TOPIC_TITLE
stringlengths
15
156
CATEGORIES
stringlengths
2
199
POST
stringlengths
36
177
ANSWERS
stringlengths
0
51.8k
Fail to re-build package with debuild
linux;debian;build;rebuild;thunar;linux;debian;build;rebuild;thunar
Fail to re-build package with debuild Ask Question
3 Ok, after reading some more tutorials, I figured out how at least a modification + build of it can be done.I first tried this official debian tutorial, which seems to be too old ( dpatch does not work as described )Than I took a try for this 3rd party tutorial which uses quilt to build the patch and debuild for building the package. It seems to work better.I am now able to build a patch for the package thunar and install it ... here the needed steps:# get some packages, needed to do a build from sourcesudo apt-get install quilt build-essential fakeroot devscripts# get the needed build dependencies of thunarsudo apt-get build-dep thunar# get the sources of thunar (no sudo!)apt-get source thunar# enter the sourcescd thunar-1.2.3# define a patch dir for quiltexport QUILT_PATCHES=debian/patches# apply all available thunar patchesquilt push -a# add my own patch ( increase the trailing number in the name ! )quilt new 03_myTestPatch.patch# add files which you are going to modifyquilt add thunar/main.c# modify file ( I just added a comment in my first try, nano is the editor of my choice)# if your editor creates temporary files( e.g. main.c~), make sure to remove them when you finished editingnano thunar/main.c# refresh the patch and de-apply all available patchesquilt refreshquilt pop -a# Add some info into the changelog ( attention, this will make use of your default console-editor, which could be vi )dch -n# build the package ( your patch will be applied )debuild -uc -us# install the package ( version/CPU is OS/system-specific )sudo dpkg -i ../thunar_1.2.3-4.1_amd64.deb.. well I am able to build and test patches now .. however, I still have no idea how to re-build the binaries:debuild cleandebuild -uc -us--> I get the same errors like mentioned above .. clean seems not to be able to remove all files which need to be removed. It seems like this really is a thunar-specific problem.EDIT: Now I know whats wrong. A single folder is somehow missing during the re-build. For now I fixed things by using a script and triggering things by hand instead of using the automated 'debuild':#! /bin/bashcd thunar-1.2.3fakeroot debian/rules cleanfakeroot debian/rules buildmkdir debian/tmp/usr/share/gtk-docfakeroot debian/rules binaryShareImprove this answer Follow edited Feb 10, 2015 at 10:18 answered Feb 9, 2015 at 10:36AlexAlex18211 silver badge1414 bronze badgesAdd a comment | 
Preventing applications from stealing focus
windows;window-focus;windows;window-focus
Preventing applications from stealing focus Ask Question
55 +100 This is not possible without extensive manipulation of Windows internals and you need to get over it.There are moments in daily computer use when it is really important that you make one action before the operating system allows you to do another. To do that, it needs to lock your focus on certain windows. In Windows, control over this behavior is largely left to the developers of the individual programs that you use.Not every developer makes the right decisions when it comes to this topic.I know that this is very frustrating and annoying, but you can't have your cake and eat it too. There are probably many cases throughout your daily life where you're perfectly fine with the focus being moved to a certain UI element or an application requesting that the focus remains locked on it. But most applications are somewhat equal when it comes to deciding who is the lead right now and the system can never be perfect.A while ago I did extensive research on solving this issue once and for all (and failed). The result of my research can be found on the annoyance project page.The project also includes an application that repeatedly tries to grab focus by calling:switch( message ) { case WM_TIMER: if( hWnd != NULL ) { // Start off easy // SetForegroundWindow will not move the window to the foreground, // but it will invoke FlashWindow internally and, thus, show the // taskbar. SetForegroundWindow( hWnd ); // Our application is awesome! It must have your focus! SetActiveWindow( hWnd ); // Flash that button! FlashWindow( hWnd, TRUE ); } break;As we can see from this snippet, my research was also focused on other aspects of user interface behavior I don't like.The way I tried to solve this was to load a DLL into every new process and hook the API calls that cause another windows to be activated.The last part is the easy one, thanks to awesome API hooking libraries out there. I used the very great mhook library:#include "stdafx.h"#include "mhook-2.2/mhook-lib/mhook.h"typedef NTSTATUS( WINAPI* PNT_QUERY_SYSTEM_INFORMATION ) ( __in SYSTEM_INFORMATION_CLASS SystemInformationClass, __inout PVOID SystemInformation, __in ULONG SystemInformationLength, __out_opt PULONG ReturnLength );// OriginalsPNT_QUERY_SYSTEM_INFORMATION OriginalFlashWindow = (PNT_QUERY_SYSTEM_INFORMATION)::GetProcAddress( ::GetModuleHandle( L"user32" ), "FlashWindow" );PNT_QUERY_SYSTEM_INFORMATION OriginalFlashWindowEx = (PNT_QUERY_SYSTEM_INFORMATION)::GetProcAddress( ::GetModuleHandle( L"user32" ), "FlashWindowEx" );PNT_QUERY_SYSTEM_INFORMATION OriginalSetForegroundWindow = (PNT_QUERY_SYSTEM_INFORMATION)::GetProcAddress( ::GetModuleHandle( L"user32" ), "SetForegroundWindow" );// HooksBOOL WINAPIHookedFlashWindow( __in HWND hWnd, __in BOOL bInvert ) { return 0;}BOOL WINAPI HookedFlashWindowEx( __in PFLASHWINFO pfwi ) { return 0;}BOOL WINAPI HookedSetForegroundWindow( __in HWND hWnd ) { // Pretend window was brought to foreground return 1;}BOOL APIENTRY DllMain( HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved ) { switch( ul_reason_for_call ) { case DLL_PROCESS_ATTACH: Mhook_SetHook( (PVOID*)&OriginalFlashWindow, HookedFlashWindow ); Mhook_SetHook( (PVOID*)&OriginalFlashWindowEx, HookedFlashWindowEx ); Mhook_SetHook( (PVOID*)&OriginalSetForegroundWindow, HookedSetForegroundWindow ); break; case DLL_PROCESS_DETACH: Mhook_Unhook( (PVOID*)&OriginalFlashWindow ); Mhook_Unhook( (PVOID*)&OriginalFlashWindowEx ); Mhook_Unhook( (PVOID*)&OriginalSetForegroundWindow ); break; } return TRUE;}From my tests back then, this worked great. Except for the part of loading the DLL into every new process. As one might imagine, that's nothing to take too lightly. I used the AppInit_DLLs approach back then (which is simply not sufficient).Basically, this works great. But I never found the time to write something that properly injects my DLL into new processes. And the time invested in this largely overshadows the annoyance the focus stealing causes me.In addition to the DLL injection problem, there is also a focus-stealing method which I didn't cover in the implementation on Google Code. A co-worker actually did some additional research and covered that method. The problem was discussed on SO: https://stackoverflow.com/questions/7430864/windows-7-prevent-application-from-losing-focusShareImprove this answer Follow edited Oct 5, 2018 at 23:25 answered Mar 24, 2012 at 9:56Oliver SalzburgOliver Salzburg85.2k6161 gold badges258258 silver badges305305 bronze badges3Do you think this solution of yours could be ported to Java? I've been searching and asking questions but found nothing. Maybe I could import the hook library itself in java using jne? – Tomáš ZatoMar 4, 2015 at 15:04@TomášZato: No idea. I'm not actively using this code myself. – Oliver SalzburgMar 4, 2015 at 15:53I'm trying to compile it as C++ at least (and then inject/remove the compiled DLL from Java). But that doesn't go too well either. I don't want to discuss it here in comments, but if you could actually help me with getting it to work, I'd be very graceful! I created a chat room, if I get that to work I'll post comment how to do so here: chat.stackexchange.com/rooms/21637/… – Tomáš ZatoMar 4, 2015 at 15:56Add a comment | ; 24 In Windows 7, the ForegroundLockTimeout registry entry is no longer checked, you can verify this with Process Monitor. In fact, in Windows 7 they disallow you from changing the foreground window. Go and read about its details, it has even been there since Windows 2000.However, the documentation sucks and they chase each other and find ways around that.So, there is something buggy going on with SetForegroundWindow, or similar API functions...The only way to really do this properly is to make a small application which periodically calls LockSetForegroundWindow, virtually disabling any calls to our buggy API function.If that's not enough (another buggy API call?) you can go even further and do some API monitoring to see what's going on, and then you simply hook the API calls on every process after which you can get rid of any calls that mess up the foreground. However, ironically, this is discouraged by Microsoft...ShareImprove this answer Follow edited Apr 10, 2019 at 2:23RockPaperLz- Mask it or Casket7,3942626 gold badges6767 silver badges117117 bronze badges answered Mar 22, 2012 at 9:52Tamara WijsmanTamara Wijsman56.8k2727 gold badges184184 silver badges256256 bronze badges163Does anyone have a reproducible use case of this in Windows 7? Given that people rather experience the opposite (for example, I often find demanding Windows to be hidden behind my current window) and that I am yet to see this happen in Windows 7, it would be pretty annoying to write an application but being unable to test it. Furthermore, as Microsoft states this should no longer happen with Windows 7. At best people discovered that it could only switch the keyboard's focus by accident, this API call would fix that but I don't know how to test whether it actually works... – Tamara WijsmanMar 24, 2012 at 10:471The installer (based on InnoSetup) launches other processes and possible other (hidden) setups, but I don't know what setup creator they're based on. – Daniel Beck♦ Mar 26, 2012 at 15:007@TomWijsman: Open regedit, search for some random text that won't be found. Go into another app and start typing. When the search is finished, regedit will steal focus. – endolithJun 6, 2012 at 18:061@endolith: Not reproducible, using Windows 8 Replase Preview here though. What OS are you using? In my case it just highlights the application at the bottom but doesn't interrupt my browsing at all... – Tamara WijsmanJun 6, 2012 at 19:3125Yes, Win7 Pro 64-bit. And focus stealing is even worse for elevated processes, since they capture your pressing <Enter> when they shouldn't, and you tell it to hose your system accidentally. Nothing should ever be able to steal focus. – endolithJun 6, 2012 at 20:59 | Show 11 more comments; 18 There is an option in TweakUI which does this. It prevents most of the usual tricks dubious software developers employ to force focus on their app.It's an ongoing arms war though, so I don't know if it works for everything.Update: According to EndangeredMassa, TweakUI does not work on Windows 7.ShareImprove this answer Follow edited Mar 20, 2017 at 10:17CommunityBot1 answered Aug 5, 2009 at 9:12Simon P StevensSimon P Stevens5,17311 gold badge2727 silver badges3636 bronze badges72is tweakui compatible with windows 7? – franksterJan 13, 2010 at 9:18@frankster. No idea, sorry, I suspect it probably isn't. Download it and try it. Report back if you do so everyone knows. – Simon P StevensJan 13, 2010 at 15:515Even using the registry setting that TweakUI sets doesn't work on Win7. – EndangeredMassaOct 15, 2010 at 19:19@EndangeredMassa which registry key is that? – n611x007Nov 4, 2012 at 21:492The registry key is HKEY_CURRENT_USER\Control Panel\Desktop\ForegroundLockTimeout (in milliseconds). And yes, it doesn't work in Windows 7 anymore. – fooOct 10, 2013 at 11:33 | Show 2 more comments; 16 +50 I believe that some confusion may exist, as there are two ways of "stealing focus" : (1) a window coming to the foreground, and (2) the window receiving keystrokes.The problem referred to here is probably the second one, where awindows claims the focus by bringing itself to the foreground - without the user's request or permission.The discussion must split here between XP and 7.Windows XPIn XP there isa registry hack that makes XP work the same as Windows 7 in preventing applications from stealing focus :Use regedit to go to: HKEY_CURRENT_USER\Control Panel\Desktop.Double-click on ForegroundLockTimeout and set its value in hexadecimal to 30d40.Press OK and exit regedit.Reboot your PC for the changes to take effect.Windows 7(The discussion below mostly applies to XP as well.)Please understand that there is no way in which Windows can totally block applications from stealing the focus and remain functional.For example, if during a file-copy your anti-virus detected a possible threatand would like to pop-up a window asking you for the action to take, if this window is blockedthen you would never understand why the copy never terminates.In Windows 7 there is only one modification possible to the behavior of Windows itself, which isto use the MS-Windows focus-follows-mouse Registry hacks, where the focus and/or activation goes always to the windows under the cursor. A delay can be added to avoid applications popping up all over the desktop.See this article : Windows 7 - Mouse Hover Makes Window Active - Enable.Otherwise, one must detect and neutralize the guilty program :If this is always the same application that is getting the focus, then this applicationis programmed to take the focus and preventing this may be done by either disabling it from starting with the computer, or use some setting supplied by that application to avoid this behavior.You could use the VBS scriptincluded in VB Code which identifies who's stealing focus, which the author used to identifythe culprit as a "call home" updater for a printer software.A desperate measure when all else fails, and if you have identified this badly-programmed application,is to minimize it and hope that will not then bring itself to the front.A stronger form of minimization is to the tray by using one of the free products listed inBest Free Application Minimizer.Last idea in the order of desperation is to fracture your desktop virtually by using a productsuch as Desktops or Dexpot,and do your work in another desktop than the default.[EDIT]As Microsoft has retired the Archive Gallery, here is the above VB code reproduced :Declare Auto Function GetForegroundWindow Lib "user32.dll" () As IntegerDeclare Auto Function GetWindowThreadProcessId Lib "user32.dll" (ByVal hwnd As Integer, ByRef procid As Integer) As UIntegerPrivate Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load Me.RichTextBox1.AppendText("Starting up at " & Now & vbCrLf) End SubPrivate Sub GoingAway(ByVal sender As Object, ByVal e As System.EventArgs) Handles Me.Deactivate, Me.LostFocus Dim hwnd As Integer = GetForegroundWindow() ' Note that process_id will be used as a ByRef argument ' and will be changed by GetWindowThreadProcessId Dim process_id As Integer = 1 GetWindowThreadProcessId(hwnd, process_id) If (process_id <> 1) Then Dim appExePath As String = Process.GetProcessById(process_id).MainModule.FileName() Me.RichTextBox1.AppendText("Lost focus at " & Now & " due to " & appExePath & vbCrLf) Else Me.RichTextBox1.AppendText("Lost focus due to unknown cause.") End IfEnd SubShareImprove this answer Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Jun 9, 2012 at 9:22harrymcharrymc429k2929 gold badges492492 silver badges871871 bronze badges1753"if this window is blocked then you would never understand why the copy never terminates" That's not true. The correct behavior is to notify the user with a blinking task bar icon (or maybe a balloon pop-up or toaster notification or something). Interrupting the user with a window that intercepts their keystrokes means that they tell the antivirus software to take one action or another at random. Definitely not a good way to do things. – endolithJun 9, 2012 at 12:101"if this window is blocked then you would never understand why the copy never terminates" That's not true. The correct behavior is to notify the user with a blinking task bar icon... There have been times when I clicked a button or something in a running program that causes a new modal dialog to be created (e.g., open file), but then I switch to another program before the dialog is created. As a result, the dialog is hidden and the other program can not be switched to and the dialog cannot be dismissed. Neither its taskbar button nor Alt-Tab works; only forcing the dialog to the front. – SynetechJun 12, 2012 at 4:461@Synetech: Sometimes the only solution to the non-front dialog is to kill the task. The focus algorithms in Windows are really lousy. – harrymcJun 12, 2012 at 6:212@harrymc, I never have to resort to killing one of the apps. I just run my window-manipulating program (WinSpy++ does the trick just great) and hide the window in front, then I can dismiss the stuck-back dialog, then re-show the hidden window. It's not convenient, but it's better than killing either of the processes. – SynetechJun 12, 2012 at 15:061@harrymc, not really; killing an app and losing stuff just makes more steam, and if it is a modal dialog (that locks the parent window and has no taskbar button), then it won't appear in the Alt+Tab list, and, in my experience, a window that has a modal dialog open does not always (never?) show the modal dialog with Alt+Tab, especially if the dialog never had a change to get focus. :-| – SynetechJun 12, 2012 at 18:31 | Show 12 more comments; 5 Inspired by Der Hochstapler's answer, I decided to write a DLL injector, that works with both 64 and 32-bit processes and prevents focus stealing on Windows 7 or newer: https://blade.sk/stay-focused/The way it works is it watches for newly created windows (using SetWinEventHook) and injects DLL very similar to Der Hochstapler's one into the window's process if not present already. It unloads the DLLs and restores the original functionality on exit.From my testing, it works very well so far. However, the issue seems to go deeper than just apps calling SetForegroundWindow. For instance when a new window is created, it's automatically brought into foreground, which also interferes with a user typing into another window.To deal with other methods of focus stealing, more testing is required and I'd appreciate any feedback on scenarios where it's happening.edit: Source code now available.ShareImprove this answer Follow edited Mar 25, 2020 at 9:25 answered Nov 29, 2018 at 12:06bladeblade33644 silver badges55 bronze badges1I tried the app. It seems it needs to be started as admin, otherwise, it'll crash. ViveProSettings.exe caused it to crash for me too so I killed that processed. Once I've worked through these perhaps it's indeed working (haven't seen focus stealing since!) though I couldn't counter-test it by closing it since it crashed on exit too :). I'm not complaining, thank you for your work! I'd just like to figure out how to make it usable. I've e-mailed you with details. – PiedoneMar 24, 2020 at 14:24Add a comment | ; 3 Ghacks has a possible solution:It happens several times a day that some applications steal the focus of the active window by popping up. This can happen for a number of reasons, when I extract files or a transfer finishes for instance. It does not matter most of the time when this happens but sometimes I’m writing an article and it does not only mean that I have to type some words again but also that I lost concentration and have to click to regain focus.The Pro Reviewer website has a tip on how to prevent this from happening. The easiest way of preventing focus stealing is to use Tweak UI which has a setting that is called “Prevent applications from stealing focus”. Checking this option prevents that other applications pop up suddenly and steal the focus of the window you are currently working in.This only works when the application has been minimized before. Instead of stealing the focus it will flash a number of times which can be defined in the same menu in Tweak UI. If you do not want to use Tweak UI you can change the setting in the Windows Registry.Navigate to the Registry key HKEY_CURRENT_USER > Control Panel > Desktop and change the ForegroundLockTimeout value to 30d40 (Hexadecimal) or 200000 (Decimal). The key ForeGroundFlashCount defines the amount of flashes of a window to alert the user where 0 means unlimited.ShareImprove this answer Follow answered Aug 5, 2009 at 9:13Ivo FlipseIvo Flipse24.6k3131 gold badges102102 silver badges147147 bronze badges221This doesn't work on any OS after XP. That registry value is already set to that (by default, I believe) and doesn't work anyway. – EndangeredMassaOct 15, 2010 at 19:181Just to second that I'm on Windows 7 (64-bit), experiencing focus-stealing (VS 2012 when finally active, f'r example), and the above registry-suggestion is already in-place. Technical confirmation in this answer: superuser.com/a/403554/972 – Michael PaulukonisFeb 24, 2014 at 16:03Add a comment | ; 0 I figured out how to stop the TaskBar from flashing a newly activated target window after you programmatically activate, maximize, and focus the main window of that process from another process. First of all, there are a lot of restrictions on whether this operation will be allowed."The system restricts which processes can set the foreground window. A process can set the foreground window only if one of the following conditions is true:The process is the foreground process.The process was started by the foreground process.The process received the last input event.There is no foreground process.The foreground process is being debugged.The foreground is not locked (see LockSetForegroundWindow).The foreground lock time-out has expired (see SPI_GETFOREGROUNDLOCKTIMEOUT in SystemParametersInfo).No menus are active.https://docs.microsoft.com/en-us/windows/desktop/api/winuser/nf-winuser-allowsetforegroundwindowSo if the controlling process is in the foreground, it can temporarily enable another process to fully steal the foreground by calling AllowSetForegroundWindow with the process id of the target process. Then after that, the target process can call SetForegroundWindow itself, using its own window handle, and it will work.Obviously, this requires some coordination between the two processes, but it does work, and if you're doing this in order to implement a single-instance app which redirects all Explorer-click launches into the existing app instance, then you'll already have an (e.g.) named pipe to coordinate things anyway.ShareImprove this answer Follow edited Apr 10, 2019 at 2:30RockPaperLz- Mask it or Casket7,3942626 gold badges6767 silver badges117117 bronze badges answered Mar 26, 2019 at 7:52Glenn SlaydenGlenn Slayden1,3851111 silver badges2020 bronze badgesAdd a comment | 
Clone entire disk to image using clonezilla and keep bootloader(s)
backup;disk-image;clonezilla;backup;disk-image;clonezilla
Clone entire disk to image using clonezilla and keep bootloader(s) Ask Question
4 Clonezilla disk image by default images the partition table(s), bootloaders, and all types of partitions. I believe it makes an assumption that the MBR or primary GPT and any boot loader that is not located in its own partition is located within the first 1 MiB on the disk. This is the case by default with all of the disk tools that I've ever heard of or used in both Linux and MS, including software raid.I also believe it makes special effort to copy the backup GPT if it exists from the end of the disk.All partitions are also imaged. If it doesn't understand the partition it just copies the whole thing byte for byte.I'm not sure what options it gives if there is no MBR or GPT, like in the case of ZFS on bare disks or simply corrupt partition tables. I assume there is an option, probably in the advanced section to simply copy the whole disk byte for byte.ShareImprove this answer Follow answered Feb 8, 2015 at 22:05BeowulfNode42BeowulfNode421,87722 gold badges1616 silver badges2323 bronze badges0Add a comment | 
Removal of everything between two characters in Ms Word
windows;microsoft-word;regex;windows;microsoft-word;regex
Removal of everything between two characters in Ms Word Ask Question
7 I need a search pattern to remove everything between the "<" and ">" characters.Set "Find What" to \<(*{1,})\>Set "Replace with" to an empty string. Check "Use wildcard"Notes:< and > are special characters that need to be escaped using \* means any character{1,} means one or more timesFurther readingFind and replace text by using regular expressions (Advanced)ShareImprove this answer Follow edited Dec 10, 2015 at 9:16barlop22.6k3939 gold badges137137 silver badges215215 bronze badges answered Feb 8, 2015 at 21:54DavidPostill♦DavidPostill149k7777 gold badges343343 silver badges383383 bronze badges3Your code works for < and > but it doesn't seem to work with [ and ] When I use wildcard with this : \[(*{1,})\] word can't find anything but if I only look for [ or ] without wild card, all the [ and ] are found. Any idea why? ( I tried with and without the ` to escape the [` and ] ). Thanks for your help! – MagTunDec 10, 2015 at 6:47This is a different question to the OP. Please ask your own question and include examples of the text before and after you required changes. – DavidPostill♦ Dec 10, 2015 at 8:26Sorry for this, here is my question: superuser.com/questions/1011506/… – MagTunDec 10, 2015 at 8:50Add a comment | 
Does Keepass protect passwords from malicious software like viruses?
security;virus;password-management;keepass;security;virus;password-management;keepass
Does Keepass protect passwords from malicious software like viruses? Ask Question
4 If a virus is on your computer at the time any program handles sensitive data, you're hosed.KeePass does as much as it can to protect your passwords from malware, but no solution can be bulletproof; once malware is running on your computer, the machine cannot be trusted. Let's look at some of the security features:Database encryption. Without your keying material (master password and keyfile if you have one), it's not possible to recover the plaintext of the passwords. That means that if a copy of your hard drive is stolen or if you never unlocked the KeePass database, your passwords are safe.Memory protection. KeePass, according to its security page, makes efforts to never leave plaintext in memory. However, when you use a password, the plaintext has to be in memory at least for a short while. Any program running under the same security context as KeePass has access to that memory, and if malware is quick (i.e. designed to do this), it can grab your passwords. Malware running as administrator/root can read (or write!) any process's memory.Alternate desktop. When prompting for the master password, KeePass creates a new desktop and switches your view to it. Normal keyboard hooks installed on the main desktop won't apply to the secure desktop. Again, though, malware running as admin can do anything, including inspecting other desktops or hooking events at a lower level. (Your OS obviously knows what keys are typed.)Plug-in authentication. KeePassRPC requires that plug-ins identify themselves to KeePass. There doesn't, however, appear to be any way to stop malicious programs from talking like a valid client (sending the same authentication responses) but doing bad things with the data it gets. Again, rootkits or malware running as admin could just grab the passwords while their plaintext is in memory.Cryptographic self-tests. When KeePass starts up, it makes sure that encryption functions work correctly by putting some constant data in and verifying the output. That's nice, but sophisticated rootkits would just produce the right results while squirreling the plaintext away.If you did unlock the database while malware was present, you should definitely change your passwords.ShareImprove this answer Follow answered Feb 3, 2016 at 17:14Ben NBen N39.3k1717 gold badges137137 silver badges173173 bronze badgesAdd a comment | 
IP subnet /17 for latter range (x.x.128.0 - x.x.255.255)
subnet;subnet
IP subnet /17 for latter range (x.x.128.0 - x.x.255.255) Ask Question
1 IP address slash notation and subnet masks and be confusing, but thanks to online calculators like this, you can easily experiment. This should work:115.93.128.0/17Note the range would be from 115.93.128.1 to 115.93.255.254 since there is no 0 network address and 115.93.255.255 is reserved for the broadcast address. The netmask would be 255.255.128.0. But this is close enough I would hope.ShareImprove this answer Follow answered Feb 8, 2015 at 21:27Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badgesAdd a comment | 
PuTTY exits after entering password (log : “This account is currently not available”)
ssh;putty;ssh;putty
PuTTY exits after entering password (log : “This account is currently not available”) Ask Question
3 Opening a ticket with the hosting provider is likely the best move.It looks like the "This account is currently not available" message is coming from the shell which is invoked after logging in.It's likely that the account which you're attempting to ssh into has been disabled by the hosting provider or by an entry in the shell rc files.ShareImprove this answer Follow answered Feb 8, 2015 at 21:58Nick AustinNick Austin3122 bronze badges0Add a comment | 
Linux re-install Windows boot partition
linux;windows-8;partitioning;multi-boot;fedora;linux;windows-8;partitioning;multi-boot;fedora
Linux re-install Windows boot partition Ask Question
0 If partition is there and only content is changed then it is recoverable. If partition is deleted then I can't help. If partition is there then you can recover it as:Boot windows from DVD or flash drive make sure you are booting the same window version and same architecture like if installed version is windows 8 64bit then flash or DVD must have the same.Go windows install menu but do not click on install now but click repair computer and then go to Troubleshoot option and advance option and then command prompt.On command prompt type bootrec.exe /FixMbr and press enter.Then Type bootrec.exe /FixBoot and press enter.Exit the command prompt and reboot computer.If it recovers the windows efi then fine. If not follow the below process:Type diskpart and press enter.Type listdisk and press enter.Type select disk Type list partition and press enter.Type select partition .Type active and press enter.Close the command prompt and raboot the windows it will bring the winsows up.If it delete the menu of Linux and do not show Linux menu you can add it from windows using easybcd software(If at all needed).ShareImprove this answer Follow answered Feb 8, 2015 at 21:30Abhijatya SinghAbhijatya Singh34111 silver badge1111 bronze badges2Ok that's helpfull. The partition is still there, but the previous win 8 iso I downloaded did not boot. I am currently downloading a different (hopefully better) iso on a new usb – SlidonFeb 8, 2015 at 23:57solved, I booted successfully from a windows usb but encountered a lot of different errors while trying to repair the boot so I ended up just re-installing windows over the old one and now its working great! Thx :D – SlidonFeb 9, 2015 at 12:27Add a comment | 
Windows 8.1 hangs when entering "Startup options"
windows-8;boot;drivers;windows-8;boot;drivers
Windows 8.1 hangs when entering "Startup options" Ask Question
1 I just had the same problem, and again, no documentation on it online. In my case, turns out Windows 8.1 din't know how to interact with USB in the "Startup options" menu, so not only the keyboard(s), but USB mice and other USB devices were not powered on while in the menu. Two possible solutions,If your BIOS allows for that, enable "Legacy USB support" in BIOS. I disabled that option thinking it's no longer required for modern OSs, but apparently, I was wrongAttach a PS/2 keyboard. This solution is somewhat retro, but might suit someone. Bear in mind that PS/2 is not plug & play (at least officially), so you need to reboot the computer after attaching a PS/2 device. So attach a PS/2 keyboard, reboot, go to Startup Options, reboot, get to Startup menu, use keyboard, done.I hope this helps someone in the futureShareImprove this answer Follow answered Mar 31, 2020 at 0:06tabdiukovtabdiukov1271010 bronze badgesAdd a comment | ; 0 I don't know if this is the answer, but at least it worked for me after a couple of desperate attempts.First I tried to reboot and press F8 continuously to get into the startup menu. This, for some reason, didn't work at all. I couldn't enter the menu.Eventually I rebooted using the command shutdown /r /o, which reboots and brings up the options menu. This was the same menu as I found in Settings before, so I was afraid it wouldn't work. But I tried it anyway, and this time the menu didn't hang, so I was able to toggle the setting. I was able to install the driver (I still got the warning, but I could override it). And the AVR programmer now works fine.Really weird. I didn't try the steps in my question just once, but quite a lot of times. So it's either a weird coincidence or a weird bug that it now worked after rebooting from the command line.ShareImprove this answer Follow answered Feb 8, 2015 at 20:55GolezTrolGolezTrol29911 gold badge33 silver badges1515 bronze badgesAdd a comment | 
Windows 7: Connect to Android device using WPA2 PSK
windows-7;wireless-networking;android;hotspot;wps;windows-7;wireless-networking;android;hotspot;wps
Windows 7: Connect to Android device using WPA2 PSK Ask Question
1 I believe the type of connection you're trying to use is WPA2 PSK, which is short for Wi-Fi Protected Access 2 with Pre-Shared Key.In Windows 7, go to Control Panel -> Network and Sharing Center -> Manage Wireless Network -> Add -> Manually create a network profile In here, enter your access point's name (SSID, whatever you have setup on your phone). Choose WPA2-Personal as the security type, and choose AES as the encryption type. Type in your password in the Security key box, and you may choose to check Start this connection automatically or Connect even if the network is not broadcasting if you like. Hit next, and your computer should now automatically be tethered to your phone.ShareImprove this answer Follow answered Feb 9, 2015 at 0:33rocfobrocfob9311 silver badge77 bronze badgesAdd a comment | 
Can I mount fully encrypted HDD from another HDD? (TrueCrypt)
windows-7;ubuntu;hard-drive;encryption;truecrypt;windows-7;ubuntu;hard-drive;encryption;truecrypt
Can I mount fully encrypted HDD from another HDD? (TrueCrypt) Ask Question
1 Install truecrypt on ubuntu and either mount the volume or fully decrypt it.ShareImprove this answer Follow answered Feb 19, 2015 at 11:39OvermindOvermind9,76844 gold badges2525 silver badges3737 bronze badgesAdd a comment | 
How to select all arrows of a certain colour in PowerPoint?
microsoft-powerpoint;microsoft-powerpoint
How to select all arrows of a certain colour in PowerPoint? Ask Question
4 Not directly possible in PowerPoint. If you're fairly good with VBA, you could write some code to do the job.If you only need to do this once in a while, it's probably not worth the effort, but if you'll be changing these things regularly, there are a couple of addins that might help.I have an add-in called ShapeStyles that lets you "memorize" the style of one shape then apply it to others and also set the shape's style as "sticky", meaning that when you redefine the style, all of the similarly styled shapes in the whole presentation get set to the new style.The add-in itself is commercial but the free demo allows you to create up to five styles. That might be all you need. http://www.pptools.com/shapestyles/There's also a free Selection Manager add-inhttp://www.pptools.com/FAQ00135.htmIt lets you select any number of shapes then save the selection as a named selection, one you can recall (ie, re-select) at any time.ShareImprove this answer Follow answered Feb 20, 2015 at 21:08Steve RindsbergSteve Rindsberg5,43611 gold badge1515 silver badges1717 bronze badges2Hi Steve, is it still not possible natively in PowerPoint to select things with matching properties, e.g. formatting or color, across slides? Or alternatively, create something like a "cross-slide spanning layer" where you can put things, and then show or hide that "layer"? – David.PAug 6, 2022 at 15:[email protected] Still not possible, I'm afraid. In fact, you can't select anything across multiple slides. It might be possible to do what you're after with a few custom layouts, though. Put the stuff to be shown on one layout, then remove them from a duplicate layout and assign the appropriate layout to relevant slides. – Steve RindsbergAug 6, 2022 at 16:21Add a comment | ; 1 PowerPoint has no option for selecting objects by color or shape.A commercial extension that has this capability isPPT Productivity add-in for PowerPoint.Unfortunately, this tool is part of their Power Tools, which costs$149 per user/year, with 30-days trial.ShareImprove this answer Follow answered Aug 7, 2022 at 9:16harrymcharrymc429k2929 gold badges492492 silver badges871871 bronze badgesAdd a comment | ; 1 +50 Here are three approaches (A,B,C) which can be taken:A) Change theme colorsPowerpoint uses "theme colors" which can be easily changed. In most cases this will work, especially if you create your PPT carefully from the beginning.There are 10 basic colors, plus lighter/darker variations of those. If you have used standard colors, go to solution (B).Customize/Change your colors (see also this detailed description to understand more about themes)Go to View -> Slide masterSelect Colors -> customize colors. This opens the "create new theme colors" dialogue. The colours should match those of your current active theme.Now, change the color(s) as needed. Give your theme colors a name such as "MyColors". Please note that this will change the colors both of shapes and text.If you later want to change a specific color, go back to the slide master view, and in the "colors" drop-down right-click on the "MyColors" palette and select "Edit". Re-change the colos(s) as needed.You can also create several theme colors, and switch between them as needed.NOTE: To make all elements of one color "disappear", change that color to the same color as the slide background.B) Search-replace by macroIf solution (A) doesn't work for you, you'll either have to use a third-party plugin, or write a macro. This SU answer has a script for text color replace: it should be fairly easy to adapt it to object color replace.If you need help adapting your macro, ask on stackoverflow.C) Hide/Show objects by Macro - independent from colorSpecifically to answer the Bounty. Taken from this stackoverflow thread.The idea is, that you will create grouped objects on each slide, only for the elements that you want to show / hide.Then, create a macro which shows/hides only the grouped objects in the whole presentation, using the following code:Sub Numbers()Dim sld As SlideFor Each sld In ActivePresentation.Slidessld.Shapes("Shape Group").Visible = msoTriStateToggleNext sldEnd SubShareImprove this answer Follow answered Aug 8, 2022 at 12:061NN1NN3,76511 gold badge1313 silver badges3131 bronze badgesAdd a comment | 
Kinect for Windows v2 vs Kinect for Xbox One
kinect;kinect
Kinect for Windows v2 vs Kinect for Xbox One Ask Question
3 Just as @Ramhound said on the Question comment, these two sensor are functionally identical. Recently MS also announced in a blog that they will no longer produce Kinect for Windows v2 sensor, developers should just use Kinect for Xbox One sensor + Kinect Adapter for Windows. And they also said in that official blog: both Kinect for Xbox One and Kinect for Windows v2 sensors are functionally identical, our Kinect for Windows SDK 2.0 works exactly the same with either.Here is the link for that blog.ShareImprove this answer Follow answered May 20, 2015 at 9:14YaOzIYaOzI56955 silver badges88 bronze badges1Are the resolution (color and depth) of them also the same? – DerzuOct 28, 2015 at 2:03Add a comment | ; -1 The firmware on the devices are different. I tried to connect a Kinect for window to my xbox one s and it doesn't recognise it. However both would work on a PC for windows development.ShareImprove this answer Follow answered Jan 14, 2017 at 20:08DennisADennisA1Add a comment | 
Does an IO port address belong to RAM?
