i am trying to implement DSR algo by tcl in ns2.but the problem i am facing is that i cannot make out how to circulate the ROUTE-REQUEST & ROUTE-REPLY packet in the established network.
I am new comer in this forum and the beginner on freeBsdI have a problem on how to implement the spam filter program on mail server, the problem is i have no idea on how to implement and test the spam filter program on the mail server and where should i put the program? is it in pop3?
I have been giving the task of shell scripting in C++ for implementation of Secure command in my shell. The Secure command will prompt for the filename and the password (like *****) and can only be displayed when ls -secure and password is provided. For example
whether Fedora / Gnome are planning on implementing a 2D version of Gnome 3? (i.e same GUI but without the bling). Like what Ubuntu did with Unity 2D. Unfortunately, my old laptop cannot run Gnome 3 due to the graphics specs and fallback mode doesn't work so I'm stuck with KDE.
there have been many posts about trying to use FF4 with graphic acceleration and i ran into an article that discusses some of the ramifications in doing so: Context and from the information presented, it appears that mozilla's approach is to blacklist graphic drivers that are not sufficiently "malware-proof" since code from the webpage is presented directly to the graphics driver.
i was not aware of this side issue and figured many others were also uninformed, but my thoughts are that some careful consideration should be done before implementing this new functionality. Perhaps someone more knowledgable could chime in with more concise information.
Myself and a friend have our own small IT business; we mainly design and build web sites for other small businesses. One of the things we would like to offer to clients is the ability to relay email addressed to their company's domain to their own personal email address (either web-based, or hosted by their ISP).
Now, clearly there is a risk of our mail relay being marked as "open", and therefore becoming black listed as a source of spam. Not something that we want to happen!setting up such a system? I understand how I would go about configuring an MTA like Postfix or Sendmail to perform such a task, but I'm unsure how I would ensure that relayed mail is delivered and we're not labeled as spammers.
I did wonder if perhaps the "mail forwarding" options in a mail server like Zimbra would get around the issue by forwarding on messages inline or as attachments within new emails (so the messages would appear to be from the account hosted on our server).
I'm interested in writing a generational garbage collector in C++. This is for a Python-like programming language project. I have used Boehm's garbage collector before, but I'm worried that it will have noticeable pause times (unacceptable for interactive programs). Since I can't really find any other C++ established GCs out there, I have been thinking of simply writing my own.
However, there are two essential ingredients I need for this:
- Some kind of write barrier mechanism that will notify my collector when something is written to a part of the heap
- A way for me to know the addresses and sizes of the stack, heap and global storage (the root sets)
how to implement write barriers (and how to get the stack, heap and global storage information) on the Linux platform? As an alternative, if you know of C++ GCs other than Boehm, I would also be interested.
I am working on xlib project to develop text editor without using help from any of toolkit/widgets.I get stuck in scrollbar.I have no idea how they work and developed.It become more difficult as I am using low-level C library - xlib.
I have scoured the internet in search of a way to implement this 301 redirect on Apache2 to no avail. My distro is Debian 5.0 Lenny. I want all request to sepserver.net to be 301 redirected to [URL]. Does anyone know how to do this? I have never done this before so I could really use a detailed explanation of how to implement this type of 301 that will work.
How can I implement logical operators in grep? I checked the man info and couldn't figure it out. For example, I'd like to display lines in file1.txt that contains word1 OR word2. cat file1.txt | grep word1 OR word2
Though I have developed some web applications (automation tools) using PHP which have been primarily meant for Intranet (within the organizations I have worked for), I have paid little attention to SEO (it was not required until now). But now I want to understand how do we go about implementing SEO and where do we fit this mechanism in a system / website?
Do we need any other tools or learn some specific programming /scripting language to achieve it?Will implementing a good SEO yield identical results irrespective of what search engine (be it Google or Yahoo!) is being used by users?
implementing hamming code in c: Calculating the Hamming Code The key to the Hamming Code is the use of extra parity bits to allow the identification of a single error. Create the code word as follows:
Mark all bit positions that are powers of two as parity bits. (positions 1, 2, 4, 8, 16, 32, 64, etc.) All other bit positions are for the data to be encoded. (positions 3, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 17, etc.)
i am running linux kernel 2.6.32-30 and my aim is to do packet aggregation in linux,so i created a qdisc simple one like sch_fifo.c and i wanted to put upon the dequeue function but when i attach my qdisct with tc qdisc add dev wlan0 root aggregate my screen just go black and in var/log/messages it says 31 m of stolen memory.graphic perfomance may suffer. can you somebody pls help me. Below is my dequeue function.
