Thursday, July 30, 2009

Beauty Salon Agreement Sample

CentOS Goodbye to CentOS?

CentOS is a Linux-born of the source code of Red Hat Enterprise (RHEL) - which was reinforced when Red Hat began marketing its operating system through use lincencias and supportive. CentOS on the other hand is an alternative offering free software and robust quality of RHEL without paying costly licensing and support policies to sustain the project solely on donations.
Today the team base of developers of this project, issued a letter to its founder Lance Davis.


July 30, 2009 4:39 GMT Open Letter to Lance Davis for CentOS developed members.
is unfortunate that we are forced to write this letter, we had no choice. For some time now, we have tried to fix these problems: It seems

you crawled into a hole ... and is not acceptable. For a long time

gave for granted that there would be funds for the CentOS project, to date we have not seen anything.

Only you have control of the domain 'centos.org' no one more delegate, not is appropriate.

Only you, it seems, are the one who has privileges 'Founder' in the IRC channel with no one delegate, it is not appropriate.

When I tried to communicate (Russ) to the Linux UK phone numbers or your number, I heard the message 'lines temporarily occupied' during the last two weeks. Finally yesterday, I answered an answering machine in which I left a message asking you to call me back urgently. Karanbir also reported that called you leaving unanswered messages.

CentOS Please do not kill just for the sake of being afraid to want to share management the project.

is clear that the project will die if all developers are gone.

Contact me favors, or any of the others who signed this letter to agree on the above information and keep the project domain 'centos.org'.

Firman, Russ Herrold

Angenendt
Karanbir
Ralph Singh Jim Perrin


Donavan Nelson Tru Huynh Tim Verhoeven




Johnny Hughes CentOS has been adopted by companies of all sizes to demonstrate its quality, would be a real shame that attitudes of this nature could see an end a project as good as this. Via


CentOS Linux Project In Trouble


Wednesday, July 15, 2009

How Do The Pills Yeduc Work

Who blocked my session?

Roshak published in orafaq.com I hope will be useful.
When a user or developer tells you that your session is blocked, "understanding by blocking the execution of a DML which after launch stops responding, you know how useful it can be to identify not only who is doing it, but that object is or better yet, you can identify the exact record your session is waiting to lock.

Building block I will use the table emp

SCOTT schema

. I open a SQL * Plus session and set the following parameters SQL> set sqlprompt "Session 1> Session 1 > set LINESIZE 200
update all records

Session 1> update emp 2
September 1000 * salt = 1.05;

14 rows updated.



without commit open another session of SQL * Plus variable
update SQL> set sqlprompt "Session 2>" Session 2>
and this update only one record

Session 2> update emp 2 September

salt = 1000 WHERE empno = 7369 3;
after pressing ENTER is not of immediate returns to the prompt, here's the lock.

Identifying
session that is blocking a new session in SQL * Plus check the contents of v $ lock

showing the blocks that currently exist in the base and the relationship between who blocked who, though not

explicitly SQL> select * from v $ lock; KADDR SID ADDR TY ID1 ID2 LMOD
---- REQUEST BLOCK STEM ---- -------- ------- - ------- ------- --- ---- --------- ------- -------
........ ........ ....... .. ....... ....... ....... ......... ....... .......
2887B03C 2887B068     144 TX  196639    3891       0         6     323       0
0E3CBE90 0E3CBEC0     144 TM   69948       0       3         0     323       0
0E3CBE90 0E3CBEC0     137 TM   69948       0       3         0     570       0 27CF5D14
27CF5D54 TX 196 639 3891 6 137 ; 0 570 1



last column shows the BLOCK , if a session holds a lock that in turn blocks to another you'll see that
BLOCK = 1
. Going further, you can see which session is being blocked by comparing ID1 and ID2 . The blocked session will have the same values \u200b\u200band ID1 ID2 the blocking, and, as is making the lock request can not be obtained, will REQUEST> 0 . In the above query you can see that SID 137 is blocking the SID 144. Session 1 is for SID 137 and SID 144 is Session 2 that is blocked. To make the comparison not only see data that you can execute query

following SQL> select l1.sid
6 and l1.id2 = l2.id2;