linux;memory;cpu;io;linux;memory;cpu;io
Does an IO port address belong to RAM? Ask Question
3 Back to the root of the IBM PC which used 8088 microprocessor, separate address rooms were used for RAM and IO. The 8088 processor supported 20 bit addresses when accessing RAM, but used only 16 bit addresses for access IO. There was an extra pin on the processor to signalize whether RAM or IO is addressed. This procedure is called port-mapped I/O and is still being used by actual X64-processors. So the address 0x378 for parallel port does not present an address in RAM.ShareImprove this answer Follow edited Feb 19, 2015 at 15:47 answered Feb 19, 2015 at 15:39user3767013user37670131,39711 gold badge99 silver badges66 bronze badges2Means that address is built in processor ? processor already know that 0x378 is for parallel port and not for any other devices. – Usr1Feb 20, 2015 at 6:30In the time before plug and play, I/O cards had either static address (like LPT:), or could be configured by jumpers or DIP-switches (to configure whether the card works as COM1: or COM2:). The processor didnot care about it, it was the BIOS who expected to find parallel port under 0x378. – user3767013Feb 20, 2015 at 7:56Add a comment | ; 1 Let's imagine that a CPU has only 4 pins (bits) to address devices. It means that it can select up to 16 devices, from 0000 to 1111. Now think that RAM adressses are from 0000 to 0111 (8 addresses, very limited RAM), it leaves only other 8 (from 1000 to 1111) for other devices (Hard Disk, Serial Port, USB Port, Ethernet, Wifi,etc).The same thing happens in a very big scale on actual CPUs, they have a space to address all the hardware limited by physical pins on the CPU. When the CPU starts, BIOS recognize the hardware installed and assign address space for each one of them.In older systems, as DOS and Windows 3.1 it was usually established manually by configuration files as autoexec.bat and config.sys or by dip-switches and jumpers directly on the hardware. Modern systems do it dinamically via mechanisms as PCI and PCI Express.ShareImprove this answer Follow edited Feb 19, 2015 at 15:53 answered Feb 19, 2015 at 11:29jcbermujcbermu16.9k22 gold badges5050 silver badges6060 bronze badges1Although modern PCI-related devices use memory-mapped I/O to access the hardware, legacy devices such as LPT: or COM: are still accessed with port-mapped I/O. – user3767013Feb 19, 2015 at 15:49Add a comment | ; 1 This isn't up to the OS, but the CPU. And the answer varies between CPU families. On x86 (AMD/Intel), the answer is NO. The port example you give is typical for x86 PC's, and you can see from the length (16 bits) that it's not a 32 or 64 bits RAM address. The x86 has special instructions to communicate with IO ports, and these IO instructions know that IO addresses are 16 bits.On ARM chips, which you might find in your phone, IO port addresses are in the same address range as RAM (but obviously at different addresses). An ARM chip uses the same type of instructions to read IO ports and memory, so in both cases you need a 32 bits address.ShareImprove this answer Follow answered Feb 19, 2015 at 16:02MSaltersMSalters8,11711 gold badge2121 silver badges2929 bronze badgesAdd a comment | 
Frequent BSOD 0x9F driver_power_state_failure
windows-7;drivers;bsod;nvidia-geforce;windows-7;drivers;bsod;nvidia-geforce
Frequent BSOD 0x9F driver_power_state_failure Ask Question
0 The error is generated by nVidia display driver. Instead of recovering from a crash, it crashes the whole system bus driver. Since system drivers cannot be user-altered, theres is nothing you can do directly to the driver.You should use a stable, older driver like 332.21 or 325.x. Try to get the driver from your manufacturer's website, to make sure that it is compatible with your device. If you can, try to note the version number (in your case 311.00) and download it directly from the nVidia website not Acer's. OEMs tend to alter/customize drivers.ShareImprove this answer Follow edited Mar 1, 2015 at 13:51thecatlover1996544 bronze badges answered Feb 19, 2015 at 9:42OvermindOvermind9,76844 gold badges2525 silver badges3737 bronze badges13Thanks for the tip, I will install 332.21 and see if I get any more blue screens in the next few days. If I don't, I'll set this one "solved" :) – thecatlover1996Feb 19, 2015 at 10:43If you are in luck, the new driver did not break anything in windows and things will work fine with the older version. – OvermindFeb 19, 2015 at 11:02This honestly is horrible advice. The 347 driver branch is stable its been out for more then 3 months only receiving updates for new game releases. Based on a duplicate question, their solution to this problem, was to reinstall the drivers. Others have had to resort to replacing the hardware. If fresh Windows installations have this problem that is a good sign its a hardware issue not a software problem. – RamhoundFeb 19, 2015 at 12:34Hardware problems are much more unlikely than software problems. As for the 347 series, I do not validate them as stable yet and I do extensive testing with drivers on multiple cards and OSes. There are way too many compatibility issues with other than DX11 games, specially physx related. Do not forget that nVidia drivers are the number one error generator in the post-Vista era. – OvermindFeb 19, 2015 at 13:29@Overmind - Who says they are the number one error generator? Because I have seen lots of problems with Intel and AMD display drivers also. I still believe using an older display driver to be bad advice. – RamhoundFeb 19, 2015 at 14:14 | Show 8 more comments
Launchy: can't use a shorcut to create a new email for a specific person using Outlook 2013
microsoft-outlook-2013;launchy;microsoft-outlook-2013;launchy
Launchy: can't use a shorcut to create a new email for a specific person using Outlook 2013 Ask Question
0 I copied Outlook.exe to a new folder path without spaces, updated my shortcut with the "/c ipm.note" flags to point to that new exe location, and it did work. Unfortunately it takes a couple seconds to open - I think it's initializing a new instance of Outlook behind the scenes.ShareImprove this answer Follow answered Apr 3, 2019 at 13:37MikeMike1Add a comment | ; 0 What you have done works great.Here's an alternative: using the Weby plugin,use this as the URL: mailto:%1I named this emzz (to make it unique)I type emzz (Tab) emailaddressBoom, my default email client opens a new email to that person.You can get very fancy with additional fields typed into Launchy.This gives you subject and cc fields, then you'd have to do something likemailto: %1 %2 %3and type:emzz (Tab) [email protected] (Tab) SAMPLEsubject (Tab) [email protected] reference for the structure of the mailto: URL is here: https://developer.yoast.com/blog/guide-mailto-links/ShareImprove this answer Follow answered Jun 2, 2021 at 13:47Benj Benj 1Add a comment | 
Is it possible I would get hacked by using DNS service? [closed]
networking;security;dns;networking;security;dns
Is it possible I would get hacked by using DNS service? [closed] Ask Question
0 A DNS service is Domain Name Resolution. A DNS server takes a web URL (e.g. www.google.com) and translates it to an IP address (in Google’s case, 216.58.216.206). A DNS would not change what a website sees as your location.It is theoretically possible that an attacker could pose as a public DNS server via a Man-in-the-Middle attack and redirect legitimate browser requests to lookalike phishing sites or sites that attempt to load malicious scripting and what have you.This would, however, require access to a private network’s configuration or require the victim to be using a public or poorly secured network.If you’re on a public network like many businesses offer, it’s possible, if unlikely, that an attacker is using hardware to imitate the public hotspot to capture data traffic.If this is legitimately concerning you, you can, however, take a few easy steps to protect yourself whilst connected to a public network.Do not preform any sensitive browsing (online banking, ordering things on Amazon, etc) on public networks.When inputting a URL, prefix with https:// to attempt to force the page to load securely. If the network is compromised or the site’s security certificates are invalid, you will be unable to load the page, however.Google Chrome (unsure about Firefox, I doubt IE does this) has a blacklist of reported malware and phishing sites and automatically blocks you from browsing to said pages.There are slightly more advanced steps possible, like using a VPN to secure your public internet connection, but I'm not very familiar with VPN setup.ShareImprove this answer Follow edited Feb 19, 2015 at 1:51Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badges answered Feb 19, 2015 at 1:48astv25astv2543633 silver badges99 bronze badgesAdd a comment | 
Where does this name come from? root@<hostname>
linux;centos;centos-6;linux;centos;centos-6
Where does this name come from? root@<hostname> Ask Question
1 After updating the hostname your current instance won't be updated. Use "su root" orlogout and login. Then Bash should display your new hostname.ShareImprove this answer Follow answered Feb 19, 2015 at 3:04Robin HoodRobin Hood3,40122 gold badges1818 silver badges3636 bronze badgesAdd a comment | ; 0 You should change your hostname in /etc/hostname and in /etc/hostsIf you want to find the file that contains that string 28004-2-2734499 you may want to to a grep search like this:sudo grep -rnw '/etc/' -e "28004-2-2734499"Other ways to change host like this; leave out the brackets: sudo hostname [newhostname]Or:sudo sysctl kernel.hostname=[your_new_hostname]Otherwise take a look at this other question and see if that helps.ShareImprove this answer Follow edited Apr 13, 2017 at 12:37CommunityBot1 answered Feb 19, 2015 at 2:49Dean SpicerDean Spicer64111 gold badge55 silver badges1414 bronze badgesAdd a comment | ; 0 When I adjust hostnames on machines that already have a hostname set, I do the following. First, I check what the hostname is set to using plain hostname like this:hostnameThen after checking what the current hostname is set to, I change it to something new like this; of course change [new_hostname] to match your new hostname:sudo hostname [new_hostname]On Debian/Ubuntu-based systems I then edit /etc/hostname to set the new hostname:sudo nano /etc/hostnameThat file should simply contain the hostname as you wish it to be; nothing more or less. Then I run the init.d script to make that change active; note this is not always needed on all Debian/Ubuntu-based systems:sudo /etc/init.d/hostname.sh startOn RedHat/CentOS-based systems, the file /etc/sysconfig/network might need to be adjusted. When you open it it might have entries like this:NETWORKING=yesHOSTNAME="my_hostname"GATEWAY="192.168.0.1"GATEWAYDEV="eth0"FORWARD_IPV4="yes"Note this is an example; just pay attention to what the value of HOSTNAME is and change it to match the hostname value you want set.Finally, regardless of Unix flavor, checking and setting the kernel hostname. Running this command will show you what the current kernel hostname setting is:sysctl kernel.hostnameThe output would be something like this:kernel.hostname = my_hostnameNow to change that, just run this command; of course change new_hostname to match whatever new hostname you want it to be set to:sudo sysctl kernel.hostname=new_hostnameAfter all that is done, you might have to change your /etc/hosts file to match the new hostname settings:sudo nano /etc/hostsBut when all of that is done, just logout and then log back into the server. The new hostname should now be set.ShareImprove this answer Follow answered Feb 19, 2015 at 3:31Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badgesAdd a comment | 
OSX: ssh: Could not resolve hostname: nodename nor servname provided, or not known
macos;networking;ssh;dns;network-shares;macos;networking;ssh;dns;network-shares
OSX: ssh: Could not resolve hostname: nodename nor servname provided, or not known Ask Question
6 Fixed adding to /etc/hosts:192.168.1.67 macpro.localFor some reason ~/.ssh/config is not enoughShareImprove this answer Follow edited Oct 2, 2017 at 18:38 answered Sep 21, 2015 at 17:25drew1kundrew1kun2,02866 gold badges3838 silver badges5858 bronze badgesAdd a comment | ; 4 This message implies that you do not have sufficient filesystem permissions for the file containing your key. Use chmod 600 to set the rights correctly.ShareImprove this answer Follow edited May 26, 2017 at 19:37Will Dereham10566 bronze badges answered Feb 19, 2015 at 9:50ryderryder14711 silver badge66 bronze badges3thank you, I've already found this out... Kinda fixed my ssh connection (deleting all the keys and generating them from scrach), BUT when doing /usr/sbin/sshd -t still get this: Could not load host key: /etc/ssh_host_rsa_key Could not load host key: /etc/ssh_host_dsa_key interesting, that when I do sudo /usr/sbin/sshd -t I don't get any warnings... Could you explain why? And should I fix anything? – drew1kunFeb 19, 2015 at 22:27The system prevents you for starting sshd as standard user and using the systemwide hostkey. This is the reason why you did not get the message when using sudo. Sudo execute the followed command with admin rights. Then the sshd is able to use the hostkey from /etc. – ryderFeb 20, 2015 at 9:031I understand all this, but you didn't answer why and how to fix it. In fact I can ssh now as a standart user although I still have this messages... – drew1kunFeb 21, 2015 at 2:13Add a comment | ; 2 The reason you get "Could not load host key" is probably because those files contain private keys and are protected. Try:sudo /usr/sbin/sshd -tAs to lookups for macpro.localnot working, check sharing settings. Below the "Computer Name" field, it should tell you the name that other computers can access your desktop with. The "Edit" button lets you alter that.ShareImprove this answer Follow answered Feb 19, 2015 at 1:53Wilfredo Sánchez VegaWilfredo Sánchez Vega12122 bronze badges1well on the desktop sudo /usr/sbin/sshd -t gives the same result, but on laptop I get that nice msg:@ WARNING: UNPROTECTED PRIVATE KEY FILE! @ What should I do with it??? And as to sharing settings - all is correct and should work, but it doesn't – drew1kunFeb 19, 2015 at 2:45Add a comment | ; 1 I met the similar issue, I can ping my <hostname> but when I ssh it, just report can't resolve.I solved this problem by adding an empty line at the end of /etc/hosts!By the way, it happened on macOSShareImprove this answer Follow answered Apr 15, 2021 at 2:10Zhang ChenZhang Chen1122 bronze badgesAdd a comment | ; 0 Personally, I had an issue with my ~/.ssh/config file. I had to remove the host which was the host of my remote machine.I just had to keep my ~/.ssh/config asHost *ServerAliveInterval 300ServerAliveCountMax 22ShareImprove this answer Follow answered May 3, 2021 at 20:33A. AttiaA. Attia10111 silver badge33 bronze badgesAdd a comment | 
What files can I safely enable NTFS compression for on Windows 7/8 USB bootable drive?
windows-7;usb;ntfs;compression;windows-7;usb;ntfs;compression
What files can I safely enable NTFS compression for on Windows 7/8 USB bootable drive? Ask Question
3 When considering compression for small files, keep in Mind the NTFS cluster size of 4K: Files, that are below 4K and can not be compressed enough to fit entirely into the MFT record (i.e. more than a few byte) will use 4K before and after. A file of 7K with a compression rate of less than 1.8 will also use 8K before and after. Text files will benefit most from compression, as they allow for a high compression rate, executables will benefit much less.For a bootable drive, it might be much easier to just leave out some files - do you need notepad.exe and friends? Do you need all locales in boot?EditAs @Goyuix tested, the EFI bootloader (bootmgr.efi) has to remain uncompressed. This is to be expected, as it is not read by Windows, but by the EFI firmware, which knows nothing about compressed files.The same holds true for the classic bootloader (bootmgr), which is read by BIOS, again knowing nothing oof file system compression.Both firmware dialects just read a consecutive length of bytes into memory, then transfer control to them, which would obviously not work, if they are compressed.ShareImprove this answer Follow edited Feb 19, 2015 at 1:29 answered Feb 19, 2015 at 0:50Eugen RieckEugen Rieck19.5k55 gold badges4949 silver badges4545 bronze badges3The EFI bootloader doesn’t matter with NTFS because it won’t ever be used. ;) – Daniel BFeb 19, 2015 at 21:34@DanielB - Goyuix tried it, and bootmgr.efi has to stay uncompressed. It might be called from the first-stage bootloader in the EFI system partition, I don't know. – Eugen RieckFeb 19, 2015 at 21:39Who knows how he came to this conclusion. Considering how Setup still boots after removing the file it can’t possibly be relevant. Of course, when using FAT32 to be UEFI-bootable... you can’t compress it anyway. ^_^ – Daniel BFeb 19, 2015 at 21:54Add a comment | ; -1 Zip, gzip, LZH and other common compression schemes are lossless and reconstitute the file verbatim, so it is safe to compress anything, but as you implied, some files are already compressed, e.g. DOCX, XLSX, JPEG, MP3 and MP4, so you would gain little or nothing for those. See Why don't some files compress very much?. [BTW, JPEG and the Motion Picture (MP) compression are lossy schemes, which is why high-end cameras can save RAW data, as well.]ShareImprove this answer Follow answered Feb 19, 2015 at 0:59DrMoishe PippikDrMoishe Pippik22.4k44 gold badges3434 silver badges5050 bronze badges4I appreciate the information, but this really doesn't answer the question of can I safely enable NTFS compression for the boot & install files. – GoyuixFeb 19, 2015 at 1:12A flash drive does not have a boot record per se unless you are making bootable media. Nowhere in your question do you state so. Reword your question to be specific. – DrMoishe PippikFeb 19, 2015 at 20:55I updated the question to be more clear. This is for bootable media to install Windows. – GoyuixFeb 19, 2015 at 21:17In that case, any encryption is problematical. Boot media, by definition, has to be able to open and install all files. If one arbitrarily compresses a file, whether text (which might be instructions used during deployment), or anything else, how would the installation algorithm "know" that the file must be unpacked? It would be simpler to omit a file you know is not used on your PC, e.g. a foreign driver, though even that might cause a failure. – DrMoishe PippikFeb 20, 2015 at 18:35Add a comment | 
Fill rows down quickly (column or matrix of zeros)
microsoft-excel;microsoft-excel-2010;microsoft-excel;microsoft-excel-2010
Fill rows down quickly (column or matrix of zeros) Ask Question
4 If you want to create a block of zero'sHi-light (select) the areatouch the 0 keytouch Ctrl + EnterShare Follow answered May 28, 2014 at 21:17Gary's StudentGary's Student19.1k66 gold badges2525 silver badges3838 bronze badgesAdd a comment | ; 2 To create a column of 0's in Excel:insert a 0 into one cell.copy that cell, for example by right-clicking the mouse and selecting 'copy'select the blank rows you wish to fill with 0's by left-clicking the mouse and draggingto high-light the desired blank cells.press control-v on the keyboardYou can also select a block of empty cells containing many columns and rows.Share Follow answered May 28, 2014 at 17:12Mark MillerMark Miller40755 gold badges1212 silver badges2727 bronze badgesAdd a comment | ; 2 To create a column of a certain digit / letter:Insert the number (0 in your case) (eg. A1)Select that cell (ie. A1)In the name box at the top left (where it says your cell reference), change it to a range (eg. A1:A20)Press Enter ↵Press Ctrl + D (shortcut for 'fill down')This is easier than dragging over each cell if you have 100s of cells you want to do this to.Screenshot (I can't show the cells being highlighted after pressing Enter because Print Screen removes it > <):Share Follow edited May 29, 2014 at 12:21 answered May 28, 2014 at 17:17ᔕᖺᘎᕊᔕᖺᘎᕊ6,11344 gold badges3232 silver badges4545 bronze badgesAdd a comment | 
How can I switch the tuleap's interface?
tuleap;tuleap
How can I switch the tuleap's interface? Ask Question
2 You need to install tuleap-theme-flamingparrot RPM and then switch to it in your preferences (My Personal Page).Once installed you can also update local.incShare Follow answered May 28, 2014 at 20:51Manuel VACELETManuel VACELET34922 silver badges77 bronze badgesAdd a comment | 
Edit vim syntax highlighting options for a specific file type
vim;syntax-highlighting;markdown;vim;syntax-highlighting;markdown
Edit vim syntax highlighting options for a specific file type Ask Question
1 :syn list shows you all syntax definitions; the group for _this_ is markdownItalic. To change the visual appearance, just link this syntax group to a different highlight group (:hi lists them all), e.g. to turn off the highlighting:hi link markdownItalic NormalYou can put that into your ~/.vimrc to make it permanent. You may want to consider switching to a high-color terminal (if possible); it looks like you're running with very few (2 / 16) colors.Share Follow answered May 28, 2014 at 17:18Ingo KarkatIngo Karkat22.2k22 gold badges4242 silver badges5858 bronze badges1Perfect, thanks. I am using a high colour terminal, but unfortunately it doesn't render italics :) – FlashMay 28, 2014 at 17:21Add a comment | ; 1 It looks like you have Tex fragments inside your Markdown document. An alternative approach would highlight those with the correct syntax. My SyntaxRange plugin allows to highlight just those regions as Tex, e.g.::11,42SyntaxRange texShare Follow answered May 28, 2014 at 17:25Ingo KarkatIngo Karkat22.2k22 gold badges4242 silver badges5858 bronze badges2Hmm, I would need some way of detecting the ranges automatically based on $, $$, \[ etc. Sounds like a good project at some stage. – FlashMay 30, 2014 at 7:52The plugin also has an API that lets you specify start and end patterns for the (Tex) range. The command from the answer is mostly for manual definition of a range. – Ingo KarkatMay 30, 2014 at 8:14Add a comment | 
Mac stuck on gray screen
macos;boot;macbook;macos;boot;macbook
Mac stuck on gray screen Ask Question
0 What troubleshooting steps have you tried? Have you tried clearing the Nv ram? Also have you tried using diskutil to verify any issues. Also, you can also boot the machine into safe mode by holding the shift key. The machine will run a few tests while booting into safe mode. This could possible resolve the issue for you as well. Usually the grey screen is from a corrupt os. In shortboot - hold command + option + p + r (let machine post 3 times)boot - hold shift to bring machine into safe mode (does machine boot?)boot - hold command + r - open diskutil - select disk - verify disk(does disk show errors?)Share Follow answered May 29, 2014 at 14:08SudoNinjaSudoNinja1111 bronze badge1Hi I have tried all this. Yes, the file boot.efi is either corrupted or locked. Any clue on how to unlock it? – user3684457Jun 1, 2014 at 17:44Add a comment | 
How do I Connect a 30yr-old Tandy 1400LT laptop to the internet?
ethernet;laptop;serial;ethernet;laptop;serial
How do I Connect a 30yr-old Tandy 1400LT laptop to the internet? Ask Question
30 The OS should be no problem as it is a 386 hardware. You'll probably need 4MB of RAM (likely higher) at an absolute minimum to run Linux, and likely 16MB to run any distribution or kernel with a decent software selection since 2000 or so. If you can't upgrade the RAM you are stuck.Some brief searches seem to suggest this has an 8088 with 512KB or 768KB or RAM, though. Modern Linux won't run on that at all. (You may want to keep an eye on ELKS, the Tandy's NEC CPU is mentioned in the boot/setup.S file.)I did get Linux booted on an old 1995-era "Winbook" laptop via floppy, I believe I used muLinux.rs-232c connectorThe way to "convert" serial to a network connection is PPP. You would need to set up a PPP client on your laptop, and have a pppd running on another Linux/Windows host that can route your ppp connection to your outgoing Internet connection.You can probably still use it as an ssh terminal somehow if you install SSHDOS on it.If anything, put an RS-232 adapter on your Linux system, configure your inittab to spawn a getty on ttyS0 or ttyUSB0 and use a DOS terminal program to access your system.Share Follow edited Jun 2, 2014 at 15:57Scott Leadley22311 silver badge66 bronze badges answered May 28, 2014 at 17:08LawrenceCLawrenceC71.9k1515 gold badges123123 silver badges211211 bronze badges134One Option might also be to use a actual 56K modem that I have here and do a real dialup-connection to a ISP. I have read that some providers provide free-of-charge dailup connections. That would be the most "matching" sollution. – Clemens BergmannMay 28, 2014 at 20:066Freedos might just run on it (freedos.org), 2MB or more RAM for optimal performance, but 768K should probably work alright. Not sure about the HD size though. Freedos has an ssh client as well (freedos.org/software/?prog=ssh2dos). – MaQleodMay 28, 2014 at 20:292@CristianCiupitu No, FreeDOS should be fine with an 8088/8086 compatible. See my comment on the question proper. – userMay 28, 2014 at 21:132@ClemensBergmann I really doubt that machine will be able to keep up with a 56 kbit/s data stream on the serial port. Considering that it's from long before 16550 UARTs became common, it'll have an 8550 UART at best, which will be a serious bottleneck for high-speed serial port communications. – userMay 28, 2014 at 21:146I believe the CPU is too slow for anything involving encryption to be usable. – Thorbjørn Ravn AndersenMay 29, 2014 at 14:43 | Show 8 more comments; 35 Well, if you're really feeling old-school, you can go back to a prehistory I'm barely old enough to remember!You will need:A copy of DOS to run on the TandyKermit (the terminal emulator, not the frog)A null modem cable (or for some realold-school cred, a couple of dial-up modems & phone lines)A machine running some kind of Unix-like OS, connected to the internet, with a serial port.Configure the Unix machine's getty or eqiuvalent so you can log in on the serial console.Connect the Tandy to the Unix machine's serial port.Either using the null modem cable or via the two modems and the telephone network.Fire up the terminal emulator. Dial the modem if required.Log in to the Unix box.Use links (or lynx), ftp, PINE, or any other favorite text-mode internet software.For best results watch this while setting it all up.Share Follow answered May 28, 2014 at 21:04voretaq7voretaq72,0611616 silver badges1515 bronze badges105Yes, we really did live like this once. For my first few years on the Internet with a Windows box you'd have the dial-up connection open a terminal window after it dialed the number so you could log in to the server and type ppp at the shell prompt. Then you'd close the terminal and let Windows proceed to negotiate the PPP connection. All so my high-tech Netscape 3.x browser could render frames and tables. – voretaq7May 28, 2014 at 21:15What no mention of gopher or nntp reader like tin? – ZoredacheMay 28, 2014 at 21:43PINE > tin! If you know of a reasonable entry into the Gopher tunnels these days I'd be quite happy to include that though... – voretaq7May 28, 2014 at 22:032+1 It should be noted, though, that this just turns the Tandy into a relatively dumb serial terminal. It would work, of course, but you might just be able to do a little more with it... – thkalaMay 29, 2014 at 6:432@thkala I am old enough to have actually done this many moons ago, as well as connect a 8088 machine (which is very close to this V20) to the Internet using a net card under MS-DOS. MS-Kermit was usable with a single telnet session, but for multiple sessions it was too slow. I believe the user ended up using NCSA Telnet. – Thorbjørn Ravn AndersenMay 29, 2014 at 15:51 | Show 5 more comments; 13 I have a 1400HD and oddly enough do connect it to the internets.The best method is to get a Xircom PE3-10BT ethernet adapter which will connect to the 1400's parallel port. The PE3 has a DOS ODI driver which will let you use a TCP stack like mTCP, WATTCP, PC/TCP, etc. mTCP includes a irc, ftp, telnet and other clients and works well.Next would be to connect a Digi One SP or linux box running tcpser to the 1400's serial port and use it as a virtual modem. Either will emulate a modem connected to com1 letting you use a normal terminal software such as procomm, telix, qmpro on the 1400 to telnet. Share Follow edited May 30, 2014 at 6:02Renju Chandran chingath1,45533 gold badges1212 silver badges1919 bronze badges answered May 30, 2014 at 4:45Adam UstineAdam Ustine13122 bronze badges3That sounds very interesting. the PE3 (early 90s) was not available with the tandy (late 80s) but it seems a realistic combination. If you got the PE3 running why would you add an additional "virtual modem"? – Clemens BergmannMay 30, 2014 at 5:53+1 for the internet connection that probably goes as fast as the main memory. I ran my Mac Classic online for a while, connected by SCSI (a parallel port bus) to ethernet. – PotatoswatterMay 30, 2014 at 9:54Correct, no need to add a "virtual modem" if you were using the Xircom ethernet adapter. I only offered it up because running tcpser on Linux is virtually free vs $50-20 for the Xircom adapter. IMHO the serial port on the 1400 is too slow to be useful. Also the Xircom PE1 (PocketEthernet) was first released in 1988 just a year and some months after the 1400 so it's period correct for this device and does work well. – Adam UstineMay 30, 2014 at 12:34Add a comment | ; 12 May I suggest that you try Minix v2.0? It will run on XT hardware like your laptop, although it will probably take some fiddling.Minix 2.0 is reasonably full-featured and there is a contributed PPP driver that will also run on XT-style hardware. You can then use PPP over a serial connection to a properly networked Linux system. Finding an SSH client that will work on Minix with so little memory is more of a challenge, however...Share Follow answered May 28, 2014 at 20:21thkalathkala2,07911 gold badge1919 silver badges2323 bronze badgesAdd a comment | ; 9 NAME:1400 HDMANUFACTURER:Tandy Radio ShackTYPE: PortableORIGIN: U.S.A.YEAR:1987END OF PRODUCTION: UnknownBUILT IN LANGUAGE: MS-DOS, GW-BASIC & DESKmate delivered on disksKEYBOARD: full stroke keyboard, 76 keysCPU: NEC V20 (Intel 8088 equivalent)SPEED: 4.77MHz or 7.16MHzCO-PROCESSOR:Intel 8087-2 (8 MHz) math co-processorRAM: 640 KB + 128 KB available for RAM-based disk driver or print spoolerROM: 16 KBTEXT MODES: 40 x 25, 80 x 25GRAPHIC MODES: 640 x 200 (monochrome 9'' LCD backlight display), conform to IBM CGACOLORS: 16 shades of blue with built-in LCD display. Colours with external monitorSOUND: Sound beeperSIZE / WEIGHT: 3.5 x 14.5 x 12.5 inches / 13.5 lbs 370 x 310 x 80 mm / 5KgI/O PORTS: AC adapter, Centronics/parallel (DB-25 F), RS232/serial port (DB-9 M), RGBI output for color monitor (DB-9 F), composite video output, enhanced keyboard (5 pin Din F), 2 internal slots (modem, I/O bus)BUILT IN MEDIA: LT & FD : 2 x 3.5'' floppy disk drives (DS DD, 720 KB each) HD: one 3.5'' floppy disk drive (720 KB) + 20MB hard diskOS: Tandy DOS 3POWER SUPPLY: External PSU - 15v DC 700mA and internal battery (12 volt, 2200 mAh, 4 hours of continuous use)PERIPHERALS: 1200 baud modem, 128 KB expansion RAMdrive, external hard-diskPRICE: $1599 (USA, 1987)According to the above specs, in order to connect this properly you would need to find the original 1200 baud modem listed in the PERIPHERALS section and connect using dial-up. 1200 baud = 1200 B/s. You will need something similar to the device shown on image below: Share Follow edited May 30, 2014 at 14:04 user201265 answered May 28, 2014 at 19:59eyoung100eyoung10043933 silver badges1111 bronze badges172The fact that weren't faster modems at that time, doesn't mean that the serial port itself can't do higher speeds like at least 38400 bps. – Cristian CiupituMay 28, 2014 at 20:08@CristianCiupitu I'm not disputing that, but if the OP wants authenticity like me, he would stick with the modem. – eyoung100May 28, 2014 at 20:111I think that this might actually be the most promising Option. I would start with a "not that authentic"-variant with a newer modem and if I stumble upon an matching modem I would "downgrade" to that. Do you think that drivers might a problem? I have not worked with modems in ages. Do the just talk AT commands over RS232? – Clemens BergmannMay 28, 2014 at 20:18@ClemensBergmann, You're forgetting something here though. With the limit in RAM(640k + 128k add-in), your not authentic variant must be between 300 baud and the 1200 baud pictured, and must be external, unless the internal slots aren't used. Even internally, the speed can't be over 1200 baud. – eyoung100May 28, 2014 at 20:2311200 baud and 1200 bits/sec are for all intents and purposes the same. So about 150 bytes/second, give or take. The four hours use time on battery is pretty impressive, though, all considered. – userMay 28, 2014 at 21:15 | Show 12 more comments; 5 You are not going to run Linux or any multitasking OS, the 8088 simply does not have the MMU required. Your only chance is DOS using something like Arachne DOS browser - or an old version of it that fits into your available memory. If only want to use it as a console, it's easy enough using a DOS terminal program.Share Follow answered May 29, 2014 at 17:22ArachneArachne5111 bronze badge32Multitasking does not require an MMU. – PotatoswatterMay 30, 2014 at 9:551Indeed, ELKS and Minix are examples of multitasking OSes which this machine can run. – RuslanMay 31, 2014 at 13:59Or Windows 3.x. I'm fairly certain Windows 3.0 could run just fine on an 8088/8086 (I know it ran on a 286, because I did at one point run it on a 286-equipped PS/2, and I think 3.1 could be made to run in standard mode on such hardware). It's multitasking, albeit cooperatively (not preemptively) multitasking. Not sure if you could cram even Windows 3.0 into 768 kB RAM, though, and even if you can fit Windows into that it won't have the RAM to do much of anything useful; 1.5-2.0 MB RAM is probably a practical minimum. But CPU-wise it should be okay, if you don't need a speed demon. – userJun 2, 2014 at 9:57Add a comment | ; 3 One option that comes to mind, given that you admit in your question you only really want to use it as a SSH terminal anyway, would be to use a terminal emulator on the Tandy to act as a serial terminal to a more modern computer, connected over RS232.You could still effectively "SSH out" to hosts on the internet although obviously in this case the laptop itself is not actually on the net. But it would definitely be a lot more usable.Share Follow answered May 29, 2014 at 6:03CoxyCoxy2,05211 gold badge1313 silver badges88 bronze badges3Hi, that was also one of the first things that came to my mind. But I think for the sake of authenticity I think I want to at least leave the building without using a computer that is more powerful than the laptop. I have not used computers back then but what seems most authentic is placing a modem on a spare phone line connected to a spare server at work and use a modem at the Tandy to remotely dail in to the server. Do you think that this would be a realistic use case in the 1980s? – Clemens BergmannMay 29, 2014 at 8:42Oh yes, dialing directly into your workplace is a perfectly cromulent use case for those times. – CoxyMay 30, 2014 at 0:20There is a DOS SSHv2 client around. – mirabilosMay 30, 2014 at 22:50Add a comment | ; 3 Try using a Console server / terminal servers / serial server / device server - different names for the same thing. You can connect to it via your RS-232 port (assuming you get the cable right - you may need to build one) and from there out via ethernet to the internet. But why bother. Its cheaper and more fun to get a Raspberry Pie, have a real linux distro on a modern processor, and if you want to go old school boot it up using the Risc OS or use one of the many available emulators.Share Follow answered May 29, 2014 at 14:51RobertRobert3111 bronze badgeAdd a comment | ; 0 Unless you're doing this project as a hobby in and of itself, I would hesitate to even try connecting something that old and primitive to a network. It's likely to be far more work than you bargain for, and is very likely to cause system problems. If you're green and don't want to toss a working piece of equipment (I'm that way), a better use for this might be a direct serial connection (null modem?) to a headless server, as a maintenance console in a normally lights-out environment.Share Follow answered May 29, 2014 at 14:19Phil PerryPhil Perry28411 silver badge77 bronze badgesAdd a comment | ; 0 You should checkout what this guy has already done and not re-invent the wheel if you don't have it :)http://users.telenet.be/mydotcom/library/network/dostcpip.htmHe describes how to get a TCP/IP stack working under DOS, although everything is using a dial up there are links to DOS browsers and other stuff.Share Follow answered Jun 2, 2014 at 7:19silversilver10122 bronze badgesAdd a comment | ; 0 Given that system specs you cannot run a current linux distro in that machine as said above but i think you can build your own linux to fit that laptop, check Linux From Scratch tutorials and maybe you can install a simple core linux with just a bash terminal.2 other options are:Become programmer (if you are not already) and build your own OS Ask a programmer to develop an OS for you (look for arduino and small-medium devices programmers)Share Follow answered Jun 2, 2014 at 12:14Isidro.rnIsidro.rn111 bronze badgeAdd a comment | ; 0 The modem connects to the motherboard with a 20 pin connector. Remove the internal modem. (It connects to the uart) U can use that connector and connect wifi to it. Then you can simply use a terminal program and some AT commands to connect to the internet wireless. There are many cheap boards that do this. There are bluetooth boards also. You can keep the com port to use for your mouse.Arachne is a very good graphical browser that runs on DOS. No need for linux, Dos 6.22 does it all.Share Follow answered Jun 23, 2019 at 0:45MarcMarc10122 bronze badgesAdd a comment | 
Excel spreadsheet undoes/reverts to previously saved state
microsoft-excel;microsoft-excel-2010;microsoft-excel;microsoft-excel-2010
Excel spreadsheet undoes/reverts to previously saved state Ask Question
2 You may want to do your own versioning - Saving a new file as FileName_Date.xlsxI'd also check the autorecovery settings to see how often it's saving / where and consider turning it off. Share Follow answered Aug 7, 2014 at 2:41Jason GordonJason Gordon4122 bronze badgesAdd a comment | ; 0 This could be because it's one single machine. - You could also check if ctrl and z buttons are stuck. - If any other software or applications are running which may be causing this.Share Follow edited Jul 7, 2015 at 11:39mic842,36322 gold badges2121 silver badges1717 bronze badges answered Jul 7, 2015 at 9:17PavanPavan11Add a comment | ; 0 Very simple solution.Install a key-logger (there are legit uses to them including this one).Keep working in excel as usual.Once that problem occurs go and look back at the log and you will be surprised to see that Ctrl+Z was logged.Trust me on this one. Her Ctrl key is fixed and her Z key is also malfunctioning.Share Follow answered Sep 20, 2015 at 1:27RajRaj8955 bronze badgesAdd a comment | ; 0 Wireless mouse!!!This is not an April Fool answer!!They are capable of random movement of the pointer and of click actions:Typically, they contain two batteries and will illuminate with just one.Batteries are often left in for so long that they leak and corrode the connections.Eventually, the circuits are temporarily starved of voltage and this is what causes the malfunction, which humans prefer to believe is a virus, etc. Share Follow answered Mar 20, 2016 at 22:23TuesusMalnexTuesusMalnex8855 bronze badgesAdd a comment | 
Truecrypt, killed process, still able to copy files on external disk
truecrypt;truecrypt
Truecrypt, killed process, still able to copy files on external disk Ask Question
1 The GUI process only serves as a management interface for the kernel driver. This driver does all the heavy lifting, including encryption and decryption.Bottom line: This is expected behavior. You can even close it normally while volumes are mounted IIRC.Share Follow answered May 28, 2014 at 20:16Daniel BDaniel B56.9k99 gold badges115115 silver badges151151 bronze badges2Thanks. And this driver get loaded as soon as you mount the disk with truecrypt? – mirageMay 29, 2014 at 6:13@vrocipes The driver is always running. You can see it in Device Manager when you enable the “Show hidden devices” option, in the “Non-Plug and Play Drivers” category. – Daniel BMay 29, 2014 at 11:20Add a comment | 
How to block div on website permanently using Chrome?
