Snagged this from WhirCat’s centosprime page and Other World Computing.http://eshop.macsales.com/reviews/Framework.cfm?page=/Tips/Key_Combinations/bootkeycombos.htmlhttp://whircat.centosprime.com/startup-keys-boot-options/ Obscure Startup Key / General Use Key Combinations Apple systems have always used different key combinations to perform different tasks, just like all computer makers. However, finding those key combinations …

Mac Boot Options Read more »

Warning! This is a destructive test! Badblock utility writes a value to the drive, reads it back, and compares the two. Where X is the drive letter: a,b,c,d sudo badblocks -wvs /dev/sdX To test a particular partition, X is the …

[HOWTO] Test a hard drive, SDD, or thumbdrive for bad blocks Read more »

Switch to root su – Password: xxxxx Download and install dependencies required by dmg2img yum -y install zlib-devel* bzip2* openssl-devel* Download, unzip, and untar the dmg2img package: wget http://vu1tur.eu.org/tools/dmg2img-1.6.5.tar.gz gunzip dmg2img-1.6.5.tar.gz tar -xvf dmg2img-1.6.5.tar.gz cd dmg2img* Build the package and …

[HOWTO] Convert Macintosh dmg files to iso in Linux Read more »

Wired and wireless technologies Network interfaces, subnets, routing Installation of repeaters and hubs Bridges Switches Routers Gauntlet, Sidewinder, Cybercomputing Firewall Certified Network performance, security and resilience Intrusion detection systems, snort

Corrective: Repair any kind of defect. Adaptive: Porting to new hardware or a different OS, without affecting functionality. Perfective: New requirements, and performance improvements. Preventive: Improve maintainability itself, refactor awkward designs and comments.