with considering different requirements as compared to mobile.Share Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Sep 12, 2014 at 6:26smalismali71022 gold badges66 silver badges1919 bronze badgesAdd a comment | ; 0 all answer is goodbut a question not answered !why seemed a desktop cpu cycle is More power than mobile cpu cycle ?The answer is :Desktop cpu use a More Transistor than Mobile cpu Intel Core = 600000000 ~ 1200000000Arm Base = 20000 ~ 40000why ?Because a Desktop cpu Process More Instructions than a Mobile cpuTherefore :More Transistor =More Instructions = More Performance ARM Cortex A7 (4 Core at 1.5 ghz) =2,850 MIPS(million instructions per second)=2850000000 instructions AMD E-350 (Dual core at 1.6 ghz) = 10,000 MIPS(million instructions per second)=10000000000 instructions Tianhe-1A (186,368 cores at 2ghz)=2,670,000,000 MIPS = 2670000000000000You Can Calc instruction Per Cycle or CPIfor more help : http://meseec.ce.rit.edu/eecc550-winter2011/550-12-6-2011.pdfand The next important :a Mobile Cpu like a SnapDragon 801 Max frequence is UP TO 2.2 GHZ this mean frequence not stable at 2.2 GHZ and it started (500 mhz ~ 2.2 ghz) It was decided to HEAT OF CPU Share Follow edited Oct 10, 2014 at 17:58 answered Oct 10, 2014 at 17:38Saeed TaheriSaeed Taheri1111 bronze badgeAdd a comment | 
Sharing/publishing multiple Outlook calendars on intranet
exchange;calendar;microsoft-outlook-2013;exchange;calendar;microsoft-outlook-2013
Sharing/publishing multiple Outlook calendars on intranet Ask Question
-2 A network is built in steps, usually using TCP/IP for the traffic. Routers connect the traffic together. Behind the router is a Server. In a Windows Based environment, this server usually has multiple items installed on it.An Active Directory DomainA Mail ServerAn Intranet SiteOptional: Corporate Internet Site.Servers are usually built in this order also, as the Active Directory controls the Permissions for all the users created in the domain. The mail server, in this case Exchange inherits permissions from Active Directory, as does the Intranet site, in this case Sharepoint.The document I linked to in my comment to you stated that the maximum limit for the number of users is 5000 for Windows Server 2000, but the fact that you're running Outlook 2013 means that you should be using at least Exchange Server 2007, meaning LVR should be enabled. This means you should have virtually no user limit. It may be disabled, as you only have 60 users. Disabling it increases bandwidth used, which will slow down perceived speed. Adding Sharepoint will only compound the problem as the increase in traffic will also increase used bandwidth.In order to Share a Calendar with All Users, one of your users, ideally the person in charge of the calendar must create a Public Calander.Create a Public Folder inside the domain. All the items contained in this folder will be seen by everyone.Add the Public Folder to the Public Folders list in Outlook, if it's not already there.Create a Public Calendar.If you want to use Sharepoint, have the Sharepoint Admin create a public folder like Step 1 Above, and share the Calendar on Sharepoint. I recommend giving every sharepoint user besides the maintainer read only access to the calendar, so that only one user is in charge.Share Follow edited Sep 8, 2014 at 16:16 answered Sep 8, 2014 at 16:10eyoung100eyoung10043933 silver badges1111 bronze badges7Maybe I'm being unclear, but we want each user's personal calendar to be viewable by every user in the company. Not the full information about what or where, only the when. And we would like to see all of the users' calendars at once. I don't see how your answer would help us achieve that, so could you please elaborate on that? – LizzanSep 8, 2014 at 16:21The methodology of Active Directory prevents the use you want, as the user/permission model depends on the users to do the sharing(Bottom Up). This means that the users must each individually share their calendar w/ 59 other users, meaning each user will "see" all 60. If the permission model were top down you could do what you're asking. – eyoung100Sep 8, 2014 at 16:37Ok, then we will have to find another way to accomplish what we want. Thank you very much for your time! – LizzanSep 8, 2014 at 16:411Thats not true at all. You can establish a group with all the users in it and give the group permissions to the calendar. – ssnobodySep 8, 2014 at 18:12@ssnobody Sounds good, could you please elaborate on that? – LizzanSep 9, 2014 at 3:22 | Show 2 more comments
Skype 4.3 without PulseAudio, only ALSA. Any options?
