• Changing Fedora Clock

    7
    2 Votes
    7 Posts
    741 Views
    StrongBadS

    Ah, this is what you really want..

    date -s "last hour"
  • Expensive hardware going spare.

    34
    2 Votes
    34 Posts
    6k Views
    coliverC

    @Breffni-Potter said:

    @coliver said:

    @Breffni-Potter said:

    Bidding starts at $2500.

    Collection only 😄

    Welp too rich for my blood.

    But I just put an Apple Sticker on top. Therefore the price has gone up.

    Oh... Man suddenly I really want these things... damn you Apple!

  • I know I am late to the party...

    15
    3 Votes
    15 Posts
    2k Views
    IRJI

    Outlook is very slow, but other than that I am not having any issues. A reboot seemed to fix all speed related issues other than Outlook.

  • What Does Your Home Lab and Office Look Like?

    51
    2 Votes
    51 Posts
    15k Views
    JaredBuschJ

    Never mind the bottle of cheap sake. It has been a rough day.
    image.jpeg

  • In need of Hardware: i7-4770TE 2.3GHz

    5
  • Best practice: Backup Users iPhones

    15
    5 Votes
    15 Posts
    2k Views
    A

    Google Photos. Free. Unlimited.

  • Client side Java needs to go away

    18
    6 Votes
    18 Posts
    3k Views
    RojoLocoR

    @scottalanmiller said:

    Old ilO too.

    ...all old and current iDRAC.

  • MS Outlook and O365 issue

    23
    2 Votes
    23 Posts
    6k Views
    J

    When we've seen this issue it's usually been saved credentials in Windows credential manager. For some reason they can authenticate but then Outlook randomly tries the credentials in credential manager. If the credentials are old you will get a login prompt. That's always the first thing I check.

  • 1 Votes
    9 Posts
    3k Views
    NetworkNerdN

    Here's the current suggestion from Seagull Support in addition to sending Bartender message logs, Bartender print job logs, and system / application logs on the server:

    I would like to try making a change to Commander, I would like to change when Bartender restarts the process. Please follow the steps below
    1: Open Commander and stop detection
    2: Click on Detection Command Handler Setup
    3: On the General tab in the Restart Process dropdown select "Every Command"
    4: Start detection.

  • 2 Votes
    19 Posts
    17k Views
    scottalanmillerS

    Pidgin is probably your choice then.

  • Is This a Single Point of Failure or SPOF

    1
    9 Votes
    1 Posts
    888 Views
    No one has replied
  • The Newbies Guide to Google

    7
    3 Votes
    7 Posts
    2k Views
    RojoLocoR

    @johnhooks said:

    @RojoLoco said:

    @johnhooks said:

    How to find music on google:

    intitle:"index.of" (mp3) "string to search for"

    mp3???? Ewwwwww............... search for music in a better sounding format, please.

    The chances of finding other types are slimmer. I haven't had much like finding other file types.

    DEATH BEFORE mp3!!!!! No musician alive would be caught dead searching for mp3 specifically.... I need to flush my brain out with some freakin analog, vinyl, warm, good sounding recordings now..... shudder

  • 1 Votes
    12 Posts
    3k Views
    H

    I is

  • Should I take the same money to go back to the same job?

    71
    4 Votes
    71 Posts
    18k Views
    scottalanmillerS

    So actually that is a great example - no one at the bank was allowed to work other jobs (unless the bank approved them which they would never do since everyone was paid to be on call and so clearly another job could never happen) but as I was hourly, they had no means of complaining.

  • Image Deployment Options

    9
    2 Votes
    9 Posts
    1k Views
    DustinB3403D

    @Dashrender said:

    Sure, you can manually build your image in a VM, but how much time are you spending on that? MDT can do the whole thing for you.

    Frankly for SMB it's probably not worth worrying about MDT, but larger shops, perhaps it is.

    The initial image creation took a few hours investment sure. But otherwise it's just a matter of updating the VM with System and Security patches and software updates.

    Which has to be done either way.

    So "maintaining the VM" isn't much overhead.

  • Files in Folder Hided in Windows 8 Machine

    32
    1 Votes
    32 Posts
    7k Views
    scottalanmillerS

    @Lakshmana said:

    Yeah.I have moved the folder from E to F drive by creating new folder in the F drive now

    But E is the empty drive. That's not what you were supposed to be testing. Try copying the files again, not the empty folder.

  • Wiping Data or Shredding the Drive

    35
    1 Votes
    35 Posts
    5k Views
    stacksofplatesS

    @DustinB3403 said:

    @johnhooks Probably considering how few drives those might actually go through....

    You'd be better of purchasing a bearing press, and high powered magnets.

    They're solid steel. They'll go through. The plastic never holds up like in the picture, the petals come off.

  • Webhosting, websites, completely lacking fundementials

    8
    1 Votes
    8 Posts
    800 Views
    stacksofplatesS

    Drupal, like the others uses php and MySQL for data. But you can do some really cool stuff since it's database driven. There's a module called Views which allows you to create really complex SQL queries, and it's gui driven. You can write the SQL if you want, but you don't have to. You can create full database applications with relations to retrieve data and display it pretty much however you want.

    Here's what Views looks like:

    views.PNG

    Here's the query created from that:

    query.PNG

    Another cool thing views can do is change output of specific items. So for this view, it takes an input of a fontawesome name (just the specific name like "news" or "flash") and rewrites it with the HTML around it. So when you fill in the form to create the content all you type in is "pencil" and a size number and it outputs it as <i class="fa fa-pencil fa-<size_number>x"></i> which is this:

    pencil.PNG

  • Xbox Game Sharing

    11
    3 Votes
    11 Posts
    2k Views
    mlnewsM

    Could not resist....

    a9P4OAZ_460s_v2.jpg

  • 2 Votes
    4 Posts
    2k Views
    B

    @JaredBusch said:

    Of course once an attacker is in your system, they will have access to all your stuff.

    Indeed. The moral of this story is simply that all bets are off if your systems are compromised.