How to set up the Delphi environment on Ubuntu

The instructions executed by the processor are very simple; for example ``read the contents of memory at location X into register Y'. The target host that owns the IP address, responds with an ARP reply that contains its physical hardware address. Staff and students in the school have the tcsh …

more ...

Getting your Audio player up and running on Linux

True, they are often needed for one project or another and can be well worth the cost, but for a beginner or a learner -- and for many professionals -- free software is simply irreplaceable. It also sets up the file data structure describing this character special file, making its file operations …

more ...

How easy is it to learn the lxc utility?

Every device in the system is represented by a device special file, for example the first IDE disk in the system is represented by /dev/hda. But there may have a possibility of spreading malware to the Linux based systems if they are connected with Windows based systems. This is …

more ...

Installing a web server under Network Security Toolkit

There are also numerous completely free resources available on the Internet, including (1) tutorials, (2) books and (3) newsgroups. This might seem a very unreliable method but every process in the system is making system calls, for example to write a character to the terminal, all of the time. In …

more ...

Succeed with RedHat on Linux

If a developer needs a VM or if IT Ops needs to provision a server, they expect to do so quickly and painlessly; Linux's scalability allows for this rapid provisioning, as does its lack of cost-prohibitive licensing. The Linux command line offers a wealth of power and opportunity. A good …

more ...

At the command line with tcpdump

The API user (generally, the higher-level software) has zero input into the API and its implementation. The file position starts at zero; it cannot be negative. Processes are generally associated with a user's login group, not any of the supplemental groups. (Even of the large corporately-funded developer base, many have …

more ...

Getting to grips with yum on the terminal

The major identifier for the primary IDE controller is 3 and is 22 for the secondary IDE controller. The GPL subsequently became by far the most widely used license for free software. The analogy is also frequently made with recipes for cooking food. Multiple processes are free to read from …

more ...

What's your favourite Widget engine

There are many ways to make money, so why choose a method that requires investing just as much time and effort into making software that lots of people want to use as trying to prevent the usage of said software? Most shells offer a similar set of internal commands, but …

more ...

Can you install Yellow Dog Linux on the Rasberry Pi?

The numbers are different for an Alpha AXP Linux box. I am a composer, and one of the biggest hurdles for me in switching to exclusively Free Software was my sheet music typesetting software. The IDE subsystem registers IDE controllers and not disks with the Linux kernel. A common sector …

more ...

How logname can help power your webapp

When a user-space application requests that a given filename be opened, the kernel opens the directory containing the filename and searches for the given name. If the expiry time for an active timer has expired (expiry time is less than the current system jiffies), its timer routine is called and …

more ...

Fall in love with pv

The first, the old timer mechanism, has a static array of 32 pointers to timer_struct data structures and a mask of active timers, timer_active. Processes can choose to ignore most of the signals that are generated, with two notable exceptions: neither the SIGSTOP signal which causes a process to halt …

more ...

Interesting apps based on make

The exact wording of a recipe as it is written by its author is protected under copyright law, but the information itself (i.e., the names of the ingredients, their quantities and the various steps in their processing) is not. Even so, if a process executes until it waits then …

more ...

How to automate ltrace

Mostly Linux kernel modules are device drivers, pseudo-device drivers such as network drivers, or file-systems. The IP protocol layer itself uses many different physical media to transport IP packets to other IP hosts. Software and other creative works enter the public domain only if the author deliberately surrenders the copyright …

more ...

How to set up the Python environment on Ubuntu

A mechanism is needed whereby activities can be scheduled to run at some relatively precise time. The registered protocol operations are kept in the pops vector, a vector of pointers to proto_ops data structures. This showcased not only how the Linux community works together to handle critical software security threats …

more ...

Docker and Amigo Linux

From there, the kernel gets the inode for plunder. You probably only have one screen, right? The routine will be called when the element on the task queue is processed and it will be passed a pointer to the data. Even when you're programming in another language, the C library …

more ...

Will LXDE work without X Windows?

The basics of Unix programming have existed untouched for decades. So, if the operation value is 2, then -2 is added to the adjustment entry for this semaphore. Linux provides kernel memory allocation and deallocation routines and it is these that the device drivers use. Relative to the on-CPU cache …

more ...

Focus on the outcome when using cdparanoia

This hides the underlying differences from the generic system calls which read and write to ordinary files. It was a failure. When it boots, it automati- cally looks for a GRUB 2 bootloader image file named grubx64.efi, also in the uefi folder on the system. Windows 10 is perhaps …

more ...

How makedbm can help power your webapp

It links the sock data structure to the BSD socket data structure using the data pointer in the BSD socket. The GNU C library provides more than its name suggests. The advocate could further explain why one particular distro was chosen and what software came pre-packaged/easily installed that made …

more ...

How to set up the Zsh environment on Ubuntu

The device driver places bytes onto the queue, one by one, and user space reads the bytes in the order that they were placed on the queue. Although Linux was only created in 1991, the number of Linux users estimated by Red Hat in 1998 was 7.5 million, and …

more ...

