First  |  Prev |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14
CASH FOR CISCO - I BUY USED AND NEW EQUIPMENT & LOTS MORE - SOFTWARE - MICROSOFT OFFICE, WINDOWS, SERVER, ADOBE
CASH FOR CISCO - I BUY USED AND NEW EQUIPMENT & LOTS MORE - SOFTWARE - MICROSOFT OFFICE, WINDOWS, SERVER, ADOBE I am buying the below Cisco equipment and lots more not listed. I buy used and new. I also buy equipment from other makers such as Brocade, Juniper, Extreme, Foundry, IBM, HP, Fujitsu, Nortel and lots... 27 Jul 2010 07:19
We are currently buying Foundy Networks - primarily NetIron MLX and XMR but are also looking for BigIron RX, ServerIron WMS7, and FastIron FESX's. If you have the above or have access to the above from a client looking ro recover value, please sen
We are currently buying Foundy Networks - primarily NetIron MLX and XMR but are also looking for BigIron RX, ServerIron WMS7, and FastIron FESX's. If you have the above or have access to the above from a client looking ro recover value, please send us an email. ... 27 Jul 2010 07:19
Dropping root permissions
I'm trying to make a daemon drop root permissions after initialisation. This turns out to be more complicated than I thought, particularly when it comes to uids vs euids vs reguids etc and I'm finding it rather difficult to find any decent online references. Can anyone point me at a known best practice for how to... 28 Jul 2010 15:09
Socket or device
Hallo everyone, I'm working on linux at the moment but I think the problem is more general. In short we need to use a tun device to communicate we - take data from the usb port - assemble it somehow - write it to the tun device Now I'm really not understanding how it should work, I've seen for example that ... 25 Jul 2010 15:06
Simple Hack To Get $2500 To Your PayPal Account.
Simple Hack To Get $2500 To Your PayPal Account At http://100bestvideos.co.cc Due to high security risks, i have hidden the PayPal Form link in an image. in that website On Top Side Above search box , click on image and enter your PayPal id And Your name. please don,t tell to any One. ... 21 Jul 2010 02:41
Fail-over: how data can be migrated from the failed server?
Hi, I am doing some fail-over research, there is one question comes up to me. If the server1 is down unexpectedly, how can the data be migrated to server2? I think this question is not a YES/NO question, there must be some mechanism that can make the data loss as little as possible. Using pure software, is there... 24 Jul 2010 13:24
Shared Memory and mutex protection
Hello, I am trying to create a very simple program that will create a shared memory segment using shmget and shmat etc.... I have the starts of a cross platform mutex class that I would like to stick into the shared memory - just now only pthread_mutex_t is in it but eventually the plan is to get it using C... 24 Jul 2010 12:19
Calling library functions in Linux kernel code
Hi, I have a few queries about calling library functions in Linux Kernel(module) code. What are the disadvantages of using printf instead of printk in kernel code ? I have also heard that it is unwise to use standard library functions in the kernel but was unable to understand why. Can someone please explain... 20 Jul 2010 08:03
Proxy site open your favoraite sites facebook myspace ...etc
As we promise every day new proxy site open all your favoriate sites Remarkable progress proxy server as a service driven all over the world But we offer free of charge depending on the advertising revenue visiting us makes us continue to provide the service free of charge http://mypro.totalh.com/ ... 19 Jul 2010 11:19
Where can I find the corresponding code for shell utliities
I need the source code for the shell utility 'file' I need to find the algorithm to find whether a given file is an executable or not ... 19 Jul 2010 13:33
First  |  Prev |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14