google-chrome;blocking;google-chrome;blocking
How to block div on website permanently using Chrome? Ask Question
30 For this kind of thing, I normally recommend the Stylus Add-on for chrome.Browse to the site when you have installed the add-on and go to:Stylus (Icon) > Write Style for > Click on the part of the URL you'd like the div to disappear on.Use a code similar to the following to hide the div:.comments {display: none !important;}Save (CMD+S), and you should notice the div is now hiddenShare Follow edited Jan 27, 2022 at 10:37CommunityBot1 answered May 28, 2014 at 13:53Fazer87Fazer8712.4k11 gold badge3434 silver badges4747 bronze badges22FYI: After the scandal following Stylish's data collection practices, the code has been forked, cleaned and re-published as "Stylus". Rejoice! – Vincent VancalberghAug 16, 2018 at 8:39Updated URL: chrome.google.com/webstore/detail/stylus/… – OwenSep 25, 2018 at 13:30Add a comment | ; 14 You can use Adblock Plus chrome or firefox extension. When enabled, click its extension icon and then click "Block element". Then you can click an element in the page that you want blocked.Adblock Plus will then block that element each time it is found.Share Follow answered Oct 17, 2016 at 16:48AndrewAndrew15111 silver badge44 bronze badges64Dunno why this was downvoted. Adblockers have supported blocking elements for a very long time now. So if you can create a rule for it in Stylish, you can block it using Adblock Plus or uBlock Origin, because they support CSS selectors. – Daniel BDec 23, 2016 at 17:281Nice! Used AdBlock Plus for many years but never noticed that neat feature. Sometimes I get those "duh" moments ;-) – derybMar 20, 2018 at 22:002WOW! Great tip. Thank you. With Adblock Plus you can easily remove any element you wish. – HomTomJun 26, 2018 at 9:163Much easier than the accepted solution – OwenSep 25, 2018 at 13:321This was soo easy! Also sharing @deryb's "duh" moment! Definitely the best answer :). – theforestecologistMay 27, 2020 at 15:40 | Show 1 more comment; 1 You can use Stylebot chrome extension. After installing go to the website, open Stylebot and use the arrow-tool for selecting the DIV. Then look for Layout and visibility and click on hide. The DIV will disappear and the change will be persisted. Of course, you can undo that whenever you want.Share Follow answered May 28, 2014 at 13:52drkblogdrkblog2,5751414 silver badges1313 bronze badges11Stylebot did not seem to work for me. Stylish recommended in the other anwer works great. – Tim SwastFeb 18, 2016 at 18:19Add a comment | ; 0 In addition to Adblock (mentioned by Andrew) this also works with uBlock Origin. I clicked the element picker (eyedropper), selected the element, and then clicked the create button. Poof, gone!Share Follow answered Jul 14, 2021 at 19:28jashad2jashad21Add a comment | 
bash autocompletion + command history using sudosh on AIX
bash;history;autocomplete;aix;sudosh;bash;history;autocomplete;aix;sudosh
bash autocompletion + command history using sudosh on AIX Ask Question
0 I don't know sudosh, it seem very old.First you have to know witch profile to load, is it .profile, .bash_profile, .bashrc ? Can you show us your PATH? echo $PATHshould return something, if not, that is why the TAB doesn't work.About the command history, you have to check if you have a .bash_history inside your home directory with the right permission and ownership. Type this command to see if you have an history :historyIf not, check what i told you.It can help me if you can post an ls -l inside your homeShare Follow answered Jun 11, 2014 at 0:51user3163621user31636211911 bronze badgeAdd a comment | ; -1 Should load .bash_profile because bash is configured as default shell. $ echo $PATHecho $PATH/usr/bin:/etc:/usr/sbin:/usr/ucb:/usr/bin/X11:/sbin:/usr/java6/jre/bin:/usr/java6/bin$ historyhistory 1 echo $PATH 2 history 3 ls -la 4 cat /dev/null > .bash_history 5 ls -la 6 exit 7 echo $PATH 8 history$ ls -lls -ltotal 0$ ls -lals -latotal 24drwxr-xr-x 2 srarol staff 256 Jun 11 09:39 .drwxr-xr-x 14 bin bin 4096 May 15 16:00 ..-rw------- 1 srarol staff 68 Jun 11 09:40 .bash_history-rw-r--r-- 1 srarol staff 255 Jun 11 09:37 .bash_profile>>cat .bash_profile# Local EnvironmentPS1='\[\e[1;36m\]${ORACLE_SID}\[\e[1;35m\] \[\e[1;33m\]\u\[\033[1;35m\]@\[\e[1;32m\]\h\[\e[0m\] $PWD $ 'EDITOR=viexport PS1 EDITOR# vi parameter AIXcase `uname` in AIX) EXINIT="set ll=20000000" export EXINIT ;;esacShare Follow edited Jun 12, 2014 at 11:43 answered Jun 11, 2014 at 7:43user332331user332331111 bronze badge2This doesn't really answer the question, does it? .bash_profile is just a file, but clearly it doesn't have the right contents or there is some other problem. Posting a directory listing of your own machine isn't an answer. – mtakJun 11, 2014 at 8:01Sorry? It should load .bash_profile. I have a .bash_history file with the correct permissions. It is all shown by the listing above. The content of .bash_profile should be ok. – user332331Jun 12, 2014 at 11:38Add a comment | 
How much clock drift is considered normal for a non-networked windows 7 PC?
windows-7;date-time;windows-7;date-time
How much clock drift is considered normal for a non-networked windows 7 PC? Ask Question
4 I would also like to know what is the typical ("expected") clock drift of standard RTCs found in common PC hardware. The NTP FAQ from www.ntp.org provides some information on the topic:3.3.1.1. How bad is a Frequency Error of 500 PPM? says that a 500 PPM error corresponds to a drift of 43 seconds per day, and "Only poor old mechanical wristwatches are worse."From 3.3.1.2. What is the Frequency Error of a good Clock?:I'm not sure, but but I think a chronometer is allowed to drift mostly by six seconds a day when the temperature doesn't change by more than 15° Celsius from room temperature. That corresponds to a frequency error of 69 PPM.I read about a temperature compensated quartz that should guarantee a clock error of less than 15 seconds per year, but I think they were actually talking about the frequency variation instead of absolute frequency error. In any case that would be 0.47 PPM. As I actually own a wrist watch that should include that quartz, I can state that the absolute frequency error is about 2.78 PPM, or 6 seconds in 25 days.For the Meinberg GPS 167 the frequency error of the free running oven-controlled quartz is specified as 0.5 PPM after one year, or 43 milliseconds per day (roughly 16 seconds per year)8.3.1.1.1. How accurate is the CMOS clock? mentions (typical?) frequency errors in the range of 12 to 17 PPM for one specific machine.Share Follow answered Jan 22, 2015 at 9:15GrodriguezGrodriguez48511 gold badge55 silver badges1414 bronze badgesAdd a comment | ; 1 Most of my machines are around 20 ppm off, which is about 12 seconds per week. So you're seeing about 5 times the average. That's unusually high, but not so high that it means something is necessarily wrong.Share Follow answered May 25, 2017 at 20:16David SchwartzDavid Schwartz61.4k77 gold badges9999 silver badges148148 bronze badgesAdd a comment | 
How to write comments in mac configuration files
macos;mac;command-line;osx-mavericks;macos;mac;command-line;osx-mavericks
How to write comments in mac configuration files Ask Question
Disadvantages of partitioning an SSD?
partitioning;ssd;storage;partitioning;ssd;storage
Disadvantages of partitioning an SSD? Ask Question
156 +250 SSDs do not, I repeat, do NOT work at the filesystem level!There is no 1:1 correlation between how the filesystem sees things and how the SSD sees things.Feel free to partition the SSD any way you want (assuming each partition is correctly aligned, and a modern OS will handle all this for you); it will NOT hurt anything, it will NOT adversely affect the access times or anything else, and don't worry about doing a ton of writes to the SSD either. They have them so you can write 50 GB of data a day, and it will last 10 years.Responding to Robin Hood's answer,Wear leveling won't have as much free space to play with, because write operations will be spread across a smaller space, so you "could", but not necessarily will wear out that part of the drive faster than you would if the whole drive was a single partition unless you will be performing equivalent wear on the additional partitions (e.g., a dual boot).That is totally wrong. It is impossible to wear out a partition because you read/write to only that partition. This is NOT even remotely how SSDs work.An SSD works at a much lower level access than what the filesystem sees;an SSD works with blocks and pages.In this case, what actually happens is, even if you are writing a ton of data in a specific partition, the filesystem is constrained by the partition, BUT, the SSD is not.The more writes the SSD gets, the more blocks/pages the SSD will be swapping out in order to do wear leveling. It couldn't care less how the filesystem sees things! That means, at one time, the data might reside in a specific page on the SSD, but, another time, it can and will be different. The SSD will keep track of where the data gets shuffled off to, and the filesystem will have no clue where on the SSD the data actually are.To make this even easier: say you write a file on partition 1. The OS tells the filesystem about the storage needs, and the filesystem allocates the "sectors", and then tells the SSD it needs X amount of space. The filesystem sees the file at a Logical Block Address (LBA) of 123 (for example). The SSD makes a note that LBA 123 is using block/page #500 (for example). So, every time the OS needs this specific file, the SSD will have a pointer to the exact page it is using.Now, if we keep writing to the SSD, wear leveling kicks in, and says block/page #500, we can better optimize you at block/page #2300. Now, when the OS requests that same file, and the filesystem asks for LBA 123 again, THIS time, the SSD will return block/page #2300, and NOT #500.Like hard drives nand-flash S.S.D's are sequential access so any data you write/read from the additional partitions will be farther away than it "might" have been if it were written in a single partition, because people usually leave free space in their partitions. This will increase access times for the data that is stored on the additional partitions.No, this is again wrong! Robin Hood is thinking things out in terms of the filesystem, instead of thinking like how exactly a SSD works.Again, there is no way for the filesystem to know how the SSD stores the data.There is no "farther away" here; that is only in the eyes of the filesystem, NOT the actual way a SSD stores information. It is possible for the SSD to have the data spread out in different NAND chips, and the user will not notice any increase in access times. Heck, due to the parallel nature of the NAND, it could even end up being faster than before, but we are talking nanoseconds here; blink and you missed it.Less total space increases the likely hood of writing fragmented files, and while the performance impact is small keep in mind that it's generally considered a bad idea to defragement a nand-flash S.S.D. because it will wear down the drive. Of course depending on what filesystem you are using some result in extremely low amounts of fragmentation, because they are designed to write files as a whole whenever possible rather than dump it all over the place to create faster write speeds.Nope, sorry; again this is wrong. The filesystem's view of files and the SSD's view of those same files are not even remotely close.The filesystem might see the file as fragmented in the worst case possible, BUT, the SSD view of the same data is almost always optimized.Thus, a defragmentation program would look at those LBAs and say, this file must really be fragmented! But, since it has no clue as to the internals of the SSD, it is 100% wrong. THAT is the reason a defrag program will not work on SSDs, and yes, a defrag program also causes unnecessary writes, as was mentioned.The article series Coding for SSDs is a good overview ofwhat is going on if you want to be more technical about how SSDs work.For some more "light" reading on how FTL (Flash Translation Layer) actually works, I also suggest you read Critical Role of Firmware and Flash Translation Layers in Solid State Drive Design (PDF) from the Flash Memory Summit site.They also have lots of other papers available, such as:Modeling Flash Translation Layers to Enhance System Lifetime (PDF)Leveraging host based Flash Translation Layer for Application Acceleration (PDF)Another paper on how this works: Flash Memory Overview (PDF). See the section "Writing Data" (pages 26-27).If video is more your thing, see An efficient page-level FTL to optimize address translation in flash memory and related slides.Share Follow edited Mar 20, 2017 at 10:16CommunityBot1 answered May 28, 2016 at 1:24Time TwinTime Twin1,92611 gold badge99 silver badges55 bronze badges11Hello, can you please add some links to sources that back up your information? It may very well be that the other answer is factually incorrect, but I've no way of knowing that you are correct either. – MarioDSMay 30, 2016 at 13:074From Windows Internals 6th ed., part 2, ch. 9 (Storage Management) and 12 (File Systems), you can learn how I/O requests to files go through the file system driver, then the volume driver, and finally the disk driver (also used for SSDs). The FSD translates blocks-within-a-file to blocks-within-a-partitoin; the volume driver translates the latter to blocks-within-a-disk, i.e. LBAs. So by the time the requests reach the disk driver all file- and partition-related context is GONE. The disk can't be aware of files or partitions because that info just isn't in the requests that come to it. – Jamie HanrahanMay 30, 2016 at 15:215RobinHood is also mistaken in the claim "Like hard drives nand-flash S.S.D's are sequential access". These are random-access devices. If they were sequential access, then you couldn't tell them "read or write block n"; the only block you could access would be the one immediately following, or maybe the one immediately preceding, the one you just accessed. It is true that internally, NAND-flash SSDs can only write data in large "pages" at a time, but that doesn't make them sequential access. Tapes are sequential access. Look it up. – Jamie HanrahanMay 30, 2016 at 15:26I added another pdf in addition to the first link I had in my answer. – Time TwinMay 30, 2016 at 21:011@TimeTwin Man, the more I re-read your answer, the dumber I feel for blindly trusting Robin Hood's answer, which indeed contains statements that make SSD design look very stupid, had they been true. This is a reminder why we need to remain critical about information even if found on trustworthy sites and with many upvotes. You've made a rather spectacular entry on this site, enjoy the rep boost and please continue to spread your (verified) knowledge. – MarioDSJun 9, 2016 at 8:16 | Show 6 more comments; 19 Very long answers here, when the answer is simple enough and followsdirectly just from the general knowledge of SSDs.One does not need more than readthe Wikipedia term of Solid-state drive to understand the answer, which is:The advice "DO NOT PARTITION SSD" is nonsense.In the (now distant) past, operating systems did not support SSDs very well,and especially when partitioning did not take care to align the partitionsaccording to the size of the erase block.This lack of alignment, when an OS logical disk sector was split betweenphysical SSD blocks,could require the SSD to flash two physical sectors when the OS only intendedto update one, thus slowing disk access and increasing Wear leveling.Currently SSDs are becoming much larger, and operating systems knowall about erase blocks and alignment, so that the problem no longer exists.Maybe this advice was once meant to avoid errors on partition alignment,but today these errors are all but impossible.In fact, the argument for partitioning SSDs is today exactly the same as forclassical disks :To better organize and separate the data.For example, installing the operating system on a separate and smaller partitionis handy for taking a backup image of it as a precautionwhen making large updates to the OS.Share Follow edited Jul 2, 2016 at 15:41You'reAGitForNotUsingGit69244 silver badges1818 bronze badges answered May 30, 2016 at 14:53harrymcharrymc429k2929 gold badges492492 silver badges873873 bronze badgesAdd a comment | ; 5 There are no drawbacks to partitioning a SSD, and you can actually extend its life by leaving some unpartitioned space.Wear leveling is applied on all the blocks of device (ref. HP white-paper, linked below)In static wear leveling, all blocks across all available flash in the device participate in the wear-leveling operations. This ensures all blocks receive the same amount of wear. Static wear leveling is most often used in desktop and notebook SSDs.From that, we can conclude partitions don't matter for wear-leveling. This makes sense because from the HDD & controller point of view, partitions don't really exists. There are just blocks and data. Even partition table is written on the same blocks (1st block of the drive for MBR). It's the OS which then reads the table, and decides to which blocks to write data and which not.OS sees blocks using LBA to give a unique number to each block. However, the controller then maps the logical block to an actual physical block taking wear-leveling scheme into consideration.The same whitepaper gives a good suggestion to extend live of the device:Next, overprovision your drive. You can increase the lifetime by only partitioning a portion of the device’s total capacity. For example, if you have a 256 GB drive— only partition it to 240 GB. This will greatly extend the life of the drive. A 20% overprovisioning level (partitioning only 200 GB) would extend the life further. A good rule of thumb is every time you double the drive’s overprovisioning you add 1x to the drive’s endurance.This also hints that even unpartitioned space is used for wear-levelling, thus further proving the point above.Source: Technical white paper - SSD Endurance (http://h20195.www2.hp.com/v2/getpdf.aspx/4AA5-7601ENW.pdf)Share Follow answered Jun 6, 2016 at 7:25JollyMortJollyMort38922 silver badges1010 bronze badges1What's the point of setting aside sectors right off the bat, instead of just letting it mark bad sectors along the way? Until there's 10 gigs of bad sectors, yeah that 240 out 250 will be 100% usable, and ~90% of what it could be. I've been being mean to my SDD for years. Windows still shows it's full capacity. – MazuraMay 25, 2020 at 4:02Add a comment | ; 1 Disk sectors have been 512 bytes for a long time, and mechanical disks have the property that the only thing that affects how long it takes to read/write a sector is the seek delay. So the main optimzation step with mechanical hard drives was try to read/write blocks sequentially to minimize seeks. Flash works vastly different than mechnical hard drives. On the raw flash level, you do not have blocks, but pages and "eraseblocks" (to borrow from Linux MTD terminology). You can write to flash a page at a time, and you can erase flash an eraseblock at a time.A typical page size for flash is 2KBytes, and a typical size for eraseblocks is 128KBytes.But SATA SSDs present an interface that works with 512 byte sector sizes to the OS.If there is a 1:1 mapping between pages and sectors, you can see how you would run into trouble if your partition table started on an odd page or a page in the middle of an eraseblock. Given that OSes prefer to fetch data from drives in 4Kbyte chunks since this aligns with x86 paging hardware, you can see how such a 4Kbyte block could straddle an eraseblock, meaning updating it would require erasing, then rewriting 2 blocks instead of 1. Leading to lower performance.However, SSD firmware does not maintain a 1:1 mapping, it does a Physical Block Address (PBA) to Logical Block Address (LBA) translation. Meaning you do not ever know where say sector 5000 or any other given sector is really being written to in the flash. It's doing a lot of things behind the scenes by design to try always write to pre-erased eraseblocks. You can't know for sure exactly what its doing without a disassembly of the firmware, but unless the firmware is completely junk the firmware probably steps around this.You may have heard about 4Kn hard drives. These are mechnical hard drives that internally use a sector size of 4Kbytes, but still present a 512-byte sector interface to the operating systems. This is needed because the gaps between sectors need to get smaller on the platter to fit more data.That means internally it always reads and writes 4K sectors but hides it from the OS. In this case, if you do not write to sectors that fall on a 4KByte boundary, you will incur a speed penalty because each such read/write will result in two internal 4KByte sectors being read and rewritten. But this does not apply to SSDs.Anyway this is the only situation I can think of why it is suggested not to partition SSDs. But it doesn't apply.Share Follow answered Jun 2, 2016 at 14:53LawrenceCLawrenceC71.9k1515 gold badges123123 silver badges211211 bronze badgesAdd a comment | ; -1 I decided some background information might be helpful in making this answer clear, but as you can see I went a bit OCD soyou might want to skip to the end and then go back if needed. While I do know a bit, I'm not an expert on S.S.D.s so if anyone sees a mistake EDIT it.:).Background Information:What Is An S.S.D.?:An S.S.D. or solid state drive is a storage device with no moving parts. The term S.S.D. is often intended tospecifically refer to nand-flash based solid state drives intended to act as a hard drive alternative, but inactuality they are just one form of S.S.D., and not even the most popular one. The most popular type of S.S.D.is nand-flash based removable media like usb sticks (flash drives), and memory cards, though they are rarely refered toas an S.S.D.. S.S.D.s can also be ram based, but most ram-drives are software generated as opposed to physical hardware.Why Do Nand-flash S.S.D.s Intended To Act As A Hard Drive Alternative Exist?:In order to run an operating system, and it's software a fast storage medium is required. This is where ram comes intoplay, but historically ram was expensive and cpu's couldn't address massive quantities. When you run an operating system,or program the currently-required portions of data are copied to your ram, because your storage device isn't fast enough.A bottleneck is created, because you have to wait for the data to be copied from the slow storage device to the ram. Whilenot all nand-flash S.S.D.s recieve better performance than the more traditional hard drive, the ones that do help reduce the bottleneck by giving faster access times, read speeds, and write speeds. What Is Nand-flash?:Flash storage is a storage medium that uses electricity rather than magnetism to store data. Nand-flash is flash storagethat uses a NAND gateway. Unlike A nor-flash which is random access, nand-flash is sequentially accessed.How Do Nand-flash S.S.D.s store data?:Nand-flash storage is composed of blocks, those blocks are split into cells, the cells contain pages. Unlike a hard drive which uses magnetismto store data, flash mediums use electricity, because of this data cannot be over-written;data must be erased in order to re-use the space. The device cannot erase individualpages; erasal must occur at a block level. Since data cannot be written to a block that is already used (even if not all the pages in it are) the entire block must be erased first, and then the now blank block can have data written to it's pages. The problem is that you would lose any data already in those pages, including data you don't want to discard! To prevent this existing data to be retained must be copied somewhere else before performing the block erasal. This copying proceedure is not performed by the computer's operatingsystem, it is performed at a device level by a feature known as garbage collection.On hard drives a magnetic plate is used to store data. Much like vinyl records the plate has tracks, and these tracks aredivided into sections called sectors. A sector can hold a certain amount of data (typically 512 bytes but some newer onesare 4KB). When you applya filesystem sectors are grouped into clusters (based on a size you specify, called an allocation size or cluster size), and then files are written across clusters. It is also possible to divide a sector to make clusters smaller than your sector size.The space unused in a cluster after a file is written across a cluster (or several) is not usable, the next file starts ina new cluster. To avoid lots of unusable space people typically use smaller cluster sizes, but this can decrease performance when writing large files. Nand-flash S.S.D.s do not have a magnetic plate, they use electricity passing through memory blocks. A blockis made of cells containing pages. Pages have X capacity (usually 4 KB), and thus the number of pages will determine the capacityof a block (usually 512 KB). On SSD's a page equates to sector on a hard drive, because they both represent the smallestdivision of storage.What Is Wear Leveling?:Nand-flash storage blocks can be written to, and erased a limited number of times (refered to as their lifecycle). To prevent the drive from suffering ofcapacity reduction (dead blocks) it makes sense to wear down the blocks as evenly as possible. The limited lifecycle isalso the main reason why many people suggest not having a page file or swap partition in your operating system if you areusing a Nand-flash based S.S.D. (though the fast data transfer speeds from the device to ram are also a major factor inthat suggestion).What Is Over Provisioning?:Over Provisioning defines the difference between how much free space there is, compared to how much there appears to be.Nand-flash based storage devices claim to be smaller than they are so that there is garanteed to be empty blocks forgarbage disposal to use. There is a second kind of over provisioning called dynamic over provisioning which simply refersto known free space within the shown free space. There are two types of dynamic over provisioning: operating system level,and drive controller level. At the operating system level Trim can be used to free blocks that can then be written toimmediatley. At the controller level unallocated drive space (not partitioned, no filesystem) may be used. Having morefree blocks helps keep the drive running at it's best performance, because it can write immediately. It also increasesthe likely hood of having blocks that are sequentially located which reduces access times because Nand-flash S.S.D.suse sequential access to read and write data.What Is Write Amplification?:Because Nand-flash mediums require a block to be erased before it can be written, any data within the block that isn'tbeing erased must be copied to a new block by garbage disposal. These additional writes are called write amplification.What Is Trim.?:Operating systems are built with traditional hard drives in mind. Remember a traditional hard drive can directly overwritedata. When you delete a file the operating system marks it as deleted (okay to over-write), but the data is still there untila write operation occurs there. OnNand-flash based S.S.D.s this is a problem, because the data must first be erased. The erasal occurs at a block level sothere may be additional data that isn't being deleted. Garbage disposal copies any data that isn't up for deletion to emptyblocks, and then the blocks in question can be erased. This all takes time, and causes unneccesary writes (write amplification)! To get around this a feature called Trim was made.Trim gives the operating system the power to tell the S.S.D. to erase blocks with pages containing data the operating system has markedas deleted during periods of time when you aren't requesting a write operation there. Garbage collection does it's thing, and as a result blocks are freed up so that writes can hopefully occur toblocks that don't need to be erased first which makes the process faster, and helps reduce the write amplification to amimimum. This is not done on a file basis; Trim uses logical block addressing. The L.B.A. specifies which sectors (pages) to erase, and the erasal occurs at a block level.The Answer To Your Question "Disadvantages of partitioning an SSD?":Ram Based S.S.D.s:There is absolutely no disadvantage because they are random access!Nand-flash Based S.S.D.s:The only disadvantages that come to my mind would be:Wear leveling won't have as much free space to play with, because write operations will be spread across a smaller space, so you "could", but not necessarily will wear out that part of the drive faster than you would if the whole drive was asingle partition unless you will be performing equivalent wear on the additional partitions (eg: a dual boot).Like hard drives nand-flash S.S.D's are sequential access so any data you write/read from the additional partitions will befarther away than it "might" have been if it were written in a single partition, because people usually leave free spacein their partitions. This will increase access times for the data that is stored on the additional partitions.Less total space increases the likely hood of writing fragmented files, and while the performance impact is smallkeep in mind that it's generally considered a bad idea to defragement a nand-flash S.S.D. because it will wear downthe drive. Of course depending on what filesystem you are using some result in extremely low amounts of fragmentation, because they are designed to write files as a whole whenever possible rather than dump it all over the place tocreate faster write speeds.I'd say it's okay to have multiple partitions, but wear leveling could be a concern if you have some partitionsgetting lots of write activity, and others getting very little. If you don't partition space you don't plan to use, and instead leave it for dynamic over provisioning you may recieve a performance boost because it will be easier to free blocksand write sequential data. However there is no garauntee that over provisioning space will be needed which brings us backto point #1 about wear leveling.Some other people in this thread have brought up discussion of how partitioning will affect Trim's contributions to dynamic over provisioning. To my understanding TRIM is used to point out sectors (pages) that have data flagged for deletion, and so garbage disposal can free erase those blocks. This free space acts as dynamic over provisioning within THAT partition only, becausethose sectors are part of clusters being used by that partition's filesystem; other partitions have their own filesystems.However I may be totally wrong on this as the whole idea of over provisioning is a bit unclear to me since data will bewritten to places that don't even have filesystems or appear in the drives capacity. This makes me wonder if perhaps over provisioning space is used on atemporary basis before a final optomized write operation to blocks within a filesystem? Of course Trim's contributionsto dynamic over provisioning within the filesystem would not be temporary as they could be written to directly since they're alreadyin usable space. That's my theory at least. Maybe my understanding of filesytems is wrong? I've been unable to find any resources that go into detail about this.Share Follow answered Sep 8, 2014 at 22:10Robin HoodRobin Hood3,40122 gold badges1818 silver badges3636 bronze badges317"1. Wear leveling won't have as much free space to play with, because write operations will be spread across a smaller space (...)". This seems not to be true as wear levelling is performed at lower level by SSD controller (at least with SSD and operating system that support Trim). superuser.com/a/901521/517270 – misko321Dec 1, 2015 at 20:004NAND based memories allow random access to blocks. What it does not allow is random access to bits inside a block. So partitions can be accessed randomly because they are multiples of the block size (at least should be, if the user didn't mess with the memory somehow, i.e. using partitioning apps without knowing what is happening) – Miguel AngeloApr 28, 2016 at 2:455points 1 and 2 seem to be totally false – underscore_dJun 8, 2016 at 14:36Add a comment | ; -1 What these answers ignore are Windows SSD optimizations. I do not know if this means that partitioning becomes better, but for a partitioned C-drive as Windows-drive you can:turn of indexingdo not need to keep track of time of last accessdo not need to store old 8 character dos-namesbypass Windows trashShare Follow answered Oct 14, 2015 at 7:21Ruud van den BergRuud van den Berg711 bronze badge1Turning off indexing not only slows down searches but also means that you're unable to search inside files. It's not a good suggestion. – RichardJun 5, 2016 at 22:19Add a comment | 
How can I disable changes to folder last modified date?
windows-7;microsoft-excel;microsoft-office;microsoft-excel-2013;windows-7;microsoft-excel;microsoft-office;microsoft-excel-2013
How can I disable changes to folder last modified date? Ask Question
1 The only solution I have found so far is to open Excel via the Start Menu (or launcher of choice). Then go to File>>Open (or Ctrl+o). Choose your file, and click the drop down on the "Open" button to open it as Read Only. Opening it in this manner will keep the folder's Modified Date from updating. Share Follow answered Sep 8, 2014 at 16:16JNevillJNevill1,21666 silver badges1212 bronze badges2Well this worked but this is awful way... I have dozens of files to open... opening it using Excel makes things harder – Vlad KucherovSep 9, 2014 at 12:06Yea... I agree... this is a stupid solution. The issue is clearly something within Office's code, so there's probably not anything that can be done to get around it, besides this. If it comes to it, you might consider whipping up some VBA/Macro to open the workbooks you need as read-only and then keep that VBA in a workbook in a seperate folder. That's also hinky as all hell, but it might take some of the pain away. – JNevillSep 9, 2014 at 12:29Add a comment | ; 1 You could create a read-only network share and use that for opening such files. Excel won't have any chance then for creating the lock files which in turn change the modification date of the containing folder.Share Follow answered May 31, 2016 at 9:10springy76springy7611122 bronze badges1I like this answer because it is a general solution, guaranteed to work for ANY program. If they don't have permission to touch anything, then you can be certain it won't change! – ToolmakerSteveJul 17, 2021 at 11:40Add a comment | ; 1 for quick browsing through a few files it was convenient to use the Explorer with preview Pane: it opens any Office file without modifying dates of the file nor the containing folderShare Follow answered Sep 5, 2018 at 13:01markcelomarkcelo11111 bronze badgeAdd a comment | ; 1 The other way to prevent opening an Excel file from changing the folder's modified date is to ctrl-shift right click on file name and select open in protected mode.Edit: method2 is right click menu on file and click new.Share Follow edited Feb 19, 2021 at 1:47 answered Nov 9, 2015 at 19:18user139301user13930111133 bronze badges21I tried this with Word; open in read-only still changes the modified date on the containing folder. – bgmCoderNov 7, 2018 at 22:55I revised the answer. read-only does not prevent a dummy file created in the folder. – user139301Feb 19, 2021 at 1:48Add a comment | 
Why is cache memory so expensive?
memory;architecture;memory;architecture
Why is cache memory so expensive? Ask Question
9 Take a look at : Processors cache L1, L2 and L3 are all made of SRAM?In general they are all implemented with SRAM.(IBM's POWER and zArchitecture chips use DRAM memory for L3. This is called embedded DRAM because it is implemented in the same type of process technology as logic, allowing fast logic to be integrated into the same chip as the DRAM. For POWER4 the off-chip L3 used eDRAM; POWER7 has the L3 on the same chip as the processing cores.)Although they use SRAM, they do not all use the same SRAM design. SRAM for L2 and L3 are optimized for size (to increase the capacity given limited manufacturable chip size or reduce the cost of a given capacity) while SRAM for L1 is more likely to be optimized for speed.More importantly, the access time is related to the physical size of the storage. With a two dimensional layout one can expect physical access latency to be roughly proportional to the square root of the capacity. (Non-uniform cache architecture exploits this to provide a subset of cache at lower latency. The L3 slices of recent Intel processors have a similar effect; a hit in the local slice has significantly lower latency.) This effect can make a DRAM cache faster than an SRAM cache at high capacities because the DRAM is physically smaller.Another factor is that most L2 and L3 caches use serial access of tags and data where most L1 caches access tags and data in parallel. This is a power optimization (L2 miss rates are higher than L1 miss rates, so data access is more likely to be wasted work; L2 data access generally requires more energy--related to the capacity--; and L2 caches usually have higher associativity which means that more data entries would have to be read speculatively). Obviously, having to wait for the tag matching before accessing the data will add to the time required to retrieve the data. (L2 access also typically only begins after an L1 miss is confirmed, so the latency of L1 miss detection is added to the total access latency of L2.)In addition, L2 cache is physically more distant from the execution engine. Placing the L1 data cache close to the execution engine (so that the common case of L1 hit is fast) generally means that L2 must be placed farther away.Take a look at : Why is the capacity of of cache memory so limited?The total silicon area (max chip size) is limited. Putting more cores or more cache, or more hierarchy of the caches are the trade-off of the design.Take a look at : L2 and L3 Cache Difference?Typically there are now 3 layers of cache on modern CPU cores:L1 cache is very small and very tightly bound to the actualprocessing units of the CPU, it can typically fulfil data requestswithin 3 CPU clock ticks. L1 cache tends to be around 4-32KBdepending on CPU architecture and is split between instruction anddata caches.L2 cache is generally larger but a bit slower and is generally tiedto a CPU core. Recent processors tend to have 512KB of cache per coreand this cache has no distinction between instruction and datacaches, it is a unified cache. I believe the response time forin-cache data is typically under 20 CPU "ticks"L3 cache tends to be shared by all the cores present on the CPU andis much larger and slower again, but it is still a lot faster thangoing to main memory. L3 cache tends to be of the order of 4-8MBthese days.Main Memory (~16 G, Shared). Take a look at : https://stackoverflow.com/questions/4666728/size-of-l1-cache-and-l2-cacheL1 is closer to the processor, and is accessed on every memory access so its accesses are very frequent. Thus, it needs to return the data really fast (usually within on clock cycle). It also needs lots of read/write ports and high access bandwidth. Building a large cache with these properties is impossible. Thus, designers keep it small, e.g., 32KB in most processors today.L2 is accessed only on L1 misses so accesses are less frequent (usually 1/20th of the L1). Thus, L1 can take multiple cycles to access (usually kept under 10) and have fewer ports. This allows designers to make it bigger.Both of them pay very different roles. If L1 is made bigger, it will increase L1 access latency which will drastically reduce performance because it will make all loads and stores slower. Thus, L1 size is barely debatable.If we removed L2, L1 misses will have to go to the next level, say memory. This means that a lot of access will be going to memory which would imply we need more memory bandwidth, which is already a bottleneck. Thus, keeping the L2 around is favorable.Experts often refer to L1 as a latency filter (as it makes the common case of L1 hits faster) and L2 as a bandwidth filter as it reduces memory bandwidth usage.Note: I have assumed a 2-level cache hierarchy in my argument to make it simpler. In almost all of todays multicore chips, there also exists an L3. In these chips, L3 is the one that plays the role of memory bandwidth filter. L2 now plays the role of on-chip bandwidth filter, i.e., it reduces access to the on-chip interconnect and the L3 (allowing designers to put a low-bandwidth interconnects like a ring and a slow single-port L3 which allows them to make L3 bigger).Perhaps worth mentioning that the number of ports is a very important design point because it determines how much of the chip area will the cache consume. Ports add wires to the cache which consumes a lot of chip area and power.Take a look at : http://en.wikipedia.org/wiki/Static_random-access_memoryStatic random-access memory (SRAM or static RAM) is a type of semiconductor memory that uses bistable latching circuitry to store each bit. The term static differentiates it from dynamic RAM (DRAM) which must be periodically refreshed. SRAM exhibits data remanence,1 but it is still volatile in the conventional sense that data is eventually lost when the memory is not powered.Share Follow edited May 23, 2017 at 12:41CommunityBot1 answered Sep 8, 2014 at 16:06MargusMargus44622 silver badges44 bronze badgesAdd a comment | ; 0 Short answer: because registers, cache and main memory are built in different ways so there is a trade-off between fast/expensive and slowish/cheaper.While a register will be accessed in a single cycle, cache and main memory might make use of controlling mechanisms that allow them to share some low-level components, thus, making them cheaper to build. For instance, some memory chips will hold X number of requests in a queue while it's still searching for memory banks for a address location that was requested previously.You can read more about it at Wikipedia's Memory Hierarchy page and follow the links for more details.If you want to deep dive into this area, Martin Thompson's talks are very insightful, specially the one on performance myths (which has a directly comparison of registers, cache and main memory).Share Follow answered Sep 8, 2014 at 15:52Giovanni TirloniGiovanni Tirloni42844 silver badges1010 bronze badgesAdd a comment | 
Is it possible to connect two wireless range extenders?
wireless-router;wireless-router
Is it possible to connect two wireless range extenders? Ask Question
-1 Go with powerline range extenders? I have 2 in my place and they work fine.You just join whichever wifi is strongest in the area.Most have a built in ethernet too, handy for wired connections.This is a good scalable method.You may have to change the IP of one of them, if the want a fixed IP, but you can normally configure that in the settings of the extender.Oh, you can also unplug the extender and move to another outlet if you need to change location, very handy.Share Follow answered Aug 24, 2015 at 12:08C BakerC Baker922 bronze badges1Just do yourself a favor and make sure to get AV2 devices. You will probably not be happy with devices with a nameplate speed of less than 1200 Mbps. (Because they won't actually provide anywhere near a tenth of that.) – David SchwartzApr 18, 2017 at 20:39Add a comment | 
Creating a path shortcut?
