• Data Export from Database

    17
    1 Votes
    17 Posts
    5k Views
    scottalanmillerS

    @JaredBusch said:

    @scottalanmiller said:

    If you learn a language just to do this, Python would be my recommendation. Specifically well suited to learning, good for doing small scripts of this nature and good for list processing like this. It's just a good fit. But yeah, if you know some other language already, definitely go with that.

    I dislike any whitespace delineated language.

    I do hate that aspect of it, very Fortrany, but it does make readability a clearer priority for the newbies and can have benefits, especially when working in teams of non-full time programmers.

  • Spotify in locked down environment

    21
    1 Votes
    21 Posts
    6k Views
    Reid CooperR

    This gives me an idea for a topic...

  • Light Based Storage

    7
    2 Votes
    7 Posts
    878 Views
    DashrenderD

    @dafyre said:

    @Dashrender http://makezine.com/2015/08/07/2015-hoverboard/

    LOL I purchased one of the KickStarter kits from Hendo. It's suppose to be here by Nov.

    I heard about Nike making those shoes too... I hope they make them for the masses, I'd love a pair.

  • Avast for Business

    29
    1 Votes
    29 Posts
    6k Views
    DustinB3403D

    What we might do is for our non-servers go with the cloud free platform, and for the servers just purchase the standard business version.

    Sure it splits up the monitoring, but at least it gives us the tools we need (for our servers), at a reasonable cost.

  • Windows 10 Setup: Family use (children under 18)

    9
    1 Votes
    9 Posts
    2k Views
    JaredBuschJ

    @DustinB3403 said:

    Scott I think gjacobse is asking if it's possible to create a windows 10 account without the requirement for an email account.

    @scottalanmiller said:

    That's possible and would be better. But if an email address is required, I think that it is fine. Having one doesn't mean that they get to use it.

    It is not possible to setup a family account without the microsoft account to tie to it.

  • Simple E-Mail Retention Policy

    66
    1 Votes
    66 Posts
    21k Views
    DashrenderD

    @Breffni-Potter said:

    You've still not identified how it is legal or even possible for a complete random to compel me to pay them to search them.

    They might not be able to compel you to pay them. but as Dustin said, you might be required to bring in an outsider to do an audit, so then YOU are paying them (the outside auditor) to do said audit. But if you have nothing to audit, there is nothing to pay. Or in this case, if you limited yourself to two years of back email, they would only be spending time going through the last two years, not the last 20+

  • 1 Votes
    21 Posts
    6k Views
    dafyreD

    @Dashrender Eons ago... http://sillydog.org/narchive/full4.php

    It was actually pretty good too...

  • Job at USA in Uranium energy whether it is true?

    64
    -1 Votes
    64 Posts
    16k Views
    scottalanmillerS

    @shy12302 said:

    @scottalanmiller said:

    Most likely this is purely identify theft. But there is no guarantee, of course.

    i am afraid now give me a solution

    What do you expect any of us to tell you? We are IT people and only a couple are from your region and none (that I know of) are from Saudi Arabia. Your information has been compromised already, that can't be stopped now. Think about what information that you gave to a thief and try to imagine how they could or would use it now that they have it. That is what you are dealing with. A thief has all of your personal information. Can they use it to access bank accounts, get into your house, use your identity in other scams.... probably. Which things make sense? Definitely go and protect your accounts with additional data and things that they could not get from the data that you gave away.

  • Out of IPv4

    7
    0 Votes
    7 Posts
    2k Views
    coliverC

    @DustinB3403 said:

    They're already spending a ton of money to continue to support IPv4 because of NAT, and the requirement of both types being able to talk to each other.

    The cost analysis is probably saying that this process is still less expensive then going all in on IPv6.

  • 2 Votes
    7 Posts
    3k Views
    DustinB3403D

    Here's a how to on windows 8 (I'm assuming it would be similar on Windows 10)

  • Link for Centos 5.7

    4
    0 Votes
    4 Posts
    1k Views
    Reid CooperR

    I agree, this is a case where downloading the fully up to date version that CentOS provides is what makes sense. The overall version is 5. The .7 or .11 is just the patch level.

  • FYI - GoDaddy ISP Issues

    8
    2 Votes
    8 Posts
    2k Views
    AVI-NetworkGuyA

    @scottalanmiller said:

    @AVI-NetworkGuy said:

    I'm back at my room. 😞

    I had a VPN "emergency" I had to deal with, and my head is POUNDING. 😞

    Oh that sucks.

    Indeed it does... 😞 Have a great time tonight and I'll catch you guys tomorrow!

  • Important Vs Urgent Matrix

    1
    3 Votes
    1 Posts
    638 Views
    No one has replied
  • How can I actively monitor drive usage

    11
    1 Votes
    11 Posts
    1k Views
    scottalanmillerS

    Obviously, adjust the "1000" if you want it to do it a different number of times. And adjust the "5" if you want it to update at a different interval than every five seconds.

  • XenServer - Linux CLI desktop - Integrated Management

    10
    1 Votes
    10 Posts
    1k Views
    scottalanmillerS

    @DustinB3403 said:

    I'm using XenCenter and the VM Management Console to access the VM directly. Rather than PuTTY.

    So, no not a physical screen.

    That's a console. There is only one. You are essentially attached directly to the VGA output. If you were physically sitting at the box, you'd not have separate keyboard, mouse and monitors on a single box. Same thing here. That's not an SSH session, it's actually the console output.

  • Citrix Selling, well attempting too

    6
    1 Votes
    6 Posts
    1k Views
    scottalanmillerS

    @johnhooks said:

    @scottalanmiller said:

    Reuters calls them a cloud computing company? What cloud computing is Citrix even involved in?

    It's considered cloud if you can't see the computer right?

    At Citrix, it is. Apparently that definition did not win them a lot of business.

  • Powershell Import-CSV issue

    14
    1 Votes
    14 Posts
    4k Views
    coliverC

    I found an even easier way.

    $guid.id

    Since the $guid is a Powershell custom object you can call individual elements of it. This is the first time I've really dug into Powershell but this is a good thing to know.

  • Best hosting providers for a medium private cloud

    14
    2 Votes
    14 Posts
    3k Views
    dafyreD

    @scottalanmiller said:

    Now, saying that you can do that all separate, someone like @ntg....

    coughshamelessplugcough

  • Home VPN - Non Point to Point

    25
    0 Votes
    25 Posts
    3k Views
    DustinB3403D

    I'm going to be setting up a VM to perform this function for me.

    As it is now, I have my ISP, and home router. Obviously I could completely bypass my home router, and setup a VM based one, and then pass back to the router for wireless, but this seems a bit convoluted to do.

    I'm considering just putting a pass-through from my router directly to my VM host on a dedicated port for WAN serviceability, and then a 2nd NIC for LAN access.

    Any recommendations?

  • VPN multiple IP address

    17
    2 Votes
    17 Posts
    4k Views
    I

    Hi Scott,

    Yes, that's what I mentioned on my earlier messages. I think we got misunderstanding. Anyway, when I tried to follow the link I provided it seems that ccd is not taking effect, users define on ccd still getting 10.8.0.x IP instead of 10.8.2.x IP. I think user must take effect the assigning of internal IP address then you can route which public IP he will use.