Categories
How-To Technical

Have you cleaned you package

As much as I would like to discuss the importance of cleaning ones package for good health reasons.  I choose to refrain this time around.  I will talk about something which is just as worthwhile as cleaning one’s own package.    When you install / uninstall new apps you may have packages left over which take […]

Categories
Software Technical

What Is Hyper-Threading?

Hyper-Threading is a technology included by Intel first in their Netburst line of parts. Hyper-Threaded processors present their individual processing cores to the system as if they are two processing cores. To use Intel’s parlance, that means that each physical core appears in the operating system as two logical cores. While the OS can distinguish […]

Categories
Technical

History

There are times where I run a command that I needed to only need it again at a later time.  Most of the time I document my steps, but there are those time where I just do things in the heat of the moment to get what I need done.  So what can one do?  […]

Categories
How-To Technical

Kicking it with some switches

With a recent need to update and configure switches at the office.  I used a few simple steps to make this all happen.   These steps require you setup a closed network with a DHCP Server and TFTP Server and connect all switches to this network.   TFTP Software Update to ProCurve Switch Connect to switch […]

Categories
How-To Technical

HowTo: Make a Windows 7 USB Flash Install Media while in Linux

Recently I had a need to install Windows 7 on a computer and I was out of DVD media to use. The only media I had was a 8GB USB Thumb drive. I have done this many of time in Windows itself with various of tools and eve manually. Now I do it in Linux […]

Categories
Software Technical

Command of the day: shred

The shred command can be used for destroy files so that their contents are very difficult or even impossible to recover. The shred command accomplishes its destruction by repeatedly overwriting files with data patters designed to do maximum damage. Even the use of high-sensitivity data recovery methods and equipment make it difficult to recover files […]