L1.SID
  3  
  6  and s2.sid = l2.sid
  7  and l1.block = 1
  8  and l2.request > 0
  9  and l1.id1 = l2.id1
 10  and l2.id2 = l2.id2;

ESTADO_BLOQUEOS
------------------------------------------------------------------------------------------- SCOTT @ testserver
(SID = 137) is blocking SCOTT @ testserver (SID = 144)

There is even more information in the table v $ lock, but to read, is then necessary to understand a little more about the types of blocks and columns cryptic
ID1 and ID2




lock type and columns ID1 / ID2
In this case the type of DML lock is unique as it was I who launched the instruction blocks. However, your can get this information from v $ lock

without much effort.

The first thing is to see the column TYPE

. There are dozens of types of locks, however, most are system. The latter are usually very brief and does not help set the library cache, undo logs, etc. if you mess with
v $ lock.
There are only three types of blocking, TX, TM and UL. UL is a block defined by the user-defined package that DBMS_LOCK. TX is a block of transaction records, is obtained each time a transaction is to alter data, regardless of the number of objects that will be involved in that transaction. columns ID1 and ID2 point to the rollback segments and the table entries transaction of that transaction.
TM is a DML lock. Obtained each time an object is altered. ID1 column

identifies the object in question.


Lock Modes can see more information by observing the lock modes TM and TX.
columns and LMOD REQUEST use both the same number as the lock modes in order of incremental exclusive: from 0 for non-blocking, up to 6 for exclusive lock. A session should be an exclusive lock TX so that you can change the data; LMOD
be 6. If you can not get exclusive lock because some of the records you want to alter are blocked by another session, then make the request for exclusive TX;
LMOD be 0 because it is not blocking, and REQUEST be 6. This can be seen in the previously executed query
KADDR SID TY ID1 ADDR ; ID2 LMOD REQUEST BLOCK STEM
-------- -------- ------- -- ------- ------- -------- -------- ------- ------- 2887B03C 2887B068     144 TX  196639    3891        0        6     323       0 27CF5D14 27CF5D54 TX 196 639 3891 6 137 , 0570 1 Session 2

observes that

ID1 and ID2 , which is requesting a lock TX ( LMOD = 0, REQUEST = 6), points to the entry of transactions and rollback of Session 1 that is what determines the session Session 2 blocks. may also find yourself with TX in mode 4 blocks of shared mode (Shared). If a block does not find any tickets available Invoked Transaction List (ITL - Interest Transaction List) and have records that will alter, then the session gets a TX lock in mode 4 while waiting for input (ITL). If you notice that there is contention on a lock object for TX-4, you will probably need to increase the INITRANS parameter . Locks TM
generally are required and acquired in mode 3, also called an exclusive shared registry (Shared-Row Exclusive) and Mode 6.

DDL operations require exclusive lock TM. (Note that the CREATE TABLE statement does not require a lock-TM and is not needed because the object in question does not exist yet!) DML operations require a Shared-Row Exclusive lock. Selected records up on v $ lock
, you can see from the TM lock levels that are of type ADDR KADDR
DML ; SID TY ID1 ID2 LMOD STEM REQUEST ; BLOCK -------- -------- ------- -- -------- -------- ------- -------- ------- ------- 0E3CBE90 0E3CBEC0     144 TM    69948        0       3        0     323       0 0E3CBE90 0E3CBEC0     137 TM    69948        0       3        0     570       0 Finding the locked object Now we know that each record points to an object TM locked, you can use the field to identify

ID1. SQL> select object_name from dba_objects WHERE object_id = 69948;

-------------------------- OBJECT_NAME ------------------------------------- EMP is sometimes enough just to know what the object is, however, can further deepen their identifying not only the object but also the data block and even the accurate record on the waiting Session 2. Finding

locked record
This information is obtained from v $ session
by the entrance to the locked session

