How to install split on Suse

I am a composer, and one of the biggest hurdles for me in switching to exclusively Free Software was my sheet music typesetting software. The way that FIFOs are opened is a little different from pipes. The exact mechanism varies from architecture to architecture. Linux itself is actually just the …

more ...

Fall in love with uptime

Thus they are also called built-in commands. This means that companies can run Linux on very large and expensive hardware for big tasks, such as graphics rendering or chemical molecular modeling, as well as on older hardware, such as an old Sun UltraSPARC computer, to extend its lifetime in a …

more ...

The ultimate guide to sdiff

If you find a bug, report it! On i386, for example, a user-space application executes a software interrupt instruction, int, with a value of 0x80. However, such programs are typically also made available for free (usually as a free download from the Internet). Maybe it's a Linux firewall on a …

more ...

Identify provide font files

For block (disk) and character devices, these device special files are created by the mknod command and they describe the device using major and minor device numbers. The originator of the request, the client, creates a socket and makes a connection request on it, specifying the target address of the …

more ...

Good fortune at the terminal

Though I make no claim to it's quality, even Microsoft Windows is "free of cost" to consumers. Recently, it got a new Pixel desktop, which has improved the overall look of the OS as well. Linux affects IT operations teams, developers, network engineers, lines of business and the CIO's office …

more ...


Running Gnome on Scientific Linux

Where system programs interface primarily with the kernel and system libraries, application programs also interface with high-level libraries. This is often a good idea, because it allows use of both operating systems (although not simultaneously), and it also allows Linux to access files on the other operating system. The instructions …

more ...

Let your ALTLinux terminal speak its mind

This allows the ethernet layer to correctly receive IP packets and to pass them onto the IP layer. The boot disks are located in the bootdisks/ directory in the distribution tree. Indeed, they even have associated inodes. It is vital that we keep a philosophical approach so that our beliefs …

more ...

Getting a mail server up and running on Caldera OpenLinux

Whereas MINIX is based on a microkernel that contains the bare minimum amount of code necessary to run an operating system, Linux has a monolithic kernel, which means that functions like the file system, virtual memory, and various system calls all take place in privileged kernel space. But the existence …

more ...

Job control under Freesco

Both are very different from proprietary software (also commonly called commercial software), which is software that is controlled by a company or an individual. The other option for an account is "root." The root account enables you to do all most anything you want, to your system, as you will …

more ...

Editing with vi and dnssec-keygen

This might be a bit of a controversial statement, but I've not seen any Linux GUIs that are quite as good as Windows. In 1978, Kernighan and Ritchie wrote, "The C Programming Language," a book that is today as it was 20 years ago: THE book on C programming. Like …

more ...

The key to success with mdu

Linux and other open source projects built on top of it have helped to drive the a standardization of IT, allowing for more interoperability across the world's business environment. Many of the devices you own probably, such as Android phones, digital storage devices, personal video recorders, cameras, wearables, and more …

more ...


Here's what no-one tells you about ln

and insert it as the first line of your script. Arch Linux, the favorite Linux distribution of die-hard Linux enthusiasts, comes with Linux kernel and package manager. Linux keeps looking through the pending list from the start until there is a pass where no semaphore operations can be applied and …

more ...

How zgrep can spruce up your system

So that Linux can manage the processes in the system, each process is represented by a task_struct data structure (task and process are terms that Linux uses interchangeably). Signals have no inherent relative priorities. If you tried to code up something similar in C from scratch, you'd be looking at …

more ...

Linux CLI goodness with rpcbind

As you can see, by use of scripting, any shell interaction can be automated and scripted. A typical Linux distribution includes the Linux kernel, but it also contains many application programs and tools. The device identifier for the first partition of that disk (/dev/hdb1) is (3,65). Knowledge and …

more ...

Using the ssh-keyscan tool on Kali

Also, most OSS does not retire after a short period of time because collaborative open source development results in constant software improvement geared to the needs of the users. This software universe had been going on behind my back for years. Files may reside in any of these directories. There …

more ...

Answered - your most burning xargs questions

Dynamically loading code as it is needed is attractive as it keeps the kernel size to a minimum and makes the kernel very flexible. For DOS formatted disks, those formatted by fdisk, there are four primary disk partitions. Linux is that power. The originator of the request, the client, creates …

more ...

Linux adventures with amixer

Even so, most software developers, even those who have grown up during this venerable "Linux revolution" have at least heard of Unix. While early drones relied on proprietary operating systems, the boom in drone flight is helped onward by Linux, which provides the tiny embedded operating systems necessary to run …

more ...

Types of Hackers

In the most elemental definition, hacking can be described as the act of exploiting the weaknesses and shortfalls in a computer system, as well as the network of such a system. In the exploitation of these weaknesses, illegal acts might include stealing private information, accessing a network’s configuration and …

more ...

Getting Gnome Flashback to work with a dual screen monitor

The kernel allocates a new module data structure and enough kernel memory to hold the new module and puts it at the end of the kernel modules list. By virtue of its open source licensing, Linux is freely available to anyone. People who develop OSS commonly use the Internet to …

more ...

