NTFS Drive Gives “pmount” Error in Ubuntu

When clicking on ‘Places’ then ‘Computer’ in Ubuntu 6.06. The windows partitions which are automatically detected are not accessible, and you receive the following error: Unable to mount the selected volume error: device /dev/hda2 is not removable error: could not execute pmount This is because pmount is being used by the system instead of mount. Read more about NTFS Drive Gives “pmount” Error in Ubuntu[…]

Centrino Duo – “Santa Rosa” Quick Facts

The new Centrino Duo platform includes new Core 2 Duo processors, a new chipset with a faster front-side bus and an optional dedicated memory cache, a new graphics solution with a larger allocation of memory, and a new wireless card with support for Draft-N wireless. Centrino Pro has all the features from the Centrino Duo Read more about Centrino Duo – “Santa Rosa” Quick Facts[…]

419 Fraud

The 419 fraud (after a formerly relevant section of the Criminal Code of Nigeria) is a form of advance fee fraud. It is a confidence trick in which the target is persuaded to advance relatively small sums of money in the hope of realizing a much larger gain. In brief, 419 is a sub-classification of Read more about 419 Fraud[…]

PCIe Basics

PCI Express is based on a serial protocol, which means that the interface can use a very small number of connectors. In doing so, the PCIe connections are clocked faster than the parallel busses (PCI, AGP) in order to obtain a high bandwidth. The bandwidth can be multiplied by merging several PCI Express lanes. The Read more about PCIe Basics[…]

Standard Port Numbers

 FTP  21  Telnet  23  SMTP  25  DNS  53  TFTP  69  Finger  79  HTTP  80  POP3  110  NNTP  119  SNMP  161  MySQL  3306  Microsoft SQL Server  1433  Terminal Services  3389  AIM  5190  PCAnyWhere  5631, 5632  VNC  5800, 5801, 5900, 5901  X Windows  6000  IRC  6667

RAID 0

RAID 0 is also known as a Striped Set without parity, it is a kind of RAID half-breed. It features one of the most well known processes in RAID devices: striping. Striping comes in many forms and it can be understood loosely as this: Using several hard drives connected to a controller, the hard drive Read more about RAID 0[…]

RAID 1

RAID 1 is also known as Disk Mirroring. You have two or more disks, and you mirror the contents of one onto the other. With 100% data redundancy, very little restoration of data on a single disk failure is necessary.  You can copy the files from its mirrored drive to the replacement drive. If you Read more about RAID 1[…]

RAID 2

With RAID level 2, data correction occurs in real-time via an implementation of Error Correcting Code, or ECC for short. If one disk were to crash in a RAID 2 configuration, there would be no interruption in service. Using parity, a single missing disk is “reconstructed” on the fly. RAID 2 uses a very specific Read more about RAID 2[…]

RAID 3

Like RAID 2, RAID 3 is not supported under Windows Server. In addition, RAID 3 reserves the dedicated parity-disk model for active recovery. But RAID 3 bests RAID 2 by moving up to byte-level data striping (8 bits in a byte), and switching to a more effective ECC scheme. XOR is the shortened version of Read more about RAID 3[…]

RAID 5

RAID 5 performance is all about the RAID controller. Depending on implementation and the controller in use, it can offer a data read transaction rate as formidable as any RAID level, an impressive write transaction rate, and an excellent aggregate transfer rate. What it offers that RAID 0 doesn’t is security. By ideal design, only Read more about RAID 5[…]

Getting Classic to work on OSX without OS9 installed

To use Mac OS 9-compatible applications in the Classic environment you must have a Mac OS 9 System Folder. Out of the box, some Macintosh computers manufactured after June 2004 do not have Classic pre-installed, including iMac G5, Mac mini, and some Power Macintosh G5 computers. Classic is available on one of the Apple software Read more about Getting Classic to work on OSX without OS9 installed[…]

New Form of Spyware?

Spyware and viruses could start using an old Unix trick. Recent viral applications allow viruses and spyware to use the kernel rootkit concept to hide themselves from the Windows operating system and the users that administer them. For more information, take a look at the following articles: The Inquirer Computer World

Qmail waits 30 minutes before processing a message

A recent problem with a Qmail server had our Linux technicians scratching their heads a bit. The server would accept a message to be sent from an account on that box, but it would take about 30 minutes to actually send the message to the recipient. This is what we found: ————————————————————————————- After scouring the Read more about Qmail waits 30 minutes before processing a message[…]