background preloader

Tech

Facebook Twitter

Webhosting

Office & other like programs. Delete Your Empty Folders. Here's a simple command script that will locate and dump empty folders and subfolders. I'm looking for a program that can delete any folders that are empty or that contain only empty subfolders. Can you help? M. V. Weir You don't need a program; you can do this at the command prompt. Open a command prompt window and navigate to the root folder of the drive in question. The file EMPTIES.BAT now contains a list of all folders on your hard drive in reverse order. How does it work? Remember Everything | Evernote Corporation. Trema (diacritic) The diaeresis (/daɪˈɛrɨsɨs/ dy-ERR-ə-səs) (also spelled diæresis or dieresis; plural: -es), trema or umlaut is a diacritic that consists of two dots ( ¨ ) placed over a letter, most commonly a vowel. When that letter is an i or a j, the diacritic replaces the tittle: ï.[1] The same symbol is also used as a diacritic in other cases, distinct from both diaeresis and umlaut.

For example, in Albanian, ë represents a schwa. The word diaeresis is from Ancient Greek: διαίρεσις, meaning division, separation, distinction.[2] Umlaut is German for "around/changed" (um-) "sound" (Laut). The word trema (plural tremas or tremata), a term generally used in the context of the French language and also occasionally used in classical scholarship, is from Ancient Greek: τρῆμα, meaning a perforation, orifice, or pip (as on dice),[3] and is derived from the form of the diacritic rather than its function. In German, diaeresis occurs in a few proper names, such as Ferdinand Piëch and Bernhard Hoëcker.

Examples: 1pesak. About Me | webchick.net. Angela Byron, Director of Community Development at Acquia, is a Drupal core co-maintainer, recipient of the Google-O'Reilly Open 2008 Source Award for Best Contributor, co-author of the O'Reilly book Using Drupal, and an open source evangelist who lives and breathes Drupal. She got her start as a Google Summer of Code student in 2005 and since then has completely immersed herself in contributing to open source. Her work includes core patch review, improving the user experience of Drupal through the Spark project, testing and quality assurance efforts, improving and fixing documentation, and general community cat herding. She lives near Vancouver, British Columbia, Canada with her wife Marci. She's obsessed with Drupal, working with open source and getting new people (especially women) involved, as well as just geeky computer stuff in general. I should really put something else here someday.

:P Media mentions: This is why you have printing problems! WineHQ Forums Index. Xandros: Linux Desktop and Server Operating Systems. Raiden's Realm | Your Linux Community. Oversimplified DNS - Start of Authority (SOA) ... or, even a rocket scientist can understand DNS Step 3 - Verify SOA (Start of Authority) GOAL: Find your SOA record and make sure that it is accurate. BACKGROUND: The SOA record has core information about your zone. It defines which server is your primary nameserver, your contact information (E-mail), how your secondary nameservers get updated, and the default (minimum) Time-To-Live values for your records. Step 3a: Get your SOA data To get your SOA data, you can use NSLOOKUP or DIG (or any other program, or a web site, that can query DNS records from a nameserver you choose).

Using NSLOOKUP, enter "server nameserver.example.com" (do this once for each nameserver on your list, replacing "nameserver.example.com" with one nameserver at a time). Using DIG, enter your domain name as the domain name to query, and enter each server from the list you wrote down (one at a time), and look at the SOA or "Zone of Authority" section. Problem? Problem? Zamzar - Free online file conversion. Gallery | Your photos on your website. The official U.S. time - clock. GNU Image Manipulation Program. The GNU Image Manipulation Program. Free File Hosting and Online Backup Storage. Matt's Script Archive, Inc. :: Free Perl CGI Scripts.

Permissions. In FreeBSD, every file and directory has an associated set of permissions and several utilities are available for viewing and modifying these permissions. Understanding how permissions work is necessary to make sure that users are able to access the files that they need and are unable to improperly access the files used by the operating system or owned by other users. This section discusses the traditional UNIX® permissions used in FreeBSD. For finer grained file system access control, refer to Section 14.9, “Access Control Lists”. In UNIX®, basic permissions are assigned using three types of access: read, write, and execute.

These access types are used to determine file access to the file's owner, group, and others (everyone else). The read, write, and execute permissions can be represented as the letters r, w, and x. They can also be represented as binary numbers as each permission is either on or off (0). Table 4.1 summarizes the possible numeric and alphabetic possibilities. 4.4.1. World Wide Web Consortium (W3C) Welcome to the Tclers Wiki! Niles Family Web Site. Erase Cell Phone Data with ReCellular's Data Eraser. Firefox Browser | Customize your Web with free add-ons. Firefox's toolbar provides easy access to common features. Do you miss something you use a lot? The toolbar is easy to customize. Is there something you don't use all the time? Try adding it to the overflow menu. We'll show you how. You can change the items that appear in the overflow menu or your toolbar.