SQL> select row_wait_obj #, row_wait_file #, row_wait_block # #

row_wait_row 2 from v $ session 3 WHERE sid = 144; ROW_WAIT_FILE
ROW_WAIT_OBJ # # # ROW_WAIT_BLOCK ROW_WAIT_ROW #
----------- - -------------- --------------- -------------
69 948 4 ; 147 0

it returns the object ID, the file number on the block in the data file and record in the block is waiting for the session. If this information sounds familiar, it is because these are the four components of an extended ROWID. You can build the extended ROWID of the record from these components using DBMS_ROWID package. ROWID_CREATE function takes these data as arguments to return the
ROWID SQL> select do.object_name, row_wait_obj #, row_wait_file #, row_wait_block #, row_wait_row #,
2 ; dbms_rowid.rowid_create (1, row_wait_obj #, row_wait_file #, row_wait_block #, row_wait_row #)
  3  from v$session s, dba_objects do
  4  where sid = 144

  5  and s.row_wait_obj# = do.object_id;

OBJECT_NAM ROW_WAIT_OBJ# ROW_WAIT_FILE# ROW_WAIT_BLOCK# ROW_WAIT_ROW# DBMS_ROWID.ROWID_C ---------- ------------- -------------- --------------- ------------- ------------------
EMP                69948              4             147             0 AAARE8AAEAAAACTAAA

with which we can inspect the registry directly

SQL> select * from scott.emp WHERE rowid = 'AAARE8AAEAAAACTAAA';

EMPNO ENAME ; JOB MGR HIREDATE ; SAL COMM DEPTNO
---------- ---------- --------- ---------- --------- ---------- ---------- ----------
      7369 SMITH      CLERK           7902 17-DEC-80        800                    20

With the above you can identify a session that is blocking and how to get the record that is blocked waiting for the session.




Thursday, July 9, 2009

Urban Decay Online Australia

very dangerous maneuver

this stunt on a motorcycle ... : S


Monday, July 6, 2009

Best 35mm Film For Retro Look

What is a 'fork bomb' and how to prevent


In computer terms, 'fork' is a reference to when a process (called

parent process) creates a copy of itself (

child process). In multithreaded environments
this means that the thread running (father) is doubled (son).

A
operation 'fork'
aside memory space for the child. The latter is an exact copy of all memory segments of the parent process, and although it implementation of a semantic question
copy-on-write
, physical memory may not be assigned (ie both processes could come to share the same physical memory segments for some time). Both the parent and the child process have the same segments of code, but run independently of one another.
Taking a brief idea of \u200b\u200bwhat it means 'fork' operating system level,
'fork bomb' is an attack in English, which implements the fork operation (or equivalent functionality).


A 'fork bomb' is not a virus and does not infect other programs or documents, nor is it a worm and recusos not using the machine network to spread, goes more in the category of
'wabbit'
. The term 'wabbit' is probably attributable to the pronunciation that makes Elmer Fudd (from Bugs Bunny cartoons)-in the English version, meaning 'rabbit', which in English means rabbit and rabbits as a "fork bomb 'has the ability to multiply rapidly and "overthrow" (disable) a system that relies on the assumption (usually valid) that the programs and processes can run simultaneously are limited. This quickly creates a large number of processes in order to saturate the available spaces in the list of processes that keeps the operating system. If this becomes saturated, you can not run another program until the end of yet another process and if this happens, it is unlikely that this program is run as each instance of the pump handle on their own to occupy any space. The following code shows what could be considered one of the 'fork bomb' finest. Submitted by
Jaromil
as a piece of art open source in 2002. Run the following 13 characters in a shell Unix-like bash or zsh. : () {: input which will be ... : # ... another copy of the function ':', which has to be loaded into memory
; # (hence,': self-killing } # end of what makes ',' ;
# Having defined ':' should now ...

