Solved

I'd like to hire you to improve my Linux setup

Posted on 1998-01-12
1
210 Views
Last Modified: 2013-12-15
I installed Redhat version 4.2 last summer, but there are
many things that either don't work or don't work
as well as I would like.  I don't have the time
to mess around with them, but I would like to hire you
to do so.  None are essential to me, but they are worth
enough to me to pay you to do them.  The areas include:

Reading e-mail off-line (with a mime compatible mail reader)
Reading news
Tape backup
Using rdist to keep file systems in sync
Playing audio CDs on my CD player
Using my Logitech scanner
Improve ppp-on and my bootup sequence.
Make better use of my APC Backups (battery back up system),
  i.e. have it shut my system down gracefully.

BTW, I use a network provider over a 28.8K modem.  

I'll pay at least $20 for each of the above tasks.  
Send me e-mail (stanley@cs.berkeley.edu).  When you know
enough about me and my system, make a bid stating which
tasks you can do, how much you will charge for each,
when you can do the work and how much of my time you will need. Ideally, I'd prefer to deal with just one expert.

I hope to hear from you.

Ken
0
Comment
Question by:klopter
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
unicorntech earned 150 total points
ID: 1631263
Ken,

I provide this service to people on the web. Someone who will vouch for my services is lorenkia. Her email is lorenkia@kia-sequoia.com. Also with regard to payment for this I will be happy to do the above and waive the payments in exchange for a reference from you.

Let me know what you think and either comment here or email me at jasons@aone.com.au

Regards,

Jason
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I am a long time windows user and for me it is normal to have spaces in directory and file names. Changing to Linux I found myself frustrated when I moved my windows data over to my new Linux computer. The problem occurs when at the command line.…
Setting up Secure Ubuntu server on VMware 1.      Insert the Ubuntu Server distribution CD or attach the ISO of the CD which is in the “Datastore”. Note that it is important to install the x64 edition on servers, not the X86 editions. 2.      Power on th…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question