Advanced Search
Search Results
1352 total results found
I need a free file encryption software
TrueCrypt is a simple, easy-to-use, on-the-fly encryption program. It works on Windows 2000/XP/2003 and Linux.Some features include: Ability to encrypt entire hard disk partition or a storage device Creation of a virtual encrypted disk within a file that moun...
What is UCLA on iTunes U?
iTunes U is an Apple program to assist universities distribute their digital content using the iTunes desktop application. Apple offers institutions of higher learning free storage space and tools for uploading content, which is then available for download.In ...
How can I find a dead or stuck pixel on my LCD monitor?
You can use a free utility called UDPixel.Check it out
What's the quickest way to get a computer repaired at UCLA
KST, our contracted PC vendor, also provides tech support for PCs, printers and other equipment. KST has an on-campus support person assigned to UCLA, so to get quick support, simply email them and help is on the way.
Is the KST the lowest possible price for a computer?
The vendors we contract with through KST try to offer their lowest prices through the KST “Sweet Spot” configurations. However, if you are planning to place an order for a large number of machines, contact KST or the vendor directly to see if some additional ...
How do I uninstall the Cisco VPN Client for Mac OS X?
The Cisco VPN Client on Mac OS X systems must be uninstalled by running a script via a terminal window. This may be useful to you, particularly if you now wish to use the built-in VPN client for OSX ( http://www.bol.ucla.edu/services/vpn/pptp/docs/macosx.html ...
How to Change Your Computer Name in Windows XP
Here are the steps to change the name on your computer when you’re using Windows XP1. Go to “start” menu and click on “control panel”2. A new window will pop up with different options to select from. Click on “system” to go to system properties.3. Another wind...
How do I change the nav portlet?
What I want to do: Change the navigation portlet so that only the current top folder and its contents appear.The fix:Go to the ZMI in Plone.Go to portal_properties → navtree_propertiesUncheck “includeTop” Put the “topLevel” equal to 1.Source: Plone Users maili...
Is there a free Anti-Virus software for Windows XP 64-bit?
Sophos 6.x supports 64-bit Windows XP, but according to Bruin Online, the earliest it will become available as a download/update is Spring 2007. Campus users still need to upgrade from Sophos 4.x to Sophos 5.x before UCLA releases Sophos 6.×.During this transi...
Is there a way of making the smart folder's contents public while keeping the content's containing folder from appearing to the public?
What you can do is create a folder called “events”. Then what I like to do is restrict the addable types to this folder so that users can only add events to this folder. To do this, click on “add item” from the action tabs when you are logged in Plone. At th...
Microsoft Volume Activation 2.0 Notes / Q& A
I attended the MS Live Meeting (10/27/2006) regarding the new Volume Activation 2.0 which will be implemented in the new coming Windows Vista, Windows Server (LongHorn) and also in future MS products. The next version of Volume Activation 3.0 is in the work a...
What's the best way to dispose of e-waste?
Computers and peripherals are filled with hazardous waste products, so it’s essential to dispose of them properly and safely. Before doing anything with a computer you no longer want, be sure to wipe the data clean from the hard disk (deleting files is not en...
National Vulnerability Database
National Vulnerability Database is a comprehensive cyber security vulnerability database that integrates all publicly available U.S. Government vulnerability resources and provides references to industry resources. “USERS POPULATE THE VULNERABILITY DATABASEA d...
svchost.exe - application error
You get the error: svchost.exe – application error the instruction at “0×745f2780” referenced memory at “0×00000000” the memory could not be “read”.Click OK to terminate the program.Click cancel to debug the program.First Solution (Easy Fix)1.Go 2 the start me...
What is Trusted Computing?
An interesting (if you like technical) article excerpted from Amit Singh’s book, “Mac OS X Internals”, discusses trusted computing on Mac OS X (tools included)…http://www.osxbook.com/book/bonus/chapter10/tpm/Also, Wikipedia has an excellent article describing ...
Intrusion Detection Systems Information
Intrusion Detection Systems (IDS) have many approaches. This page is intended to document the different approaches and reference places where more information can be obtained.Intrusion Detection Systems — http://en.wikipedia.org/wiki/Intrusion_detection_syste...
What are Microformats?
Microformats are an unofficial solution to creating small, simple, standardized solutions based on existing practices. The philosophy seems to be paying off, as rel-nofollow is supported not only by many CMS applications but also google, hcard is supported in...
What are the options for running Windows and OS X on an Intel Mac?
As of now there are two truly viable options for running Windows XP on the new Intel Mac computers. The first is to dual boot via Boot Camp offered by Apple, the second is a third party virtualization progam called Parallels Desktop.This developer brief explo...