One thing that I forget to tell you. Open I open the PDF file, I already select on the check box Always open the select program to opne this type of file. But the file still not remember to open with adobe acrobat file. Thank
Please help to create the machine certificate as I am working on AD RMS,I have installed the Virtual PC now I want to beging with coding in AD RMS project ........So I need to create Machine certificate and to have RAC..............
Help me Out ................
Hi, I have problem running quickbook 2005. I prefer to run it in user mode but the message box told me to run it in powers user or administration mode. It there any possible way for me to run QB 2005 in a user mode?
I want to run a application on windows start up. The user should see only the application screen.
All I need is to stop the user to do anything in the system(before my application Run).
Later he should be able to exit the application and do other staff(like opening the explorer etc)
Is there any registry settings for this?or may be some other method
I have got some questions about RAID1 and RAID5 hardware solutions. For example, I implemented RAID1 as disk mirroring in Windows Server 2003. How do I test this disk mirroring in action in the real world? Does it mean if one hard drive has failed, the system will continue to operate on the mirrored drive? Or when one hard drive has failed, the system will fail but one can reboot the system to the mirrored drive?
Similarly, if I implement a RAID5 using 3 disks, what does it really do? Does it support failover, data redundancy or both? How does RAID5 achieve it?
You can test disk mirroring by trashing one of the drives. If they are hot-swapable, just yank one out and put in a new, empty disk. The system will continue to operate during all this, though possibly slower than usual during the rebuild.
RAID-5 with three disks:
Basically, it writes 1 sector to disk 1, 1 sector to disk 2, then checksum of the two sectors to disc 3. The steps are repeated, but the checksum is always written to a different disk. That way, two disks are enough to rebuild the array, it does not matter which disk failed, AND it ofers speed advantages compared to RAID-1.
RAID as such does not offer failover. All disks are in use all the time. However, some RAID-cases have hot-standby-disks, which automatically replace failed ones, in order to keep the window of vulnerability as short as possible.
There also is no real data redundancy: If you accidentally delete something, its lost.
RAIDs only increase uptime and, to a certain amount, throughput.
And now my significant other has entered the room and ordered me to stop typing.
"If it was two men, the non-driver would have challenged the driver to simply crash through the gates. The macho image thing, you know." - Marc Clifton
I am working on AD RMS so can u plz tell me that how to get the machine certificate and
how to get the User License and How to get RAC(Rights Account Certificate)
PLease tell me that what is needed the first.
TF 220066 An error accured while the setup porogram was an opening a connectionto the data base on the
Team Foundation Data-tier server.Verify that the name of server is correct and that a firewall
or other network connectivity issue is not blocking network traffic. Click next to try again. For more information about
this error, see the installation logs. For the more information about the logs, " Troubleshooting installation for Team Foundation"
in the Foundation installation Guide.
Installation Of software,
Visual Studio 2008 Server Prof.
Inbuilt Installation : Slq Server 2005 Express Edition.
Hi, firstly please do not get the wrong idea, this is for good intentions,not spreading malicious software.
My school has over 300 computers connected to the network, and somehow they have ALL been infected with Conficker (the C edition). Unfortunately the schools IT manager recently retired and when it comes down to it I am the guy for fixing small IT problems.
We have already tried shutting down all computers and running the Microsoft Malicious Software Removal Tool (April 09 Edition) on each computer one by one. We have done this twice but obviously we are missing it somewhere and the dam virus keeps resurrecting and infects the whole network again.
My best guess is to somehow run the malicious software removal tool on all computers at once.
Does anyone know a way to copy and run a file from the server onto all networked machines?
I have full administrator access so thats no problem. Im just unsure of how to do this.
well I have been working on an assigment and it states::
A program has to be developed, and coded in C language, to decipher a document written
in Italian that is encoded using a secret key. The secret key is obtained as random
permutation of all the uppercase letters, lowercase letters, numbers and blank space. As
an example, let us consider the following two strings:
Plain: “ABCDEFGHIJKLMNOPQRSTUVXWYZabcdefghijklmnopqrstuvwxyz0123456789 ”
Code: “BZJ9y0KePWopxYkQlRjhzsaNTFAtM7H6S24fC5mcIgXbnLOq8Uid 3EDv1ruVGw”
The secret key modifies only letters, numbers, and spaces of the original document, while
the remaining characters are left unchanged. The document is stored in a text file whose
length is unknown.
The program has to read the document, find the secret key (which by definition is
unknown; the above table is just an example and it is not the key used for preparing the
sample files available on the web course) using a suitable decoding algorithm, and write
the decoded document to a new text file.
And I know that I have to upload an English dictionary into the program but I don't why it has been asked.(may be not in that statement but I have to dO THAT). My question is , while I can do that program using simple encryption/decryption algorithm then what's the use of uploading the english dictionary in our program? So is there any decryption algorithm that uses a dictionary to decrypt an encrypted file? or can somebody tell me what approach or algorithm should I use to solve that problem???
An early reply (and also authentic one) will be highly appreciated from you.
Thank you guys.
Last Visit: 31-Dec-99 18:00 Last Update: 3-Sep-15 11:44