I have installed CentOS 5.5 on a computational cluster and want to limit the disk space used per user to 10GB. I do not know what is the relation between blocks and the the volume i want (10GB). What is the values I should used in the file opend by "edquota username" command? What is the usage of inode? there are soft and hard items in columns 3 ,4 and 6,7. Which of them should be configured? here is the example by CentOS documents. I only changed the file system which is in my case /dev/sdb0 (this is mounted as /home in my system. What changes I should do to this example to limit the user to 10GB disk scape?
Disk quotas for user testuser (uid 501): Filesystem blocks soft hard inodes soft hard /dev/sdb0 440436 0 0 37418 0 0
I run Wheezy Xfce 64-bit. I went through the Synaptic listings and added Python 3.3.2 and Tkinter for it, and that works fine; but for some reason PyGtk is available only for Python 2.7, not for Python 3.3, unless I'm just using the wrong way to try to find it. Is there a PyGtk available for Python 3.3 in Wheezy, and, if so, how do I install it and then import it once it's installed?
Options:A double linked list with fixed size character arrays. New nodes will be added when previous ones get filled. Dynamic arrays using realloc(). Linked list has the disadvantage of not having an O(1) search like an array but I think using realloc() will be more dangerous since it moves the whole block to a new location and if the new location is not big enough to hold the whole block, realloc fails !! this case will not occur with the linked list since its nodes are scattered.
I need to implement AIDE on my client machines. The builds on these machine are different, so each workstation will have its own specific db generated through running AIDE initially. It is not good practice to just leave the db on the machine, since an "attacker" would be able to view this information. However, at the same time I do not want to pull back over 100 different aide db's to the ftp server and have an update pull each specifically every time I need to run the check. The plan is to leave the db on the client machine, but encrypt it (using public/private keys). I need to be able to encrypt the file on the client machine. I will use a cron on the client to pull an update (from my ftp server) that runs AIDE. This update needs to be able to decrypt the file, use it running AIDE, then re-encrypt the file on the client.
I've a java program which needs to be executed regardless of whether a user is logged in or not. Currently I've a shell script which executes the java program. I login to the server and run this shell script when the server is rebooted. I would like to start this script automatically preferably as a service so that I can stop and restart this service whenever I update the java program.
I'm having a hard time googling for answers because I keep using the word "keyword."
I've never really used any kind of database before, but I want to learn the basics, so I'm playing with it a little bit at work. What I want to do is make a database to hold information on various articles. For example, with columns for the title, author, and date. Those are all easy. The tricky part is that I'd also like to be able to label articles with keywords so I can search for certain topics.
Since there's no way to know ahead of time how many keywords, if any, each article might warrant, I'm not sure how to put this in database form. There's no variable-sized array data type. It seems sloppy to just list them all in a single VARCHAR column. Making several columns that may or may not be left null and putting one keyword in each seems wasteful.
I am working on the beginning of implementing a two-node cluster with shared storage (GFS) and IP address. Both machines are virtual on VMware ESX 3.5, that should not make a difference, but that is the background.current status is that I have a single node cluster built with only the IP address configured within the cluster. The issue that I am having is that I have configured a service to contain only the IP address resource, however, when I go into cluster management that "service" does not register. As such, I cannot bring it online, ping it, etc. below is my cluster.conf configuration:
i m trying to implement wireless sensor network in omnet++ 4.1 simulation tool but that tool is not supported.so i m installing framework mixim 1.2 in omnet++ that support wireless and mobility feature.now i have problem that how to create sensor network in omnet++4.1 using mixim 1.2?if any body
I went on a really fun, homicidal rampage, and eradicated Exchange from about 15 companies by implementing PostPath instead. In fact, there weren't any discernable issues (prolly lost myself a bit of cash coz we all know how unstable MS Exchange is) in the migrations and the customers were exceedingly happy with the product (and especially the licensing).
At the time, PostPath.com had a full featured 12 user version of their product for free, which I could really use right about now, but Cisco bought 'em out a couple of years ago and I'm not sure where to look for an old copy of this 12 user free version of PostPath.