Click the menu button , click and choose . Tip: Here's another way to open the Customize Firefox tab: Right-clickHold down the control key while you click on a blank spot in the tab bar or toolbar and choose from the context menu. Click the menu button , click and choose . Click the menu button , click and choose . Note: You can also turn the Bookmarks toolbar on or off from the menu bar at the top of the screen: Click , go down to and select . Click the menu button , click and choose . Try restoring the default set of buttons and toolbars by clicking the Restore Defaults button when you are in the customize mode. cPanel Forums. HTML Tip: Centering Images Is Harder Than You Think. HTML Tip: Centering Images Is Harder Than You Think by Larisa Thomason, Senior Web Analyst, NetMechanic, Inc. We frequently get questions from subscribers who are having problems centering images - particularly when they're mixing the ALIGN attribute with style sheet properties.

There are two main causes: HTML rules and browser compatibility issues. Some Elements Center, Others Don't! First, remember that the ALIGN attribute is a deprecated HTML attribute, meaning it's marked for deletion in future versions. Since ALIGN may not behave as you expect, how should you center an image? Your first thought is probably to include the align="center" property/value pair to your image tag. <p align="center">paragraph content here</p><table align="center">table content here</table><div align="center">div content here</div><h2 align="center">header content here</h2> The content inside those tags centers reliably across browsers because they're block-level tags. Deprecated Alignment Strategies.

HTML Goodies: The Ultimate HTML Resource. What is FastCGI? - Definition from Whatis.com. The Django Book. Programmer's Heaven - Ruby, .NET, C#, C++, PHP, Python, Java - It's all here! Baudot code. The Baudot code, invented by Émile Baudot,[1] is a character set predating EBCDIC and ASCII.

It was the predecessor to the International Telegraph Alphabet No. 2 (ITA2), the teleprinter code in use until the advent of ASCII. Each character in the alphabet is represented by a series of bits, sent over a communication channel such as a telegraph wire or a radio signal. The symbol rate measurement is known as baud, and is derived from the same name. History[edit] Baudot code[edit] Technically, five bit codes began in the 16th century, when Francis Bacon developed the cipher now called Bacon's cipher. However, this cipher is not a machine cipher and as such is not readily suitable for telecommunications.[2] Baudot invented his original code in 1870 and patented it in 1874. The table above "shows the allocation of the Baudot code which was employed in the British Post Office for continental and inland services.

Murray code[edit] Paper tape with holes representing the "Baudot Code" ITA2[edit] Presentation Zen. Help. Keyboard Shortcuts for Windows - The solution. Whether you are working with General Folder, Word, Excel, PowerPoint or Internet Explorer and Media Player, all the shortcuts are provided in this article.

The use of a Windows operating system can be made easier and quicker with the use of keyboard shortcuts and combinations of various keys. This article explains the shortcuts used for different applications such as Microsoft Word, Excel and PowerPoint. Although many shortcuts are already well known, this article also provides an insight into those that are less commonly used. Needless to say, keyboard shortcuts reduce the time and effort of using the mouse while working. This article lists the most common shortcuts used in a Windows operating system. The keyboard shortcuts can be used in different ways, such as: Navigation (running a new application, showing the desktop, locking the desktop, etc.) Power management (shutting down the computer, restarting the computer, etc.) Windows system In a General Folder and text programs See also.

Russ Haynal&#039;s ISP Page. Major Internet Backbone Maps - sorted by "connectivity" as per CAIDA's AS Rank and "Skitter AS Internet Graph" AS 3355 - Level 3AS 174 - Cogent AS 3257 - GTT / Tinet AS 1299 - TeliaSoneraAS 2914 - NTTAS 6453 - TATA CommunicationsAS 6762 - Italia Sparkle /Seabone AS 6939 - Hurricane ElectricAS 2828 - XO CommunicationAS 3549 - See Level 3AS 1273 - Vodafone / Cable & Wireless AS 3491 - PCCW / Beyond the Network America AS 6461 - Zayo Group / AbovenetAS 3320 - Deutsche Telecom AS 20485 - TransTeleKom AS 9002 - RETN AS 7018 -AT&T map, AT&T , AT&T AS 701 - Verizon /UUNET AS 209 - Centurylink / QwestAS 1239 - Sprint AS 4323 - TW Telecom - See Level 3AS 12389 - Rostelecom Maps of sub-marine communications cables Exchange Points: Internet Related Organizations: Contact me at 703-729-1757 or Russ 'at' navigators.com If you use email, put "internet training" in the subject of the email.Copyright © Information Navigators.

SourceForge : Project Home. Word 2007 Shortcuts for Inserting Accents and Symbols. You can use shortcuts to insert accented characters and common symbols into your Word documents. For example, you can type deja vu or get fancy and type déjà vu or café or résumé. Diacritical symbols appear over certain letters in foreign languages and in foreign words borrowed into English. To create a diacritical symbol when you’re typing in Word 2007, you press a special Control-key combination. The one you press somewhat represents the diacritical symbol you need, such as Ctrl+’ to produce a ’ diacritical. For example, to put an é into your document, press Ctrl+’ and then the letter E.

