Here is a good photo, that Andy Cromwell took, its some of the Rendell clan supporting the Tewkesbury Tigers under 9’s In the photo is my Dad, and 3 sons Max, Miles and Mason GO TIGERS!!!!!!
Olivia has decided that she wants to decorate her room, so she went out shopping this afternoon with Elaine to buy some accessories. She has brought new curtains and bedding, a light shade and a matching lamp shade and some new cushions.
Today the various Tewkesbury Tigers rugby teams were playing against Drybrook RFC. The under nines were playing away, everyone met at the Tewkesbury club house and left for Drybrook at 09:30. The weather was good, the sun was shining 🙂 a great day for driving through the Forest of Dean.
What you are trying to accomplish here is to have one resource (either a page or an entire site) redirect a visitor to a completely different page or site, and while doing so tell the visitor’s browser that the redirect is either permanent (301) or temporary (302). Microsoft’s Internet Information […]
Custom rules can be created for Spamassassin, I use a hand written list thats customised for my needs. The location of the file is /etc/mail/spamassassin/98_myrules.cf The file name is not important, the format of the file is as follows:- body LocalStockRule /putcompanynamehere/ describe LocalStockRule Local Stock Name Block score LocalStockRule […]
We will be leaving the club at 09:30am on Sunday, so please be at the club prior to this time. Drybrook RFC Mannings Ground Drybrook Gloucestershire GL17 9EU
Linpus on an Acer Aspire One netbook, does not ship with an SSH client. To be fair its not probably needed by the average user. When I use my wifes AA1 to check my linux mail servers (postfix). I found that I could not SSH so had to install it […]
Copy folder using command line This is an example how to copy a folder using the command line. i.e I want to copy the folder ‘Aqua’ on my desktop to /usr/share/amsn/skins. What is the command using the terminal? sudo cp -R ~/Desktop/Aqua /usr/share/amsn/skins/ Sudo is because you need root privileges […]
OK, we live in the wonderful world of Linux. BUT, for many of us, having to deal with Windows is a fact of life. For example, you may want to use a Linux server to back up Windows files. This can be made easy by mounting Windows shares on the […]
To change the DHCP lease period for a Zyxel P-660R-D1 router, telnet into the router and at the command line type “ip dhcp enif0 server lease 120” This will set the DHCP lease tim to 120 seconds. If you wanted to have the lease time set to 1 hour you […]
The virtual machines default store is located in;- \var\lib\vmware\Virtual Machines This is for Centos. The position of the default store on Windows is;- c:\Virtual Machines
The below will show you how to add the Dag Wieers repository to Centos 5.3 I have also used this method for lower versions of Centos as well. First you need to run this code from the console or via putty. rpm –import http://dag.wieers.com/rpm/packages/RPM-GPG-KEY.dag.txt In order to add this repository […]
Its gone so fast 🙁 but we have done so much 🙂 Today we visited the Chrysler Building. The Chrysler Building is an Art Deco skyscraper in New York City, located on the east side of Manhattan in the Turtle Bay area at the intersection of 42nd Street and Lexington Avenue. […]
We use cookies to optimise our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.