
Free Geek Welcome to the Tclers Wiki! Firefox Browser | Customize your Web with free add-ons There are many ways to customize Firefox, such as adding features to Firefox with add-ons and customizing the New Tab page. You can also customize Firefox controls, buttons and toolbars. Do you miss something you use a lot? The Firefox toolbar is easy to customize. You can rearrange the items that appear in the overflow menu or on your toolbar. Click the menu button in the top-right corner, click , and choose the option. Click the menu button , click and choose To turn on the Title bar: Put a check mark next to Title Bar in the lower left. Click the menu button , click and choose To turn on the Title bar: Put a check mark next to Title Bar in the lower left. Note: You can also turn the Bookmarks toolbar on or off from the menu bar at the top of the screen: Click , go down to , and select . Click the menu button , click and choose To turn on the Title bar: Put a check mark next to Title Bar in the lower left. You can also try the instructions in the resources below:
"System error 5 has occurred. Access is denied." error message may appear This article helps you resolve the "System error 5 has occurred. Access is denied" error message. When you run the Net View or Net Time command at the command prompt in Windows XP or Windows Server 2003, you may receive the following error message: System error 5 has occurred. Access is denied. This issue may occur for one of the following reasons: There is a time synchronization problem. For more information, click the following article numbers to view the articles in the Microsoft Knowledge Base: ( ) How to synchronize the time with the Windows Time service in Windows XP ( ) In Windows Server 2003 and in Windows XP, W32Time frequently logs Event ID 50, and poor time synchronization occurs ( ) How to configure an authoritative time server in Windows XP Additionally, go to the following Microsoft website: ( Applies to
HTML Tip: Centering Images Is Harder Than You Think HTML Tip: Centering Images Is Harder Than You Think by Larisa Thomason, Senior Web Analyst, NetMechanic, Inc. We frequently get questions from subscribers who are having problems centering images - particularly when they're mixing the ALIGN attribute with style sheet properties. There are two main causes: HTML rules and browser compatibility issues. Some Elements Center, Others Don't! First, remember that the ALIGN attribute is a deprecated HTML attribute, meaning it's marked for deletion in future versions. Since ALIGN may not behave as you expect, how should you center an image? Your first thought is probably to include the align="center" property/value pair to your image tag. <p align="center">paragraph content here</p><table align="center">table content here</table><div align="center">div content here</div><h2 align="center">header content here</h2> The content inside those tags centers reliably across browsers because they're block-level tags. Deprecated Alignment Strategies
59 Open Source Tools That Can Replace Popular Security Software — Datamation.com It's been about a year since we last updated our list of open source tools that can replace popular security software. This year's list includes many old favorites, but we also found some that we had previously overlooked. In addition, we added a new category -- data loss prevention apps. With all the attention generated by the WikiLeaks scandal, more companies are investing in this type of software, and we found a couple of good open source options. Thanks to Datamation readers for their past suggestions of great open source security apps. Anti-Spam 1. ASSP (short for "Anti-Spam SMTP Proxy") humbly calls itself "the absolute best SPAM fighting weapon that the world has ever known!" 2. Used by more than 100,000 sites, MailScanner leverages Apache's SpamAssassin project and ClamAV to provide anti-spam and anti-virus capabilities. 3. This Apache project declares itself "the powerful #1 open-source spam filter." 4. Anti-Virus/Anti-Malware 5. 6. Anti-Spyware 7. Application Firewall 8. 9. Backup
Permissions In FreeBSD, every file and directory has an associated set of permissions and several utilities are available for viewing and modifying these permissions. Understanding how permissions work is necessary to make sure that users are able to access the files that they need and are unable to improperly access the files used by the operating system or owned by other users. This section discusses the traditional UNIX® permissions used in FreeBSD. For finer grained file system access control, refer to Section 14.9, “Access Control Lists”. In UNIX®, basic permissions are assigned using three types of access: read, write, and execute. Table 4.1 summarizes the possible numeric and alphabetic possibilities. Table 4.2. Use the -l argument to ls(1) to view a long directory listing that includes a column of information about a file's permissions for the owner, group, and everyone else. How does the system control permissions on devices? Directories are also treated as files. 4.4.1. % chmod go= FILE
Window Managers for X Booting In computing, booting (or booting up) is the initialization of a computerized system. The system can be a computer or a computer appliance. The booting process can be "hard", after electrical power to the CPU is switched from off to on (in order to diagnose particular hardware errors), or "soft", when those power-on self-tests (POST) can be avoided. Soft booting can be initiated by hardware such as a button press, or by software command. Booting is complete when the normal, operative, runtime environment is attained. A boot loader is a computer program that loads an operating system or some other software for the computer after completion of the self-tests. On modern general purpose computers, the boot up process can take tens of seconds, and typically involves performing a power-on self-test, locating and initializing peripheral devices, and then finding, loading and starting an operating system. History[edit] Switches and cables used to program ENIAC (1946) Early computers[edit]