windows-7;shortcuts;windows-7;shortcuts
Creating a path shortcut? Ask Question
0 Right-click on an application, select Send to:, and choose a destination for the shortcut. Share Follow answered Sep 8, 2014 at 15:39newbie_techienewbie_techie3422 bronze badges2Could i do that for a whole path though, i want to be able to create a shortcut that opens the whole path of something like programfiles(86) – davednoSep 8, 2014 at 15:40Yes, you can do it for a folder. – newbie_techieSep 8, 2014 at 15:48Add a comment | 
/sbin/init exists but couldn't execute it
linux;linux-kernel;init;linux;linux-kernel;init
/sbin/init exists but couldn't execute it Ask Question
wamp localhost working but cannot display page
wamp;wamp
wamp localhost working but cannot display page Ask Question
4 WAMPServer 2.5 Homepage the Your Projects Menu and Virtual HostsThere has been a change of concept in WampServer 2.5 and there is a good reason for this change!In WampServer 2.5 it is now STRONGLY encouraged to create a Virtual Host for each of your projects, even if you hold then in a \wamp\www\subfolder structure.Virtual Hosts DocumentationVirtual Host ExamplesThe WampServer home page ( \wamp\www\index.php ) now expects you to have created a Virtual Host for all your projects and will therefore work properly only if you do so.HistoryIn order to make life easier for beginners using WampServer to learn PHP Apache and MySQL it was suggested that you create subfolders under the \wamp\www\ folder.wamp |-- www |-- Chapter1 |-- Chapter2 |-- etcThese subfolders would then show as links in the WampServer Homepage under a menu called 'Your Projects' and these links would contain a link to localhost/subfoldername.Acceptable only for simple tutorialsThis made life easy for the complete beginner, and was perfectly acceptable for example for those following tutorials to learn PHP coding.However it was never intended for use when developing a real web site that you would later want to copy to your live hosted server.In fact if you did use this mechanism it often caused problems as the live sites configuration would not match your development configuration.The Problem for real website development.The reason for this is of course that the default DocumentRoot setting for wamp isDocumentRoot "c:/wamp/www/"regardless of what your subfolder was called.This ment that often used PHP code that queried the structure or your site received different information when running on your development WampServer to what it would receive when running on a live hosted server, where the DocumentRoot configuration points to the folder at the top of the website file hierarchy.This kind of code exists in many frameworks and CMS's for example WordPress and Joomla etc.For ExampleLets say we have a project called project1 held in wamp\www\project1 and run incorrectly as localhost/project1/index.phpThis is what would be reported by some of the PHP command in question:$_SERVER['HTTP_HOST'] = localhost$_SERVER['SERVER_NAME'] = localhost$_SERVER['DOCUMENT_ROOT'] = c:/wamp/wwwNow if we had correctly defined that site using a Virtual Host definition and ran it as http://project1 the results on the WAMPServer devlopment site will match those received when on a live hosted environment.$_SERVER['HTTP_HOST'] = project1$_SERVER['SERVER_NAME'] = project1$_SERVER['DOCUMENT_ROOT'] = c:/wamp/www/project1Now this difference may seem trivial at first but if you were to use a framework like WordPress or one of the CMS's like Joomla for example, this can and does cause problems when you move your site to a live server.How to create a Virtual Host in WampServerActually this should work basically the same for any wndows Apache server, with differences only in where you may find the Apache config files.There are 3 steps to create your first Virtual Host in Apache, and only 2 if you already have one defined.Create the Virtual Host definition(s)Add your new domain name to the HOSTS file.Uncomment the line in httpd.conf that includes the Virtual Hosts definition file.Step 1, Create the Virtual Host definition(s)Edit the file called httpd-vhosts.conf which for WampServer lives in\wamp\bin\apache\apache2.4.9\conf\extra\httpd-vhosts.conf(Apache version numbers may differ, engage brain before continuing)If this is the first time you edit this file, remove the default example code, it is of no use.I am assuming we want to create a definition for a site called project1 that lives in\wamp\www\project1Very important, first we must make sure that localhost still works so that is the first VHOST definition we will put in this file.<VirtualHost *:80> DocumentRoot "c:/wamp/www" ServerName localhost ServerAlias localhost <Directory "c:/wamp/www"> AllowOverride All Require local </Directory></VirtualHost>Now we define our project: and this of course you do for each of your projects as you start a new one.<VirtualHost *:80> DocumentRoot "c:/wamp/www/project1" ServerName project1 <Directory "c:/wamp/www/project1"> AllowOverride All Require local </Directory></VirtualHost>NOTE: That each Virtual Host as its own DocumentRoot defined. There are also many other parameters you can add to a Virtual Hosts definition, check the Apache documentation.Small asideThe way virtual hosts work in Apache: The first definition in this file will also be the default site, so should the domain name used in the browser not match any actually defined virtually hosted domain, making localhost the first domain in the file will therefore make it the site that is loaded if a hack attempt just uses your IP Address.So if we ensure that the Apache security for this domain is ALWAYS SET TORequire localany casual hack from an external address will receive an error and not get into your PC, but should you misspell a domain you will be shown the WampServer homepage, because you are on the same PC as WampServer and therfore local.Step 2:Add your new domain name to the HOSTS file.Now we need to add the domain name that we have used in the Virtual Host definition to the HOSTS file so that windows knows where to find it. This is similiar to creating a DNS A record, but it is only visible in this case on this specific PC.Edit C:\windows\system32\drivers\etc\hostsThe file has no extension and should remain that way. Watch out for notepad, as it may try and add a .txt extension if you have no better editor.I suggest you download Notepad++, its free and a very good editor.Also this is a protected file so you must edit it with administrator privileges, so launch you editor using the Run as Administrator menu option.The hosts file should look like this when you have completed these edits127.0.0.1 localhost127.0.0.1 project1::1 localhost::1 project1Note that you should have definitions in here for the IPV4 loopback address 127.0.0.1 and also the IPV6 loopback address ::1 as Apache is now IPV6 aware and the browser will use either IPV4 or IPV6 or both. I have no idea how it decides which to use, but it can use either if you have the IPV6 stack turned on, and most window OS's do as of XP SP3.Now we must tell windows to refresh its domain name cache, so launch a command window again using the Run as Administrator menu option again, and do the following.net stop dnscachenet start dnscacheThis forces windows to clear its domain name cache and reload it, in reloading it will re-read the HOSTS file so now it knows about the domain project1.Step 3: Uncomment the line in httpd.conf that includes the Virtual Hosts definition file.Edit your httpd.conf, use the wampmanager.exe menus to make sure you edit the correct file.Find this line in httpd.conf# Virtual hosts#Include conf/extra/httpd-vhosts.confAnd just remove the # to uncomment that line.To activate this change in you running Apache we must now stop and restart the Apache service.wampmanager.exe -> Apache -> Service -> Restart ServiceNow if the WAMP icon in the system tray does not go GREEN again, it means you have probably done something wrong in the \wamp\bin\apache\apache2.4.9\conf\extra\httpd-vhosts.conf file.If so here is a useful mechanism to find out what is wrong. It uses a feature of the Apache exe (httpd.exe) to check its config files and report errors by filename and line numbers.Launch a command window.cd \wamp\bin\apache\apache2.4.9\binhttpd -tSo fix the errors and retest again until you get the outputSyntax OKNow there is one more thing.There are actually 2 new menu items on the wampmanager menu system. One called [b]'My Projects'[/b] which is turned on by default.And a second one, called [b]'My Virtual Hosts'[/b], which is not activated by default.'My Projects' will list any sub directory of the \wamp\www directory and provide a link to launch the site in that sub directory.As I said earlier, it launches 'project1` and not 'localhost/project1' so to make the link work we must create a Virtual Host definition to make this link actually launch that site in your browser, without the Virtual Host definition it's likely to launch a web search for the site name as a keyword or just return a site not found condition.The 'My Virtual Hosts' menu item is a little different. It searches the file that is used to define Virtual Hosts ( we will get to that in a minute ) and creates menu links for each ServerName parameter it finds and creates a menu item for each one.This may seem a little confusing as once we create a Virtual Host definition for the sub directories of the \wamp\www folder some items will appear on both of the 'My Projects' menu and the 'My Virtual Hosts' menu's.How do I turn this other 'My Virtual Hosts' menu on?Make a backup of the \wamp\wampmanager.tpl file, just in case you make a mistake, its a very important file.Edit the \wamp\wampmanager.tplFind this parameter ;WAMPPROJECTSUBMENU, its in the '[Menu.Left]' section.Add this new parameter ;WAMPVHOSTSUBMENU either before or after the ;WAMPPROJECTSUBMENU parameter.Save the file.Now right click the wampmanager icon, and select 'Refresh'. If this does not add the menu, 'exit' and restart wampmanager.Big NoteThe new menu will only appear if you already have some Virtual Hosts defined! Otherwise you will see no difference until you define a VHOST.Now if you take this to its logical extensionYou can now move your web site code completely outside the \wamp\ folder structure simply by changing the DocumentRoot parameter in the VHOST definition. So for example you could do this:Create a folder on the wamp disk or any other disk ( beware of network drive, they are a bit more complicated)D:MD websitesCD websitesMD example.comCD example.comMD wwwYou now copy your site code to, or start creating it in the \websites\example.com\www folder and define your VHOST like this:<VirtualHost *:80> DocumentRoot "d:/websites/example.com/www" ServerName example.dev ServerAlias www.example.dev <Directory "d:/websites/example.com/www"> AllowOverride All Require all granted </Directory> php_flag display_errors Off php_flag log_errors On php_value max_upload_size 40M php_value max_execution_time 60 php_value error_log "d:/wamp/logs/example_com_phperror.log"</VirtualHost>Then add this new development domain to the HOSTS file:127.0.0.1 localhost::1 localhost127.0.0.1 project1::1 project1127.0.0.1 example.dev::1 example.devNOTE: It is not a good idea to use a ServerName or ServerAlias that is the same as your live domain name, as if we had used example.com as the ServerName it would mean we could no longer get to the real live site from this PC as it would direct example.com to 127.0.0.1 i.e. this PC and not out onto the internet.ALSO:See that I have allowed this site to be accessed from the internet from within the VHOST definitions, this change will apply to only this site and no other. Very useful for allowing a client to view your changes for an hour or so without having to copy them to the live server.This does mean that we have to edit this file manually to turn this access on and off rather than use the Put Online/Offline menu item on wampmanager.Also I have added some modifications to the PHP config, again that will only apply to this one site.Very useful when maintaining a site with specific requirement unlike all the other sites you maintain.I guess we can assume from the parameters used that it has a long running page in it somewhere and it is very badly written and will not run with errors being displayed on the browser without making a horrible mess of the page. Believe me sites like this exist and people still want them maintained badly. But this mean we only have to change these parameters for this specific site and not globally to all Virtual sites running on WampServer.Share Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Sep 25, 2014 at 13:42RiggsFollyRiggsFolly71744 silver badges1515 bronze badges22+1 This was very helpful! Only the file httpd-hosts.conf didn't exist so instead I edited httpd-vhosts.conf. – A1rPunJan 20, 2015 at 20:142@A1rPun Thanks for spotting the spelling error. I have fixed it in the answer. It should have been httpd-vhosts.conf like you assumed. – RiggsFollyJan 20, 2015 at 21:14Add a comment | ; 0 You need to create a Virtual Host first. This can be done simply by using WAMP'S Add a Virtual Host Utility. For steps to create a virtual host visit : how to create a virtual host step by step Share Follow answered Sep 12, 2016 at 10:05RakeshRakesh10111Welcome to Super User! Please quote the essential parts of the answer from the reference link(s), as the answer can become invalid if the linked page(s) change. – DavidPostill♦ Sep 19, 2016 at 9:20Add a comment | 
What does "--" used in Excel function mean?
microsoft-excel-2010;worksheet-function;microsoft-excel-2010;worksheet-function
What does "--" used in Excel function mean? Ask Question
3 All the -- does is tell Excel to convert the boolean search results to 0 or 1.Anytime you need to use some type of logical function in Excel and wish to have the results returned as either “1” or “0” instead of “TRUE” or “FALSE,” simply use double minus signs as part of your formula and you will be well on your way to creating some powerful Excel formulas.This source does a great job of explaining how to use this feature.Share Follow answered Sep 8, 2014 at 15:52CharlieRBCharlieRB22.4k55 gold badges5555 silver badges104104 bronze badges1Source is first result of my Google search. Nice. ;-) – IsziSep 8, 2014 at 16:15Add a comment | 
Search for images by "has Geotag data"
images;search;file-search;search-indexing;geotagging;images;search;file-search;search-indexing;geotagging
Search for images by "has Geotag data" Ask Question
0 I would recommend Batch Images http://www.binarymark.com/products/batchimages/default.aspxStep 1: Specify the folder(s) where you want to scan for images, and specify file name pattern if applies:Step 2: Under image properties tab, under Metadata check EXIF GPS, that way saying explicitly that you require images to have that metadata type (which is what you want)Step 3: Click search and wait. When the search is done images will be added to the list in the main window, which you can the either work with (process, modify, convert, etc.), or save it as a txt file for use by other programs. You can also directly copy image files from within the program.Although the program is paid, you can accomplish this with the free trial version so you don't need to buy a license.Disclaimer: I have the paid version and am an active user.Share Follow answered Apr 24, 2015 at 10:20GeorgeGeorge29222 silver badges88 bronze badgesAdd a comment | 
Bash: exact match of a string with regex
linux;bash;regex;linux;bash;regex
Bash: exact match of a string with regex Ask Question
9 You get a success because the regex matches on a portion of it.If you want an exact match, you need to anchor the pattern to the start and end of the line: regex="^lo(lo)+ba$"the ^ stands for the start of the string: nothing can be before the patternthe $ stands for the end of the string: nothing can be afterIn your original code, as the pattern is not anchored, the pattern matching does not care of what could be before of after, if at least a portion of the string validates the pattern.ShareImprove this answer Follow edited Sep 26, 2014 at 14:49 answered Sep 26, 2014 at 11:35SekiSeki34311 silver badge1010 bronze badgesAdd a comment | ; 1 What are the parenthesis for? must start with 2x $str1 and end with max 1x $str2So it's if [[ $toCheck =~ ^$str1$str1($str2|)$ ]] ; then echo "$toCheck:success" > output else echo "$toCheck:failed" > output fiShareImprove this answer Follow answered Apr 15, 2015 at 16:22ladikoladiko1122 bronze badgesAdd a comment | 
Getting Windows 8 to display different pictures on each display desktop
windows-8;multiple-monitors;windows-update;desktop;slideshow;windows-8;multiple-monitors;windows-update;desktop;slideshow
Getting Windows 8 to display different pictures on each display desktop Ask Question
1 It seems like it will eventually sort itself out, but I didn't do anything to make that happen.I'm still flummoxed, but at least it's back...(trying to mark the question as answered, or similar. New to posting questions though, only ever answered before...)ShareImprove this answer Follow answered Sep 26, 2014 at 11:24FlyZanzibarFlyZanzibar1133 bronze badgesAdd a comment | ; 0 Rightclick your desktop and choose Personalize (or personalization) forgot the name that was used in windows 8.Go to your background settings, and change how the background is presented. Some settings will keep the same background across different monitors, such as tile, while others (stretch for example) will use different images across different monitors.I don't have a windows 8 machine here with me to look what the exact names are and how they function, but its easy enough to test and you'll see the reaction straight away.ShareImprove this answer Follow answered Sep 26, 2014 at 11:15LPChipLPChip57.5k99 gold badges9292 silver badges135135 bronze badges1I tried all that, unfortunately, with no luck. That said, I've now got it back. I have no idea how... :D – FlyZanzibarSep 26, 2014 at 11:22Add a comment | 
Unable to get Excel to recognise date in column
microsoft-excel;microsoft-excel-2010;microsoft-excel-2007;date;microsoft-excel;microsoft-excel-2010;microsoft-excel-2007;date
Unable to get Excel to recognise date in column Ask Question
99 The problem: Excel does not want to recognize dates as dates, even though through "Format cells - Number - Custom" you are explicitly trying to tell it these are dates by "mm/dd/yyyy". As you know; when excel has recognized something as a date, it further stores this as a number - such as "41004" but displays as date according to format you specify. To add to confusion excel may convert only part of your dates such as 08/04/2009, but leave other e.g. 07/28/2009 unconverted.Solution: steps 1 and then 21) Select the date column. Under Data choose button Text to Columns. On first screen leave radio button on "delimited" and click Next. Unclick any of the delimiter boxes (any boxes blank; no checkmarks) and click Next. Under column data format choose Date and select MDY in the adjacent combo box and click Finish. Now you got date values (i.e. Excel has recognised your values as Date data type), but the formatting is likely still the locale date, not the mm/dd/yyyy you want.2) To get the desired US date format displayed properly you first need to select the column (if unselected) then under Cell Format - Number choose Date AND select Locale : English (US). This will give you format like "m/d/yy". Then you can select Custom and there you can either type "mm/dd/yyyy" or choose this from the list of custom strings. Alternative 0 : use LibreOffice Calc. Upon pasting data from Patrick's post choose Paste Special (Ctrl+Shift+V) and choose Unformatted Text. This will open "Import Text" dialog box. Character set remains Unicode but for language choose English(USA); you should also check the box "Detect special numbers". Your dates immediately appear in the default US format and are date-sortable. If you wish the special US format MM/DD/YYYY you need to specify this once through "format Cells" - either before or after pasting. One might say - Excel should have recognised dates as soon as I told it via "Cell Format" and I couldn't agree more. Unfortunately it is only through step 1 from above that I have been able to make Excel recognize these text strings as dates. Obviously if you do this a lot it is pain in the neck and you might put together a visual basic routine that would do this for you at a push of a button. It can be as simple as this VBA code in Excel:Sub RemoveApostrophe()For Each CurrentCell In SelectionIf CurrentCell.HasFormula = False Then CurrentCell.Formula = CurrentCell.ValueEnd IfNextEnd SubAlternative 1: Data | Text to ColumnsUpdate on leading apostrophe after pasting: You can see in the formula bar that in the cell where date was not recognised there is a leading apostrophe. That means in the cell formatted as a number (or a date) there is a text string that program thinks - you want to preserve as a text string. You could say - the leading apostrophe prevents the spreadsheet to recognise the number. You need to know to look in formula bar for this - because the spreadsheet simply displays what looks like a left-aligned number. To deal with this, select the column you want to correct, choose in menu Data | Text to Columns and click OK. Sometimes you will be able to specify the data type, but if you have previously set the format of the column to be your particular data type - you will not need it. The command is really meant to split a text column in two or more using a delimiter, but it works like a charm for this problem too. I have tested it in Libreoffice, but there is the same menu item in Excel too.Alternative 2: Edit Replace in LibreofficeThis is the quickest and best way so far, but that does not work in MsOffice as far as I know. Libreoffice Calc has option to search/replace using Regexps (aka. Regular Expressions) - what you do is find the cell and replace with itself and in the process Calc re-recognises the number as number and gets rid of the leading apostrophe. It works extremely quick. Select your column. Ctrl-H opens find-replace dialogue. Check 'Current selection' and 'Use regular expressions'. In the find box enter ^[0-9] - which means 'find any cell that has a digit 0 to 9 in its first position'. In the replace box enter & - which for libreoffice means 'for replacement use string you found in the search box'. Click Replace All - and your values are recognised for numbers that they are. The beauty is - it works on cells that contain only numbers with a leading apostrophe, nothing else - i.e. it will not touch cells that contain apostrophe-a space (or two)-then number, or cells that contain capital O instead of zero or any other anomalies you want to correct by hand.ShareImprove this answer Follow edited Jun 4, 2020 at 15:42 answered Sep 26, 2014 at 12:49r0bertsr0berts1,88611 gold badge1616 silver badges1919 bronze badges6I address both your points in my OP. Splitting the date values to columns (and then re-integrating in ISO format) is of course a possibility, but given that Excel has extensive built in date functions I'd like to be able to leverage them with the valid date data I have. Your second option is exactly as I describe what is not working for me. – PatrickSep 26, 2014 at 15:05Dear Patrick, please read carefully. Or you can use Libre Office Calc - with your data this works straight away - you simply pre-format column for Date - English (USA) and upon pasting do "Paste Special" "Unformatted text" - just tell the dialog box that language is English(USA) and don't forget to check the box to recognize special numbers. In my answer I tried to hint as hard as I could that Excel is inconsistent with this (buggy) and you have to resort to these steps 1 and then 2 to achieve the result you want. – r0bertsSep 26, 2014 at 16:28I should indeed have read your question properly. Your first suggest does indeed work. You should have had the bounty. Thanks for your assistance. – PatrickApr 8, 2015 at 16:20Really good answer!!! – AddersMay 17, 2018 at 14:35Tragically, a macro which recorded the text to columns procedure does not correct the sort issue! Can anyone help with that? Selection.TextToColumns Destination:=Range("A1"), DataType:=xlDelimited, _ TextQualifier:=xlDoubleQuote, ConsecutiveDelimiter:=False, Tab:=False, _ Semicolon:=False, Comma:=False, Space:=False, Other:=False, FieldInfo _ :=Array(1, 4), TrailingMinusNumbers:=True – PiecevcakeMay 1, 2020 at 1:34 | Show 1 more comment; 17 Select all the column and go to Locate and Replace and just replace "/" with /.ShareImprove this answer Follow edited Aug 28, 2015 at 20:18kenorb23.5k2626 gold badges122122 silver badges186186 bronze badges answered Aug 28, 2015 at 17:14Jair BressaniJair Bressani16911 silver badge22 bronze badges52Can you explain what this does to fix the problem? – fixer1234Aug 28, 2015 at 20:26This really worked and was easy. The replacement thing just remove the leading zeros – Pedro GabrielJul 7, 2017 at 18:086First, THIS WORKS. BEST solution. FAR better than the checked solution :) . To fixer1234 and @PedroGabriel: It's not that it removes zeros. In the act of replacing cell contents, Excel evaluates whether the resultant cell contains a formula, text, or a number. After doing the "/" replacement, it interprets the cell to now contain a number (which a date technically is to Excel), so it is now correctly sortable. (Clever users may recognize the technique of doing find/replace with an "=" character in a similar scenario with Excel reinterpreting contents.) Anyway Jair has the ideal solution :) – MicrosoftShouldBeKickedInNutsMay 2, 2019 at 14:53@MicrosoftShouldBeKickedInNuts today I have no idea why I said that about the zeroes, it really had nothing to do with zeroes... This is the best answer, still using this one. Cheers – Pedro GabrielMay 2, 2019 at 18:09Sort worked after this was manually done, and by far the easiest! BUT recorded macro didn't fix the sort! Any Ideas? Selection.Replace What:="/", Replacement:="/", LookAt:=xlPart, _ SearchOrder:=xlByRows, MatchCase:=False, SearchFormat:=False, _ ReplaceFormat:=False I tried adding the replace format d/m/yy h.mm AM/PM, that didn't work. I suspect that if we find the missing parameter we can dispense with the character replace! – PiecevcakeMay 1, 2020 at 1:25Add a comment | ; 4 I was dealing with a similar issue with thousands of rows extracted out of a SAP database and, inexplicably, two different date formats in the same date column (most being our standard "YYYY-MM-DD" but about 10% being "MM-DD-YYY"). Manually editing 650 rows once every month was not an option.None (zero... 0... nil) of the options above worked. Yes, I tried them all. Copying to a text file or explicitly exporting to txt still, somehow, had no effect on the format (or lack therefo) of the 10% dates that simply sat in their corner refusing to behave.The only way I was able to fix it was to insert a blank column to the right of the misbehaving date column and using the following, rather simplistic formula:(assuming your misbehaving data is in Column D)=IF(MID(D2,3,1)="-",DATEVALUE(TEXT(CONCATENATE(RIGHT(D2,4),"-",LEFT(D2,5)),"YYYY-MM-DD")),DATEVALUE(TEXT(D2,"YYYY-MM-DD")))I could then copy the results in my new, calculated column over top of the misbehaving dates by pasting "Values" only after which I could delete my calculated column.ShareImprove this answer Follow edited Apr 10, 2017 at 22:29bertieb7,2243636 gold badges4040 silver badges5252 bronze badges answered Apr 10, 2017 at 21:49LucsterLucster4111 silver badge11 bronze badgeAdd a comment | ; 3 I had the exact same issue with dates in excel. The format matched the requirements for a date in excel, yet without editing each cell it would not recognise the date, and when you are dealing with thousands of rows it is not practical to manually edit each cell. Solution is to run a find and replace on the row of dates where i replaced the hypen with a hyphen. Excel runs through the column replacing like with like but the resulting factor is that it now recongnises the dates! FIXED!ShareImprove this answer Follow answered Feb 22, 2016 at 9:06Warren RocchiWarren Rocchi3111 bronze badgeAdd a comment | ; 3 This may not be relevant to the original questioner, but it may help someone else who is unable to sort a column of dates.I found that Excel would not recognise a column of dates which were all before 1900, insisting that they were a column of text (since 1/1/1900 has numeric equivalent 1, and negative numbers are apparently not allowed). So I did a general replace of all my dates (which were in the 1800s) to put them into the 1900s, e.g. 180 -> 190, 181 -> 191, etc. The sorting process then worked fine. Finally I did a replace the other way, e.g. 190 -> 180.Hope this helps some other historian out there.ShareImprove this answer Follow answered Jun 25, 2017 at 9:14Laurie AllenLaurie Allen3111 bronze badgeAdd a comment | ; 2 It seems that Excel does not recognize your dates as dates, it recognizes them text, hence you get the Sort options as A to Z. If you do it correctly, you should get something like this:Hence, it is important to ensure that Excel recognizes the date. The most simple way to do that, is use the shortcut CTRL+SHIFT+3.Here's what I did to your data. I simply copied it from your post above and pasted it in excel. Then I applied the shortcut above, and I got the required sort option. Check the image.ShareImprove this answer Follow edited Sep 26, 2014 at 11:45CharlieRB22.4k55 gold badges5555 silver badges104104 bronze badges answered Sep 26, 2014 at 11:41ChainsawChainsaw13822 gold badges22 silver badges88 bronze badges62Unfortunately that shortcut does not work for me. – PatrickSep 26, 2014 at 15:07What does the shortcut do in your system Patrick. – FireeSep 29, 2014 at 6:213The shortcut doesn't seem to do anything at all. I've got several systems at my disposal running Office 2007, 2010 and 2013 and none of them react to the CTRL SHIFT 3 shortcut. CTRL 1 correctly pops up the 'format cell' dialogue. – PatrickSep 29, 2014 at 9:281The Ctrl+Shift+3 keyboard shortcut, referenced somewhat sloppily as “Ctrl+Shift+#” here, means “Applies the Date format with the day, month, and year.” in Excel 2007, 2010, 2013, and 2016. (Specifically, on my Excel 2013, it is “d-mmm-yy”.) The Microsoft document doesn’t explain that the cells must already contain … (Cont’d) – Scott - Слава УкраїніJun 3, 2017 at 22:031(Cont’d) … values that Excel recognizes as date/time data, and it seems like nobody here has clearly explained that, since Patrick is in England, his version of Excel is recognizing strings like 04/08/2012, 04/09/2009, and 04/01/2010 as 4-Aug-2012, 4-Sep-2009, and 4-Jan-2010, respectively, and is treating 04/21/2011 as a text string (because there is no 21st month). Since some of the values are text (and some of the values, presumably, have actually been misinterpreted), formatting (such as by the Ctrl+Shift+3 keyboard shortcut) isn’t going to do any good. – Scott - Слава УкраїніJun 3, 2017 at 22:11 | Show 1 more comment; 2 I would suspect the issue is Excel not being able to understand the format... Although you select the Date format, it remains as Text.You can test this easily: When you try to update the dates format, select the column and right click on it and choose format cells (as you already do) but choose the option 2001-03-14 (near bottom of the list). Then review the format of your cells.I will suspect that only some of the date formats update correctly, indicating that Excel still treating it like a string, not a date (note the different formats in the below screen shot)! There are work-arounds for this, but, none of them will be automated simply because you're exporting each time. I would suggest using VBa, where you can simply run a macro which converts from US to UK date format, but, this would mean copying and pasting the VBa into your sheet each time.Alternatively, you create an Excel that reads the newly created exported Excel sheets (from exchange) and then execute the VBa to update the date format for you. I will assume the Exported Exchange Excel file will always have the same file name/directory and provide a working example:So, create new Excel sheet, called ImportedData.xlsm (excel enabled). This is the file where we will import the Exported Exchange Excel file into!Add this VBa to the ImportedData.xlsm fileSub DoTheCopyBit()Dim dateCol As StringdateCol = "A" 'UPDATE ME TO THE COLUMN OF THE DATE COLUMNDim directory As String, fileName As String, sheet As Worksheet, total As IntegerApplication.ScreenUpdating = FalseApplication.DisplayAlerts = Falsedirectory = "C:\Users\Dave\Desktop\" 'UPDATE MEfileName = Dir(directory & "ExportedExcel.xlsx") 'UPDATE ME (this is the Exchange exported file location)Do While fileName <> ""'MAKE SURE THE EXPORTED FILE IS OPENWorkbooks.Open (directory & fileName)Workbooks(fileName).Worksheets("Sheet1").Copy _Workbooks(fileName).ClosefileName = Dir()LoopApplication.ScreenUpdating = TrueApplication.DisplayAlerts = TrueDim row As Integerrow = 1Dim i As IntegerDo While (Range(dateCol & row).Value <> "")Dim splitty() As Stringsplitty = Split(Range(dateCol & row).Value, "/")Range(dateCol & row).NumberFormat = "@"Range(dateCol & row).Value = splitty(2) + "/" + splitty(0) + "/" + splitty(1)Range(dateCol & row).NumberFormat = "yyyy-mm-dd"row = row + 1LoopEnd SubWhat I also did was update the date format to yyyy-mm-dd because this way, even if Excel gives you the sort filter A-Z instead of newest values, it still works!I'm sure the above code has bugs in but I obviously have no idea what type of data you have but I tested it with the a single column of dates (as you have) and it works fine for me!How do I add VBA in MS Office?ShareImprove this answer Follow edited Mar 20, 2017 at 10:16CommunityBot1 answered Mar 17, 2015 at 9:14DaveDave25.3k1010 gold badges5454 silver badges6969 bronze badges1well... I'm going to leave this for a couple of days to give it a bit of extra exposure but this looks like a solid answer. This is absolutely crazy though, I can't beleive this is needed. As it is I've fixed the data at source with a small function in powershell to flip it round to ISO format at which point I don't care if Excel recognises it as a date :/ – PatrickMar 17, 2015 at 15:50Add a comment | ; 2 https://support.office.com/en-us/article/Convert-dates-stored-as-text-to-dates-8df7663e-98e6-4295-96e4-32a67ec0a680Simple solution here - create new column use =datevalue(cell) formula then copy the formula into your other rows- a few seconds to fixShareImprove this answer Follow answered Jun 23, 2016 at 23:35MikeMike2111 bronze badgeAdd a comment | ; 1 I figured it out!There is a space at the beginning and at the end of the date. If you use find and replace and press the spacebar, it WILL NOTwork. You have to click right before the month number, press shiftand the left arrow to select and copy. Sometimes you need to use themouse to select the space. Then paste this as the space in find andreplace and all your dates will become dates.If there is space and date Select Data>Go to Data>Text to columns>Delimited>Space as separator and then finish.All spaces will be removed.ShareImprove this answer Follow edited May 16, 2017 at 9:47djsmiley2kStaysInside6,61311 gold badge3030 silver badges4242 bronze badges answered May 14, 2015 at 16:46JailDoctorJailDoctor1122 bronze badges1The reason the find and replace won't work with the spacebar is that the gap is most likely a tab. – PatrickNov 17, 2015 at 11:54Add a comment | ; 0 If Excel stubbornly refuses to recognize your column as date, replace it by another :Add a new column to the right of the old columnRight-click the new column and select FormatSet the format to dateHighlight the entire old column and copy itHighlight the top cell of the new column and select Paste Special, and only paste valuesYou can now remove the old column.ShareImprove this answer Follow answered Mar 17, 2015 at 10:01 community wiki harrymc 2I've tried this, it behaves the same with the new column. See Dave's answer, the screen cap at the top is what I get not matter how many times I move it between columns. – PatrickMar 17, 2015 at 15:42Try to force the issue by using the DATEVALUE(old column) function in the formula on the new column, then use the Number formatting dropdown list on the Home ribbon bar to choose Short/Long Date. – harrymcMar 18, 2015 at 8:24Add a comment | ; 0 I just simply copied the number 1 (one) and multiplied it to the date column (data) using the PASTE SPECIAL function. It then changes to General formating i.e 42102Then go apply Date on the formating and it now recognises it as a date.Hope this helpsShareImprove this answer Follow answered Nov 17, 2015 at 8:03Mpho SehlakoMpho Sehlako1Add a comment | ; 0 All the above solutions - including r0berts - were unsuccessful, but found this bizarre solution which turned out to be the fastest fix.I was trying to sort "dates" on a downloaded spreadsheet of account transactions. This had been downloaded via CHROME browser. No amount of manipulation of the "dates" would get them recognised as old-to-new sortable.But, then I downloaded via INTERNET EXPLORER browser - amazing - I could sort instantly without touching a column.I cannot explain why different browsers affect the formatting of data, except that it clearly did and was a very fast fix.ShareImprove this answer Follow answered Apr 24, 2016 at 1:24RosRos1Add a comment | ; 0 My solution in the UK - I had my dates with dots in them like this:03.01.17I solved this with the following:Highlight the whole column. Go to find and select/ replace.I replaced all the full stops with middle dash eg 03.01.17 03-01-17.Keep the column highlighted.Format cells, number tab select date.Use the Type 14-03-12 (essential for mine to have the middle dash)Locale English (United Kingdom)When sorting the column all dates for the year are sorted.ShareImprove this answer Follow edited Dec 13, 2016 at 17:22Gaff18.3k1515 gold badges5656 silver badges6868 bronze badges answered Dec 13, 2016 at 11:25CharlieCharlie1Add a comment | ; 0 I tried the various suggestions, but found the easiest solution for me was as follows...See Images 1 and 2 for the example... (note - some fields were hidden intentionally as they do not contribute to the example). I hope this helps...Field C - a mixed format that drove me absolutely crazy. This is how the data came directly from the database and had no extra spaces or crazy characters. When displaying it as a text for example, the 01/01/2016 displayed as a '42504' type value, intermixed with the 04/15/2006 which showed as is.Field F - where I obtained the length of field C (the LEN formula would be a length of 5 of 10 depending on the date format). The field is General format for simplicity.Field G - obtaining the month component of the mixed date - based on the length result in field F (5 or 10), I either obtain the month from the date value in field C, or obtain the month characters in the string.Field H - obtaining the day component of the mixed date - based on the length result in field F (5 or 10), I either obtain the day from the date value in field C, or obtain the day characters in the string.I can do this for the year as well, then create a date from the three components that is consistent. Otherwise, I can use the individual day, month, and year values in my analysis.Image 1: basic spreadsheet showing values and field namesImage 2: spreadsheet showing formulas matching explanation aboveI hope this helps.ShareImprove this answer Follow answered Jan 13, 2017 at 13:02EranEran15(1) While it is nice to post a screen image to demonstrate that your answer actually works, we prefer that the formulas in your solution be posted as text in the body of your answer, so people can copy and paste them. (2) You seem to understand the problem — that numeric dates like 04/08 are ambiguous. 04/08 will be interpreted as April 8 in some locales (such as the United States) and 4-Aug in others (such as England).  But these are ambiguous precisely because the month number and the day-of-the-month are different. … (Cont’d) – Scott - Слава УкраїніJun 4, 2017 at 20:22(Cont’d) …  So why would you use un ambiguous dates like 01/01 in your answer?  (3) Actually, I’m not sure you do understand the problem, or that your answer actually does work, inasmuch as your sheet has rows where the month # is 15; that appears to be an obvious error.  And, given that 04/15 is unambiguous — it must mean April 15 — it doesn’t make sense that your method parses 01/11 as the 1st day of the 11th month. … (Cont’d) – Scott - Слава УкраїніJun 4, 2017 at 20:22(Cont’d) …  (4) It should be pointed out that, at best, you answer will handle only dates that look like nn/nn/nnnn.  It will fail on dates like 5/8, 5/08, 5/28, 05/8, and 11/8.  Also — fun fact — your answer will fail on dates ≤ May 17, 1927 and ≥ October 17, 2173.  Never mind the Y10K problem; we may start having issues as soon as 154 years from now!  (5) You say, “I can do this for the year as well, then create a date from the three components that is consistent.”  So why don’t you, and show it? … (Cont’d) – Scott - Слава УкраїніJun 4, 2017 at 20:23(Cont’d) …  It’s especially hard to verify that your method works when you present an incomplete version of it; one that doesn’t show the month, day and year being reassembled into a date.  (6) As I told Patsaeed, it would have been nice if you had used the OP’s data, from the question, rather than making up your own.  Failing to use the OP’s data, it might have been nice if you had used Patsaeed’s, so at least we’d be able to compare apples to apples. … (Cont’d) – Scott - Слава УкраїніJun 4, 2017 at 20:23(Cont’d) …  And, whether you use the OP’s data or somebody else’s, it would have been nice if you had shown the original input to your scenario.  (For example, for Row 7, is it 01/11/2016 or 11/01/2016?)  And, if you’re going to use your own data, it would have been nice if you had included dates from the same month that demonstrate (for example) how 1/11 and 1/21 are handled differently. And why have duplicate data?  You’ve wasted 19 rows by using the same four values multiple times, spread out over 23 rows. – Scott - Слава УкраїніJun 4, 2017 at 20:23Add a comment | ; 0 SHARING A LITTLE LONG BUT MUCH EASIER SOLUTION TO SUBJECT.....No need to run macros or geeky stuff....simple ms excel formulae and editing.mixed dates excel snapshot:The date is in the mixed format. Therefore, to make a symmetricaldate format, extra columns have been created converting that 'mixedformat' date column to TEXT. From that text we have identified thepositions of "/" and middle text has been extracted determiningdate, month, year using MID formula. Those which were originally dates, formula ended with ERROR / #VALUE result. - Finally, from the string we created - we have converted those to dates by DATE formula.