Ctrl+’ followed by a D equals Ð (or ð). Be sure to note the difference between the apostrophe (or tick) and the back tick, or accent grave. For the Ctrl+@, Ctrl+:, Ctrl+^, and Ctrl+~ key combinations, you also need to press the Shift key, which is required anyway to get the @, :, ^, or ~ symbols on your keyboard. The Word 2007 AutoCorrect feature has been trained to know certain special characters. 1. Google Apps. Used Cell Phones and Used Mobile Phones from ReCellular. Why Most PowerPoint Presentations Suck...and how you can make them better. On-screen Russian keyboard Kbd.RusWin.net, Virtual Keyboard for Russian and Ukrainian.

ClaimID.com - Manage your online identity. AutoIt v3 - Automate and Script Windows Tasks - For Free! AutoIt v3 is a freeware BASIC-like scripting language designed for automating the Windows GUI and general scripting. It uses a combination of simulated keystrokes, mouse movement and window/control manipulation in order to automate tasks in a way not possible or reliable with other languages (e.g. VBScript and SendKeys). AutoIt is also very small, self-contained and will run on all versions of Windows out-of-the-box with no annoying “runtimes” required! AutoIt was initially designed for PC “roll out” situations to reliably automate and configure thousands of PCs. Features: AutoIt has been designed to be as small as possible and stand-alone with no external .dll files or registry entries required making it safe to use on Servers. Also supplied is a combined COM and DLL version of AutoIt called AutoItX that allows you to add the unique features of AutoIt to your own favourite scripting or programming languages!

Take me to the downloads page! Features Basic-like Syntax and Rich Function Set ).

Pearltrees videos

Da tubes. GLLUG. Basic vi Commands. What is vi? The default editor that comes with the UNIX operating system is called vi (visual editor). [Alternate editors for UNIX environments include pico and emacs, a product of GNU.] The UNIX vi editor is a full screen editor and has two modes of operation: Command mode commands which cause action to be taken on the file, and Insert mode in which entered text is inserted into the file. In the command mode, every character typed is a command that does something to the text file being edited; a character typed in the command mode may even cause the vi editor to enter the insert mode.

In the insert mode, every character typed is added to the text in the file; pressing the <Esc> (Escape) key turns off the Insert mode. While there are a number of vi commands, just a handful of these is usually sufficient for beginning vi users. NOTE: Both UNIX and vi are case-sensitive. To Get Into and Out Of vi To Start vi To use vi on a file, type in vi filename. To Exit vi Moving the Cursor Changing Text. How Open Source Software Can Improve the Library - DegreeTutor.com. Remember a time when doing research required us to have to go to the library? Your school had one, and that's probably where you spent most of your library time. If it wasn't your school, then it was probably your local town or city library. Some of these libraries may have been tiny little holes in the wall with just a few thousand books while others were huge university libraries with 10,000 of books, magazines, newspapers, cd, microfiche, and more.

The depth a library can have can range greatly; it all depends on how much money that library gets in funding. The big college libraries obviously get the most due to the fact that they are part of an actual business model that produces a significant amount of money. Public libraries on the other hand only get what the government gives them, which in smaller municipalities can be very little. Organizing Libraries For many libraries, organizing books and other media can be a daunting task, especially as the library grows with more material. 59 Open Source Tools That Can Replace Popular Security Software — Datamation.com.

It's been about a year since we last updated our list of open source tools that can replace popular security software. This year's list includes many old favorites, but we also found some that we had previously overlooked. In addition, we added a new category -- data loss prevention apps. With all the attention generated by the WikiLeaks scandal, more companies are investing in this type of software, and we found a couple of good open source options. Thanks to Datamation readers for their past suggestions of great open source security apps. Anti-Spam 1. ASSP (short for "Anti-Spam SMTP Proxy") humbly calls itself "the absolute best SPAM fighting weapon that the world has ever known! " 2. Used by more than 100,000 sites, MailScanner leverages Apache's SpamAssassin project and ClamAV to provide anti-spam and anti-virus capabilities. 3.

This Apache project declares itself "the powerful #1 open-source spam filter. " 4. Anti-Virus/Anti-Malware 5. 6. Anti-Spyware 7. Application Firewall 8. 9. Backup. Desktop. BurningIsoHowto. Window Managers for X. Free Geek. Download.

Fonts

AutoHotkey - Free Mouse and Keyboard Macro Program with Hotkeys and AutoText. Welcome to Career Cruising. Web Developer. About. Google. Search - Web Search. TorrentFreak | Torrent News, Torrent Sites and the latest Scoops. Support & Drivers : CanoScan 8600F. DVD Player and Blu-ray Player region codes. Ten Dying IT skills. Binary to Text (ASCII) Conversion. A Beginner's Guide to CDOSYS. :: BIOSMAN Inc :: AMI BIOS BEEP CODES: AMI BIOS REPLACEMENT.

15 Essential Checks Before Launching Your Website - Smashing Magazine. 10 lightweight apps to make older PCs fly. Expect. Contact Toshiba. Welcome to Dell Technical Support. Dell – The Official Site. Booting. Microsoft Support. "System error 5 has occurred. Access is denied." error message may appear. MicroATX.

Drupal

Hardware. Sansa. PlayPhone - Hot Ringtones, Mobile Games, Wallpapers, and Videos!