linux;audio;skype;alsa;pulse-audio;linux;audio;skype;alsa;pulse-audio
Skype 4.3 without PulseAudio, only ALSA. Any options? Ask Question
12 +300 You can try using apulse: it is minimalistic pulseaudio emulator made specifically to run Skype 4.3 with ALSA. You need 32-bit build even on 64-bit machine.I personally had troubles with microphone on Ubuntu 14.04, but for most people it works fine.To build apulse on Ubuntu (and related distros), you must install following packages: pkg-config build-essential cmake libglib2.0-dev:i386 libasound2-dev:i386 gcc-multilib (probably some other too).The build process more or less follows the one described in README:mkdir build && cd buildPKG_CONFIG_PATH=/usr/lib/i386-linux-gnu/pkgconfig CFLAGS=-m32 cmake -DCMAKE_INSTALL_PREFIX=/usr -DCMAKE_BUILD_TYPE=Release ..makesudo make installShare Follow edited Mar 7, 2016 at 18:42Matthew M322 bronze badges answered Sep 24, 2014 at 11:43alandaland2,9501616 silver badges2626 bronze badges3struggling to build it from source. could you share the binary? – Art GertnerSep 24, 2014 at 18:521@smc: Here is an archive with binaries and here is quick-and-dirty checkinstall-produced package. I also updated my post with build instructions. – alandSep 24, 2014 at 20:441Just an update: I am using apulse on my 32-bit Linux Mint for several months now. Works as a charm – Art GertnerJan 11, 2015 at 11:56Add a comment | ; 5 I managed to have skype 4.3. running on my (otherwise pure ALSA) system. I'm running openSuSE 13.1, so, I can only describe what I did here. The general idea was to have skype running in a sort of 'pulseaudio jail'.I installed pulseaudio but did not activate it. The most important thing about NOT activating pulseaudio seems to be a lineautospawn = noin /etc/pulse/client.conf.The next preparation step was to modify /etc/pulse/default.pa according to https://wiki.archlinux.org/index.php/Pulseaudio:# BEGIN CHANGED: https://wiki.archlinux.org/index.php/Pulseaudioload-module module-alsa-sink device=dmixload-module module-alsa-source device=dsnoop# END CHANGED: https://wiki.archlinux.org/index.php/Pulseaudio#ORIG: #load-module module-alsa-sink#ORIG: #load-module module-alsa-source device=hw:1,0#ORIG: ### Automatically load driver modules depending on the hardware available#ORIG: .ifexists module-udev-detect.so#ORIG: load-module module-udev-detect#ORIG: .else#ORIG: ### Use the static hardware detection module (for systems that lack udev support)#ORIG: load-module module-detect#ORIG: .endifThen I added two lines to my ~/.asoundrc:pcm.unwantedpulse { type pulse }ctl.unwantedpulse { type pulse }A shell script 'myskype' looks like this:#!/bin/shumask 0cd# 1. step: start pulseaudio in advancemkdir .pulse 2> /dev/nullecho 'autospawn = yes' > .pulse/client.confaplay -q -D unwantedpulse /usr/share/skype/sounds/ChatOutgoing.wav# now pulseaudio should be running# 2. step: important mixer settings - these are hardware dependent and (probably) not really necessaryamixer sset Digital 100% unmute capamixer sset Capture 99% unmute cap# etc etcpacmd set-source-volume alsa_output.dmix.monitor 0x10000pacmd set-source-volume alsa_input.dsnoop 0x11000# 3. step: start skype in background /usr/bin/skype & skypepid=$!sleep 9# to prevent funny programs like firefox from connecting (or even starting)# pulseaudio, we clean up rather quicklyrm -rf .pulse# wait for skype to exitwait $skypepid# 4. step: stop pulseaudiopactl exitsleep 4pactl exitexit 0Now, when I start 'myskype', skype will be started in that 'pulseaudio jail' but everything else is still using ALSA.Share Follow answered Oct 27, 2014 at 19:59drebdreb5111 bronze badgeAdd a comment | ; 3 +150 I had the same-ish problem. There's no workaround, I've already wasted two days to fix the problem. You can install pulseaudio and make it work with an older version of alsa. Because pulseaudio works smoothly with old versions of alsa.I'm using 1.0.16. Here's a script to install this version. I've experienced just one issue so far with pulseaudio