How much do you know about the Linux slabtop command?

insmod physically writes the address of the symbol into the appropriate place in the module. Aliases are expanded when the function definition is read, not when the function is executed, because a function definition is itself a compound command. Once connection has been made, any of the (usually) several browsers …

more ...

Interesting apps based on ifconfig

Linux runs faster than both Windows 8.1 and Windows 10 thanks to its light-weight architecture. Common feedback would include questions about how something works or why you chose a particular approach along with suggestions for improvements or requests for changes. A block device cannot transfer or access a unit …

more ...

A simple guide to ld

The saved uid stores the original effective uid; its value is used in deciding what effective uid values the user may switch to. The installation and setup process of this Linux distro for programmers is almost just like Fedora. The address bus specifies the memory locations (addresses) for the data …

more ...

Getting your CD ripper up and running on Linux

Although directories are treated like normal files, the kernel does not allow them to be opened and manipulated like regular files. Any ethernet frame transmitted to that address will be received by the addressed host but ignored by all the other hosts connected to the network. Some operating systems, such …

more ...

Quick and easy fixes using mkisofs

It will even automatically look for requests for missing or non-existent web pages, known as 404s. Most of the servers that hold the entire internet are Linux-based for many reasons that will not be listed here. The access file logs every visit to your web site. The shell program is …

more ...

Sysadmin and Devops using RedHat

So when you're writing something in your word processor and you want to check out something on the web, no need to review all your windows to find your browser, stacked all the way behind the others. Thus, the computer will request replacement of the disks during the course of …

more ...


Understanding the fundamentals of quota

By calling bash executable binary explicitly, the content of our file date.sh is loaded and interpreted as Bash Shell Script. For most users, LILO works best. A block device cannot transfer or access a unit of data smaller than a sector and all I/O must occur in terms …

more ...

Redirecting standard output on the Kubuntu operating system

Another great quality of this dependable Linux distro for developers is its software delivery method. By contrast, most software carries fine print that denies users these basic rights, leaving them susceptible to the whims of its owners and vulnerable to surveillance. Advocating Linux is rarely an easy task. The saved …

more ...

Linux adventures with ypset

However, they seem to be forgetting that, while some action we make won't directly influence everybody, every action we make affects somebody. It is vital that we keep a philosophical approach so that our beliefs stand behind our actions. This instruction causes a switch into kernel space, the protected realm …

more ...

Downloading using Gwget

This integration would result in efficient administration. Filesystems usually exist physically (i.e., are stored on disk), although Linux also supports virtual filesystems that exist only in memory, and network filesystems that exist on machines across the network. Most processes consist of only a single thread; they are called single-threaded …

more ...

How to evaluate error messages with bzless

Absolute paths specify a location (file or directory) in relation to the root directory. A 100Mhz processor will receive 100,000,000 clock ticks every second. Background processes that attempt to read from (write to) the terminal are sent a SIGTTIN (SIGTTOU) signal by the terminal driver, which, unless caught …

more ...

Work in progress asynchronous email client

One obvious part of Linux is the kernel itself; but even that would be useless without libraries or shells. A lot of commands on the terminal will rely on you being in the right location. Another great quality of this dependable Linux distro for developers is its software delivery method …

more ...

Getting a mail server up and running on Qimo 4 Kids

They will not begin with a slash. In general, failing to agree with the standards is considered a bug. Not all four entries in the partition table have to be used. None other than the system call handler!

Scan the results of parameter expansion

The list goes on. To address …

more ...

Using the cal tool on Kali

After submitting a contribution using the process described in the documentation, you will need to be available to respond to feedback. The entire Linux kernel was written from scratch, without employing any code from proprietary sources. Instead, the kernel keeps parts of the process resident in memory to allow the …

more ...

Getting up and running with Lumina

These common interfaces mean that the kernel can treat often very different devices and their device drivers absolutely the same. In order to be accessed, a file must first be opened. It has the same rights and responsibilities as any kernel code; in other words, Linux kernel modules can crash …

more ...

File formats and conventions

Because Linux has such a large number of contributors from across multiple decades of development, contacting each individual author and getting them to agree to a new license is virtually impossible, so that Linux remaining licensed under the GPLv2 in perpetuity is all but assured. They prefer the term open …

more ...

Actionable tips for mastering babeltrace

federal government. A pipe (its two file data structures, its VFS inode and the shared data page) is created in one go whereas a FIFO already exists and is opened and closed by its users. Another disadvantage of Open Source is the support service. If the expiry time for an …

more ...


Does mklost+found sometimes make you feel stupid?

If the process has not blocked the signal and is waiting but interruptible (in state Interruptible) then it is woken up by changing its state to Running and making sure that it is in the run queue. In addition to implementing the standard C library, glibc provides wrappers for system …

more ...

Acceptable parameters when the widget resource matters

Closed source software can be distributed for free or for a cost; either way, the source code for the software is unavailable from the original developers. In Linux, no further organization or formatting is specified for a file. Until Linux came along it was either Windows or Macintosh - take it …

more ...