#VALUE were picked as it is by IFERROR added to DATE formula & the column was formatted as required (here, dd/mmm/yy)* REFER THE SNAPSHOT OF EXCEL SHEET ABOVE (= mixed dates excel snapshot) *ShareImprove this answer Follow edited May 18, 2017 at 20:11Pierre.Vriens1,4053838 gold badges1616 silver badges2020 bronze badges answered Aug 28, 2016 at 14:45PatsaeedPatsaeed1122 bronze badges2(1) While it is nice to post a screen image to demonstrate that your answer actually works, we prefer that the formulas in your solution be posted as text in the body of your answer, so people can copy and paste them. (2) Your formulas as shown in your image are wrong, inasmuch as they refer to Columns V, W, and X when they should be referring to Columns B, C, and D. … (Cont’d) – Scott - Слава УкраїніJun 4, 2017 at 20:20(Cont’d) … (3) It would have been nice if you had used the OP’s data, from the question, rather than making up your own.  And, whether you use the OP’s data or your own, it would have been nice if you had shown the original input to your scenario (e.g., for Row 9, it is 5/8/2014 or 5/08/2014).  And, if you’re going to use your own data, it would have been nice if you had included dates from the same month, to demonstrate (for example) how 5/8 and 5/28 are handled differently. And why have duplicate data?  You’ve wasted six rows by using the same values more than once. – Scott - Слава УкраїніJun 4, 2017 at 20:20Add a comment | ; 0 This happens all the time when exchanging date data between locales in Excel.If you have control over the VBA program that exports the data, I suggest exporting the number representing the date instead of the date itself. The number uniquely correlates with a single date, regardless of formatting and locale.For example, instead of the CSV file showing 24/09/2010 it will show 40445.In the export loop when you hold each cell, if it's a date, convert to number using CLng(myDateValue). This is an example of my loop running through all rows of a table and exporting to CSV (note I also replace commas in strings with a tag that I strip when importing, but you may not need this):arr = Worksheets(strSheetName).Range(strTableName & "[#Data]").Value For i = LBound(arr, 1) To UBound(arr, 1) strLine = "" For j = LBound(arr, 2) To UBound(arr, 2) - 1 varCurrentValue = arr(i, j) If VarType(varCurrentValue) = vbString Then varCurrentValue = Replace(varCurrentValue, ",", "<comma>") End If If VarType(varCurrentValue) = vbDate Then varCurrentValue = CLng(varCurrentValue) End If strLine = strLine & varCurrentValue & "," Next j 'Last column - not adding comma varCurrentValue = arr(i, j) If VarType(varCurrentValue) = vbString Then varCurrentValue = Replace(varCurrentValue, ",", "<comma>") End If If VarType(varCurrentValue) = vbDate Then varCurrentValue = CLng(varCurrentValue) End If strLine = strLine & varCurrentValue strLine = Replace(strLine, vbCrLf, "<vbCrLf>") 'replace all vbCrLf with tag - to avoid new line in output file strLine = Replace(strLine, vbLf, "<vbLf>") 'replace all vbLf with tag - to avoid new line in output file Print #intFileHandle, strLine Next iShareImprove this answer Follow answered Sep 27, 2017 at 10:50Mor SagmonMor Sagmon101Add a comment | ; 0 I was not having any luck with all the above suggestions - came up with a very simple solution that works like a charm. Paste the data into Google Sheets, highlight the date column, click on format, then number, and number once again to change it to number format. I then copy and paste the data into the Excel spreadsheet, click on the dates, then format cells to date. Very quick. Hope this helps.ShareImprove this answer Follow answered Nov 9, 2017 at 14:24MikeMike1Add a comment | ; 0 This problem was driving me crazy, then I stumbled on an easy fix. At least it worked for my data. It is easy to do and to remember. But I do not know why this works but changing types as indicated above does not.1. Select the column(s) with the dates2. Search for a year in your dates, for example 2015. Select Replace All with the same year, 2015.3. Repeat for each year.This changes the types to actual dates, year by year.This is still cumbersome if you have many years in your data. Faster is to search for and replace 201 with 201 (to replace 2010 through 2019); replace 200 with 200 (to replace 2000 through 2009); and so forth. ShareImprove this answer Follow answered Nov 20, 2017 at 15:59WallyWally1Add a comment | ; 0 Select dates and run this code over it..On Error Resume Next For Each xcell In Selectionxcell.Value = CDate(xcell.Value) Next xcellEnd SubShareImprove this answer Follow edited Aug 6, 2019 at 9:30Mokubai♦86.7k2525 gold badges198198 silver badges222222 bronze badges answered Jul 6, 2017 at 23:51KathrynKathryn11I tried this, it added "12:00:00 AM" in every empty cell in the selection (a whole column). And sort didn't recognise the dates. – PiecevcakeMay 1, 2020 at 1:12Add a comment | ; 0 No answers here have suggested Excel Power Query. I had a DateTime value (e.g. 2021-02-25T00:35:54.497Z) that excel couldn't interpret correctly. I needed both date and time. In a new Excel workbook, I used the "Get Data > From CSV" option to load into Power Query. Then loaded the results to excel sheet and the date values are recognized correctly. Note that type datetime vs type datetimezone makes a difference. I had to datetimezone to get the correct result.Power Query - automated script from "Excel > Get Data" GUIlet Source = Csv.Document(File.Contents("C:\myFolder\DataSet_RefreshHistory.csv"),[Delimiter=",", Columns=7, Encoding=1252, QuoteStyle=QuoteStyle.None]), #"Promoted Headers" = Table.PromoteHeaders(Source, [PromoteAllScalars=true]), #"Changed Type" = Table.TransformColumnTypes(#"Promoted Headers",{{"refreshType", type text}, {"startTime", type datetimezone}, {"endTime", type datetimezone}, {"status", type text}, {"ReportName", type text}, {"WorkspaceId", type text}, {"serviceExceptionJson", type text}})in #"Changed Type"GET DATABEFORE and AFTERShareImprove this answer Follow answered Mar 3, 2021 at 2:42SherlockSpreadsheetsSherlockSpreadsheets16155 bronze badgesAdd a comment | ; -1 I use a mac. Go to excel preferences> Edit> Date options> Automatically convert date systemAlso,Go to Tables & Filters> Group dates when filtering.The problem probably started when you received a file with a different date system, and that screwed up your excel date functionShareImprove this answer Follow answered Nov 30, 2017 at 10:36StephenieStephenie10Add a comment | ; -2 I usually just create an extra column for sorting or totaling purposes so use year(a1)&if len(month(a1))=1,),"")&month(a1)&day(a1).That will provide a yyyymmdd result that can be sorted. Using the len(a1) just allows an extra zero to be added for months 1-9.ShareImprove this answer Follow edited Sep 26, 2014 at 11:42CharlieRB22.4k55 gold badges5555 silver badges104104 bronze badges answered Sep 26, 2014 at 11:15PaulPaul111 bronze badge12This won't help since the dates aren't being recognised as dates. Also, using extra columns for sorting purposes is rarely necessary – CallumDASep 26, 2014 at 11:59Add a comment | 
Installing .NET framework 3.5 on windows server 2012
windows;windows-server-2012;.net-framework;window;.net-3.5;windows;windows-server-2012;.net-framework;window;.net-3.5
Installing .NET framework 3.5 on windows server 2012 Ask Question
8 You need your 2012/2012R2 ISO mounted or unpacked to a folder as the installation media for .net 3.5 is actually included on the DVD/ISO itself!Next up, you can install by launching a command prompt (As Administrator) and running the following command:DISM /Online /Enable-Feature /FeatureName:NetFx3 /All /LimitAccess /Source:d:\sources\sxs(Replacing d:\sources\sxs with C:\users\you\desktop... or wherever you unpack it to!)The command switches used above do the following~:/Online targets the operating system you're running (instead of an offline Windows image)./Enable-Feature /FeatureName:NetFx3 specifies that you want to enable the .NET Framework 3.5./All enables all parent features of the .NET Framework 3.5./LimitAccess prevents DISM from contacting Windows Update./Source specifies the location of the files needed to restore the feature (in this example, the D:\sources\sxs directory).This works 99.9% of the time, and if it fails - it usually indicates a problem with the BITS/Windows update service - which are actually both used by the DISM (Deployment Image Servicing and Management) tool. To fix that, take a look at This Microsoft Fixit Article. The windows 8 manual instructiosn also work for 2012/2012R2!ShareImprove this answer Follow answered Sep 26, 2014 at 10:45Fazer87Fazer8712.4k11 gold badge3434 silver badges4747 bronze badges2The system on which I want to install .NET is on remote location(1) and the system from which I am picking ISO is on remote location(2). Now I am trying to mount ISO from location(2) to location(1) but the problem is location(1) pc is on win 2012 and location(2) pc is on win 2003 R2, so location(1) pc is not able to access shared folders of location(2) pc. So I was asking if it is necessary to use ISO only, or there is any other way which only includes small files if I manage to download and install .NET -- thxxxxxx – Vikram SinghSep 27, 2014 at 16:22This didn't work for me on a naked install of 2012 R2. There are updates in kb articles that supposedly fix .NET 3.5 install (such as support.microsoft.com/en-gb/kb/3005628) but no good for me as I wanted to do this without any updates installed. – codaamokApr 8, 2016 at 10:05Add a comment | ; 1 You need your 2012/2012R2 ISO mounted or unpacked to a folder as the installation media for .NET 3.5 is actually included on the DVD/ISO itself.Next up, you can install by launching a Command Prompt (as an administrator) and running the following command:DISM /Online /Enable-Feature /FeatureName:NetFx3 /All /LimitAccess /Source:Z:\sources\sxs(Z: indicates the DVD drive)ShareImprove this answer Follow edited Nov 9, 2016 at 15:36Gaff18.3k1515 gold badges5656 silver badges6868 bronze badges answered Jul 29, 2016 at 12:36Hanmanji NHanmanji N1111 bronze badgeAdd a comment | ; 0 If you do not have a ISO, you can download a trial version of Windows 2012 R2, and copy/past sources/sxs, and select this location when installing the .Net using the server manager. It worked fine for me.ShareImprove this answer Follow answered Nov 9, 2016 at 14:45MadguiMadgui10122 bronze badgesAdd a comment | ; 0 I also had an issue with this and I have to mention that if you are using an OEM / ROHK version of Windows Server 2012 the issue could be that there is a second language pack installed.A second language pack will also block the installation of the .NET Framework.You can check with lpksetup.exe if there is another language installed. Remove any languages until you only have one left and then try to install the .NET Framework again.Also if you are using OEM / ROK it could be necessary to get a different install DVD because in my case the install files for .NET were missing on the original OEM DVD.ShareImprove this answer Follow edited Nov 9, 2016 at 15:35Gaff18.3k1515 gold badges5656 silver badges6868 bronze badges answered Jul 4, 2016 at 13:35Ivan ViktorovicIvan Viktorovic57744 silver badges1414 bronze badgesAdd a comment | 
Netsh firewall: allow a port just for a single interface
windows-7;networking;firewall;netsh;windows-7;networking;firewall;netsh
Netsh firewall: allow a port just for a single interface Ask Question
Re-add ssh key every time I restart my mac
macos;ssh;git;macos;ssh;git
Re-add ssh key every time I restart my mac Ask Question
12 For anyone else still looking, I found a working solution on Stackexchange, based on a question on Reddit that mentions this problem, specifically with macOS Sierra.In addition to ssh-add -K you also have to create a new file ~/.ssh/config with this content:Host * UseKeychain yes AddKeysToAgent yes IdentityFile ~/.ssh/id_rsa IdentityFile ~/.ssh/id_25519Worked for me, hope this helps someone :)ShareImprove this answer Follow answered Apr 22, 2017 at 8:44Christian MachtChristian Macht46511 gold badge55 silver badges1616 bronze badges0Add a comment | 
Firefox modifying google searchplugin to not country redirect
firefox;browser;search;firefox;browser;search
Firefox modifying google searchplugin to not country redirect Ask Question
2 The following google.com/ncr search plugin works in Firefox 34.0.5:Google (No country redirect) (google.com) by Mycroft Project [Review] http://mycroftproject.com/google-search-plugins.htmlShareImprove this answer Follow answered Dec 8, 2014 at 1:03guestguest2922 bronze badges11Can you give a more detailed description of the linked content, and explain how it relates to the question? This will help ensure that this answer remains useful in the event the linked page goes offline. In addition, please be careful posting links in answers of this nature—they could be seen by the community as spam, correctly or otherwise. See the help center for more information. – bwDracoDec 8, 2014 at 3:07Add a comment | ; 1 Doing more research, I found out that FF can be forced to reload modified searchplugins by deleting the search.js in %AppData%\\Mozilla\\Firefox\\Profiles\\[ID].default\\ or the linux equivalent folder.To actually get google to not redirect anymore, the following changes need to be made to the google.xml in the ....\\Mozilla Firefox\\browser\\searchplugins\\ folder:in Line 13 change google.com/search to google.de/search or the TLD of your country. It should now be<Url type="text/html" method="GET" template="https://www.google.de/search">in Line 27 change google.com to google.de/ncr. It should now be<Url type="text/html" method="GET" template="https://www.google.de/ncr" rel="searchform"/>save it (Admin rights may be required). Delete the search.js mentioned earlier and restart firefox.This got me working results for FF 32.0.3UPDATE: In the FF35.0 Update, the syntax of the google.xml file seems to have changed. It's sufficient to change line 13 as mentioned above. Line 27 has been removed. Don't forget to delete the search.jsUPDATE 2: Since FF40.0, the default search plugin xmls are not available as plain text anymore. The new recommended way is to install the google US (no country redirect) search plugin from Mycroft (see answer below) and and modify the xml in FF's AppData Folder to one's needs.ShareImprove this answer Follow edited Feb 24, 2016 at 13:12 answered Sep 27, 2014 at 20:16XaserXaser77622 gold badges1010 silver badges1818 bronze badgesAdd a comment | ; 0 Add a custom Google Search for your country from this URL.Thereafter if you want further customization in Google Search, edit the XML file from Mozilla Profile:E.g. for Windows7:C:\Users\ < username >\AppData\Roaming\Mozilla\Firefox\Profiles\< profile name >.default\searchplugins\google-xxx---from-xxx.xmlIn my case, I have edited the 7th line to include Search Results from All countries but use google.ae using the below -os:Url type="text/html" method="GET" template="https://www.google.ae/#q={searchTerms}&amp;tbas=0" resultDomain="google.ae"ShareImprove this answer Follow edited Feb 11, 2016 at 7:20nKn5,43966 gold badges3131 silver badges3838 bronze badges answered Feb 11, 2016 at 6:07Swapnendu MazumdarSwapnendu Mazumdar111 bronze badgeAdd a comment | 
Pipe PuTTY context to client clipboard?
linux;windows;ssh;putty;clipboard;linux;windows;ssh;putty;clipboard
Pipe PuTTY context to client clipboard? Ask Question
2 If you want to copy all the putty output to clipboard, there is a "Copy All To Clipboard" option available in context menu (right-click) from title bar of the putty window. ShareImprove this answer Follow answered Sep 26, 2014 at 10:38tonioctonioc87344 silver badges66 bronze badges2This is by far the fastest way to copy a large buffer. – Daniel W.Sep 26, 2014 at 10:401this doesn't play nicely with tmux when set -g mouse on – AK_Feb 9, 2018 at 19:03Add a comment | ; 4 There is a putty patch doing exactly what you want.http://ericmason.net/2010/04/putty-ssh-windows-clipboard-integration/And this patch has been integrated into kitty.ShareImprove this answer Follow answered Mar 23, 2016 at 14:29SulisuSulisu6155 bronze badges3kitty is a good point, it's open source. but this eric mason page i could not find the source of his "modified putty". Very dangerous. – Daniel W.Mar 23, 2016 at 14:441@DanFromGermany The source code is provided as a small patch to original putty 0.60 source, and the patch link is at bottom of the blog, before comment area.This is direct [ patch link](ericmason.net/putty/putty-0.60-clip.patch) – SulisuApr 24, 2016 at 22:561Using this with KiTTY, but I modified the function slightly to avoid using the $* as I feel weird about using that BASH expansion there. I went with function wcb { cat <(echo -ne '\e''[5i') - <(echo -ne '\e''[4i') } instead. – Alan HensleySep 29, 2017 at 1:46Add a comment | ; 3 2020 Answer. As mentioned in previous answers it is possible. Idk how about official Putty because i use KiTTY (enhanced version of Putty) instead.But all you need is to set Windows clipboard in Terminal > Remote-controlled printing and then use following code as a bash script or a function or whatever you like and then pipe into it.echo -ne '\e''[5i'cat -echo -ne '\e''[4i'Usage example: cat <whatever> | puttyclipboard.shPS: The content (and the original idea) of the dead website ericmason.net mentioned in previous answer can be found at web.archive.orgShareImprove this answer Follow answered Oct 9, 2020 at 18:41icaineicaine13111 bronze badge2This works fine from a regular bash session, but not if I run it inside tmux. Any idea what might be causing this? – Henry HenrinsonNov 9, 2020 at 18:43Thx, great answer. Works fine with Kitty, but not with Putty (there is no option Windows clipboard in the mentioned settings). – Business TomcatFeb 16, 2021 at 5:52Add a comment | ; 1 I am using Linux Mint Cinnamon here and my version of PuTTY does't have contextual menu.I had to copy selecting what I wanted to copy in PuTTY and clicking the middle button (scroll), and then paste it with that same button (instead of right click and paste).Apparently Mint has two clipboards.ShareImprove this answer Follow edited Apr 4, 2017 at 22:57 answered Apr 4, 2017 at 18:03Lucio MollinedoLucio Mollinedo11155 bronze badges2Please answers are not set for comment, if you can answer the question answer it properly – yassApr 4, 2017 at 18:18The initial comment wasn't meant to be criticism but to shed some light into why I was posting this answer. Anywho, I changed the answer . – Lucio MollinedoApr 4, 2017 at 22:58Add a comment | ; 0 The link posted by @Sulisu is dead so here is the function it contained:## WindowsClipboard Function, only use with KiTTY or modified Puttyfunction wclip { echo -ne '\e''[5i' cat $* echo -ne '\e''[4i' echo "Copied to Windows clipboard" 1>&2}ShareImprove this answer Follow answered Aug 28, 2020 at 22:00Parsa B.Parsa B.911 bronze badge1Someone should edit the existing answers to include the function from the website and properly cite and quote the reference (even if it’s dead) – RamhoundAug 29, 2020 at 10:33Add a comment | ; -1 run Apache SSHDthen from your Linux box:date | ssh -p 8000 myworkstation "cmd /c clip.exe"ShareImprove this answer Follow answered Oct 31, 2018 at 12:15weberjnweberjn46166 silver badges88 bronze badgesAdd a comment | 
Count Row and Column in Pivot Table
microsoft-excel;microsoft-excel-2010;worksheet-function;pivot-table;microsoft-excel;microsoft-excel-2010;worksheet-function;pivot-table
Count Row and Column in Pivot Table Ask Question
1 In the values field for the pivot table, you need to insert what you want to sum or count. Then click it to select what calculation you want it to perform (sum, count, etc).ShareImprove this answer Follow edited Feb 13, 2015 at 13:35 answered Sep 26, 2014 at 11:57RaystafarianRaystafarian21.4k1111 gold badges5959 silver badges9090 bronze badges1Hm, a downvote more than 2 years later.. – RaystafarianDec 19, 2016 at 21:16Add a comment | ; 1 I was confused by the previous answer, so here's finally worked for me. I had data original data like so:01/01/2015/r/foo01/01/2015/r/foo01/02/2016/r/barAnd so on, and I created a pivot-table that look like so: /r/foo/r/bar /r/fizz01/01/201501/02/2016And I wanted to count each instance of each row per month. In your pivot table field, right-click the value that you want to sum the instances of like so:And it filled in my chart: /r/foo/r/bar /r/fizz01/01/2015 20001/02/2016 010ShareImprove this answer Follow answered Dec 19, 2016 at 2:19Charles ClaytonCharles Clayton15077 bronze badgesAdd a comment | 
Why does my C:\ drive show that it's using more space than is actually being used?
windows;windows-8;hard-drive;ssd;windows;windows-8;hard-drive;ssd
Why does my C:\ drive show that it's using more space than is actually being used? Ask Question
1 There will always be a discrepancy between the used space reported on the drive itself and the sum of the files/folders on it, and the discrepancy will almost always be more on the OS drive than in any other drive on the system. There are a couple of reasons for this:The used/free graph on the drive properties is a very simple calculation based on the volume bitmap. The volume bitmap is just a record of which blocks are allocated and which are free. The graph merely subtracts the number of used blocks from the total and multiplies by the blocksize to arrive at a value. The volume bitmap does not consider what data those blocks hold or what they're allocated to; only that they're allocated to something.File Explorer or the command line will actually look at the sizes of all the files on the drive and add them together, but it can't see everything. Files with the hidden and system attributes do not display by default, so those files would not be considered unless you specifically selected them. Also, you wouldn't be able to get the size of files you don't have permission to access.File metadata such as access control lists, auditing data, extended attributes, etc. take space to store in the MFT, but are not actually part of the file and are therefore not reported.NTFS reparse points (such as junctions and hard links) are usually reported incorrectly by the file system. Hard links in particular get reported multiple times (making the space used look higher than what it actually is). Although symlinks are usually reported correctly.Sparse files, alternate data streams, volume shadow copies, and NTFS compression also distort the filesystem's view. Sparse files can be reported as gigabytes in size but may only have 100MB of data and only take 100MB of space. Compression tends to report the uncompressed size, not the compressed one. Alternate data streams do not get counted even though they're part of the file (the filesystem only reports the size of the first stream).Volume slack. Files are reported in bytes but are stored as 4KB clusters and rounded up to the nearest 4KB boundary. So if you have a 1-byte file, it will take 4KB of space. a 5KB file will take 8KB of space, etc. It's not much but it adds up over thousands of files.There are more, but really, the volume bitmap (the size reported by the drive's properties) is the true, accurate representation of how much free space you have.ShareImprove this answer Follow answered Aug 25, 2016 at 21:25Wes SayeedWes Sayeed13.5k55 gold badges3939 silver badges7474 bronze badgesAdd a comment | 
Open multiple instances of Adobe Acrobat Professional
adobe-acrobat
Open multiple instances of Adobe Acrobat Professional Ask Question
3 I was easily able to run multiple instances Acrobat Pro XI (11.0) by simply typing "run" from the start menu, and in the "run window" typing then in "run" entering: "C:\Program Files\Adobe\Acrobat 11.0\Acrobat\Acrobat.exe" /nand repeat. I could scan and OCR in one, and do operations in the other.awesome ShareImprove this answer Follow edited Aug 25, 2015 at 6:43suspectus4,6351414 gold badges2424 silver badges3333 bronze badges answered Aug 25, 2015 at 5:48AngelAngel4622 bronze badges21Great, works! Just to note for newbs (like myself) that it may depend on where your Acrobat.exe folder is. In my case the correct command was "C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\Acrobat.exe" /n – user293098Sep 22, 2015 at 2:53Note that according to the other answer by ConanOfRottingham, the full filespec of Acrobat is not needed. The code above can be replaced with simply Acrobat /n, no matter where the program files are located. Verified in Acrobat XI Pro. – NewSitesAug 15, 2019 at 16:43Add a comment | ; 2 In Windows 10 x64bit Professional running Adobe Acrobat DC. In the Windows Search box type "Run" without the quotes.Click on the "Run" app.Type acrobat /n in the blank field provided and then click on the "OK" button. That's it! You now have another instance of Acrobat running. This is helpful when sending say 4 very large files to 4 different printers all at the same time. You can have each instance of acrobat sending 4 different large documents to 4 different printers simultaneously.ShareImprove this answer Follow edited Aug 15, 2019 at 17:38NewSites51311 gold badge44 silver badges1414 bronze badges answered May 31, 2019 at 5:32ConanOfRottinghamConanOfRottingham2111 bronze badge2Verified that this also works in Acrobat XI Pro. – NewSitesAug 15, 2019 at 16:44The new instance can be opened with a specific pdf file by adding the filespec: Acrobat /n "C:\path\FileToOpen.pdf". – NewSitesAug 15, 2019 at 16:46Add a comment | ; 0 Another possibility, if you have enabled the option to open documents as new tabs in the same window, and provided you have several such open tabs, is to drag one of the tabs out of the Acrobat window using your mouse. A new instance of Acrobat will then be created, containg that tab.ShareImprove this answer Follow answered Jul 30, 2022 at 6:45FlintstoneFlintstone111 bronze badgeAdd a comment | ; -1 The short answer: no.A bit a longer answer: Acrobat is not set up to run in multiple instances. What you can do, and this is now also sanctioned and supported by Adobe, is running Reader with the same major version number (Acrobat XI and Reader XI, or Acrobat X and Reader X). If you happen to be on Mac, it is not sanctioned officially by Adobe, but if you know what you are doing, you can run different versions of Acrobat concurrently; I have a development where for changing the document, JavaScript has to be off, but for testing it has to be on. So, I run Acrobat 7 with JavaScript deactivated and Acrobat 9 or XI with active JavaScript, and for displaying important documentation, I have Reader XI active as well.For Windows, I am not quite sure whether Acrobat and Reader can run concurrently; they can be installed on the same machine.ShareImprove this answer Follow answered Aug 26, 2014 at 11:13Max WyssMax Wyss1,5541010 silver badges1010 bronze badges1Note that the Windows part of this answer is wrong. See the other answers. – NewSitesAug 15, 2019 at 16:33Add a comment | 
What are the default English error messages for Windows password policies?
windows;passwords;windows;passwords
What are the default English error messages for Windows password policies? Ask Question
3 Password related stringsThe following Microsoft article provides a list of common logon error messages, along with a brief explanation: Workstation Logon. It was written for Windows 2000, but it might still apply.And here are some XP messages, courtesy of NirSoft: Windows XP DLL File Information - msgina.dllText dumpThese should be all messages which contain the word password, straight from Windows 7 SP1:// kernel32.dll.mui86, "The specified network password is not correct."615, "The password provided is too short to meet the policy of your user account.\nPlease choose a longer password."616, "The policy of your user account does not allow you to change passwords too frequently.\nThis is done to prevent users from changing back to a familiar, but potentially discovered, password.\nIf you feel your password has been compromised then please contact your administrator immediately to have a new one assigned."617, "You have attempted to change your password to one that you have used in the past.\nThe policy of your user account does not allow this. Please select a password that you have not previously used."1057, "The account name is invalid or does not exist, or the password is invalid for the account name specified."1216, "The format of the specified password is invalid."1304, "The password is too complex to be converted to a LAN Manager password. The LAN Manager password returned is a NULL string."1323, "Unable to update the password. The value provided as the current password is incorrect."1324, "Unable to update the password. The value provided for the new password contains values that are not allowed in passwords."1325, "Unable to update the password. The value provided for the new password does not meet the length, complexity, or history requirements of the domain."1326, "Logon failure: unknown user name or bad password."1327, "Logon failure: user account restriction. Possible reasons are blank passwords not allowed, logon hour restrictions, or a policy restriction has been enforced."1330, "Logon failure: the specified account password has expired."1386, "A cross-encrypted password is necessary to change a user password."1390, "A cross-encrypted password is necessary to change this user password."1397, "Mutual Authentication failed. The server's password is out of date at the domain controller."1907, "The user's password must be changed before logging on the first time."2108, "The network connection was made successfully, but the user had to be prompted for a password other than the one originally specified."8529, "Security Account Manager needs to get the boot password."-2147467238, "The server process could not be started because the configured identity is incorrect. Check the username and password."-2146368492, "The identity or password set on the application is not valid"-2144272340, "Group Policy settings require that a recovery password be specified before encrypting the drive."-2144272334, "The recovery password file was not found because a relative path was specified. Recovery passwords must be saved to a fully qualified path. Environment variables configured on the computer can be used in the path."-2144272332, "The recovery key provided is corrupt and cannot be used to access the drive. An alternative recovery method, such as recovery password, a data recovery agent, or a backup version of the recovery key must be used to recover access to the drive."-2144272331, "The format of the recovery password provided is invalid. BitLocker recovery passwords are 48 digits. Verify that the recovery password is in the correct format and then try again."-2144272329, "The Group Policy setting requiring FIPS compliance prevents a local recovery password from being generated or used by BitLocker Drive Encryption. When operating in FIPS-compliant mode, BitLocker recovery options can be either a recovery key stored on a USB drive or recovery through a data recovery agent."-2144272328, "The Group Policy setting requiring FIPS compliance prevents the recovery password from being saved to Active Directory. When operating in FIPS-compliant mode, BitLocker recovery options can be either a recovery key stored on a USB drive or recovery through a data recovery agent. Check your Group Policy settings configuration."-2144272324, "The BitLocker startup key or recovery password cannot be found on the USB device. Verify that you have the correct USB device, that the USB device is plugged into the computer on an active USB port, restart the computer, and then try again. If the problem persists, contact the computer manufacturer for BIOS upgrade instructions."-2144272323, "The BitLocker startup key or recovery password file provided is corrupt or invalid. Verify that you have the correct startup key or recovery password file and try again."-2144272322, "The BitLocker encryption key cannot be obtained from the startup key or recovery password. Verify that you have the correct startup key or recovery password and try again."-2144272292, "Group Policy settings do not permit the creation of a recovery password."-2144272291, "Group Policy settings require the creation of a recovery password."-2144272278, "Group Policy settings do not permit the creation of a password."-2144272277, "Group Policy settings require the creation of a password."-2144272276, "The Group Policy setting requiring FIPS compliance prevents passwords from being generated or used. Please contact your system administrator for more information."-2144272275, "A password cannot be added to the operating system drive."-2144272256, "Your password does not meet minimum password length requirements. By default, passwords must be at least 8 characters in length. Check with your system administrator for the password length requirement in your organization."-2144272255, "Your password does not meet the complexity requirements set by your system administrator. Try adding upper and lowercase characters, numbers, and symbols."-2144272240, "BitLocker Drive Encryption cannot be applied to this drive because there are conflicting Group Policy settings for recovery options on operating system drives. Storing recovery information to Active Directory Domain Services cannot be required when the generation of recovery passwords is not permitted. Please have your system administrator resolve these policy conflicts before attempting to enable BitLocker."-2144272239, "BitLocker Drive Encryption cannot be applied to this drive because there are conflicting Group Policy settings for recovery options on fixed data drives. Storing recovery information to Active Directory Domain Services cannot be required when the generation of recovery passwords is not permitted. Please have your system administrator resolve these policy conflicts before attempting to enable BitLocker."-2144272238, "BitLocker Drive Encryption cannot be applied to this drive because there are conflicting Group Policy settings for recovery options on removable data drives. Storing recovery information to Active Directory Domain Services cannot be required when the generation of recovery passwords is not permitted. Please have your system administrator resolve these policy conflicts before attempting to enable BitLocker."// winlogon.exe.mui1004, "Changing password..."1301, "Your password has been changed."1302, "The system cannot change your password now because the domain %s is not available."1303, "The User name or old password is incorrect. Letters in passwords must be typed using the correct case."1304, "You do not have permission to change your password."1305, "The password on this account cannot be changed at this time."1306, "Unable to change your password because the computer you selected is not the Domain Controller of the domain. Type the name of the domain or the name of the Domain Controller and try again."1307, "Please type a password which meets these requirements."1308, "Your new password does not meet the minimum length or password history and complexity requirements. Please type a different password."1309, "Your password must be at least %hu characters; cannot repeat any of your previous %hu passwords; must be at least %ld days old; must contain capitals, numerals or punctuation; and cannot contain your account or full name."1310, "Your password must be at least %hu characters, cannot repeat any of your previous %hu passwords and must be at least %ld days old."1311, "Unable to change the password on this account due to the following error:\n\n%d : %s\n\nPlease consult your system administrator."1312, "Unable to change your network provider password."2010, "Consider changing your password"2011, "Your password will expire in %ld days."2012, "Your password expires today."2027, "Your password will expire tomorrow."2028, "\nTo change your password, press CTRL+ALT+DELETE and then click \"Change a password...\"."2042, "Please lock this computer, then unlock it using your most recent password or smart card."2046, "\nTo change your password, press CTRL+ALT+END and then click \"Change a password...\"."4000, "Do you want to allow this application to read your stored user name and password?"// authui.dll.mui11401, "The passwords you entered did not match."11402, "Please enter a user name and password."11601, "The user name or password is incorrect."11609, "The password on this account cannot be changed at this time."11610, "The password for this account has expired. To change the password, click OK, click Switch User, and then log on."11611, "Your password has expired and must be changed."11613, "Your password has been changed."14101, "To continue, type an administrator password, and then click Yes."-1342172277, "The username/password credential provider failed to enumerate tiles."-1342172275, "The autologon password could not be loaded."-1342172274, "The autologon password could not be loaded. Details: %1"// kerberos.dll.mui1073741828, "The Kerberos client received a KRB_AP_ERR_MODIFIED error from the server %1. The target name used was %3. This indicates that the target server failed to decrypt the ticket provided by the client. This can occur when the target server principal name (SPN) is registered on an account other than the account the target service is using. Please ensure that the target SPN is registered on, and only registered on, the account used by the server. This error can also happen when the target service is using a different password for the target service account than what the Kerberos Key Distribution Center (KDC) has for the target service account. Please ensure that the service on the server and the KDC are both updated to use the current password. If the server name is not fully qualified, and the target domain (%2) is different from the client domain (%4), check if there are identically named server accounts in these two domains, or use the fully-qualified name to identify the server."-2147483634, "The password stored in Credential Manager is invalid. This might be caused by the user changing the password from this computer or a different computer. To resolve this error, open Credential Manager in Control Panel, and reenter the password for the credential %1."Do it yourselfDownload ResHacker.Get the winlogon.exe.mui localization file, which is usually located in the following folder in an US English Windows system (Vista and later): C:\Windows\System32\en-USOpen the file using ResHacker, and browse the String Table and/or Message Table section, whichever available. You can also press Ctrl+F to look for specific words.Repeat steps 2-3 as needed.Note Getting the right files might require some guesswork.ShareImprove this answer Follow edited Aug 26, 2014 at 11:12 answered Aug 26, 2014 at 10:26and31415and3141514.4k33 gold badges4545 silver badges6262 bronze badges2I guess 1308, "Your new password does not meet the minimum length or password history and complexity requirements. Please type a different password." is the string that covers my question. – RebeccaAug 26, 2014 at 11:49@Junto Also 1309 and 1310. The only official reference I could find is the one I posted above. – and31415Aug 26, 2014 at 12:58Add a comment | 
Two different physical ssd's for two different OS
windows;ubuntu;hard-drive;bios;windows;ubuntu;hard-drive;bios
Two different physical ssd's for two different OS Ask Question
2 Generally yes, either through changing the boot order in bios, or by selecting a boot device in the system boot menu. If you don't want one bootloader stepping on the other, disconnect the other SSD and install.You don't need to 'turn off' the SSD - the windows system can't see the linux FS without additional filesystem drives, if they exist, and the linux system generally can be told to not mount your windows bootloader.ShareImprove this answer Follow answered Aug 26, 2014 at 9:24Journeyman Geek♦Journeyman Geek125k5151 gold badges252252 silver badges418418 bronze badges5Thanks. So it's possible to completely turn off SSD in a bios? I plan to turn off SSD with UBUNTU in bios and install clean SSD then install Windows on it. After i've done with games on windows i will turn off 2nd SSD. – Alexander KimAug 26, 2014 at 9:29Yes, that is possible. But not needed (though might come in handy during the windows installation). – HennesAug 26, 2014 at 9:31I just unplugged mine, and left the side off while I set up the system, then plugged the drives back in. If you do it right, windows shouldn't overwrite or care about grub but better safe then sorry – Journeyman Geek♦ Aug 26, 2014 at 9:32You mean - you have unplugged yours when you was installing windows? – Alexander KimAug 26, 2014 at 9:32yup. it is a just in case thing but it worked – Journeyman Geek♦ Aug 26, 2014 at 10:10Add a comment | ; 1 You don't even need to turn off the SSD's in BIOS. On the Ubuntu SSD, install the boot loader Grub (installed by default), and make sure it has entries for both Linux and Windows. Then set your boot device for the SSD containing Ubuntu. This will make sure Grub gets started when you turn on your PC. After Grub starts at boot, you can choose to boot Windows or Ubuntu. (in short, Grub also works for different disks, not just for different partitions)ShareImprove this answer Follow answered Aug 26, 2014 at 9:25mtakmtak16.1k22 gold badges5151 silver badges6262 bronze badges1Thanks, but i don't want to mess with GRUB. Because i do gaming only on weekends (2 days in a row), so i won't have to choose what OS to load on every boot. I just want to turn off 2nd SSD then turn on 1st and able to work in ubuntu again/ – Alexander KimAug 26, 2014 at 9:31Add a comment | 
Running OpenGL Apps on Android x86 4.4 R1 in virtual machine
virtual-machine;android;hyper-v;opengl;virtual-machine;android;hyper-v;opengl
Running OpenGL Apps on Android x86 4.4 R1 in virtual machine Ask Question
0 As far as I know, Android x86 doesn't have any OpenGL emulation. (Related:Running OpenGL App on Android x86 and VirtualBox?)The possible alternatives are:GenymotionThe default Android emulator bundled with SDKShareImprove this answer Follow answered Sep 24, 2017 at 8:01mike_smike_s1Add a comment | 
Creating tables in SQL [closed]
sql;sql
Creating tables in SQL [closed] Ask Question
2 The issue is the syntax near the table name. Remove the quote marks from test_11. CREATE TABLE test_11 ( `Company_Name` varchar(160), `Company_Number` varchar(8), `Care_Of` varchar(100), `PO_Box` varchar(10), `Address_line1` varchar(300), `Address_line2` varchar(300), `Post_town` text, `County` varchar(50), `Country` text, `Post_Code` varchar(20), `Category` varchar(100), `Status` varchar(70), `Country_of_Origin` text, `Dissolution_Date` date, `Incorporation_Date` date, `Accounting_refday` int(2), `Accounting_refmonth` int(2), `Next_due_date` date, `Last_made_up_date` date, `Accounting_category` text, `Returns_next_due_date` date, `Returns_last_made_up_date` date, `Num_mort_changes` int(6), `Num_mort_outstanding` int(6), `Num_mort_part_satisfied` int(6), `Num_mort_satisfied` int(6), `SIC_code1` varchar(170), `SIC_code2` varchar(170), `SIC_code3` varchar(170), `SIC_code4` varchar(170), `Num_gen_partners` int(6), `Num_lim_partners` int(6), `URL` varchar(47), `Change_of_name_date` date, `Company_name_previous` varchar(160)) ENGINE=InnoDB DEFAULT CHARSET =latin1;SQLFiddleShareImprove this answer Follow answered Aug 26, 2014 at 9:03DaveDave25.3k1010 gold badges5454 silver badges6969 bronze badgesAdd a comment | 
Run windows explorer via chrome?