:
# ... call ':', initiating a chain reaction: each ':' will launch two more. Since
':' is an arbitrary name for the function, a more understandable is:
forkbomb () {forkbomb }; Forkbomb

Other examples. Windows version using language
batch % 0 number of processes that can handle a user. When a process tries to create a new one and the user is at the limit of allowed processes, this will fail. Administrators should set this limit low enough so that if all users simultaneously launch a bomb, are enough resources to avert disaster, which is highly unlikely (that all users at the same time launch a bomb).
Unix systems usually have a limit of processes controlled by the shell command ulimit . The Linux kernel configured and respect the variable
rlimit (resource limit) of a process. In the same way in both Linux and BSD You can edit the configuration file pam_limits: / etc / security / limits.conf
and add the following line. However, check that is enabled as not all Linux distributions come with pam_limits configured by default. \u0026lt;os_user> hard nproc 200
If you do not have PAM enabled try putting the following line in your configuration file / etc / profile.conf
ulimit-u 200
Limit the number of processes a process can create not prevent a 'fork bomb' because it will be there waiting for more and more processes. A system that distributes resources fee sharing the resources of the parent could work, although such systems are not very common. Sources

Fork bomb
How to: Prevent a fork bomb by Limiting user process



Sunday, July 5, 2009

Famous Sportsmen Having Shower



MAY - JUNE "2011"
http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif

Clickea on the image to enlarge http://img514.imageshack.us/img514/4984/justcuz37ie5.gif
http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif

http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif

click on any image to enlarge http://img514.imageshack.us/img514/4984/justcuz37ie5.gif

http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif

http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif
Subscribe here: rojasluis2005 @ yahoo.com http://img514.imageshack.us/img514/4984/justcuz37ie5.gif



Clickea on image to enlarge http://img514.imageshack.us/img514/4984/justcuz37ie5.gif
http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif
http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif
http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif

Clickea on the image to enlarge http://img514.imageshack.us/img514/4984/justcuz37ie5.gif
http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif

http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif

http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif


http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif
Readers Circle
of Venezuela and Our System
. . . . La imagen “http://www.aulaclic.es/windowsvista/comunes/camera_teoria.gif” no puede mostrarse, porque contiene errores. (VIDEO)


http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif
OUR RECOMMENDED
............ .. ...... .... . ...... ...... ... . La imagen “http://www.aulaclic.es/windowsvista/comunes/camera_teoria.gif” no puede mostrarse, porque contiene errores. (VIDEO)


http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif

"Supplementary Prospectus" ; Final Bimonthly, March-April.
Some of these works, Limited Stocks. (Effective through 04/30/1911 or to exhausting existence )

Clickea on image to enlarge http://img514.imageshack.us/img514/4984/justcuz37ie5.gif

"Supplementary Prospectus" pg. 1 / 8
http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif
"Supplementary Prospectus" pg. 2 / 8
http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif

Clickea on image to enlarge http://img514.imageshack.us/img514/4984/justcuz37ie5.gif
"Supplementary Prospectus" pg. 3 / 8
"Supplementary Prospectus" pg. 4 / 8

Clickea on image to enlarge http://img514.imageshack.us/img514/4984/justcuz37ie5.gif

http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif
"Supplementary Prospectus" pg. 5 / 8
http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif
"Supplementary Prospectus" p.6 / 8

"Supplementary Prospectus" pg. 7 / 8
Clickea on image to enlarge http://img514.imageshack.us/img514/4984/justcuz37ie5.gif
http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif

"Supplementary Prospectus" pg. 8 / 8



La imagen “http://img112.imageshack.us/img112/5315/avrnzlpkugsu5.gif” no puede mostrarse, porque contiene errores.

http://www.soloimagen.net/imagenes-animadas/Lineas/Linea%20arco%20iris.gif


La imagen “http://i43.tinypic.com/214plap.gif” no puede mostrarse, porque contiene errores.


La imagen “http://byfiles.storage.live.com/y1psmxUqYnNNqUou71rgVX_Ur-Vsonaji7O07MYEQDPovrWDQsAgDFdiB2GGcup47chqHmH0yYBFg4” no puede mostrarse, porque contiene errores. La imagen “http://byfiles.storage.live.com/y1psmxUqYnNNqUou71rgVX_Ur-Vsonaji7O07MYEQDPovrWDQsAgDFdiB2GGcup47chqHmH0yYBFg4” no puede mostrarse, porque contiene errores.
http://www.soloimagen.net/public/gifs/linea-pies.gif
http://lh5.ggpht.com/vagabundia/RjFxLscd1OI/AAAAAAAAATI/HlmYclfVGjo/s144/flechaTUT.gif Contact the author by E-mail