> From: Indunil Jayasooriya
> > >
> > > [root@centos67 loop]# cat file1
> > > firstname1
> > > firstname2
> > >
> > > [root@centos67 loop]# cat file2
> > > lastname1
> > > lastname2
> > >
> > > I need a OUTPUT like this
> > >
> > >
> > > *firstname1 lastname1firstname2 lastname2*
> > >
> > >
> >
I used gnome for years. Until gnome 3. It struck me a huge step in the
wrong direction, and made me have to fish around to do things that used to
be easy.
I've used mate, xfce, and kde since then, all of which I find more user
friendly. Gnome devs seem to think that they are empowered to tell user
On Wed, Jun 15, 2011 at 10:07 PM, Fajar Priyanto wrote:
>
> Btw, I've checked. My room humidity is 23%. That should be ok,
> shouldn't it? But still I saw the spark.
Very early in this thread Benjamin Franz posted this:
"Low humidity would be my first guess. The relative humidity in your
server
On Sun, Jun 12, 2011 at 4:59 PM, R P Herrold wrote:
> This was covered by me in a blog post some time ago, as to my
> approach:
>
> http://orcorc.blogspot.com/2010/06/reading-logs-part-3-run-your-updates.html
>
> The rationale for having a redirect (offsite, back to the
> proper's localh
On Sun, Jun 12, 2011 at 3:19 PM, Jason wrote:
>> When you see attempts to fetch things that are not installed on your
>> system it is usually someone up to no good.
> Well, I was creating ReWrite rules and directing to 301 when something came
> in that was not on my system, but it does involve al
On Sun, Jun 12, 2011 at 1:49 PM, ken wrote:
> That's interesting and useful in its way. But I'd prefer to use the
> same scripts used by the actual crackers/bots. Not only would I be able
> to test my sites with them, but I'd be able to recognize the
> probes/attacks when they appear in logs as
6 matches
Mail list logo