Starting the portmap/rpcbind daemon at boot time

Like interrupts, some devices have a fixed DMA channel. Most processes consist of only a single thread; they are called single-threaded. The data is read by a head, which can detect whether a particular minute particle is magnetized. On GNU/Linux systems a file command can be used to identify …

more ...

How setquota can help power your webapp

When provided with a relative pathname, the kernel begins the pathname resolution in the current working directory. Linux systems always have a root filesystem. I've been in Free Software for a few years now and learned a ton from it. Modularity is common in nature, and its application to man-made …

more ...

Determine hardware resources for devices

Python has always touted itself as a "batteries included" language; its standard library contains lots of useful modules, often more than enough to solve many types of problems quickly. To understand what OSS is, you must first understand how source code is used to create programs. In all cases, bash …

more ...

Creating a SPEAKUP_DOCS.TXT file for your distro

Its latest releases often inspire the other Linux distributions to adopt new features and make changes. Just as IP packets have their own header, TCP has its own header. This integration would result in efficient administration. However, there is a fundamental difference: free software retains its copyright and is released …

more ...

Compiling your own kernel on OpenGEU

Students should, at least, be given the opportunity to see how their new tools work. If a blocked signal is generated, it remains pending until it is unblocked. It's basically community version of Red Hat without any fee or support. The BSD socket layer passes the socket data structure representing …

more ...

Download via SFTP

Most file writing occurs at the end of the file. Computer software was almost universally regarded as being akin to mathematics, i.e., something that anybody is permitted to use in any amount, with any desired modifications and for whatever purpose desired. Where in I/O space the common peripherals …

more ...

How to automate dpkg

You can easily see the exported kernel symbols and their values by looking at /proc/ksyms or by using the ksyms utility. As the writing process writes to the pipe, bytes are copied into the shared data page and when the reading process reads from the pipe, bytes are copied …

more ...

Is C Sharp the best programming language for Linux?

This is one of those arguments that sounds good superficially but which is not borne out by the evidence. If the thief runs, he/she probably won't get caught, and it is a quick way to make some extra cash. If you've always wanted to learn programming, whether you want …

more ...

Boost your mastery of hostid with these tips

Critical mass will be reached when people are given a CD that they can install just as easily as Windows and will provide them with all the tools that they are accustomed to on that platform - mostly this means a Microsoft Office equivalent. If, however, that company transitions to Linux …

more ...

Running syslogd inside a docker image

The inode is both a physical object, located on disk in Unix-style filesystems, and a conceptual entity, represented by a data structure in the Linux kernel. It may not be the best choice for word processing (or maybe it is -- read on), but many see it as an "ISP in …

more ...

Installing a web server under Moblin

Free software, as the term is usually used, and public domain software resemble each other in that both are usually free both in a monetary sense and with regard to use. Assuming that a module can be unloaded, its cleanup routine is called to allow it to free up the …

more ...

The ultimate guide to unicode_start

You can control everything from the command line. There is yet one other weakness: if a computer switches operating systems later, the long uptime is credited to the new OS. Peripherals are real devices, such as graphics cards or disks controlled by controller chips on the system board or on …

more ...

How biff can help power your webapp

The four bytes are written as four decimal numbers in the 0-255 range, separated by dots. In this case the waiting process will be suspended and another, more deserving process will be chosen to run. The most difficult part of the installation process is, without a doubt, partitioning the hard …

more ...

The ultimate guide to gs

These negative connotations include lack of quality, of robustness, of support and of long-term commitment. The shell program is what presents the prompt and accepts subsequent commands. This means that it's not enough for a Linux platform to support what an enterprise needs right now. Copyright does not protect facts …

more ...

Configuring biod in easy steps

By then, much of the GNU operating system had been completed, with the notable exception of a kernel (i.e., the core of the operating system). The device drivers for a class of block device provide class specific interfaces to the class. There is yet one other weakness: if a …

more ...

Generating use cases for Haskell

There are various other shell interpreters available, such as Korn shell, C shell and more. The first method is most often the easiest, as long as your system UEFI boot manager allows you to disable the secure boot feature. For the operating system to accomplish this, it must contain the …

more ...

How to automate numactl

Newbies can directly cat crontab file to see the syntax in case they forget it. The API merely defines the interface; the piece of software that actually provides the API is known as the implementation of the API. There are editors, compilers and interpreters for nearly every language ever created …

more ...

Instance names should not be specified when using hwclock

For those companies, Linux supports most UNIX commands and standards, which makes transitioning to Linux very easy because the company likely would not need to pur- chase additional software or retrain staff. Critics of free software often voice fears that the freedoms and low cost of free software will lead …

more ...

Creating a COPYRIGHT.TXT file for your distro

Studying in a classroom environment can be the best choice for people who (1) prefer classes to self study, (2) do not have their own computer, (3) are lacking in motivation or study skills or (4) receive some type of tuition assistance or other grants to cover the costs of …

more ...