windows-8;google-chrome;windows-explorer;windows-8;google-chrome;windows-explorer
Run windows explorer via chrome? Ask Question
5 From Chrome, Safari and Opera this isn't possible due to their security model. Internet Explorer permits it, because it's part of the OS and intimately linked with Explorer.exe.Thus, the only solution to achieve your goal is by using an extension. ShareImprove this answer Follow answered Aug 26, 2014 at 8:24Ob1lanOb1lan1,89633 gold badges1616 silver badges3535 bronze badgesAdd a comment | ; 2 This extension from the Chrome Web Store helps by opening files from the chrome file manager in their respective programs, it does not open the local links in windows explorer as you asked but may be helpful in what it is your trying to achieve,https://chrome.google.com/webstore/detail/local-explorer-file-manag/eokekhgpaakbkfkmjjcbffibkencdfklIf you could elaborate that would help us better answer you.ShareImprove this answer Follow answered Aug 26, 2014 at 8:13Isaac ChristieIsaac Christie5144 bronze badges1Yes extensions are other solution which i want to prevent from using. edited thanks – Royi NamirAug 26, 2014 at 8:14Add a comment | ; 1 Honestly I don't know if there is an easy way to run windows explorer on chrome. I've also looked for a solution and so far the easiest way is to use chrome extension. If you're down for that path, try this one out https://chrome.google.com/webstore/detail/local-explorer-file-manag/eokekhgpaakbkfkmjjcbffibkencdfkl.ShareImprove this answer Follow answered Jul 8, 2020 at 6:31TommyTommy1111 bronze badgeAdd a comment | ; 0 If the question is "Is there is a way to open Explorer.exe from Chrome.exe?" then the general answer is "Yes." because one can launch Explorer.exe from Chrome's download view. A simple example of how to do this follows:Find something on the Internet that will trigger a download within Chrome and download it; or if you can remember the shortcuts, either press control-J or type chrome://downloads/ into Chrome's omnibox. As of 2018 the default Chrome theme's download tab contains a blue menu bar. On the very right of this blue menu bar is a Kebab Menu (three vertical dots aka "more options"). The Kebab menu has an option "Open downloads folder" which will normally launch Explorer.exe. This is useful when one is operationg in a limited environment such as Citrix Virtual Apps (previously know as MetaFrame, "Presentation Server", XenApp and then rolled into the suite and dubbed XenDesktop and as of 2018 "Citrix Virtual Apps"). Using this technique, one can typically launch Explorer.exe and elevate into a full desktop. One technique is to type into the just launched explorer window C:\Windows\System32\Taskmgr.exe and press enter. From the remote Task Manager window select the "Details" tab, locate explorer.exe, right click on it, select "End Task", select "End Process" and let the process end. Continuing with the remote Task Manager window, select File, Run new task. Type in explorer.exe (or specifically %windir%\explorer.exe) and the entire desktop should appear, including the start menu. This is a generally true method of gaining a full desktop from Chrome.exe. Each environment may contain caveats. If this specific technique fails, there are other techniques of which one normally succeeds. ShareImprove this answer Follow answered Nov 12, 2018 at 18:01EdwinEdwin111 bronze badgeAdd a comment | ; 0 Chrome new tabEnter file:///C:/Windows/explorer.exe into the Chrome address bar. A save dialog will open.Right-click any folder and select Open in new window.Navigate to the folder you want.Chrome HTML view of folder/filesRight-click on the folder/file and select Copy link address.Right-click again, selecting Save link as… or press Crtl + S. A save dialog will open.Right-click any folder and select Open in new window.Paste the copied address in the new window's address bar.ShareImprove this answer Follow edited Aug 12, 2020 at 22:55Worthwelle4,4181111 gold badges1919 silver badges3131 bronze badges answered Aug 12, 2020 at 22:23Dennis HayDennis Hay1Add a comment | 
PC as W-LAN router
wireless-networking;wireless-networking
PC as W-LAN router Ask Question
0 First, you have to setup a WiFi access point:Open a command prompt as admin (cmd)Run netsh wlan set hostednetwork mode=allow ssid=your_network_name key=your_passwordRun netsh wlan start hostednetworkThen enable connection sharing:Run ncpa.cpl to open the adapters listSelect your internet adapter, right click, propertiesUnder the Sharing tab, check "Allow other network users..."Finally select the wifi adaper and hit OkShareImprove this answer Follow answered Aug 26, 2014 at 14:27NicolasNicolas35811 silver badge66 bronze badgesAdd a comment | ; 1 If you are using Windows you can use Internet Connection Sharing. Go to the properties of the LAN interface, sharing Tab and enable the checkbox "Allow other network users to connect through this computer’s Internet connection".http://windows.microsoft.com/en-us/windows/using-internet-connection-sharing#1TC=windows-7ShareImprove this answer Follow answered Aug 26, 2014 at 10:51mtakmtak16.1k22 gold badges5151 silver badges6262 bronze badges0Add a comment | ; 0 At tomshardware.co.uk I found following steps (similar to Nicolas' answer):run from an admin command prompt netsh wlan set hostednetwork mode=allow ssid=<nice name> key=<sensible password> keyUsage=persistent (the password needs to be at least 8 characters long)in the control panel' Network and Sharing center click change adapter settingsthere should be a nice entry now with "Microsoft Virtual WiFi Miniport Adapter" - rename it to something better, e.g. "LAN-shared-over-WLAN"open the properties of the LAN-network connection, switch to the Sharing tab, select the "LAN-shared-over-WLAN" from the combobox, then check the "Allow other network users to connect through this computer's Internet connection" checkboxrun at the admin command prompt: netsh wlan start hostednetworkto stop, run netsh wlan start hostednetworkto remove the "LAN-shared-over-WLAN" entry again, run netsh wlan set hostednetwork mode=disallowShareImprove this answer Follow edited Sep 7, 2014 at 14:33 answered Sep 7, 2014 at 14:26Thomas S.Thomas S.74322 gold badges1111 silver badges2828 bronze badgesAdd a comment | 
Why do I need to install RSAT on Windows 8.1 for accessing Hyper-V Server 2012 R2?
virtual-machine;windows-8.1;virtualization;hyper-v;virtual-machine;windows-8.1;virtualization;hyper-v
Why do I need to install RSAT on Windows 8.1 for accessing Hyper-V Server 2012 R2? Ask Question
1 In fact, this depends on which Hyper-V server you wan to manage from your Windows 8.1 client.This post indicate it's totally possible to manage a Hyper-V server on Windows Server 2012/R2 from the Windows 8.1 Hyper-V Manager.Now, to manage Hyper-V Server 2012R2 (standalone), it's a bit different. This post explains how to remotely manage such an installation, either with Powershell, Server Manager or an MMC console. This article indeed state that you will have to install the proper RSAT if you want to manage your installation with server manager (point 1.2).If you want to manage an Hyper-V server on other version of Windows Server, please refer to this article, which has a table to explain the compatibility of the Hyper-V management tools.Hope this helps !ShareImprove this answer Follow edited Aug 26, 2014 at 8:11 answered Aug 26, 2014 at 7:56Ob1lanOb1lan1,89633 gold badges1616 silver badges3535 bronze badges6I think you didn't get the scenario. I'm talking about the standalone hyper-v server 2012 r2, not the one in any version of windows server. – atiyarAug 26, 2014 at 8:03@NerotheZero True, I've now edited my answer with the proper article on how to manage an Hyper-V Server 2012R2 Standalone. – Ob1lanAug 26, 2014 at 8:11@NerotheZero does that answer to your question ? If so, please upvote and mark as answer. Thanks – Ob1lanSep 1, 2014 at 8:51I'm sorry, but that does not answer my question. I've posted the question after reading all those articles you've linked, and a lot others. Thanks for your effort though. :) – atiyarSep 2, 2014 at 8:11Thus, could you be more specific ? Indeed, I think my post answer your initial question... – Ob1lanSep 2, 2014 at 12:03 | Show 1 more comment
Force vncserver started by lightdm to localhost on ubuntu 14.04
localhost;ubuntu-14.04;vncserver;localhost;ubuntu-14.04;vncserver
Force vncserver started by lightdm to localhost on ubuntu 14.04 Ask Question
0 As of November 2014 or December 2015 (depending on perspective), LightDM has added the listen-address configuration option to the [VNCServer] section.So the section in your lightdm.conf (or the file in lightdm.conf.d) would change to:## VNC Server configuration## enabled = True if VNC connections should be allowed# command = Command to run Xvnc server with# port = TCP/IP port to listen for connections on# listen-address = Host/address to listen for VNC connections (use all addresses if not present)# width = Width of display to use# height = Height of display to use# depth = Color depth of display to use#[VNCServer]enabled=trueport=5901listen-address=localhostwidth=1024height=768depth=8ShareImprove this answer Follow answered Jan 21, 2019 at 20:28AmirAmir51855 silver badges99 bronze badgesAdd a comment | 
Linux backup server
linux;backup;linux;backup
Linux backup server Ask Question
0 You need to use 2-step-backup:Make a MySQL Dump on a remote host.# mkdir /backups# mysqldump -A > /backups/all-databases.sqlMake a File Dump on remote host.# tar -cvpf /backups/fullbackup.tar --directory=/ --exclude=proc --exclude=sys --exclude=dev/pts --exclude=backups .(You can also exclude /var/lib/mysql, but i dont do this)You can do all that by the cron and get 2 files all-databases.sql and fullbackup.tar by rsync. It can not make an inconsistent data.ShareImprove this answer Follow answered Aug 26, 2014 at 8:40ArcherGodsonArcherGodson1,81711 gold badge1010 silver badges55 bronze badges3Does this mean, that there is no solution to the inherent problem? That I have to make a seperate backup-"hack" for all programs that potentially modify a file? – user2089648Aug 26, 2014 at 8:51Yes, you need to take care of program, that can modify its variable data during making the backup. Often you need do this only with Databases. – ArcherGodsonAug 26, 2014 at 10:12"It can not make an inconsistent data" – this statement is wrong. You can still get inconsistent data as tar doesn't create a filesystem snapshot. The MySQL dump will be consisntent but other files might have changed in the mean time. If you need consistent data you should have a look at lvm snapshots and similar techniques which increase the likelihood of getting consistent data. – Felix SchwarzJun 10, 2015 at 21:01Add a comment | 
router not responding for a few minutes?
networking;router;networking;router
router not responding for a few minutes? Ask Question
Pinging host from virtual machine
virtualbox;virtual-machine;kali-linux;virtualbox;virtual-machine;kali-linux
Pinging host from virtual machine Ask Question
0 first turn off the firewall of host machine it may help and set ip_forward=1For setting ip_forward=1, you have to dosysctl -w net.ipv4.ip_forward=1orecho 1 < /proc/net/ipv4/ip_forwardShareImprove this answer Follow answered Oct 3, 2014 at 4:45ManishManish122 bronze badgesAdd a comment | 
getting yml syntax highlighting in textmate2
syntax-highlighting;bundle;textmate-2;syntax-highlighting;bundle;textmate-2
getting yml syntax highlighting in textmate2 Ask Question
1 You need remove Textmate preferences and reinstall it. If you are using OSX find Library folder and search "textmate" and remove all files you find there, then remove textmate app normally from Application folder and install textmate again from its website. You will see again recommendation for .yml file when you open a .yml file for the first time and choose the option "see as YAML file". It hopefully solve the problem. ShareImprove this answer Follow answered Apr 9, 2015 at 8:47Soroush NejadSoroush Nejad12622 bronze badges2Hi thank you for the help, can you give me a better idea of what the preferences file is called? There are a lot of files, some of which may not be textmate related... – Zach SmithApr 15, 2015 at 5:00This definitely pointed me in the right direction, I found more explicit instructions here: stackoverflow.com/questions/16429165/… – Zach SmithApr 15, 2015 at 5:29Add a comment | 
Outlook shows certificate security warning in local LAN although certificate is only associated to IIS
microsoft-outlook;ssl;certificate;exchange-2010;security-warning;microsoft-outlook;ssl;certificate;exchange-2010;security-warning
Outlook shows certificate security warning in local LAN although certificate is only associated to IIS Ask Question
4 Your certificate is for webmail.example.org. If you're connecting to your Exchange server via server.domain, then the name will not match the common name in the certificate, thus the error.You either need a certificate that includes both names or you always have to use the external name (even when on the LAN).To make sure your clients use the external connector for your Exchange services, here are a few commands that may help:EXCHANGE-SERVER is the hostname of your Exchange serverexchange-server.yourdomain.com is the externally visible name of your Exchange serverCommandsSet-ClientAccessServer -Identity EXCHANGE-SERVER -AutoDiscoverServiceInternalUri https://exchange-server.yourdomain.com/Autodiscover/Autodiscover.xmlEnable-OutlookAnywhere -Server EXCHANGE-SERVER -ExternalHostname "exchange-server.yourdomain.com" -DefaultAuthenticationMethod "Basic" -SSLOffloading:$FalseSet-OABVirtualDirectory -identity "EXCHANGE-SERVER\OAB (Default Web Site)" -externalurl https://exchange-server.yourdomain.com/OAB -RequireSSL:$true -InternalUrl https://exchange-server.yourdomain.com/OABSet-WebServicesVirtualDirectory -identity "EXCHANGE-SERVER\EWS (Default Web Site)" -externalurl https://exchange-server.yourdomain.com/EWS/Exchange.asmx -BasicAuthentication:$True -InternalUrl https://exchange.haseke.de/EWS/Exchange.asmxShareImprove this answer Follow edited Jun 18, 2014 at 13:03 answered Jun 18, 2014 at 10:03Oliver SalzburgOliver Salzburg85.2k6161 gold badges258258 silver badges305305 bronze badges4But this error didn't occur with Exchange 2003: the certificates were the same. The was a self-signed certificate and an authority-signed certificate for Webmail. Is there a way to disable this warning on Outlook or to disable the usage of certificates internally on the LAN? – Umar JamilJun 18, 2014 at 11:082Exchange 2010 don't support internal/external zones when it comes to the SSL certificates. It's only bound to the services. This answer is as correct as it will get. – xstncJun 18, 2014 at 11:41@UmarJamil I added some commands which I pulled from our documentation. We used those for our own installations. I hope they help. – Oliver SalzburgJun 18, 2014 at 13:03Not sure if it matters, but: "...then the name will not match the common name..." - putting a DNS name in the Common Name (CN) is deprecated by both the IETF and CA/B. DNS names go in the SubjectAltName (SAN). Use CN for a friendly org name like "Example Widgets". – jwwJun 21, 2014 at 9:16Add a comment | ; 1 Start configuring exchange server without .local internal network access Exchange services compulsory requires SSL certificate. Old practice configuration add .local names itself. Recently I renewed my exchange server ssl from ssl2buy. I heard interesting news from there that CA/Browser from announced new guide that no CA can issue ssl certificates for hostname (NetBIOS names) and .local domain names later Oct 2014. All currently issued ssl for .local names support should expire before Oct 2015. Also Microsoft will add this change in next update.I checked with Digicert, GeoTrust and Comodo. All said same. So I changed my server configuration and removed .local instances. If I don't change this now, have to do next year, but change is for sure. More interesting is my previous exchange ssl from digicert was for $250+ and this new comodo exchange ssl is just for $45. Both works good and I don't see any issue. You can try it there https://www.ssl2buy.com/comodo-multi-domain-ssl.phpShareImprove this answer Follow answered Jul 17, 2014 at 1:41EricEric1111 bronze badgeAdd a comment | 
Virus effect on flash drive filesystem (FAT)
windows-7;filesystems;usb-flash-drive;virus;windows-7;filesystems;usb-flash-drive;virus
Virus effect on flash drive filesystem (FAT) Ask Question
1 This is one of the common virus I found nowadays on flash drives. They usually hides (System Hidden) all the contents of flash drive and creates shortcut for each of them pointing towards virus executable which itself is hidden.As you have mentioned you deleted executable virus. So to see the contents simply toggle your hidden files on.Note that: you need to toggle both normal hidden files and system hidden files to see those files. You can find this option in Folder and Search Option in Control Panel. image from external sourceTo mark them permanently visible uncheck their attribute hidden in their Properties Window.To set their attributes you can also use following attrib command I:\> attrib -H -S *.* /S /D ShareImprove this answer Follow edited Jun 18, 2014 at 10:28 answered Jun 18, 2014 at 10:20abhishekkannojiaabhishekkannojia88977 silver badges1616 bronze badgesAdd a comment | ; 1 How to solve this?Reformat drive and restore data from your backup copy. Or ...Try to recoverManually search to see if the original uncorrupted files exist elsewhere on the drive.If necessary use a data recovery tool designed for use with flash drives. This may resurrect deleted files or parts of them.By hand, go through and remove all the links one by one. Replace the links with the original contents.Personally I'd hit the drive with a large hammer, burn the fragments, then bury them deep in a landfill site. Then I'd spend $5 of my lunch money on a new one and make regular backups.ShareImprove this answer Follow answered Jun 18, 2014 at 10:16RedGrittyBrickRedGrittyBrick80.5k1919 gold badges132132 silver badges201201 bronze badgesAdd a comment | 
Does speed enhancement software actually work? [duplicate]
networking;internet;speed;networking;internet;speed
Does speed enhancement software actually work? [duplicate] Ask Question
29 In short, the answer is NoFirst of all, as you have correctly stated you cannot exceed the speed limit set by your ISP. This just won't happen. It is a hardware restriction of the connection you are using, whatever that connection is - fiber, ADSL, DialUp, 3g, 4g, ...A software that claims to overcome the restriction described above is clearly fraudulent.It is important to mention that there are ways to speed up web browsing to a certain extend. However this is a very special case. You can speed up your browser by rapidly switching between multiple proxies and opening several simultaneous connections to download the same resource. However this is normally offered as an extra functionality with the browser (like Opera's Turbo mode). Yet, even with this functionality enabled, your actual Broadband speed limit remains the top limiting factor.It is also worth mentioning that there are methods to increase actual data transfer rate. One of these methods is to use compression. However this method does not apply to some dodgy software offering to increase the speed, because compression on one side must be matched by decompression on another. For example if you send data and use some software to compress it, then whoever received the data should be aware of the compression and be capable of decompressing (and vise versa).Another thing that is very important to note is that there is a very poor regulations about advertising on the internet. Anyone can claim anything about software they distribute, virtually no responsibility is assumed. If it is not a big company with a real name, then no one will really bother with claims.In fact most of the programs that claim to speed up your Internet will contain either malware, spyware, trojans, advertising or all of it at the same time. By the way same applies for the software that claims to remove all viruses from you PC. Such software is intended for naive people without technical knowledge who will just click "install" and "agree" without giving it a second thought.If you have asked this question out of curiosity, then I hope I have summarized it well enough for you. This is a good question, btw. If you were actually considering to use such software - don't.ShareImprove this answer Follow edited Jun 18, 2014 at 12:45 answered Jun 18, 2014 at 10:01Art GertnerArt Gertner7,0691111 gold badges4141 silver badges7272 bronze badges7I don't think your first statement is entirely correct - as you mention yourself compression is a way, which increases the actual number of usable/decompressed Bytes/s. So if I can download a 1MB File in 1 Second via a compression-relay-service, which compresses it to 100KB and decompresses it on my PC, my effective Bandwith is increased to 1MB/s – FalcoJun 18, 2014 at 13:07Some of the software is supposed to work by looking at the links on the page you are currently browsing, and attempting to download the content at the other end of the links before you click on them. This can help to optimise your connection by taking advantage of otherwise unused bandwidth. However, this is likely to significantly increase the total amount of data you download, but may make it appear as if your connection is faster, as sometimes, the software will guess right and the content will have already been fetched for you. – Bill MichellJun 18, 2014 at 13:07Software with an external service can also preload this contents and tidy up and compress them on their side and just send them to you, when you actually click the link. You will have the benefit of browsing-prediction without increased traffic on your side... – FalcoJun 18, 2014 at 13:141Good comments (all three of them). And perfectly valid. I will not be updating my answer as these comments are good enough to cover what I did not. Also @Falco provided a good answer worth reading (superuser.com/a/770379/281154) – Art GertnerJun 18, 2014 at 13:16These things aren't (or weren't) all dodgy malware things. Google used to offer one. – user2357112Jun 18, 2014 at 19:53 | Show 2 more comments; 14 Do I think many of these offers are legit? NOBut are there ways in which a software could significantly speed up your internet experience? YESPossibilities include:Compression - If they provide a compression server, which takes your request in a compressed format, gets the ressource on the web and relays it to you compressed, it can be a major speed improvement depending on the content type. Good examples are Opera Turbo / Opera Mini / Windows Phone compression - with websites they can even use lossy compression and filter advertising and heavy third party load at their end, or present it on demand, which can save you tons of bandwidth.Caching - this also needs an external server - speeds up responsiveness of websites by caching their contents. But your ISP can do this as well and many major services provide several caching servers... But still, if a service would provide a massive fast caching server right next to you (small distance in hops) you could have a noticeably improved response time.DNS-Service: The software could provide you with a faster DNS-Service than your default one, which would reduce response time for many usual use-cases.System-Tweaking: especially for high-bandwidth transfers, there are a bunch of settings like number of connections, packet size, TCP and IP protocol tweaks, which could affect your performance. Although your default system settings should be pretty good and self-regulating, it is entirely possible someone can tweak the settings for a bit more performance.Protocol tricks/hacks: I seriously don't know how much of this one could actually work. But several protocols support various priority levels and other options, which could possibly be used to get your traffic routed faster by e.g. lying about its contents.ShareImprove this answer Follow edited Jun 18, 2014 at 13:49LSerni8,27311 gold badge2727 silver badges4646 bronze badges answered Jun 18, 2014 at 13:04FalcoFalco48722 silver badges1010 bronze badges2Very comprehensive answer. I'd also note that (1) and (2) usually come with a subscription fee, and (3) is nowadays mostly obsoleted by Google's 8.8.8.8/8.8.4.4 DNS servers. – LSerniJun 18, 2014 at 13:511One heuristic application of (2) is for a device/software to pre-load and therefore cache resources/pages you're likely to visit next, while you're sitting there reading the current page. – EccentropyJun 18, 2014 at 16:11Add a comment | ; 4 IMHO, there are a couple of ways, the perceived Internet speed is enhanced.Compression - basically, if the end point (say website) is using compression techniques then basically, when you connect to that site, the amount of data that you download is less than the actual size of the final page. since, you would be downloading the compressed version of the site which after the download gets decompressed on your local machine to its original size, and presented to you. Acceleration Device - Similar the above but what happens here is that the data transferred between site A and site B gets compressed and sent across the same internet line but because of the compression techniques used, you would end up transferring a larger amount of data over a short period of time. Companies like Riverbed and Silver Peak are in the business of WAN optimization and a quick search will give you what they can do. ShareImprove this answer Follow answered Jun 18, 2014 at 9:56Mamun AhmedMamun Ahmed4111 bronze badge22Ad blocking is another - a utility that scans the HTML source for URLs and decides which ones of those URLS do need to be downloaded. – Mr ListerJun 18, 2014 at 12:41Another option would probably be a highly customized protocoll with smaller control-overhead than TCP/IP which is translated by a relay-server, which could also increase your effective payload-bandwith – FalcoJun 18, 2014 at 13:15Add a comment | ; 4 I have to disagree with many of the answers here. Usually, (American) ISPs will slow down or "throttle" your access to certain websites or webservices. In general, if you live in America, you will NEVER hit the actual physical limit of data you can receive. Youtube and Netflix are the prime example of throttled services. If your ISP sees traffic going to or from Youtube, you can bet your connection is going to be suboptimal. However, if you were using one of these services, your ISP would only see traffic going to and from the service, and they would have no idea you are currently accessing Youtube. Measuring my own traffic, I get, on average, 250 kilobytes/second of data from Youtube normally. Through a private VPN I subscribe to, I usually get at least 2 megabytes/second during prime time. (I will not name my VPN for the sake of objectivity; I don't want this to look like an advertisement)I am not trying to imply that ALL speed enhancing software works, because we all know how many scams there are on the internet. But real speed-enhancing services do exist.ShareImprove this answer Follow answered Jun 18, 2014 at 17:05AhauehauehauhAhauehauehauh4111 bronze badge11Anything to back these claims of throttling up? – Matthew LockJun 19, 2014 at 6:42Add a comment | ; 3 In the dial-up and Windows 98-days, I used some software that preemptively followed every link in the background for every page I opened in a web-browser. The results were stored in the browser's local cache, like any other page I had previously visited. It was still a look-ahead caching proxy of sorts, but it worked on my computer without the need of a separate accelerator proxy, and it worked really well for surfing web-pages. It made dial-up feel instantaneous; however, long downloads (audio and video) still took normal speeds, because they were simply too big to preemptively download and cache. And, it could not help AJAX and other dynamic pages. It eventually failed, because they could not keep up with browser development, and they slipped over the event horizon like most every other dot-bomb company.If someone re-invented that wheel, they could make a lot of web-surfing feel faster, although you can never exceed the ISP-provided bandwidth, and AJAX pages would be a hairy thing to try to accelerate (i.e., look-ahead cache).ShareImprove this answer Follow answered Jun 18, 2014 at 13:55TrevorTrevor21322 silver badges66 bronze badgesAdd a comment | ; 2 There are a couple of ways your Internet connection speed can be improved, depending on your usage pattern.For example, you may have noticed that Internet browsing is very slow when you are seeding some torrents. When you are seeding a torrent, you are uploading, so why would it affect your browsing speed (which is largely downstream in terms of traffic volume)? The answer lies in the way TCP/IP works. Yes, when you browse websites, you are largely downloading, but your computer also needs to send acknowledge (ACK) packets to let the web servers know that you have indeed received data, otherwise the web server won't continue to send you new data. The ACK packets are very small, but they still need to be sent, which means it needs to use a little of your upstream bandwidth. Now, when you are seeding a torrent, the BitTorrent packets outnumber the ACK packets for your web browsing. Without proper packet prioritisation and scheduling, whichever generates the most packets basically gets to hog the upstream bandwidth.This is where some of these speed improvement programs can be legitimately useful. Some of them come as a form of custom ADSL driver. A smart ADSL driver can be configured to prioritise certain web browsing packets over P2P packets, so that your web browsing speed is largely unaffected when you are seeding torrents. In other words, it's a software implementation of Quality-of-Service. I remember having bought one that worked about 10 years ago, from a German software company. I can't remember the name though.ShareImprove this answer Follow answered Jun 18, 2014 at 12:58KalKal63911 gold badge1111 silver badges2020 bronze badgesAdd a comment | ; 2 One example would be, you send a request to a server with a fast connection to download the content you want and relay it to you in a low bandwidth friendly way. Essentially zipping the internet.The Opera Mini browser does this.Opera Mini FAQ.When you request a page in Opera Mini, the request is sent to the Opera Mini server that then downloads the page from the web. The server then wraps up your page up in a neat little compressed package (we call the format OBML), and sends it back to your phone at the speed of ninjas with jetpacks. ... By using Opera Mini, our servers do most of the work, so it works well with basic phones or older models. Pages are often smaller (saving you money) and load faster due our server-side compression. Mobile Classic can also compress pages by enabling Opera Turbo.ShareImprove this answer Follow answered Jun 18, 2014 at 15:38Mark PriceMark Price33811 gold badge44 silver badges99 bronze badgesAdd a comment | ; 1 There are a lot of tricks which can be sold as a service. For example, there could be a transparent proxy gateway between you and a server farm with a really good network bandwidth. Some tricky coding-recoding of the communication (for example, forcing caching/compression, or caching parts of html pages) were also possible.The main problem with these solutions, that these goodstanding people before me simply don't understand, how they could work.And yes, there are really a lot of fraudulent offers on the market.But it is possible, although not as a guaranteed service.ShareImprove this answer Follow answered Jun 18, 2014 at 15:11peterhpeterh2,4831010 gold badges3030 silver badges4747 bronze badgesAdd a comment | ; 1 I assume this software guides user through a number of procedure to test maximum bandwidth. It could ask user to check LAN connection with all services turned off. Then check a Wireless connection. Then offers your a kind of list of running services with options to turn them of in order to decrease other traffic. They should advise not to run many programs simultaneously. However anyway, it is all about the maximum your ISP, plan and hardware permit.By the way, you can run some test by your self, for example here: http://www.speedtest.netShareImprove this answer Follow edited Jun 18, 2014 at 20:11vinnief56055 silver badges1111 bronze badges answered Jun 18, 2014 at 9:57Ruslan GerasimovRuslan Gerasimov2,13611 gold badge1414 silver badges1212 bronze badgesAdd a comment | ; 1 99% of all "Speed up/Tweak your PC" are fake or do nothing but the very basics that every good SysOp will do anyways. There are however some tweaks for unusual system settings which in fact might result in a speed advantage.For example Windows isn't really prepared for 100 mb/s DSL connections and is noticeably slow (like ~80 mb/s only) unless you tweak the Registry properly. In this case a tweaking tool might save you some hassle, but usually appropriate tools are freely available either directly from Microsoft or from third parties.ShareImprove this answer Follow answered Jun 19, 2014 at 11:17TwoTheTwoThe11111 bronze badgeAdd a comment | 
Pentadactyl: how to disable menu bar toggle by <Alt>?
firefox;keyboard;keyboard-shortcuts;pentadactyl;firefox;keyboard;keyboard-shortcuts;pentadactyl
Pentadactyl: how to disable menu bar toggle by <Alt>? Ask Question
37 Summary: in about:config, toggle ui.key.menuAccessKeyFocuses to false.Actually recently this is the normal behaviour of Firefox. Recently, because few versions earlier it was not like this. And using extensions like Pentadactyl or Vimperator, it is very apparent and annoying, while possibly with the default user interface it's convenient. So I searched for related Firefox settings, and I found, the ui.key.menuAccessKey and ui.key.menuAccessKeyFocuses. First I had the intuition that the first needed to change, which was set to 18, which means the Alt key. I set it to 0, without any effect. Then I changed the latter, from true to false, and the issue become resolved.ShareImprove this answer Follow edited Jun 24, 2021 at 12:55Luc2,62322 gold badges2424 silver badges3535 bronze badges answered Jun 19, 2014 at 23:51deeenesdeeenes67111 gold badge55 silver badges1010 bronze badges64Right now, you need to change ui.key.menuAccessKey. ui.key.menuAccessKeyFocuses will be reset (on start?) if you have the menu bar hidden, so it most likely has no (useful and persistent) effect. This is part of a "bug fix", also introduced to solve what is an accessibility problem for people who use the menu bar interface. Apparently, under GTK, this setting is explicitly set to the boolean negation of the visibility attribute of the menu bar. – njsgJun 28, 2014 at 7:593Thanks for pointing this out, indeed, the ui.key.menuAccessKeyFocuses is reset at restart, and sometimes randomly while running. Now I changed ui.key.menuAccessKey to 0, and surprisingly it works. – deeenesJul 1, 2014 at 10:441@njsg I found out that ui.key.menuAccessKeyFocuses is set to true when you hide menubar with set guioptions-=m. So you have to place set! ui.key.menuAccessKeyFocuses=false after set guioptions-=m in your ~/.pentadactylrc. – Dmitry AlexandrovJul 24, 2014 at 16:45@njsg What I said in previous comment is enough for FF 30, but not for FF 31 where you indeed need to set ui.key.menuAccessKey=0 – Dmitry AlexandrovJul 26, 2014 at 15:16I want the menu access key, but it's annoying when I change my mind about using an Alt combination and the menu bar activates. The setting FF could really do with is ui.key.menuAccessKeyTimeout. A timeout is sensible for something like this, so tapping the key will activate the behaviour, but pausing on it and changing your mind will have no effect. Xscape uses a timeout, for example. – pyrocrastyAug 12, 2015 at 21:34 | Show 1 more comment; 1 Nice, the Alt will not toggle the Menu bar with my Iceweasel (Firefox) on Debian 7.$ vim ~/.pentadactylrc...set guioptions=BNs" - Disable Alt key to toggle hidden Menu bar for Debian, Ubuntu.set guioptions-=mset! ui.key.menuAccessKeyFocuses=false...the set! ui.key.menuAccessKeyFocuses=false need to after the set guioptions-=m.Here is my patch - [issue #6] Disable menu bar toggle by for Pentadactyl · chusiang/[email protected] this answer Follow answered Aug 9, 2015 at 9:46Chu-Saing LaiChu-Saing Lai17177 bronze badgesAdd a comment | ; 1 Seeing as you're using dwm it might suit you better to just remap dwm's MODKEY, I prefer using the super, or "windows", key for this.see this link for how to and a list of modkeys you can use.It's preferable this way as a lot of applications like to map ALT.ShareImprove this answer Follow edited Sep 24, 2015 at 18:32nKn5,43966 gold badges3131 silver badges3838 bronze badges answered Sep 24, 2015 at 17:00jgrjgr1111 bronze badge1I have personally switched the hardware key mapping of SUPER and ALT, and then used the fake SUPER key as my modkey. Then the SUPER key behaves as ALT in applications. – VorticoJan 14, 2016 at 23:12Add a comment | ; 0 I prefer that the menu bar be always visible whether or not Alt is pressed. This can be done as follows:Click the Firefox menu button (normally located at the far right beside the URL and Search boxes)Choose Customize at the bottom of the Firefox menu.At the bottom of the next screen that appears, click Show/Hide Toolbars dropdown menu, then place a check mark next to Menu Bar menu item.Finally, click Exit Customize at the lower right.The menu bar should now always be visible and pressing Alt should have no effect.ShareImprove this answer Follow edited Jun 16, 2015 at 3:47 answered Jun 14, 2015 at 15:38Winter DragonessWinter Dragoness50044 silver badges66 bronze badgesAdd a comment | 
Chrome: waiting for available socket
networking;google-chrome;kaspersky;networking;google-chrome;kaspersky
Chrome: waiting for available socket Ask Question
6 avp.exe is possibly either Kaspersky antivirus or a trojan that has infected your PC. There's no need for a genuine antivirus program to make connections to so many different external IP-addresses. Alternatively it may be part of a peer-to-peer program you have installed that is overloading your system.Kaspersky avp.exe does intercept web-page connections to check for viral payloads, so the avp.exe lines may just be a misreporting (arguably) of connections made by chrome. In which case the real problem may lie elsewhere.If you have Kaspersky installed, I'd try uninstalling Kaspersky and installing either the latest version or a competitor, perhaps just Microsoft Security Essentials, at least until the problem is resolved.If you think it is a trojan, follow the guidance in How can I remove malicious spyware, malware, adware, viruses, trojans or rootkits from my PC?There have been problems reported with Chrome that have similar symptomsYou can visit chrome://net-internals/#sockets and try flushing connections. Then retry accessing Twitter.ShareImprove this answer Follow edited Mar 20, 2017 at 10:17CommunityBot1 answered Jun 18, 2014 at 10:30RedGrittyBrickRedGrittyBrick80.5k1919 gold badges132132 silver badges201201 bronze badgesAdd a comment | ; 1 It might be bug https://code.google.com/p/chromium/issues/detail?id=162627 if twitter feed embeds enough <video> or <audio> elements. If this is the cause, the only real fix is to use another browser.ShareImprove this answer Follow answered Jun 5, 2015 at 9:38Mikko RantalainenMikko Rantalainen70188 silver badges1717 bronze badgesAdd a comment | ; 1 How many Chrome 'tab's do you have open at once (to the same server)? If it's many, try closing some of them, then refreshing the tab in question. I had about 6 tabs to the same open at once and was getting the same error. After finding this post https://stackoverflow.com/questions/23679968/chrome-hangs-after-certain-amount-of-data-transfered-waiting-for-available-soc, I tried closing some of my tabs - it fixed my problem, and I could reload the tab that was reporting 'Waiting for available socket' (and I no longer got that message in the status bar, and images that weren't loading started loading). ShareImprove this answer Follow edited May 23, 2017 at 12:41CommunityBot1 answered Jul 21, 2015 at 0:35Matty JMatty J30122 silver badges44 bronze badgesAdd a comment | ; 0 How to fix error, “waiting for available sockets” in Google ChromeWaiting for available sockets error on chrome basically happens due to overload images and data saved on chrome.Cookies and images saved on chrome once gets in huge it creates this error.Solution for http://www.fixotip.com/how-to-fix-error-waiting-for-available-sockets-in-google-chrome/ is very easy just open previous this url and follow the steps.Whenever we do open any site it saves some cookies and images as temporary on browser.For the time being it reaches into overload and creates available socket error.and it will show in the bottom left corner of the screen.ShareImprove this answer Follow answered Dec 28, 2017 at 19:52RameshRamesh112Please don;t just link to another site that contains the answer. Instead, summarise the answer in your post. – BlackwoodDec 28, 2017 at 20:28Add a comment | 
Outlook from field always reverts to default reply address
microsoft-outlook;exchange-2010;microsoft-outlook;exchange-2010
Outlook from field always reverts to default reply address Ask Question
Best way to share an Excel with an ODBC connection?
microsoft-excel;odbc;microsoft-excel;odbc
Best way to share an Excel with an ODBC connection? Ask Question
0 I finally found the way.Using MS Query instead of ODBC from within Excel. Is a bit tricky as it needs to open another app, pick mock columns, return the data and import back to Excel, and then take profit of that DSN is automatically populated to change that connection String password and the query itself from the table properties.Anyway, one must have the particular ODBC driver for which the connection is defined installed in its computer, but at least we don't need to define the source connection for each end user.ShareImprove this answer Follow answered Jun 18, 2014 at 13:56WhimusicalWhimusical17711 silver badge1010 bronze badgesAdd a comment | 
Why does a radio stream not appear on a packet monitoring tool?
