|
Mschauder wrote: starter.exe send parameter to the wol.exe on the server and start it.
But if I start the starter.exe local on my laptop, the WOL.exe will run there, too.
These two statements are mutually exclusive; if statement 1 is true how can statement 2 also be true?
It's time for a new signature.
|
|
|
|
|
wuah
again:
I sit with my laptop in the sun, enjoy the sun connect to network with vpn.
Now I have a connectivity to the Server.
I want to work Remote on my desktop pc from work. But the desktop pc is turned off.
Now I want to start my desktop pc to connect to it!
I start "starter.exe" and my desktop pc turns on.
-----
Now how I realize this:
I have 2 .exe
1. starter.exe is on my laptop
2. WOL.exe is on the server
-----
Now how my tool works:
starter.exe start the WOL.exe on the server with IP or MAC adress from my desktop pc as a parameter.
WOL.exe sends a magic packet to desktop and this turns on!
-----
Problem:
starter.exe starts on my laptop
starter.exe starts wol.exe which lay on the server
but if starter.exe start wol.exe, wol.exe will be started on my laptop instead of the server.
And cause my laptop is in an another subnet my laptop can not root packets directly.
I hope this would help
|
|
|
|
|
Mschauder wrote: I hope this would help
Well you still seem to be saying: "I do this and it works". Then you say: "I do this and it does not work".
So where are we? Let us go back to the original sequence.
- Laptop: run starter.exe (on the laptop)
- Laptop: starter.exe sends a message to the server with the IP address of the desktop
- Laptop: starter.exe terminates - its work is done
- Server: receives the message and runs wol.exe (on the server) with the desktop IP address as parameter
- Server: wol.exe sends a WOL message to the IP address of the desktop
- Server: wol.exe terminates - its work is done
- Desktop: receives WOL message and boots
- Laptop, Server and Desktop are now all booted and ready for action
Or maybe this is not what happens?
It's time for a new signature.
|
|
|
|
|
It doesn't work...
I try to describe like you :P
1. Laptop: run starter.exe
2. Laptop: starter.exe start wol.exe with ip adress of the desktop
3. Laptop: starter.exe terminates
now the problem begin
4. Because starter.exe runs wol.exe the wol.exe will run on the laptop...
what should do:
4. Server: runs wol.exe
5. Desktop: boots
6. Laptop: connect to desktop and is ready for action
---
for example
sitting in school your neighbour looks bored then you start a program like media player and this program should pop up on HIS screen not yours!
If I start media player (installed on his desktop pc) it will pop up on my screen, this I wouldn't have...
|
|
|
|
|
Mschauder wrote: 4. Because starter.exe runs wol.exe the wol.exe will run on the laptop...
Well this is obviously wrong. As I showed in my previous posts starter.exe should send a message to the server with the IP address, the server then runs wol.exe to send the WOL message to the desktop machine.
Mschauder wrote: sitting in school your neighbour looks bored then you start a program like media player and this program should pop up on HIS screen not yours!
I'm not sure exactly how you would do this unless you have some program running on your neighbour's PC that will accept commands and act on them. In general this is considered to be hacking and is not encouraged.
It's time for a new signature.
|
|
|
|
|
Well...
... thanks a lot but you don't know what I mean
I solved this otherwise
3 *.exe
1. starter.exe
*new* 2. RemoteStarter.exe (some Telnet function to start Software on other systems)
3. WOL.exe
There is no other solution...
or how would you solve something like this when a user is not allowed to use VNC to view the server.
And they know nothing about wake on LAN
|
|
|
|
|
Mschauder wrote: thanks a lot but you don't know what I mean
I think I do.
Mschauder wrote: or how would you solve something like this when a user is not allowed to use VNC to view the server.
And they know nothing about wake on LAN
I would not solve it. If you are not allowed access to the server then you should not try to hack into it.
Case closed, I think.
It's time for a new signature.
|
|
|
|
|
Nobody try to hack into it...
its just ja medium that both (Laptop & desktop) can reach...
But would you give an user the chance to "play" on a server?
|
|
|
|
|
Mschauder wrote: But would you give an user the chance to "play" on a server?
Sorry, but I am totally lost now; I have no idea what you are trying to do as it seems the description changes with every posted message.
It's time for a new signature.
|
|
|
|
|
"play" means the user is on the server with remote software.
|
|
|
|
|
What a strange coincidence, is this[^] you?
It's time for a new signature.
|
|
|
|
|
heey!!! xD
which coincidence you excactly mean
|
|
|
|
|
Mschauder wrote: which coincidence
Learning about two Germans with (almost) the same name in one day.
It's time for a new signature.
|
|
|
|
|
just nickname :P
real name is different
oh no, what you must think about germany
|
|
|
|
|
Pretty confusing thread!
Anyway, I give it a try.