and this version of alsa. I had to always start pulseaudio manually after start up so I added it in start up applications.And as far as sound control goes I use pavucontrol instead of alsamixer. It gives you more control over applications. And there are some applications like Skype of example, that asks you to allow it to automatically adjust the mixer levels. These kind of privileges causes pulseaudio to behave in weird ways. Never allow them unless you really have to. But I guess you know that already.Anyway give it a try, hope it works for you. It did for me. :)Best RegardsMohiShare Follow answered Sep 15, 2014 at 22:47MohiMohi60911 gold badge55 silver badges1313 bronze badges2When I get to the part of the script to configure the driver with sudo ./configure --with-cards=hda-intel --with-kernel=/usr/src/linux-headers-$(uname -r) sudo make I get "The file /usr/src/linux-headers-3.2.0-23/include/linux/version.h does not exist. Please install the package with full kernel sources for your distribution" even though I've used apt-get to get my kernal headers. any ideas? Edit: I did a locate, found the version.h, and now it can't find autoconf.h -.- – EdgeCaseBergSep 16, 2014 at 13:31I'm running alsa 1.0.25 and pulseaudio 1.1, haven't rebooted yet but just installed pulse has fixed skype as expected, I'm waiting for the issues to start popping up. I'll update if anything breaks using these two versions. – EdgeCaseBergSep 16, 2014 at 14:01Add a comment | ; 1 Sadly, There is no way to bypass this issue without using pulseaudio. There is even a petition which adresses that problem.But I think that Microsoft won't change that.So you have to decide: Use PulseAudio and Skype or force your relatives to switch the IM. :SShare Follow answered Sep 12, 2014 at 15:28ChristianChristian7,03411 gold badge2222 silver badges3636 bronze badgesAdd a comment | 
Ping piped to txt does output nothing
windows-7;ping;cmd.exe;pipe;windows-7;ping;cmd.exe;pipe
Ping piped to txt does output nothing Ask Question
0 Make sure that the file is writable. Open it with Notepad, type something and try to save.If saving fails, you have to add write permissions for your account. This can be done in file's properties, Security tab.(I've originally suggested this in comments and OP confirmed it was the culprit.)Share Follow answered Sep 13, 2014 at 21:45gronostajgronostaj54.7k1616 gold badges117117 silver badges174174 bronze badgesAdd a comment | ; 0 Is the output from ping going to stderr rather than stdout? If so, this should work:@echo offrem end with ctrl+c yping 192.168.33.65 -t 1>> C:\_ScriptLog\Ping\ping.txt 2>&1Share Follow answered Sep 8, 2014 at 13:54stibstib4,16566 gold badges2727 silver badges3737 bronze badges1does only write the "do you want to abort the batch?(y/n)" message to the textfile... – Reese DuchampsSep 9, 2014 at 8:11Add a comment | 
After logging into MySQL 5.6 successfully as root, it says access denied for root, ERROR 1045 (28000)
mysql;macports;mysql5;mysql;macports;mysql5
After logging into MySQL 5.6 successfully as root, it says access denied for root, ERROR 1045 (28000) Ask Question
Set default outlook send address based on TO field
microsoft-outlook;vba;microsoft-outlook-2013;microsoft-outlook;vba;microsoft-outlook-2013
Set default outlook send address based on TO field Ask Question
How to share a X server between different users on the same machine?
linux;ssh;xorg;linux;ssh;xorg
How to share a X server between different users on the same machine? Ask Question
How do you change the mouse cursor icons in Windows 8(.1)?
windows-8;windows-8.1;cursor;desktop-customization;windows-8;windows-8.1;cursor;desktop-customization
How do you change the mouse cursor icons in Windows 8(.1)? Ask Question
1 Thanks to @crazypotato's link, you have to go through Start > Personalisation and there's a "Change mouse pointers" link on the left.Share Follow answered Sep 8, 2014 at 13:56nathancherenathanchere2,36622 gold badges1818 silver badges2323 bronze badgesAdd a comment |