networking;streaming;wireshark;monitoring;networking;streaming;wireshark;monitoring
Why does a radio stream not appear on a packet monitoring tool? Ask Question
1 Try use ''http.request or http.response'' display filter in WiresharkDisplay the ''Hypertext Transfert Protocol'' and look for ''GET''then look for the url in the html sourceI toook the tip from https://ask.wireshark.org/questions/13425/streaming-url and tested it, successfuly on RFI live and unsuccessfuly on radioFG (since RougeFM was down atm)ShareImprove this answer Follow answered Jun 28, 2015 at 14:19tuk0ztuk0z35422 silver badges88 bronze badges0Add a comment | 
What ZIP compression method do common OS's natively support?
windows-7;macos;windows-8;zip;windows-7;macos;windows-8;zip
What ZIP compression method do common OS's natively support? Ask Question
9 If your primary goal is compatibility with all/most OSs and unzipping tools, then Deflate is your best choice.From Wikipedia's Zip->Compression Methods article:The most commonly used compression method is DEFLATE, which is described in IETF RFC 1951.ShareImprove this answer Follow edited Oct 7, 2021 at 6:47CommunityBot1 answered Mar 27, 2015 at 19:36Ƭᴇcʜιᴇ007Ƭᴇcʜιᴇ007111k1919 gold badges198198 silver badges262262 bronze badges11Deflate, +1. Be careful of implementations, though. They adhere to RFC 1951 (Deflate) and RFC 1952 (Gzip) to varying levels. See, for example, The Archive Browser does not honor original filename field in a GZIP header. – jwwMar 27, 2015 at 20:03Add a comment | ; 6 Since no one has answered the actual question yet:What compression methods to the native zip utilities on Windows 7, 8, and Mac OS X support?Windows 7+ supports Deflate and Deflate64.macOS only supports Deflate.ShareImprove this answer Follow answered Feb 17, 2020 at 3:04lily wilsonlily wilson16111 silver badge33 bronze badgesAdd a comment | ; 1 Any OS with python 3.3 or above and the zipfile, zlib, bz2 & lzma modules can unpack zip files using Deflate, Deflate64, BZip2 and LZMA compression methods using the zipfile command line interface, e.g.python3 -m zipfile -e example.zip .Recent versions of macOS and many (most?) Linux distros fulfil this criteria.ShareImprove this answer Follow answered Feb 8, 2021 at 6:23ruarioruario11111 bronze badgeAdd a comment | ; 0 In 2020 it seems that still only zip + Deflate is acceptable for GUIs, but for automated processes and CLI, you've got a few other options:Native CLI Support: tarMac ships with BSD tarLinux ships with GNU tarWindows 10 ships with BSD tar.exeThey all support tar.gz.BSD tar also supports .zip (but not LZMA, unless xz is also installed, which it is not on Windows 10, as of 2020).zip support is native on MacOS, and pretty easy to get on Linux.Cross-Platform: arcIf it's reasonable to have someone use a utility that's easy to install and that supports xz (LZMA, same as 7z), arc is lightweight and can be installed without a platform-specific package manager - meaning no brew: bare download or via webinstall.arc unarchive example.tar.xzIt also supports several other common formats: zip, xz, tar.xz, tar.gz, tar.bz2, etc.ShareImprove this answer Follow answered Nov 16, 2020 at 4:52coolaj86coolaj8686311 gold badge99 silver badges1919 bronze badges3The bit about tar etc. does not appear to clearly address the question. Also there is no standard tar in Windows, so such is less portable without additional tooling. – user2864740Oct 14, 2021 at 20:411tar.exe (BSD Tar) has been available as part of the native Windows CLI tooling since the last update of 2017: techcommunity.microsoft.com/t5/containers/… – coolaj86Oct 15, 2021 at 22:34Generically speaking tar is a form of zip in the same way that 7-zip and WinZip are a form of zip. Tar and WinZip both have a "none" option for compression, and both support other forms of compression too. – coolaj86Oct 15, 2021 at 22:36Add a comment | 
How to select lines containing (only/at least) 3 commas?
notepad++;notepad++
How to select lines containing (only/at least) 3 commas? Ask Question
8 I think this works better than the other answer, as that one matched lines with 4 commas. Of course this works with any character, just replace the commas... If you don't want to match less than nor more than 3 commas per line, I used this pattern:^[^,\n]*((,[^,\n]*){3}$)Explanation of each part of this pattern follows (because regular expressions are NOT obvious to me :-) ):^At the start of reg expression, means from the beginning of the line[^,\n]*Matches any number of characters that are not newline or comma(,[^,\n]*)This matches a single comma followed by zero or more characters that are not comma or newline{3}$This means to find the previous pattern exactly three times before the end of the line((,[^,\n]*){3}$)Be sure to put parenthesis around this part to make it clear what repeats three times (not the very first zero or more characters that are not a comma or newline)There may very well be a simpler way - but I've been testing and I'm pretty sure this works perfectly well in the current version of notepad++.ShareImprove this answer Follow edited Mar 29, 2017 at 13:46 answered Mar 28, 2017 at 17:29Brian BBrian B25133 silver badges66 bronze badgesAdd a comment | ; 1 Use Notepad++'s Regular Expression search.For example, here's a RegEx that will match lines with at least 3 commas:.*,.*,.*,Which basically means find "Any number of characters followed by a comma, followed by any number of characters followed by a comma, followed by any number of characters, followed by a comma".ShareImprove this answer Follow answered Mar 27, 2015 at 19:14Ƭᴇcʜιᴇ007Ƭᴇcʜιᴇ007111k1919 gold badges198198 silver badges262262 bronze badges1Thank you, and how to remove, say, the second one, if the line has at least 3 commas (I means I'm trying to find the pattern to fill in the Replace with field to achieve that) – Jim RaynorMay 1, 2020 at 10:06Add a comment | 
How to quit Avast temporarily?
windows-7;anti-virus;avast;windows-7;anti-virus;avast
How to quit Avast temporarily? Ask Question
3 Here's what worked for me:With the Win+ R combo summon services.msc.Right click on the service Avast Antivirus and click Stop.Before it stops, Avast will warn you that the service is being stopped. Only if you are confident that your computer is safe (and are more worried about the Avast using most of your CPU availability) click the Ok button and the service should stop.After a couple of minutes of stopping it, I restarted Avast. The load it put on my CPU after the restart was normal (i.e. less than 10%). ShareImprove this answer Follow answered Apr 2, 2015 at 1:08Shashank SawantShashank Sawant76244 gold badges1515 silver badges2828 bronze badgesAdd a comment | ; 1 Well, here's something you could do.If on Windows Vista/7: open your start menu, type cmd omitting the quotes, right click on cmd (looks like a black icon with c:\ on it) select Run As AdministratorIf on Windows 8+: press WinKey + F, type cmd omitting the quotes, right click on cmd (looks like a black icon with c:\ on it) select Run As AdministratorOnce in the Command Prompt it should look something like this:NB: I use Windows 8.1 Update, yours might look slightly different.Next, we need to type this:taskkill /F /IM AvastSvc.exeThis tells Windows to launch a command, taskkill (Task Killer), tells taskkill that it needs to /Force the program closed, and that the /IMage name is AvastSvc.exeOnce done, you can safely close the Command Prompt.ShareImprove this answer Follow answered Mar 28, 2015 at 3:44td512td5125,02322 gold badges1717 silver badges4040 bronze badges21No it can't be done. It fails just like trying to terminate it from the task manager and yields the error whose second line is Reason:Aessisdenied.Reason: Access is denied. Just to be sure: I started it with Admin privileges just as you said. – Shashank SawantMar 28, 2015 at 3:48Have you turned Avasts self protection off? OR... you could uninstall Avast. – td512Mar 28, 2015 at 3:53Add a comment | 
How to play multiple instances of VLC on Mac?
macos;vlc-media-player;macos;vlc-media-player
How to play multiple instances of VLC on Mac? Ask Question
46 On the Mac, running multiple instances of VLC is not supported out of the box.As workaround, you can run it from command prompt as:open -n /Applications/VLC.app/Contents/MacOS/VLC my_video.mp4Or can create a Droplet/App by pasting the code below into a new AppleScript Editor script and save it as an application:on run do shell script "open -n /Applications/VLC.app" tell application "VLC" to activateend runon open theFiles repeat with theFile in theFiles do shell script "open -na /Applications/VLC.app " & quote & (POSIX path of theFile) & quote end repeat tell application "VLC" to activateend openwhich does the following:launch the VLC droplet/app to get a separate instance of VLC,drop one or more files onto VLC droplet/app, orassociate your .mov, .avi, and other files directly with the VLC droplet/app, allowing you to simply click on the files to launch the files in a new standalone VLC session.File Association with the Droplet/App can be done as follows:Open Finder and find the video file of interest.Right click on the file (assumes you have right click enabled).Choose "Get Info".Under "Open with:", click dropdown and select the VLC droplet/app.Click "Change All" button.If prompted "are you sure", select "Yes".Source:How to play multiple instances of VLC at wiki.videolan.orgShareImprove this answer Follow answered Mar 27, 2015 at 17:39kenorbkenorb23.5k2626 gold badges122122 silver badges186186 bronze badges1Setting the file association doesn't work anymore for me in 10.13.6. The Finder says "You can’t change the item “movie.mkv” to always open in the selected application. The item is either locked or damaged, or in a folder you don’t have permission to modify (error code -54)." None of those are true, it isn't locked. it still works standalone, so it is not damaged, and it is in my user folder which I most certainly have access to. I will continue to investigate. – bb121622Dec 10, 2018 at 15:22Add a comment | 
Is it possible to have a file hidden in Windows, but visible in OS X?
windows;macos;mac;windows;macos;mac
Is it possible to have a file hidden in Windows, but visible in OS X? Ask Question
0 One possibility is to use hdiutil's makehybrid option to create a hybrid HFS/ISO disk image, with the Mac files hidden in the ISO filesystem, and the Windows files hidden in the HFS filesystem. Here's an example from an earlier stackoverflow question:hdiutil makehybrid -o image.iso source_folder -iso -hfs -hide-iso cd_folder/application.app -hide-hfs "{cd_folder/application.exe,cd_folder/autorun.inf}"I haven't tested this, but I think that in order to get the hybrid structure onto the thumb drive intact, you'll need to mount the image, unmount (but not eject) the thumb drive, and then use dd to copy the raw data to the actual disk (I'm pretty sure you need to use the /dec/rdisk# entries, not the ones with the s# suffix).ShareImprove this answer Follow edited May 23, 2017 at 12:41CommunityBot1 answered Mar 28, 2015 at 16:11Gordon DavissonGordon Davisson33.4k55 gold badges6464 silver badges7070 bronze badges2I tried this and was excited when the drive mounted correctly in OS X. Windows however is not seeing the ISO partition, and is complaining that the drive needs to be formatted :\ I tried to dd from the iso image itself, and by mounting the disk and using the rdisk dev node. Both gave me the same result... – bodanglyMar 28, 2015 at 21:16Could the problem be that my image is not the same size as the media? – bodanglyMar 28, 2015 at 21:25Add a comment | 
Networking not working on Packer created Ubuntu VirtualBox VM
networking;ubuntu;virtualbox;packer;networking;ubuntu;virtualbox;packer
Networking not working on Packer created Ubuntu VirtualBox VM Ask Question
0 Run this as a provisioning script:https://github.com/chef/bento/blob/master/packer/scripts/ubuntu/networking.shSee here for some more details: https://github.com/mitchellh/packer/issues/866ShareImprove this answer Follow answered Mar 30, 2015 at 9:57dmayo3dmayo31144 bronze badgesAdd a comment | 
running 16-bit code on 64-bit OS, using virtualization
windows-7;virtual-machine;64-bit;vmware;16-bit;windows-7;virtual-machine;64-bit;vmware;16-bit
running 16-bit code on 64-bit OS, using virtualization Ask Question
0 If the app is 16-bit, you could theoretically get away with running the program inside DOSBOX. you would need this: DOSBOXOnce installed, you can run mount C:\foo Z: which will mount the apps folder in DOSBOX. then all you need to do is: Z: and then appname.exe. Just remember to replace C:\foo with the real folder and appname with the real exe name.ShareImprove this answer Follow edited Mar 28, 2015 at 4:01 answered Mar 28, 2015 at 3:52td512td5125,02322 gold badges1717 silver badges4040 bronze badges3Thank you. It does have a GUI, though, so I think I may need to install Windows 3.x on DOSbox. But I will try it both ways, just in case. I did read that Windows 3.x has a pretty low processing overhead in DOSbox. – NathanaelMar 28, 2015 at 4:07DOSBOX should be able to launch the app with a GUI, as it does the same for DOS games – td512Mar 29, 2015 at 5:23I just tried it and DOXbox says "this program needs windows." I will experiment with Windows 3.x later today. Thank you! – NathanaelMar 29, 2015 at 15:47Add a comment | ; 1 For me otvdm was the unofficial replacement of Ntvdm I was looking for. While 16 bits Windows uses protected mode, and thus doesn’t require real mode accessing at all unlike Microsoft is claiming (the requirement is 16‑bits segments access).It emulates the ᴄᴘᴜ either completely like Ntᴠᴅᴍ or through Intel Haxm for better performance, but it does so just in order to wrap Syscalls like Wine would do on Linux : no virtual Network card ; no Virtual hard disk (%systemdrive% is %systemdrive%) ; no allocated but unused memory ; and there’s the option I’m looking for but which is disabled by default : that changes written to the registry is done to the one of the system !It’s even more powerful than the official Ntᴠᴅᴍ : the transparent level of hardware access is so high that It should be possible to use the full processing power of original graphics hardware. Though there were no ᴀᴘɪ for doing that at that time…Like Ntᴠᴅᴍ, it’s launched transparently and automatically when a 16 bits program is encountered.The only bad point is the Windows 3.11 userland like the Program Manager isn’t included with this version (not even an open‑source clone of it) whereas even modern Windows 32‑bits Windows 10 contains it. But as it’s about exe, it should be possible to just copy from a 32 bits Windows in order to get them. It can be downloaded pre‑compiled here.ShareImprove this answer Follow answered Jul 20, 2019 at 19:58user2284570user22845701,71077 gold badges3333 silver badges5959 bronze badgesAdd a comment | 
"invoke-command" using wusa.exe in powershell - won't install the msu
windows-7;command-line;powershell;hotfix;windows-7;command-line;powershell;hotfix
"invoke-command" using wusa.exe in powershell - won't install the msu Ask Question
3 Since PSRemoting uses WinRM and according to this it doesn't look like you can use wusa.exe with WinRM or WinRS it doesn't look possible with the code you listed.There is a workaround listed however:Extract the .msu file through Windows Remote Shell with WUSA using the following command:winrs.exe -r:%computername% wusa.exe %kb-update% /extract:%destination%When complete, install the .cab package with dism.exe or Package Manager. To use dism.exe, use the command below:winrs.exe -r:%computername% dism.exe /online /add-package /PackagePath:%Path_To_Package%\KBnnnnnnn.cabShareImprove this answer Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Mar 27, 2015 at 18:16JoshJosh5,10355 gold badges3333 silver badges4444 bronze badges33We wound up running a scheduled task to force the local PC to run wusa.exe, which seemed to do the trick! – bjscolluraMar 27, 2015 at 22:00On my copy of Win 10 v1607 and v1903, I get "The /extract option is no longer supported" when I try to run wusa.exe this way – HydrargyrumAug 20, 2020 at 7:271@Hydrargyrum Try using expand -f:* myupdate.msu c:\myexpandloc – JoshAug 20, 2020 at 22:11Add a comment | ; 0 remote update of powershell from 3 -> 5.1 (windows7), through the WinRM interface and Ansible server - PSH update-psh.ps1 script (worked for me):# install POWERSHELL update# descr. wusa: https://support.microsoft.com/en-us/help/934307/description-of-the-windows-update-standalone-installer-in-windows# descr. dism: https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options Start-Process -FilePath 'wusa.exe' -ArgumentList "C:\workit\updatePSH\Win7AndW2K8R2-KB3191566-x64.msu /extract:C:\workit\updatePSH" -Verb RunAs -Wait -PassthruStart-Sleep -Seconds 5Start-Process -FilePath 'dism.exe' -ArgumentList "/online /add-package /PackagePath:C:\workit\updatePSH\WSUSSCAN.cab /PackagePath:C:\workit\updatePSH\Windows6.1-KB2809215-x64.cab /PackagePath:C:\workit\updatePSH\Windows6.1-KB2872035-x64.cab /PackagePath:C:\workit\updatePSH\Windows6.1-KB2872047-x64.cab /PackagePath:C:\workit\updatePSH\Windows6.1-KB3033929-x64.cab /PackagePath:C:\workit\updatePSH\Windows6.1-KB3191566-x64.cab /IgnoreCheck /quiet" -Verb RunAs -Wait -PassThruShareImprove this answer Follow edited May 24, 2018 at 15:07arjabbar11344 bronze badges answered Dec 1, 2017 at 13:23tatantatan111please fix the formatting of your answer (no need for 'code' tag, just indent relevant lines with 4 spaces ...) – Pierre.VriensDec 1, 2017 at 13:45Add a comment | 
Why does mapping <ESC> start command line Vim in Replace mode?
vim;terminal;vim;terminal
Why does mapping <ESC> start command line Vim in Replace mode? Ask Question
1 The ANSI Escape sequences that are used by the terminal all start with Escape (^[), and as Vim is using those to communicate with the terminal, it gets confused when you map <Esc>. That's also why there are no problems in MacVim (and GVIM); those do not use the terminal and have different I/O channels.Mapping <Esc> in terminal Vim is just looking for trouble; please just choose another key.ShareImprove this answer Follow answered Mar 27, 2015 at 19:36Ingo KarkatIngo Karkat22.2k22 gold badges4242 silver badges5858 bronze badges0Add a comment | 
How to run a system file check on an external HD?
sfc;sfc
How to run a system file check on an external HD? Ask Question
6 AEisen Sep 8, 2010 at 3:08 AM I'm not sure about a Windows repair, but a Windows Vista based OS (Vista, PE, 7, 2008) will be able to run System Files Checker on an offline Windows directory.SFC /scannow /OFFWINDIR=remotedrive:\Windows /OFFBOOTDIR=remotedrive:Example:SFC /scannow /OFFWINDIR=F:\Windows /OFFBOOTDIR=F:\Following that, you can always run chkdsk /b on the drive once that finishes (unless it's pre-Vista, in which case it's chkdsk /r)See the answer listed here.http://community.spiceworks.com/topic/110283-is-it-possible-to-run-a-windows-repair-on-an-external-usb-drive-that-was-pulledShareImprove this answer Follow answered Jun 2, 2015 at 5:34Wade SWade S7611 silver badge22 bronze badgesAdd a comment | 
Protecting AWS against massive accesses
webserver;amazon-web-services;webserver;amazon-web-services
Protecting AWS against massive accesses Ask Question
0 First let's look at AWS's explanation to what you are referencing here:https://aws.amazon.com/ec2/pricing/30 GB of Amazon Elastic Block Storage in any combination of General Purpose (SSD) or Magnetic, plus 2 million I/Os (with Magnetic) and 1 GB of snapshot storageThose I/Os are for direct accesses to disk and since your index.php file will be cached and loaded into memory, depending on what your index.php file is doing it is unlikely to have an impact on your I/O.One way to test and monitor your concern about a sudden surge of accesses and requests is to run the popular Bees with Machine Guns utility (https://github.com/newsapps/beeswithmachineguns) on your web application and monitor the impact in CloudWatch. CloudWatch by default monitors in 5 minute increments so be patient; if you change CloudWatch to monitor in 1 minute intervals you will be charged extra so be careful. Do note that since you will basically be running a denial of service attack on your instance you need to get permission from AWS to run the test in advance or risk having your AWS account suspended. (https://aws.amazon.com/security/penetration-testing)I think the easiest and probably cheapest way to secure your server from unwanted spikes in traffic or a full blown DDoS (Distributed Denial of Service) attack would be to use a managed service like CloudFlare.com. You can of course use a security appliance like a Sophos UTM 9 or Imperva but you will need to know how to configure and maintain it in addition to extra hourly and licensing costs.AWS recently announced the AWS WAF (Web Application Firewall) but it looks like you have to associate it to CloudFront. (https://aws.amazon.com/blogs/aws/new-aws-waf)If you don't want to use any other tools then you will have to consistently monitor your web application and block unwanted requests when they come using Virtual Private Network (VPC) and Network Access Controls (NACLs) on your VPC subnets. While this will work, you might find yourself playing whack-a-mole if your site comes under frequent attack.Finally, the best way to protect your website is to use multiple layers of security (AKA Defense in Depth) so if you are not sure how to do that I recommend grabbing a cup of coffee (or two) and start learning at OWASP (The Open Web Application Security Project). (www.owasp.org)ShareImprove this answer Follow answered Oct 30, 2015 at 12:41 user462679user462679Add a comment | 
After formatting External Harddrive, Why do hidden OS folders $RECYCLE.BIN, System Volume Information get created
windows-8;operating-systems;virus;windows-8;operating-systems;virus
After formatting External Harddrive, Why do hidden OS folders $RECYCLE.BIN, System Volume Information get created Ask Question
0 Windows requires the system folder $RECYCLE.BIN on each disk; these store "deleted" files until the Recycle Bin (which displays all files in each $RECYCLE.BIN together) is emptied. System Volume Information is a file required by the HDD file system and cannot be viewed while the drive is mounted. Empty the Recycle Bin, and if you still get an indication of an issue from ESET Nod 32, and ESET cannot remove the malware, try free AV tools such as Malwarebytes, https://www.malwarebytes.org/, which can run a single scan, so as to not interfere with another AV.ShareImprove this answer Follow answered Jan 25, 2015 at 4:48DrMoishe PippikDrMoishe Pippik22.4k44 gold badges3434 silver badges5050 bronze badgesAdd a comment | 
High CPU usage of "NT Kernel & System" process while Chrome playing YouTube video
windows-7;google-chrome;cpu;youtube;windows-7;google-chrome;cpu;youtube
High CPU usage of "NT Kernel & System" process while Chrome playing YouTube video Ask Question
6 I think I solved it.I unchecked "use hardware acceleration when available". Now it's everything faster and consumes lower CPU.ShareImprove this answer Follow answered Jan 30, 2015 at 13:30MartinMartin22922 gold badges33 silver badges1111 bronze badges22report this issue in the Chrome Bugtracker, so that the Chrome Team can fix it. – magicandre1981Jan 31, 2015 at 15:36I can confirm the fix as well. – FailedDevJun 9, 2015 at 8:12Add a comment | ; -1 Had same problem with Win7 Pro.I uninstalled Intel® Rapid Storage Technology drivers and the problem was solved.ShareImprove this answer Follow edited Apr 22, 2015 at 13:42Nifle33.9k2626 gold badges107107 silver badges137137 bronze badges answered Apr 22, 2015 at 12:10user440036user4400361Add a comment | 
How to turn off the screen saver of CentOS 7?
screensaver;centos-7;screensaver;centos-7
How to turn off the screen saver of CentOS 7? Ask Question
38 More detail:Click on the power icon in the upper left.Click on settings(wrench/screwdriver picture/icon).Click on the power icon.Under power saving is the selection for blank screen, mine was set to a default of 5 min. I changed it to never.ShareImprove this answer Follow edited Dec 21, 2015 at 15:25g2mk1,4181212 silver badges1515 bronze badges answered Dec 21, 2015 at 14:30marklmarkl38133 silver badges33 bronze badges1This answer should get the credit. Thank you. – Philip BrackDec 11, 2018 at 19:18Add a comment | ; 4 In your terminal write these commands:xset s offxset s noblankEDIT1:Try with this script:#!/bin/shexport DISPLAY=:0.0xset s offxset s noblankxset -dpmsShareImprove this answer Follow edited Jan 25, 2015 at 1:21 answered Jan 25, 2015 at 1:02ValeriRangelovValeriRangelov27922 silver badges99 bronze badges1I edit the post. – ValeriRangelovJan 25, 2015 at 1:21Add a comment | ; 3 In centos 7, click on your username in the upper right corner. Then click 'Power' and change the time to what you want. There is an option for 'Never' so that your screen will quit going black.ShareImprove this answer Follow answered May 20, 2015 at 22:21HankHank3122 bronze badges2This is the exact same answer as superuser.com/a/1016299/245033, only less detailed. – boardriderJul 19, 2018 at 20:49@boardrider That answer is newer than this one. – Thorbjørn Ravn AndersenOct 5, 2021 at 10:22Add a comment | 
Can Excel Solver solve this Knapsack-like optimization?
microsoft-excel;solver;microsoft-excel;solver
Can Excel Solver solve this Knapsack-like optimization? Ask Question
1 Unfortunately no. Excel can only vary one item at a time and you have at least 4 variables to change.But, on the brighter side, you don't need the solver to get the best arrangement. First you calculate the cost per calorie. Select the lowest 2 (or 1) items from each group. You're done.ShareImprove this answer Follow answered Jan 25, 2015 at 2:59LDC3LDC32,21211 gold badge1313 silver badges1515 bronze badges4That was my initial reaction, but it isn't necessarily true. The lowest cost per calorie could use items that collectively exceed the $12 limit. This is probably a bad example used to illustrate the problem. In a general case, higher calorie counts within a food group could have higher cost. To stay within budget could require selecting foods with less calories or higher cost per calorie, but less item cost. – fixer1234Jan 25, 2015 at 3:18@fixer1234 Using the above method, I get 1410 calories for $10.59. Since that leaves me with $1.41, I can include another item or switch items. Since switching items will give me fewer calories for a higher cost, it would be best to add another item. Also, some prices are based on supply and demand. Chuck steak may be $4.99/lb, but sirloin steak is nearly $15.99/lb, yet they have nearly the same calories. – LDC3Jan 25, 2015 at 3:30In the example as stated, you are right. I assumed this was a made-up example just to illustrate the problem and the values weren't thought out. With real data, there could be conflicting choices. E.g., there could be a sale on bologna in a large economy package with a good price/pound. That could yield the lowest cost/calorie but the item price could be too high. Similarly, the best choices for three of the food groups could leave you with just enough money for a last item with a low item cost but high cost/calorie. For the general case, I think this might need VBA to iterate a solution. – fixer1234Jan 25, 2015 at 4:17Thanks guys- I think I'm going to have to use MatLAB for this kind of problem. I didn't specify that I was trying to maximize my spend- an additional constraint that would seem to make a difference. – Hairgami_MasterJan 25, 2015 at 22:58Add a comment | 
Why grep shows me output that does not contain the search word?
ubuntu;bash;virtualbox;grep;ubuntu;bash;virtualbox;grep
Why grep shows me output that does not contain the search word? Ask Question
1 It looks like some services report their status to stderr:$ service --status-all 2>&1 | wc -l43$ service --status-all 2>/dev/null | wc -l28$ service --status-all 2>&1 1>/dev/null | wc -l1528 to stdout, 15 to stderr. You are seeing the ones that report to stderr because the pipe only handles stdout. Do this instead:service --status-all 2>&1| grep sensuShareImprove this answer Follow answered Jan 25, 2015 at 1:50glenn jackmanglenn jackman24.6k55 gold badges4343 silver badges6666 bronze badgesAdd a comment | 
In Illustrator, I can't move objects by dragging them
adobe-illustrator;adobe-illustrator
In Illustrator, I can't move objects by dragging them Ask Question
6 If you've recently installed Pushbullet or similar Chrome apps that use the clipboard, your problem may have an easy solution: turn off the app(s), or disable its copy/paste feature, and restart the computer.This is especially likely to work if, on rebooting your computer, the problem resolves temporarily and then relapses.(Apparently Adobe and Chrome don't like to share the clipboard, Chrome wins, and Adobe sulks. I just figured this solution out yesterday after more than a week of workflow logjam with the same problem in InDesign.)If that doesn't work, the next thing to try is resetting your preference setting files, but I'll stick to one solution per answer.ShareImprove this answer Follow edited Jan 27, 2015 at 0:31 answered Jan 26, 2015 at 23:42BESWBESW17655 bronze badges3The issue is more complex than just the pushbullet setting, but Chrome is definitely involved. Will update this as I narrow things down. – Goodbye Stack ExchangeJan 27, 2015 at 0:27It's been 24 hours, and the problem is gone. I disabled the Pushbullet setting as described above, then restarted the computer after disabling Chrome from starting up automatically. If after future reboots the problem recurs, will update this. But I'm willing to consider this solved for now. Thanks! – Goodbye Stack ExchangeJan 28, 2015 at 4:10Definitely Chrome. The extension that was causing the problem for me was Cisco Webex. I deleted it, and everything went back to normal with Illustrator CC. Thank you. – Mary AnnJan 23, 2017 at 16:38Add a comment | ; 0 For me this issue was solved by closing Chrome browser and then restarting the PC. Chrome seems to conflict with Adobe Illustrator in same way preventing it from allowing movement of objects. I don't know what extension or component of Chrome is the culprit. Best of luck.ShareImprove this answer Follow answered Sep 2, 2017 at 20:36VenturaVentura12You say "For me this issue was solved by closing Chrome browser and then restarting the PC. Chrome" so does this make it not ever happen again for a solution or is this only a workaround to the problem? Let's be clear with what you are suggesting here so reader understand this specific aspect as well. Is this any different that the accepted answer anyway?? – Vomit IT - Chunky Mess StyleSep 3, 2017 at 0:19Otherwise, read over "Why do I need 50 reputation to comment" to ensure you understand how you can start commenting. – Vomit IT - Chunky Mess StyleSep 3, 2017 at 0:20Add a comment | ; 0 This happened to me, with both Illustrator and InDesign today - it turned out that there was a window running in the background that was trying to start Bridge. I closed that, and voila! everything worked again. This may not be the case for everyone having this problem, but could be the reason for some!ShareImprove this answer Follow answered Nov 7, 2017 at 1:59MimiMimi10Add a comment | ; 0 Illustrator was doing this today - first time I'd ever seen it. I closed an open Acrobat instance, and Illustrator behaved correctly. I wasn't doing anything in Acrobat except viewing a file, no edits or saving in progress. Go figure. At least it worked.ShareImprove this answer Follow answered Apr 4, 2018 at 17:28Lizziebeth10Lizziebeth101Add a comment | 
Will a NAT router try to talk directly to a device on its subnet or only through its gateway?
networking;internet;nat;networking;internet;nat
Will a NAT router try to talk directly to a device on its subnet or only through its gateway? Ask Question
2 NAT or not, you have different subnets and the way traffic routes from within a subnet and outside of a subnet works the same with IPv4. If you're on 10.1.2.0/24 and you send to anything else on 10.1.2.0/24, your traffic is not processed by the router. The device sees that the destination is on the same network and will use ARP to get the hardware address of the destination and the switch portion of the router will route the packets based on its ARP table to the correct device.If you're on 10.1.2.0/24 and you want to go to anything on 10.1.1.0/24, the client will see that the destination is not on the same network and will send it off to the appropriate gateway (in most cases the default unless you have a more complex routing scheme, but either way, a gateway). The gateway will look at the destination and see if it is on its own network, or needs to be transferred on. If it is on the same network it consults its ARP table and ARPs if necessary to send the packets to the correct device on its network. Since your router has an external address of 10.1.1.Y, something on 10.1.1.0/24 will be on its network, so it will just send the packet to the hardware address. In this case, the modem will never see the traffic.If it needs to go elsewhere, (eg an address on the other side of the modem), off it goes to the appropriate gateway - which will be 10.1.1.1, and that gateway will do the same, and pass it along to the most appropriate gateway it has for the destination and that pattern continues until it reaches its destination.How much traffic are you talking about here? What type of switch is that underneath the modem? Look at the backbone specs on that and make sure it can handle the traffic you're putting through it. That device sounds like it is the most plausible bottleneck in your described scenario.ShareImprove this answer Follow answered Jan 25, 2015 at 8:24MaQleodMaQleod13k44 gold badges3939 silver badges6161 bronze badges2It's a gigabit switch, I'm starting to think that the router is just incapable of handling all of the traffic in whole. – Craig LaffertyJan 26, 2015 at 23:30Thank you for your help in narrowing it down. It's a temporary solution until I build a pfsense box with an ac card. – Craig LaffertyJan 26, 2015 at 23:30Add a comment | 
Vagrant Complaining about missing VMWare License
vagrant;vagrant
Vagrant Complaining about missing VMWare License Ask Question
4 I fixed it by removing the VMWare Fusion plugin:vagrant plugin uninstall vagrant-vmware-fusionI am not sure why the plugin remained after I completely removed Vagrant, but it works.ShareImprove this answer Follow answered Jan 25, 2015 at 0:21James JefferyJames Jeffery42522 gold badges55 silver badges1212 bronze badges11In addition the basic usage help mentions: vagrant up --provider=virtualbox and how it chooses a default provider. – BrianJan 25, 2015 at 0:27Add a comment | ; 0 I found that the --provider=virtualbox option did not work as long as I had the vagrant-vmware-workstation plugin installed. Uninstalling the plugin did the trick.ShareImprove this answer Follow answered Jul 17, 2015 at 14:31Pinner BlinnPinner Blinn1Add a comment | ; 0 I had to do both uninstalls:vagrant plugin uninstall vagrant-vmware-fusionvagrant plugin uninstall vagrant-vmware-desktopRe-installing vagrant didn't work which make believe that at least on MacOS the uninstaller script is flawed.ShareImprove this answer Follow answered May 29, 2018 at 15:11RFCOSTARFCOSTA1Add a comment | 
Cannot map network drives
windows;networking;mapped-drive;windows;networking;mapped-drive
Cannot map network drives Ask Question
1 If you do not have a DNS server running in your network, the network names will be resolved via NetBIOS.Check if all machines have NetBIOS enabled:Click Start, and then click Network. (Or you type ncpa.cpl into the search box, and press ENTER).Click on the Network and Sharing Center, and then click Manage Network Right click on the Local Area Connection or the connection you are using, and then select Properties.Select the Internet Protocol version 4 (TCP/IPv4)Click the Advanced button under the General tab.Click the WINS tab.Click the Enable NetBIOS Over TCP/IP button.Click Ok.quoted from http://ecross.mvps.org/howto/enable-netbios-over-tcp-ip-with-windows.htmA restart might be requiered on the XP/Vista machine after changing thatAlso check if the computer name was correctly set on the Windows 7 machineControl PanelSystem and SecuritySystemComputername must be set to a valid entry Share Follow answered Sep 3, 2014 at 12:45Lukas ZechLukas Zech11111 bronze badge1Checked the Netbios settings and they were as you discribed. Still didn't fix the problem. – Swede SjolundSep 4, 2014 at 15:45Add a comment | 
Finding the IP address of a walled in router
networking;networking
Finding the IP address of a walled in router Ask Question
2 Why are you so sure your dd-wrt switch has an IP address? If you look up the DD-WRT wiki, it says that you can achieve a simple AP as follows:Simple VersionDisable DHCPConnect a LAN port to the main network / to the main Router's LAN portNow you have an AccessPoint only setup, where clients are served IP details from your main network or main Router.The WAN port is not connected, so it is not given an IP address. Switch functionality of course still works.Let me expand on this. DD-WRT, like OpenWRT or OpenWRTUSB, uses hostapd for setting up the AP. Since you have a remote DHCP server, the hostapd interface will have to be bridged with an ethernet interface, so that all DHCP-related traffic can be properly forwarded to the DHCP server: the alternative (a NAT configuration) assumes that the wifi clients are inserted in a different subnet, with addresses dished out locally.It is however a common misconception that bridges need an IP address to work: bridges are Layer-2 objects, not Layer-3. Having a bridge without an IP address means only that the device to which the ethernet and wifi interfaces belong cannot be reached from the network, that's all.The fact that bridges do not require an IP address to function properly is discussed in many places, I will just point you to the one where I first read it. Here it is stated that:It is worth mentioning at this point that it is perfectly possible for the bridge to be able to operate without having an IP address assigned to it. If this were the case, it would bridge packets between the two segments as shown above, but would not actually take part in any network exchanges on an IP level.Stated otherwise: the fact that you can connect to the SSID by no means implies that the SSID has any IP address of its own.Perhaps this is the reason why even a deep nma scan was unable to identify the address in question.EDIT:And yes, btw, I did test it on my Debian system. I do not expect it to be any different on DD-WRT.Share Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Sep 3, 2014 at 16:56MariusMatutiaeMariusMatutiae46.4k1111 gold badges7979 silver badges128128 bronze badges3While it is possible to make a bridge with no IP address, this is not done for devices which have network-accessible management screens. And disconnecting the WAN port has no effect on whether the LAN interface has an IP address. – Ben VoigtSep 3, 2014 at 18:30I'm sure it has one cause its set up to have one. If It dosen't, its cause its malfunctioning, but its working otherwise. – Journeyman Geek♦ Sep 3, 2014 at 20:59I've come to the conclusion it should have one. It dosen't. I'm going to try a full hard reset (aka a 30 30 30) and see If it happens again. If it does, I'm looking at firmware or hardware wierdness. I can swap firmwares, it is the grandfather of hackable consumer routers, and its a spare router at this point anyway. – Journeyman Geek♦ Sep 4, 2014 at 12:14Add a comment | ; 1 Connect directly to the router via Ethernet cable, and disconnect all other connections to the router so that your computer is the only thing connected to it. Configure a static IP on your computer's IP address in the range that you normally use, then use Wireshark to capture some traffic. I would do the capture right after power cycling the router. You should be able to see any traffic the router is generating at that point.Share Follow answered Sep 3, 2014 at 14:24heavydheavyd61.9k1818 gold badges152152 silver badges174174 bronze badges2..."Its somewhere where I have no easy physical access to it." – Alexander HolsgroveSep 3, 2014 at 14:421@AlexHolsgrove, yes, but there is at least one cable going from the homeplug to the router. I would just make sure that all the wireless devices that might be connected to that AP are turned off. – heavydSep 3, 2014 at 14:44Add a comment | ; 1 Firstly, how are you using nmap? If you do a ping scan and the router is configured to ignore ICMP it won't show. Try scanning for open ports through the whole range, likely 80 or 443 or whatever port the webinterface runs on. By the looks of it currently functions just as an AP and an Ethernet switch. As such it doesn't even need to have an ip address of it's own to function as it does right now. It will probably have an ip, but it might be in a different subnet altogether.The first thing to try is to social engineer yourself and remember if the ip range used in your network has changed between now and the last time you checked that router. Perhaps that pops up the old range and the static ip of the router. If that doesn't work you'll need to start scanning beyond your current subnet. Configure your local system with a fixed IP and scan the entire private range. You'll need 10.0.0.1 with subnet 255.0.0.0 and scan 10.0.0.0/8, 172.16.0.1 with 255.240.0.0 and scan 172.16.0.0/12 and lastly 192.168.0.1 with subnet 255.255.0.0 and scan 192.168.0.0/16. Assuming it has an internal IP you should find it in one of those ranges. If you don't find it that way there won't be a way to configure it anyway since you can't talk to it. It might still be in some strange mode where it doesn't have an ip address of it's own.Share Follow answered Sep 3, 2014 at 15:52AVeeAVee15944 bronze badgesAdd a comment | 
Merge two audio and one video when reeconding
audio;video;ffmpeg;merge;audio;video;ffmpeg;merge
Merge two audio and one video when reeconding Ask Question
-1 Example 1https://trac.ffmpeg.org/wiki/How%20to%20use%20-map%20optionMy intuition was your -map options and the article seems to verify that.Share Follow answered Sep 5, 2014 at 16:40dstobdstob30511 silver badge55 bronze badges2It's better to show in an answer what command you're recommending because external pages can disappear or change. I was unable to figure out how to use Example 1 to answer the posted question. However, this helped: superuser.com/a/1251856/74576 – RyanSep 19, 2017 at 16:43Much as Ryan has pointed out on his comment, the link has now rotted and disappeared. – JustinSep 7, 2019 at 18:12Add a comment | 
How to compress or hide the processors at top of htop on large machines?
