ALLInterview.com :: Home Page            
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   ERRORS new
   Refer this Site  Refer This Site to Your Friends  Site Map  Bookmark this Site  Set it as your HomePage  Contact Us     Login  |  Sign Up                      
Google
   
 
 Categories >> Software >> Operating Systems       
 
  Windows (339)   Linux (451)   Unix (455)   Solaris (781)   RTOS (43)
  Bulnex (4)   Operating Systems General Concepts (261)   Data Structures (67)   Operating Systems AllOther (48)
 
Suggest New Category 
 


 

  Question  Asked @ Answers Views     select
 
1. Why "d" is postfix in almost every service name of Linux like httpd, dhcpd? 2. how to restrict su & ssh services for some users? 3. how can we configure a default gateway for 10 n/w cards in a server?  6  2033
what is differnce between boot -s and boot -S ?  3  1907
how to add the more than one number of pkg at a time in solaris  2  1027
I AM MR SAGAR HAVING SUN SOLARIS 10, I AM NOT ABLE TO BROWSE THE INTERNET... I AM NOT HAVING NETWORK DRIVER WHICH SUPPORT SUN SOLARIS 10. I AM HAVING RTL 8111B GB LAN .BUT I AM HAVING RT8111B GB LAN DRIVERS WHICH SUPPORT XP,VISTA,UNIX,LINUX ...BUT IT NOT SUPPORTING FOR SUN SOLARIS 10 ...PLEASE GIVE A DETAILS FOR HAVING DRIVER AND HOW TO ACTIVATE THE NETWORK TO BROWSE THE INTERNET THROUGH SUN SOLARIS 10 THROUGH MOZILLA FIRE FOX ....MY E_MAIL ADDRESS IS \r\nsagar_nithin@yahoo.com  1  606
what is the difference between exchange server 2003 and exchange server 2007 Wipro  1  1006
I have 2 PC one winxp system with 160 gb HDD,2 GB Ram and another with 512 RAM , Pxe boot support onboard lan port but without HDD. My question is that can i boot my second pc without HDD via network and use or access winxp machine to store data ? and how ?  2  960
Write a cron entry for the following scenario:- At 10:30 AM for every Sunday of every 1st month of a quarter. HP   7  2860
How to transfer a file from windows xp to RHEL5(LINUX) with bootable os?.... Infosys  5  2569
what is difference between IRQ and FRQ ? Bosch  4  8636
who invented unix? Wipro   3  2397
what are the init levels in Linux?  2  1658
Explain Backup Managment commands in Linux.  5  1732
Compare between SYS V launched processes and Xinetd processes in Linux.  1  1471
presently am using vista ......i want 2 format vista and i want 2 freshly install xp but but the system is not yet formatting it is formatting with vista but not with xp.....though i used many xp cds. same pblm....... it is displaying the following error a plm has been dected and windows has been shut down to prevent this damage tecnical information: stop(0*0000007b (0*f7802524,0*c0000034,0*00000  0  249
What is file constructing in UNIX/AIX ? IBM   2  2804
E-Mail New Answers        Answer Selected Questions       
Prev    1   ... 12   ... 23   ... 34   ... 45   ... 56   ... 67   ... 78    88   [89]    90  ... 100   ... 111   ... 122   ... 133   ... 144   ... 155    Next
 
 
 
 
 
Un-Answered Questions
 
 Question Views Asked at   Select
 
describe my computer and my documents folders. identify the elements that are present in every window. 3253 IBM
why it is difficult to store linked list as an array? 23  
1.Have you used vxboot ? 2.Minimum requirement for mirror volume to created ? 136 Wipro
environment? Is it heterogeneous (mix of linux, solaris,other UNIX)? 322 Wipro
Which is the data member common to all the kernel object and what is the use of it? 359  
what is the excat control flow when we start a computer,specially including POST operation and Mostly the roleof the Kernel File? 210 HCL
Give some examples of use of thread in a single user multiprocessing system 868  
can any one send me one project on linux ...? 35  
List reasons why a Mode switch between threads may be cheaper than a Mode switch between processes. 450  
Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks? 568  
What is the configuration of the system u use at home? 331  
What is Duplicate Handle? 468 CTS
E-Mail New Answers        Answer Selected Questions
 
 
 
 
 
 


   
Copyright Policy  |  Terms of Service  |  Articles  |  Site Map  |  RSS Site Map  |  Contact Us
   
Copyright 2013  ALLInterview.com.  All Rights Reserved.

ALLInterview.com   ::  KalAajKal.com