Dear All

 I starting my hosting at Active24 .
They where expensive, and offeret nothing more then mail foward and a website foward.

I grew tired of being limited to html.

So I studied the market in Denmark, and found to my, at that time and knowledge, best  hosting firm Surftown .
For a time, I was happy. I helped Surftown , getting new costumers.
Then I started seeing the problems.
They were amateurs.
Their knowledge of hosting, uptime and security was limited to what could printed on the backside of a stamp.

I searched for a time again.

I was told that it was unwise to embark on hosting in the US, due to ping time problems.
So I was left with Scandinavia.

After a while I found Servage .

Their prices was moderst, and their claims wast. It almost looked too good, fast and technical responds, via email.

I started buying 55kr/month solution, one late night thinking, ok, this will teach me, not to host outside Denmark, where you only are protected by EU law.

 I started adding all of my current domains to Servage, then I transfered all of my files form all of my domains via ftp from Surftown to Servage .
Then I made a mysql dump of my databases from Surftown, and tried to import them to servage .

 All but one worked. Of cause it was the big, 50mb (gzip) dump of the mediawiki I am running, that failed.

I tried to import the database via phpmyadmin, no success, and the via their internal interfase (for big databases).

Still it failed, but I wrote to them. In about 30 minuts I got a technical suggestion, that I tried to follow. It failed.
I wrote a follow up, with a bit more debug information. They  gave me a pilimiarry suggesting, stating that they would look in to it ASAP.
I thought, ok this is the last I will heart from them, now they will stop returing e-mail/support tickets. But no, within hours, I got a new suggestion, with another technical referance.
The problem, was the string length, form the dump from surftown. With a new dump parameter,  I could import the database without any data loss.

I normally never, recoment firms, but with the treatment and technical support I have been getting, I am prod to have their banner on my website, next to Apache,  IPCOP and Linux.

List of common MS-DOS commands
ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in other directories when editing a file or running a command.
ARP Displays, adds, and removes arp information from network devices.
ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series of commands in a file.
BOOTCFG Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL's.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK Check the hard disk drive running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.
COLOR Easily change the foreground and background color of the MS-DOS window.
COMMAND Opens the command interpreter.
COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on another disk.
DOSKEY Command to view and execute commands that have been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original device drivers.
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable service or driver.
ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a Microsoft Windows file back to it's original format.
EXTRACT Extract files from the Microsoft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to a disk drive.
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a FTP server.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation.
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early Microsoft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer or network device.
POPD Changes to the directory or network path stored by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
REN Renames a file or directory.
RENAME Renames a file or directory.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from one location to another.

Murphys's law on: Computers and Programming

Murphy's Laws of BBS'ing
1.The day after you buy the fastest new modem, they will change the standard so that your modem can only talk to modems of the same brand (only 100 of which were ever sold).
2.The factory will ship the wrong manual with your modem and you will spend hours finding and setting dip switches that aren't even on your modem.
3.However the modem comes set from the factory, it will be the WRONG way to work on your machine.
4.No matter what solution you devise to fix a problem with your modem, it will lead to the creation of at least four other problems.
5.Whenever a caller has problems using the BBS, the user will insist the problem is on the sysop's side and the sysop will insist the problem is on the caller's side.
6.If you fail to follow the advice of more experienced modemers and use the same password on every BBS you call, someone will steal your password and make lewd comments about the sysop's mother on the boards you WERE on.
7.If you DO follow the advice of more experienced modemers and use a totally different password on every BBS you call, you will forget the password of the board where your date has left a message telling you where to meet them tonight.
8.Your spouse, who rarely visits you at your computer, will stop by at the exact moment you've receive a flirtatious page from another user...You REALLY have never chatted with them before!
9.You will always forget to disable call waiting when connected to a pay-by-the-minute BBS.
10.A truely great BBS is either illegal, immoral, or long distance from you.
11.If a file takes more than 30 minutes to download, someone in your house will pick up the phone within the last 15 seconds.
12.No matter how neutral the topic, your message will offend SOMEONE.
13.The first time you forget to scan your file downloads for viruses will be the first time in your life you'll actually get a virus.

Dijkstra's Prescription for Programming Inertia:
If you don't know what your program is supposed to do, you'd better not start writing it.

First Maxim of Computers:
To err is human, but to really screw things up requires a computer.

Gallois's Revelation:
If you put tomfoolery into a computer, nothing comes out but tomfoolery. But this tomfoolery, having passed through a very expensive machine, is somehow ennobled, and no one dares to criticize it.
Corollary - An expert is a person who avoids the small errors while sweeping on to the Grand Fallacy.

