Snagged this from WhirCat’s centosprime page and Other World Computing. Obscure Startup Key / General Use Key Combinations Apple systems have always used different key combinations to perform different tasks, just like all computer makers. However, finding those key combinations …

Mac Boot Options Read more »

Warning! This is a destructive test! Badblock utility writes a value to the drive, reads it back, and compares the two. Where X is the drive letter: a,b,c,d sudo badblocks -wvs /dev/sdX To test a particular partition, X is the …

[HOWTO] Test a hard drive, SDD, or thumbdrive for bad blocks Read more »

Tagged with: , , , , , , ,

Switch to root su – Password: xxxxx Download and install dependencies required by dmg2img yum -y install zlib-devel* bzip2* openssl-devel* Download, unzip, and untar the dmg2img package: wget gunzip dmg2img-1.6.5.tar.gz tar -xvf dmg2img-1.6.5.tar.gz cd dmg2img* Build the package and …

[HOWTO] Convert Macintosh dmg files to iso in Linux Read more »

Tagged with: , , , ,

Wired and wireless technologies Network interfaces, subnets, routing Installation of repeaters and hubs Bridges Switches Routers Gauntlet, Sidewinder, Cybercomputing Firewall Certified Network performance, security and resilience Intrusion detection systems, snort

Corrective: Repair any kind of defect. Adaptive: Porting to new hardware or a different OS, without affecting functionality. Perfective: New requirements, and performance improvements. Preventive: Improve maintainability itself, refactor awkward designs and comments.

Business analysis, software requirements co-development Architecture and design of software application Custom software application development Technology/data migration, porting of software Re-engineering of legacy software applications Support and maintenance of software applications Customization/localization services Software testing and quality assurance