Category: Mac

Snagged this from WhirCat’s centosprime page and Other World Computing.http://eshop.macsales.com/reviews/Framework.cfm?page=/Tips/Key_Combinations/bootkeycombos.htmlhttp://whircat.centosprime.com/startup-keys-boot-options/ Obscure Startup Key / General Use Key Combinations Apple systems have always used different key combinations to perform different tasks, just like all computer makers. However, finding those key combinations

By default, when hidden, a few of the bottom thumbnail bar lines remain visible. This is annoying when using an operating system with a menu bar at the top of the screen. Do completely hide the window: Edit->Preferences Display tab

Tagged with: , , , , ,

Warning! This is a destructive test! Badblock utility writes a value to the drive, reads it back, and compares the two. Where X is the drive letter: a,b,c,d sudo badblocks -wvs /dev/sdX To test a particular partition, X is the

Tagged with: , , , , , , ,

One of these five possible solutions will eject optical media. Holding down the mouse button while starting up. This may take some time, but keep your finger on the mouse button right up until the disc comes out or the

Tagged with: , , , ,

Switch to root su – Password: xxxxx Download and install dependencies required by dmg2img yum -y install zlib-devel* bzip2* openssl-devel* Download, unzip, and untar the dmg2img package: wget http://vu1tur.eu.org/tools/dmg2img-1.6.5.tar.gz gunzip dmg2img-1.6.5.tar.gz tar -xvf dmg2img-1.6.5.tar.gz cd dmg2img* Build the package and

Tagged with: , , , ,

Machine Installation and Configuration

Desktop, Laptop and Server Management to include: Account and Access Control Lists Group Policy Settings Energy Usage Policies Remote/Home connectivity with Remote Desktop and VNC Automated Backups OS and Software Updates Antivirus/Anti-Malware Solutions NAS and File Server Solutions Desktop, Laptop

Network Administration

Wired and wireless technologies Network interfaces, subnets, routing Installation of repeaters and hubs Bridges Switches Routers Gauntlet, Sidewinder, Cybercomputing Firewall Certified Network performance, security and resilience Intrusion detection systems, snort

System Administration

Install and upgrade operating systems, drivers, application software Create file systems, monitor usage, quotas User account administration Create a backup and recover policy Troubleshoot hardware and network failures, repair or replacement Verify peripheral operation Create and implement computer system and

Software Maintanence

Corrective: Repair any kind of defect. Adaptive: Porting to new hardware or a different OS, without affecting functionality. Perfective: New requirements, and performance improvements. Preventive: Improve maintainability itself, refactor awkward designs and comments.

Software Development

Business analysis, software requirements co-development Architecture and design of software application Custom software application development Technology/data migration, porting of software Re-engineering of legacy software applications Support and maintenance of software applications Customization/localization services Software testing and quality assurance

Top