Gilb's Laws of Unreliability (see also Troutman's Laws of Computer Programming):
1. Computers are unreliable, but humans are even more unreliable.
At the source of every error which is blamed on the computer you will find at least two human errors, including the error of blaming it on the computer.
2. Any system which depends on human reliability is unreliable.
3. The only difference between the fool and the criminal who attacks a system is that the fool attacks unpredictably and on a broader front.
4. A system tends to grow in terms of complexity rather than of simplification, until the resulting unreliability becomes intolerable.
5. Self-checking systems tend to have a complexity in proportion to the inherent unreliability of the system in which they are used.
6. The error-detection and correction capabilities of any system will serve as the key to understanding the type of errors which they cannot handle.
7. Undetectable errors are infinite in variety, in contrast to detectable errors, which by definition are limited.
8. All real programs contain errors until proved otherwise -- which is impossible.
9. Investment in reliability will increase until it exceeds the probable cost of errors, or somebody insists on getting some useful work done.

Gray's Law of Programming:
n+1 trivial tasks are expected to be accomplished in the same time as n trivial tasks.
Logg's Rebuttal to Gray's Law of Programming:
n+1 trivial tasks take twice as long as n trivial tasks.

Grosch's Law:
Computing power increases as the square of the cost. If you want to do it twice as cheaply, you have to do it four times slower.

Halpern's Observation:
That tendency to err that programmers have been noticed to share with other human beings has often been treated as if it were an awkwardness attendant upon programming's adolescence, which like acne would disappear with the craft's coming of age. It has p roved otherwise.

Horowitz's Rule:
A computer makes as many mistakes in two seconds as 20 men working 20 years.

IBM Pollyanna Principle:
Machines should work. People should think.

Law of Computability Applied to Social Science:
If at first you don't succeed, transform your data set.

Laws of Computer Programming:
1. Any given program, when running, is obsolete.
2. Any given program costs more and takes longer.
3. If a program is useful, it will have to be changed.
4. If a program is useless, it will have to be documented.
5. Any program will expand to fill available memory.
6. The value of a program is proportional to the weight of its output.
7. Program complexity grows until it exceeds the capabilities of the programmer who must maintain it.
8. Any non-trivial program contains at least one bug.
9. Undetectable errors are infinite in variety, in contrast to detectable errors, which by definition are limited.
10. Adding manpower to a late software project makes it later.
11. Lubarsky's Law of Cybernetic Entomology: There's always one more bug.

Lubarsky's Law of Cybernetic Entomology
There's always one more bug.

Lyall's Conjecture:
If a computer cable has one end, then it has another.

Parker's Third Rule of Tech Support:
If you can't navigate a one-level, five-item phone tree, you didn't need a computer anyway.

Peck's Programming Postulates (Philosophic Engineering applied to programming):
1. In any program, any error which can creep in will eventually do so.
2. Not until the program has been in production for at least six months will the most harmful error be discovered.
3. Any constants, limits, or timing formulas that appear in the computer manufacturer's literature should be treated as variables.
4. The most vital parameter in any subroutine stands the greatest chance of being left out of the calling sequence.
5. If only one compiler can be secured for a piece of hardware, the compilation times will be exorbitant.
6. If a test installation functions perfectly, all subsequent systems will malfunction.
7. Job control cards that positively cannot be arranged in improper order, will be.
8. Interchangeable tapes won't.
9. If more than one person has programmed a malfunctioning routine, no one is at fault.
10. If the input editor has been designed to reject all bad input, an ingenious idiot will discover a method to get bad data past it.
11. Duplicated object decks which test in identical fashion will not give identical results at remote sites.
12. Manufacturer's hardware and software support ceases with payment for the computer.

Troutman's Laws of Computer Programming (and see Peck's Programming Postulates)
1. Any running program is obsolete.
2. Any planned program costs more and takes longer.
3. Any useful program will have to be changed.
4. Any useless program will have to be documented.
5. The size of a program expands to fill all available memory.
6. The value of a program is inversely proportional to the weight of its output.
7. The complexity of a program grows until it exceeds the capability of its maintainers.
8. Any system that relies on computer reliability is unreliable.
9. Any system that relies on human reliability is unreliable.
10. Make it possible for programmers to write programs in English, and you will find that programmers cannot write in English.
11. Profanity is the one language all programmers know best.

Turnauckas's Observation:
To err is human; to really foul things up takes a computer.

Weinberg's Law:
If builders built buildings the way programmers wrote programs, then the first woodpecker that came along would destroy civilization.
Corollary: An expert is a person who avoids the small errors while sweeping on to the grand fallacy.

Woltman's Law:
Never program and drink beer at the same time.

I am fond of computers, and use linux, as well as windows.
I also like to help other people with their problems.

Here are some of the systems I have played around with:












Microsofts kommende Windows Vista kører optimalt på en computer med dobbeltkerne-processor, 2 GB arbejdshukommelse og grafikkort med 512 MB RAM