Jump to content

Doug G

Members
  • Posts

    61
  • Joined

  • Last visited

Posts posted by Doug G

  1. Fedora uses modular php.ini files located in /etc/php,d/  These configuration modules are included by the primary php.ini

    The main php.ini file is in /etc

     

    When I need to make a change to any php.ini settings in fedora I try real hard to edit or create an ini module and not edit /etc/php.ini

     

    PS - I'm using fedora 16 but I suspect the php config files are the same in fedora 17.

     

     

  2. Thank you so much for the informative reply!  I'm hoping with time that I will get better at estimating the amount of time a project will take!

     

    Thanks again,

    Nick

    Estimating is easy.  The first 80% of the project takes the first 80% of the time, and the remaining 20% of the project takes the other 80% of the time. :)

  3. WebDav is designed to offer what you want to do, but it can be a pain to get webdav setup properly.

     

    I used to use samba from linux to mount remote linux directories, but then I discovered sshfs.

     

  4. My phone becomes a wifi hotspot to my 4g broadband with the carrier's tethering option.  I think it's good for 8 or 10 computer connections.  There are also quite a few mobile wifi routers available, designed for just your situation.

     

  5. Throw in serial communication and baud for fun where you may need 10 or 11 bits per ascii character.  The different possible bit count per character is why phone modem speeds were listed in baud, not bits/sec  The only truly standard difinition is a bit, I started with an octal-based computer where each byte (yes some called octal digits bytes) was 3 bits.

     

     

  6. When you say the business is listed as the registrant, if you mean your client's business they can get in touch with GoDaddy to gain access to the registration record.  At least a client of mine was able to do a similar move with Verisign back when they were Network Solutions.  I believe they had to fax some documentation to Network Solutions to prove they were the business in question, but then they were able to get their domain back into their control from their developer (who was pulling an almost identical maneuver).

     

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.