multi-core;htop;multi-core;htop
How to compress or hide the processors at top of htop on large machines? Ask Question
51 Open the setup screen using F2 or ShiftS. The first page of that screen is dedicated to configuring header meters, so you can remove "CPUs" and add "CPU average".In recent htop versions, there also are "CPUs (1&2/4)" and "CPUs (3&4/4)" meters showing two cores per line, though this is more of use on 8–32 core systems.To save two more lines, open the "Display options" page and turn off "Leave a margin around header".Share Follow answered Sep 3, 2014 at 10:00user1686user1686399k5959 gold badges840840 silver badges910910 bronze badges415Doesn't work. On a smaller machine it works. A configuration page pops up under the CPU usage bars. But on the bigger machines it doesn't appear because the CPU usage bars take up all of the screen... Any other idea? (And yes, it took me 2 hours to figure out why nothing changed when pressing F2) – UnapiedraSep 3, 2014 at 12:483Workaround 1: blindly, hit F2, then right arrow, then DEL. Workaround 2: shrink the font on your terminal to a ridiculously small value, then hit F2 and you should see a barely readable menu. – alexeiApr 4, 2021 at 23:57Just as an addition, if your terminal doesn't respond to F2 in ssh. You can use F2 to edit htop in your local machine. And diff the config file(~/.config/htop/htoprc) before and after change. Then apply the diff to your remote machine. – YnjxsjmhApr 11, 2021 at 6:28Following up on the non-local-machine comment above, you can hit ESC instead of F10 to get out of setup. – Uwe MayerOct 31, 2022 at 21:37Add a comment | ; 44 Based on grawity's answer, you can create a configuration that you like on a different machine and then copy it to the machine where the problem occurs.The configuration is saved (under Debian) under ~/.config/htop/htoprc.On a machine where you can see past the header:Press F2 to get into the configuration.Move left to the "Left Column"Move down to select "CPU" and press F9 to delete it.From the right most column select "CPU Average" and press F5 to insert it instead.F10 let's you leave the menu.copy ~/.config/htop/htoprc to the larger machine.In my case (120 cores) a configuration with "CPUs (1&2/4)" on the left side of the header, and "CPUs (3&4/4)" on the right side of the header looks good. As a result, the header takesup about half the screen and the other half lists the processes. Each line in the header shows four CPUs which is fine for me.Sample configuration:# Beware! This file is rewritten by htop when settings are changed in the interface.# The parser is also very primitive, and not human-friendly.fields=0 48 17 18 38 39 40 2 46 47 49 1 sort_key=46sort_direction=1hide_threads=0hide_kernel_threads=1hide_userland_threads=0shadow_other_users=0show_thread_names=0highlight_base_name=0highlight_megabytes=1highlight_threads=0tree_view=0header_margin=1detailed_cpu_time=0cpu_count_from_zero=0color_scheme=0delay=15left_meters=Memory Swap CPU Load LoadAverage left_meter_modes=1 1 1 1 1 right_meters=Tasks LoadAverage Uptime right_meter_modes=2 2 2 #Alternative (Blind navigation)Press F2, left, F9. (If CPUs are the items in the header.) After this you can see what is going on and would continue by pressing F10 to quit the configuration.Blind Navigation v2 (2020-07)Thanks to islandman93:New blind navigation: F2, right, delete, right, delete. Then you probably want to add cpu average to the left columnShare Follow edited Jul 23, 2020 at 16:43 answered Sep 3, 2014 at 13:11UnapiedraUnapiedra1,30011 gold badge99 silver badges1111 bronze badges55Blind navigation worked perfectly! – zplizziMar 26, 2018 at 21:465New blind navigation: F2, right, delete, right, delete. Then you probably want to add cpu average to the left column – islandman93Jul 23, 2020 at 15:23Just for who is interested what items changes after modifying CPU. They are right_meters, right_meters and corresponding left_meter_modes, right_meter_modes. – YnjxsjmhApr 11, 2021 at 6:32And for anyone using MacOs, you do Fn+delete not delete – JZL003Mar 15, 2022 at 19:37How do I add cpu average to left column? – chovyDec 5, 2022 at 14:48Add a comment | ; -3 Try the 't' key.None of the other answers helped. My top and terminal must be different. My top was installed via the procps-3.2.8-45.0.1.el6_9.1.x86_64 package on Oracle Enterprise Linux (repackaged RedHat Enterprise Linux) 6.9 and I was accessing it via PuTTY 0.62.Share Follow answered Mar 2, 2018 at 19:25SlowBroSlowBro11Well the thread is about htop, not top. – user1686May 23, 2018 at 20:15Add a comment | ; -3 I just had this issue as well, system has 24 cores, boatloads of disks and interfaces, and I couldn't read the process data after all the mem/disk/net lines etc..Simply starting it differently was the easiest solution:atop -lFrom the man page:Limit the number of system level lines for the counters per-cpu, the active disks and the network interfaces.Share Follow answered Apr 12, 2018 at 22:50GrizlyGrizly86955 silver badges99 bronze badges1It didn't work for me – Ilya ChernovDec 2, 2020 at 12:38Add a comment | ; -3 SuSE : Press F2, Press F10, press q, sed -i 's/AllCPUs/CPU/g' ~/.htoprcdebian : Press F2, Press F10, press q, sed -i 's/AllCPUs/CPU/g' ~/.config/htop/htoprcShare Follow answered May 23, 2018 at 19:29Harald SchmidtHarald Schmidt111 bronze badgeAdd a comment | 
How can I demonstrate that a user data validation selection clashes with a previous user data validation selection?
microsoft-excel;microsoft-excel-2010;microsoft-excel;microsoft-excel-2010
How can I demonstrate that a user data validation selection clashes with a previous user data validation selection? Ask Question
1 Say you set up your data validation lists on Sheet2, and you set up your first data validation on Sheet1!A2. And you wanted to change the validation of Sheet1!B2 based on what was selected in Sheet1!A2. You would place this code in the worksheet module for Sheet1:CodeSub worksheet_change(ByVal Target As Range)If Not Intersect(Target, Range("A2")) Is Nothing Then If Target.Value = "one" Then With Range("B2").Validation .Delete .Add Type:=xlValidateList, AlertStyle:=xlValidAlertStop, Operator:=xlBetween, Formula1:="=Sheet2!B1:B2" End With End If If Target.Value = "two" Then With Range("B2").Validation .Delete .Add Type:=xlValidateList, AlertStyle:=xlValidAlertStop, Operator:=xlBetween, Formula1:="=Sheet2!B3:B4" End With End If If Target.Value = "three" Then With Range("B2").Validation .Delete.Add Type:=xlValidateList, AlertStyle:=xlValidAlertStop, Operator:=xlBetween, Formula1:="=Sheet2!B5:B6" End With End IfEnd IfEnd SubThen you would set up additional if statements for each additional list that you want to add validation to.ExplanationBasically this is saying if there's a change on the worksheet, check to see if it's at A2 and it contains a value. This value will only be within your data validation sheet. So if these things are true then:Check for each possible value and then set the data validation of B2 to the possibilities defined in your data validation list as referenced.Expand the possibilities to fit your data and add additional tiers for additional lists.Share Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Sep 9, 2014 at 11:33RaystafarianRaystafarian21.4k1111 gold badges5959 silver badges9090 bronze badges1Sorry, just spotted this. Hecticness means I won't be able to test this for a few days, when I do I'll obviously see if this works for me. Unsure how I'll manage it as yet though. I'll assume the answer is correct for now, and mark it as such. – DaveRGPSep 12, 2014 at 14:48Add a comment | 
Toshiba Laptop tells me to insert boot media in selected boot media device and press a key [duplicate]
windows-7;hard-drive;boot;laptop;windows-7;hard-drive;boot;laptop
Toshiba Laptop tells me to insert boot media in selected boot media device and press a key [duplicate] Ask Question
0 If by wipe you mean clear the contents of your hard drive, it will have wiped the Operating System for the device. This means that it wont be able to run Windows as it is not installed. if you have no back up disks or install disks that you should have got with the machine, then the only way to make it function will be to buy a new copy of Windows. you could also use a downloaded installer for Windows if you have the product key on the bottom of your machine, this will save you £80 pound upward (Depending on whether you chose windows 7, 8 etc). Although this will obviously require a working computer to download.If the wipe Option was just to restore to factory default, this may indicate that the Hard Drive was damaged indefinitely due to the drop and is unable to read. you may need a new hard drive and use the first method above.Share Follow answered Sep 3, 2014 at 9:42ThunderToesThunderToes56033 gold badges1212 silver badges3131 bronze badges3Ill be sure to try it, thanks so much for the help. – Sam McLoughlinSep 3, 2014 at 9:50When downloading the new windows 7 off the internet can i install it from a thumb drive? If not a thumb drive a cd? – Sam McLoughlinSep 3, 2014 at 9:57yeah you can run it from any removable storage media but be careful as I have had problems in the past with making a CD Bootable you need to make sure that the BIOS can find a boot order on the CD. It may be best to use an "ISO image" file of the OS. – ThunderToesSep 3, 2014 at 9:58Add a comment | 
E185: Cannot find color scheme for synload.vim (Line 19)
vim;colors;gvim;vim;colors;gvim
E185: Cannot find color scheme for synload.vim (Line 19) Ask Question
2 After investigation, I want to say, this Error message has NOTHING related with my specified localtion!!!!The real reason is, there's a configure for autoloading vimrc changes while saving vimrc file. Because I found this error ONLY shows in saving vimrc file:autocmd! bufwritepost $HOME/.marslo/.vimrc source % And, I checked the Line 19 in syntax/synload.vim:17 " Set the default highlighting colors. Use a color scheme if specified.18 if exists("colors_name")19 exe "colors " . colors_name20 else21 runtime! syntax/syncolor.vim22 endif That means, the error shows: source vimrc -> exe colors marslo256. I don't know the reason yet. However, I found the WORKAROUND for prevent error shows: FORCE SILENT, the configure would looks like:autocmd! bufwritepost $HOME/.marslo/.vimrc silent! source %And everything's fine. Details can be found at vim_dev google group.Root CauseFinally, finally, the root cause shows up!!!!The reason of this error shows, is syntax is enabled before the sepcified location is added into vim runtimepath.The solution is Move line 19(syntax enable on) to Line 97 (the end part of Vundle).Line20(filetype plugin indent on) can be removed (it's okay if it's keep),because this setting is duplicated with Line96.Details can be found at vim_dev google groupShare Follow edited Sep 18, 2014 at 9:02 answered Sep 16, 2014 at 11:40MarsloMarslo1,10211 gold badge1313 silver badges2424 bronze badgesAdd a comment | ; -1 put in marslo256.vim if exists("syntax_on") syntax resetendiflet g:colors_name = "marslo256"Share Follow answered Nov 8, 2017 at 23:14ramses_ATKramses_ATK111Please add some explanation.  Do not respond in comments; edit your answer to make it clearer and more complete. – Scott - Слава УкраїніNov 8, 2017 at 23:47Add a comment | 
How can I open/convert a .wpostx file?
windows-live-writer;windows-live-writer
How can I open/convert a .wpostx file? Ask Question
1 You have to rename the file"filename".wpost instead of "filename".wpostxthis has kind of worked for meShare Follow answered Sep 11, 2014 at 16:37KenKen2611 bronze badgeAdd a comment | 
Suppress execution trace for echo command?
command-line;bash;shell;bash-scripting;jenkins;command-line;bash;shell;bash-scripting;jenkins
Suppress execution trace for echo command? Ask Question
43 When you are up to your neck in alligators, it’s easy to forget that the goal was to drain the swamp.                   — popular sayingThe question is about echo,and yet the majority of the answers so farhave focused on how to sneak a set +x command in. There’s a much simpler, more direct solution:{ echo "Message"; } 2> /dev/null(I acknowledge that I might not have thought of the { …; } 2> /dev/nullif I hadn’t seen it in the earlier answers.)This is somewhat cumbersome, but,if you have a block of consecutive echo commands,you don’t need to do it on each one individually:{ echo "The quick brown fox" echo "jumps over the lazy dog."} 2> /dev/nullNote that you don’t need semicolons when you have newlines.You can reduce the typing burden by using kenorb’s ideaof opening /dev/null permanentlyon a non-standard file descriptor (e.g., 3)and then saying 2>&3 instead of 2> /dev/null all the time.The first four answers at the time of this writingrequire doing something special (and, in most cases, cumbersome)every time you do an echo. If you really want all echo commandsto suppress the execution trace (and why wouldn’t you?),you can do so globally, without munging a lot of code. First, I noticed that aliases aren’t traced:$ myfunc()> {>date> }$ alias myalias="date"$ set -x$ date+ dateMon, Oct 31, 2016 0:00:00 AM # Happy Halloween!$ myfunc+ myfunc # Note that function call is traced.+ dateMon, Oct 31, 2016 0:00:01 AM$ myalias+ date # Note that it doesn’t say + myaliasMon, Oct 31, 2016 0:00:02 AM(Note that the following script snippetswork if the shebang is #!/bin/sh, even if /bin/sh is a link to bash. But, if the shebang is #!/bin/bash,you need to add a shopt -s expand_aliases commandto get aliases to work in a script.)So, for my first trick:alias echo='{ set +x; } 2> /dev/null; builtin echo'Now, when we say echo "Message",we’re calling the alias, which doesn’t get traced. The alias turns off the trace option,while suppressing the trace message from the set command(using the technique presented first in user5071535’s answer),and then executes the actual echo command. This lets us get an effect similar to that of user5071535’s answerwithout needing to edit the code at every echo command. However, this leaves trace mode turned off. We can’t put a set -x into the alias (or at least not easily)because an alias only allows a string to be substituted for a word;no part of the alias string can be injected into the commandafter the arguments (e.g., "Message"). So, for example, if the script containsdateecho "The quick brown fox"echo "jumps over the lazy dog."datethe output would be+ dateMon, Oct 31, 2016 0:00:03 AMThe quick brown foxjumps over the lazy dog.Mon, Oct 31, 2016 0:00:04 AM # Note that it doesn’t say + dateso you still need to turn the trace option back onafter displaying message(s) —but only once after every block of consecutive echo commands: dateecho "The quick brown fox"echo "jumps over the lazy dog."set -xdateIt would be nice if we could make the set -x automaticafter an echo — and we can, with a bit more trickery. But before I present that, consider this. The OP is starting with scripts that use a #!/bin/sh -ex shebang. Implicitly the user could remove the x from the shebangand have a script that works normally, without execution tracing. It would be nice if we could develop a solution that retains that property. The first few answers here fail that propertybecause they turn tracing “back” on after echo statements,unconditionally, without regard to whether it was already on. This answer conspicuously fails to recognize that issue,as it replaces echo output with trace output;therefore, all the messages vanish if tracing is turned off. I will now present a solution that turns tracing back onafter an echo statement conditionally — only if it was already on. Downgrading this to a solution that turns tracing “back” onunconditionally is trivial and is left as an exercise.alias echo='{ save_flags="$-"; set +x;} 2> /dev/null; echo_and_restore'echo_and_restore() { builtin echo "$*" case "$save_flags" in (*x*) set -x esac}$- is the options list; a concatenation of the letterscorresponding to all the options that are set. For example, if the e and x options are set,then $- will be a jumble of letters that includes e and x. My new alias (above) saves the value of $- before turning tracing off. Then, with tracing turned off,it throws control over into a shell function. That function does the actual echoand then checks to see whether the x option was turned onwhen the alias was invoked. If the option was on, the function turns it back on;if it was off, the function leaves it off.You can insert the above seven lines (eight, if you include an shopt)at the beginning of the scriptand leave the rest alone.This would allow youto use any of the following shebang lines:#!/bin/sh -ex#!/bin/sh -e#!/bin/sh –xor just plain#!/bin/shand it should work as expected.to have code like(shebang)command1command2command3set -xcommand4command5command6set +xcommand7command8command9andCommands 4, 5, and 6 will be traced — unless one of them is an echo,in which case it will be executed but not traced. (But even if command 5 is an echo, command 6 still will be traced.)Commands 7, 8, and 9 will not be traced. Even if command 8 is an echo, command 9 still will not be traced.Commands 1, 2, and 3 will be traced (like 4, 5, and 6)or not (like 7, 8, and 9) depending on whether the shebang includes x.P.S. I have discovered that, on my system,I can leave out the builtin keyword in my middle answer(the one that’s just an alias for echo). This is not surprising; bash(1) says that, during alias expansion, …… a word that is identical to an alias being expanded is not expanded a second time.  This means that one may alias ls to ls -F, for instance, and bash does not try to recursively expand the replacement text.Not too surprisingly, the last answer (the one with echo_and_restore)fails if the builtin keyword is omitted1. But, oddly it works if I delete the builtin and switch the order:echo_and_restore() { echo "$*" case "$save_flags" in (*x*) set -x esac}alias echo='{ save_flags="$-"; set +x;} 2> /dev/null; echo_and_restore'__________1 It seems to give rise to undefined behavior. I’ve seenan infinite loop (probably because of unbounded recursion),a /dev/null: Bad address error message, anda core dump.Share Follow edited Mar 1, 2018 at 4:22 answered Nov 1, 2016 at 3:14G-Man Says 'Reinstate Monica'G-Man Says 'Reinstate Monica'7,5572222 gold badges3939 silver badges8585 bronze badges132I have seen some amazing magic tricks done with aliases, so I know my knowledge thereof is incomplete. If anybody can present a way to do the equivalent of echo +x; echo "$*"; echo -x in an alias, I’d like to see it. – G-Man Says 'Reinstate Monica'Nov 1, 2016 at 3:20I wonder what is the difference between { echo foo; } 2> /dev/null and (echo foo) 2> /dev/null. Both work for me and the latter looks a bit more straightforward... – Grigory EntinMar 4, 2020 at 17:211@G-ManSays'ReinstateMonica' Yep, thanks for clarification. Yep, I read that thread about (exit 1) and understand the difference, the fact that () is forking subshells and etc. My case is pretty simple (just some config tooling), and I rather interested in readability (especially for people not experienced in shells)/correctness in terms of exit statuses and etc rather than performance. So leaving performance aside, it looks like for echo it's quite ok to use () in my case. – Grigory EntinMar 5, 2020 at 9:591@BryanRoach: (1) I covered that already: “Note that the following script snippets work if the shebang is #!/bin/sh, even if /bin/sh is a link to bash. But, if the shebang is #!/bin/bash, you need to add a shopt -s expand_aliases command to get aliases to work in a script.” (2) Please learn how quoting works. Your code doesn’t work properly for printf, and it has the same problem with echo that my answer has (identified by MoonLite). – G-Man Says 'Reinstate Monica'Jun 29, 2022 at 17:171@G-ManSays'ReinstateMonica' (1) Oh, sorry! I should have checked more carefully. (2) My code works for the simple case of passing one string to print, but we can support all cases. None of the answers have gotten the quoting right. Instead of "$*" or $* it should be "$@". – Bryan RoachJun 29, 2022 at 23:20 | Show 8 more comments; 17 I found a partial solution over at InformIT:#!/bin/bash -exset +x; echo "shell tracing is disabled here"; set -x;echo "but is enabled here"outputsset +x; shell tracing is disabled here + echo "but is enabled here"but is enabled hereUnfortunately, that still echoes set +x, but at least it's quiet after that.so it's at least a partial solution to the problem.But is there maybe a better way to do this? :)Share Follow answered Sep 3, 2014 at 10:02ChristianChristian72111 gold badge55 silver badges99 bronze badgesAdd a comment | ; 7 This way improves upon your own solution by getting rid of the set +x output:#!/bin/bash -ex{ set +x; } 2>/dev/nullecho "shell tracing is disabled here"; set -x;echo "but is enabled here"Share Follow answered Dec 11, 2015 at 20:43user5071535user507153542255 silver badges1515 bronze badgesAdd a comment | ; 3 I love the comprehensive and well explained answer by g-man, and consider it the best one provided so far. It cares about the context of the script, and doesn't force configurations when they aren't needed. So, if you're reading this answer first go ahead and check that one, all the merit is there.However, in that answer there is an important piece missing: the proposed method won't work for a typical use case, i.e. reporting errors:COMMAND || echo "Command failed!"Due to how the alias is constructed, this will expand toCOMMAND || { save_flags="$-"; set +x; } 2>/dev/null; echo_and_restore "Command failed!"and you guessed it, echo_and_restore gets executed always, unconditionally. Given that the set +x part didn't run, it means that the contents of that function will get printed, too.Changing the last ; to && wouldn't work either, because in Bash, || and && are left-associative.I found a modification which works for this use case:echo_and_restore() { cat - case "$save_flags" in (*x*) set -x esac}alias echo='({ save_flags="$-"; set +x; } 2>/dev/null; echo_and_restore) <<<'It uses a subshell (the (...) part) in order to group all commands, and then passes the input string through stdin as a Here String (the <<< thing) which is then printed by cat -. The - is optional, but you know, "explicit is better than implicit".The cat - can be changed to personalize the output. For example, to prepend the name of the currently running script, you could change the function to something like this:echo_and_restore() { local BASENAME; BASENAME="$(basename "$0")" # File name of the current script. echo "[$BASENAME] $(cat -)" case "$save_flags" in (*x*) set -x esac}And now it works beautifully:false || echo "Command failed"> [test.sh] Command failedShare Follow edited Jul 18, 2022 at 9:34 answered Jul 13, 2018 at 11:09j1eloj1elo13155 bronze badgesAdd a comment | ; 2 Put set +x inside the brackets, so it would apply for local scope only.For example:#!/bin/bash -xexec 3<> /dev/null(echo foo1 $(set +x)) 2>&3($(set +x) echo foo2) 2>&3( set +x; echo foo3 ) 2>&3truewould output:$ ./foo.sh + execfoo1foo2foo3+ trueShare Follow answered Dec 11, 2015 at 21:03kenorbkenorb23.5k2626 gold badges122122 silver badges186186 bronze badges31Correct me if I'm wrong, but I don't think the set +x inside the subshell (or using subshells at all) is doing anything useful. You can remove it and get the same result. It's the redirecting stderr to /dev/null that is doing the work of temporarily "disabling" tracing... It seems echo foo1 2>/dev/null, etc., would be just as effective, and more readable. – Tyler RickDec 10, 2018 at 19:33Having tracing in your script could impact performance. Secondly redirecting &2 to NULL could be not the same, when you expect some other errors. – kenorbDec 10, 2018 at 22:151Correct me if I'm wrong, but in your example you already have tracing enabled in your script (with bash -x) and you are already redirecting &2 to null (since &3 was redirected to null), so I'm not sure how that comment is relevant. Maybe we just need a better example that illustrates your point, but in the given example at least, it still seems like it could be simplified without losing any benefit. – Tyler RickDec 12, 2018 at 0:43Add a comment | ; 1 Execution trace goes to stderr, filter it this way:./script.sh 2> >(grep -v "^+ echo " >&2)Some explanation, step by step:stderr is redirected… – 2>…to a command. – >(…)grep is the command……which requires beginning of the line… – ^…to be followed by + echo ……then grep inverts the match… – -v…and that discards all the lines you don't want.The result would normally go to stdout; we redirect it to stderr where it belongs. – >&2The problem is (I guess) this solution may desynchronize the streams. Because of filtering stderr may be a little late in relation to stdout (where echo output belongs by default). To fix it you can join the streams first if you don't mind having them both in stdout:./script.sh > >(grep -v "^+ echo ") 2>&1You can build such a filtering into the script itself but this approach is prone to desynchronization for sure (i.e. it has occurred in my tests: execution trace of a command might appear after the output of immediately following echo).The code looks like this:#!/bin/bash -x{ # original script here # …} 2> >(grep -v "^+ echo " >&2)Run it without any tricks:./script.shAgain, use > >(grep -v "^+ echo ") 2>&1 to maintain the synchronization at the cost of joining the streams.Another approach. You get "a bit redundant" and strange-looking output because your terminal mixes stdout and stderr. These two streams are different animals for a reason. Check if analyzing stderr only fits your needs; discard stdout:./script.sh > /dev/nullIf you have in your script an echo printing debug/error message to stderr then you may get rid of redundancy in a way described above. Full command:./script.sh > /dev/null 2> >(grep -v "^+ echo " >&2)This time we are working with stderr only, so desynchronization is no longer a concern. Unfortunately this way you won't see a trace nor output of echo that prints to stdout (if any). We could try to rebuild our filter to detect redirection (>&2) but if you look at echo foobar >&2, echo >&2 foobar and echo "foobar >&2" then you will probably agree that things get complicated.A lot depends on echos you have in your script(s). Think twice before you implement some complex filter, it may backfire. It's better to have a bit of redundancy than to accidentally miss some crucial information.Instead of discarding execution trace of an echo we can discard its output – and any output except the traces. To analyze execution traces only, try:./script.sh > /dev/null 2> >(grep "^+ " >&2)Foolproof? No. Think what will happen if there's echo "+ rm -rf --no-preserve-root /" >&2 in the script. Somebody might get heart attack.And finally…Fortunately there is BASH_XTRACEFD environmental variable. From man bash:BASH_XTRACEFDIf set to an integer corresponding to a valid file descriptor, bash will write the trace output generated when set -x is enabled to that file descriptor.We can use it like this:(exec 3>trace.txt; BASH_XTRACEFD=3 ./script.sh)less trace.txtNote the first line spawns a subshell. This way the file descriptor won't stay valid nor the variable assigned in the current shell afterwards.Thanks to BASH_XTRACEFD you can analyze traces free of echos and any other outputs, whatever they may be. It's not exactly what you wanted but my analysis makes me think this is (in general) The Right Way.Of course you can use another method, especially when you need to analyze stdout and/or stderr along with your traces. You just need to remember there are certain limitations and pitfalls. I tried to show (some of) them.Share Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Sep 21, 2016 at 1:51Kamil MaciorowskiKamil Maciorowski64.6k2222 gold badges118118 silver badges175175 bronze badgesAdd a comment | ; 1 if you do not neet to use the -x option, trap does the jobAs pointed out here, trap "${CMD}" DEBUG executes CMD after every command.Use this to print the output instead of set -x.code#!/bin/bash# https://stackoverflow.com/a/33412142/7128154trap '[[ $BASH_COMMAND != echo* ]] && echo $BASH_COMMAND' DEBUGecho "double echo"VAR="hello world"echo "${VAR}"lsoutput$ bash test2.sh double echoVAR="hello world"hello worldlslog.txt test.sh test2.shShare Follow answered Apr 30, 2021 at 9:02Markus DutschkeMarkus Dutschke11133 bronze badgesAdd a comment | ; 0 Editied 29 Oct 2016 per moderator suggestions that the original did not contain enough information to understand what is happening.This "trick" produces just one line of message output at the terminal when xtrace is active:The original question is Is there a way to leave -x enabled, but only output Message instead of the two lines. This is an exact quote from the question.I understand the question to be, how to "leave set -x enabled AND produce a single line for a message"?In the global sense, this question is basically about aesthetics -- the questioner wants to produce a single line instead of the two virtually duplicate lines produced while xtrace is active.So in summary, the OP requires:To have set -x in effectProduce a message, human readableProduce only a single line of message output.The OP does not require that the echo command be used. They cited it as an example of message production, using the abbreviation e.g. which stands for Latin exempli gratia, or "for example".Thinking "outside the box" and abandoning the use of echo to produce messages, I note that an assignment statement can fulfill all requirements.Do an assignment of a text string (containing the message) to an inactive variable.Adding this line to a script doesn't alter any logic, yet produces a single line when tracing is active: (If you are using the variable $echo, just change the name to another unused variable)echo="====================== Divider line ================="What you will see on the terminal is only 1 line:++ echo='====================== Divider line ================='not two, as the OP dislikes:+ echo '====================== Divider line ================='====================== Divider line =================Here is sample script to demonstrate. Note that variable substitution into a message (the $HOME directory name 4 lines from the end) works, so you can trace variables using this method.#!/bin/bash -exu## Example Script showing how, with trace active, messages can be produced# without producing two virtually duplicate line on the terminal as echo does.#dummy="====================== Entering Test Script ================="if [[ $PWD == $HOME ]]; then dummy="*** " dummy="*** Working in home directory!" dummy="*** " ls -la *.c || :else dummy="---- C Files in current directory" ls -la *.c || : dummy="----. C Files in Home directory "$HOME ls -la $HOME/*.c || :fiAnd here is the output from running it in the root, then the home directory.$ cd /&&DemoScript+ dummy='====================== Entering Test Script ================='+ [[ / == /g/GNU-GCC/home/user ]]+ dummy='---- C Files in current directory'+ ls -la '*.c'ls: *.c: No such file or directory+ :+ dummy='----. C Files in Home directory /g/GNU-GCC/home/user'+ ls -la /g/GNU-GCC/home/user/HelloWorld.c /g/GNU-GCC/home/user/hw.c-rw-r--r-- 1 user Administrators 73 Oct 10 22:21 /g/GNU-GCC/home/user/HelloWorld.c-rw-r--r-- 1 user Administrators 73 Oct 10 22:21 /g/GNU-GCC/home/user/hw.c+ dummy=---------------------------------$ cd ~&&DemoScript+ dummy='====================== Entering Test Script ================='+ [[ /g/GNU-GCC/home/user == /g/GNU-GCC/home/user ]]+ dummy='*** '+ dummy='*** Working in home directory!'+ dummy='*** '+ ls -la HelloWorld.c hw.c-rw-r--r-- 1 user Administrators 73 Oct 10 22:21 HelloWorld.c-rw-r--r-- 1 user Administrators 73 Oct 10 22:21 hw.c+ dummy=---------------------------------Share Follow edited Oct 30, 2016 at 4:50 answered Sep 20, 2016 at 20:54HiTechHiTouchHiTechHiTouch11144 bronze badges71Note, even the edited version of your deleted answer (which this is a copy of), still doesn't answer the question, as the answer does not output just the message without the associated echo command, which was what the OP asked for. – DavidPostill♦ Oct 27, 2016 at 22:06Note, this answer is being discussed on meta Have I been penalized for an answer 1 moderator didn't like? – DavidPostill♦ Oct 27, 2016 at 22:07@David I have enlarged the explanation, per comments in the meta forum. – HiTechHiTouchOct 30, 2016 at 4:53@David Again I encourage you to read the OP very carefully, paying attention to the Latin ".e.g.". The poster does NOT require the echo command be used. The OP only references echo as an example (along with redirection) of potential methods to solve the problem. Turns out you do not need either, – HiTechHiTouchOct 30, 2016 at 4:55And what if the OP wants to do something like echo "Here are the files in this directory:" *? – G-Man Says 'Reinstate Monica'Nov 1, 2016 at 3:22 | Show 2 more comments; 0 In a Makefile you could use the @ symbol. Example Usage: @echo 'message'From this GNU doc:When a line starts with ‘@’, the echoing of that line is suppressed. The ‘@’ is discarded before the line is passed to the shell. Typically you would use this for a command whose only effect is to print something, such as an echo command to indicate progress through the makefile.Share Follow edited Nov 14, 2017 at 4:22Shakaron10322 bronze badges answered May 30, 2017 at 3:04derekderek1122 bronze badges3Hi, the doc you're referencing is for gnu make, not shell. Are you sure it works? I get the error ./test.sh: line 1: @echo: command not found, but I'm using bash. – user114447May 30, 2017 at 3:191Wow, sorry I completely misread the question. Yes, @ only works when you are echoing in makefiles. – derekJun 8, 2017 at 15:57@derek I edited your original reply so it now clearly states that the solution is limited for Makefiles only. I was actually looking for this one, so I wanted your comment not to have a negative reputation. Hopefully, people will find it helpful too. – ShakaronNov 14, 2017 at 1:47Add a comment | 
Instruct Outlook 2010 to reconnect to the server now
windows;networking;microsoft-outlook;windows;networking;microsoft-outlook
Instruct Outlook 2010 to reconnect to the server now Ask Question
1 I couldn't find a way to convince Outlook to reconnect to the server, short of restarting it or disabling and (painfully) reenabling the network interface.So what I do is to unplug and plug back in the virtual cable between the VM and the host with the following VBoxCableReconnect script. Of course the script is specific to VirtualBox, but I expect that similar things are possible with other VM technologies.#! /usr/bin/env perluse strict;use warnings;sub vbox_list { my %vms; my ($running) = @_; my $what = $running ? 'runningvms' : 'vms'; local $ENV{LC_ALL} = 'C'; open VBOX, "VBoxManage list -l $what |" or die 'VBoxManage: $!'; local $/ = "\n\n\n"; while (my $section = <VBOX>) { my %vm = (); $section =~ s/\n\n.*//s; # strip shared folders, etc. foreach my $line (split /\n/, $section) { $line =~ s/\A([^:]+):\s+// or next; $vm{$1} = $line; } $vms{$vm{UUID}} = {%vm}; } close VBOX; return %vms;}sub vbox_list_cables { my ($vms) = @_; my @cables; foreach my $vm (values %$vms) { my %vm = %$vm; foreach my $key (keys %vm) { next unless $key =~ /\ANIC *([0-9]+)\z/; my $num = $1; if ($vm{$key} =~ /(^|, )Cable connected: on($|, )/) { push @cables, [$vm{UUID}, $vm{Name}, $num]; } } } return @cables;}sub vbox_iterate_cableconnected { my ($cables, $onoff) = @_; foreach my $cable (@$cables) { my ($uuid, $name, $num) = @$cable; system 'VBoxManage', 'controlvm', $uuid, "setlinkstate$num", $onoff; # TODO: report errors }}my %vms = vbox_list(1);my @cables = vbox_list_cables(\%vms);vbox_iterate_cableconnected(\@cables, 'off');sleep(1);vbox_iterate_cableconnected(\@cables, 'on');Run this as the user running the VM when bringing up a network interface on the host.Share Follow answered Apr 26, 2015 at 22:29Gilles 'SO- stop being evil'Gilles 'SO- stop being evil'68.7k2121 gold badges135135 silver badges177177 bronze badgesAdd a comment | ; 0 Control and right click the outlook icon by the clock and you have a new menu item called 'Connection Status' where you can reconnect far quicker than any other method.Share Follow answered Sep 3, 2014 at 9:18JohnnyVegasJohnnyVegas3,45011 gold badge1313 silver badges1717 bronze badges3This sure looks like it should work, but it doesn't help. I see that connections are restarted when I click on the “Reconnect” button, but my mailboxes aren't being updated. – Gilles 'SO- stop being evil'Sep 3, 2014 at 9:58I'm assuming you are using vmware on mac? Every time I experienced a problem similar to yours I would change vmware's network setting from NAT to BRIDGE or vice versa. – JohnnyVegasSep 6, 2014 at 19:33VirtualBox on Linux, but same difference. I'll experiment with turning the network off at the VB level. I tried disabling the network in Windows, to make it send whatever event it sends to Outlook when it isn't running in a VM and the network goes down, but I didn't find a way to do it without admin powers and digging into very deep menus. – Gilles 'SO- stop being evil'Sep 6, 2014 at 22:49Add a comment |