You need to create a service to install on the server that listens on a predefined port for messages on which desktop computer to start.
As this service starts automatically at the start of the server the users don't need to interfere with the server, they only need to run a program on their home computer connecting to this service on the server, which tell their desktop to start via WOL.
"When did ignorance become a point of view" - Dilbert
|
|
|
|
|
Which is exactly what I suggested more than once!
It's time for a new signature.
|
|
|
|
|
Yes I know...
But I solved this otherwise!
easier
|
|
|
|
|
All of my client user from windows xp are member of Domain User group. But they can't rename their flash drive. I don't want to add them to the local administrator group because I concern about security issue.
Is there any possible way to keep them in users group and only allow them to rename their removable flash drive label?
|
|
|
|
|
Check the list of available rights for the Domain Users group. I don't recall Rename Drives being in there, but it's been a few years since I looked.
"A Journey of a Thousand Rest Stops Begins with a Single Movement"
|
|
|
|
|
I need my Message Queueing and Message Queueing Trigger services to be run under different logon (not with Local System Account) but the login is having all administrative previlages. When i do so the queues which in turn triggering my application is not happening.
Pl come back. If you need any clarification on my question.
T & R,
Prasanna Muthuramalingam.
|
|
|
|
|
Business Technology Summit 2010 – India's First, Largest and Single-most Inspirational Technology Show
Bangalore, July 7, 2010: Cloud is the Correct Answer to all Zen Koans! And Indian enterprises are at the forefront of a fundamental shift in the way they are obtaining software and computing capacity. Cloud Computing is in focus on the first day of the 2010 edition of Business Technology Summit. The summit will be held 11-12 November 2010 at the NIMHANS Convention Centre in Bangalore.
Centered on the theme Shaping Your Enterprise for New Business Realities, the third edition of India's annual summit for business technologies features some of the most important and relevant tracks that will empower you with all the necessary know-how required for your applications and your company to prosper in this climate, now and into the future. The following tracks are covered in the Cloud Conference on 11 Nobvember:
• Cloud Development: This track focuses on development patterns and best practices, looking at what's different about clouds and what computing paradigms work best. You will not only learn key lessons from seasoned cloud computing developers, but also hear from leading cloud platform vendors.
• Cloud Workshops: Expert speakers from the leading cloud computing platforms will hold forth on building different type of cloud applications for different clouds. Intensive, Interactive and Inspirational, these workshops are all you need to build exciting apps on the cloud.
• Cloud Case Studies: This track is flush with case studies and real world lessons from experts who have been there, done it. You will find out real world reasons for why companies decided to move to the cloud or stay back with on-premise IT. You will discover what worked best, how the costs stacked up, how they secured their piece of the cloud, whether performance got better or worse, and much more.
• Cloud Governance: You will learn about the risks, the regulations, the unknowns. You will also learn about compliance and mitigating Risks to hedge Against uncertainty. The tradeoffs, challenges, security issues, and all that you need to effectively govern your cloud.
For detail on the topics, visit the summit home: http://bit.ly/cloudconference. To gain a better understanding of the type of topics and speakers at Business Technology Summit, please look up the agenda for the 2009 and 2008 editions. To register with 85% discounts at Rs. 499, visit: http://bit.ly/btsregister
About Business Technology Summit
Business Technology Summit is the single most inspirational, informative and valuable event of the year for those recognise that the overall business network benefits when business technologies are made integral to the overall value equation. It offer the best chance to refresh, pick up new tips and techniques, and network with your peers to find solutions to the most pressing business technology issues today. Each year, the summit is attended by a serious audience of over thousand lively and thought-provoking IT practitioners and business leaders.
With outstanding education sessions, powerhouse speakers, and demand-driven content BTS 2010 offers cloud and SOA vendors a great way to maximize their company's visibility and maintain a heightened profile, before during and after the summit. For details on attendee demographics, products and services invited for participation, and expo floor plan, please visit www.btsummit.com/sponsorship.html. Follow the summit on Twitter, here: http://twitter.com/btsummit.
A Saltmarch Media Press Release
E: info@saltmarch.com
Ph: +91 80 4005 1000
|
|
|
|
|
How to configure Sql-Server Express over network so that my software can access that database from another machice
plz help
|
|
|
|
|
This MSDN article[^] may be helpful. I spent days trying to find this information when I installed it; this item hadn't been written yet.
In a nutshell, you use the SQL Server Management tool to grant permissions for each user, then the Configuration tool to enable protocols and ports. For security I keep my local network address enabled for TCP/IP, and the public Internet address disabled.
"A Journey of a Thousand Rest Stops Begins with a Single Movement"
|
|
|
|
|
Hello Friends,
Can anybody let me know How to register DLL manually in VISTA
Thnx
|
|
|
|
|
Same as any other version of Windows, by using REGSVR32. The only difference is you need admin privs to do it.
|
|
|
|