Quick and easy fixes using mail

Developing the core is pretty serious business, involving pretty serious computer science. But the existence and popularity of the Windows Subsystem for Linux (WSL), as well as more recently announced capabilities like the Windows port of Docker, including LCOW (Linux containers on Windows) support, are evidence of the impact that …

more ...

Installing a web server under Cub Linux

As the writing process writes to the pipe, bytes are copied into the shared data page and when the reading process reads from the pipe, bytes are copied from the shared data page. To make it easy to find, the current, running, process is pointed to by the current pointer …

more ...

Fall in love with atq

Behavior changes and features are added. Aliases are expanded when the function definition is read, not when the function is executed, because a function definition is itself a compound command. As long as the system appears to be free of critical or oft-manifesting bugs, it is considered ``stable' and new …

more ...

Old school Linux with the telnet utility

In the Linux world, a large number of users will always prefer to compile applications from source, rather than using an installer package. Outsource open source software development to O2I and benefit from high-quality services at a cost-effective price. However, that can leave your Linux system vulnerable to attack, and …

more ...

Create your own video streaming server with BioKnoppix

As a result, software developers choose a programming language to create source code based on ease of use, functionality, and comfort level. The currently pending signals are kept in the signal field with a mask of blocked signals held in blocked. The POSIX standard was born in 1988, as well …

more ...

Focus on the outcome when using cdparanoia

It also helps to know how to access the Internet and be able to do basic web searches with a search engine such as Yahoo or Google. Of course, we knew that all along. This means that subsequent INET socket calls can easily retrieve the sock data structure. For example …

more ...

Understanding the backup generator game

Named pipes (often called FIFOs, short for "first in, first out") are an interprocess communication (IPC) mechanism that provides a communication channel over a file descriptor, accessed via a special file. I say somewhat, because the use of sed in conjunction with pipes is somewhat more comfortable (at least to …

more ...

How to set up the Perl environment on Ubuntu

A keyboard is an example of a character device. Not only you earn more capabilities as a developer, you also learn (sometimes the hard way) how to solve issues, monitor your machine for potential problems, configure different components and more. However, free software itself is not. The takeover of software …

more ...

Answered - your most burning edquota questions

However, this is no less "programming" than anything else. On these foundationless grounds, what would be the problem with using Skype and locking not only yourself, but also all of your friends, into one company's software and protocol? It uses YUM for package management. A host wishing to know the …

more ...

Docker and CRUX

Many developers believe this open-source model makes Linux inherently more secure than a proprietary operating system. You can find good software out there for processing your access file. Each type of device has its own special device file. A block is usually a power-of-two multiple of the sector size.

Old …

more ...

How can I help with Linux?

The access file logs every visit to your web site. For example, a processor could execute an instruction every clock pulse. A way to prevent that is regular updates and only download software, themes and plugns form reliable sources. It looks at each member of the operations pending queue (sem_pending …

more ...

Using the rev tool on Kali

Finally there is the main memory which relative to the external cache memory is very slow. Yes, it behaved slightly differently, but I found I could be much more efficient - while using Free Software! There are various other techniques how to define shell interpreter, but this is a solid start …

more ...

Can you install Kubuntu on the Rasberry Pi?

Because of the diversity of the Linux community and the many needs which the software is attempting to meet, not eveything can be taken care of for you all of the time. Quite the contrary, the artisans and artists who craft software which can be shared, improved, and shared again …

more ...

What's the purpose of the CHECKSUMS.md5.asc file?

As you can see, long hand command line options begin with two dashes ( -- ) and short hand options begin with a single dash ( - ). Use man command to display manual page of any desired command. There are several good reasons for becoming familiar with Linux. Where do you think Microsoft gets its …

more ...

Listen to the radio at the DamnSmallLinux command line

Proficiency with the proprietary Unixes has always been considered valuable, and it is well rewarded in the job market. The results of such concurrent accesses rely on the ordering of the individual operations, and are generally unpredictable. But I don't see the need for a true Linux Advocate to spotlight …

more ...

A simple guide to cardctl

Linux systems always have a root filesystem. Linux does not. Signals have no inherent relative priorities. Even in the days before the Internet, information and so-called "intellectual property" could still be, and were, exchanged.

A simple guide to resize2fs

Each process consists of one or more threads of execution (usually …

more ...

as tsort gone past its sell by date?

For example, software that can be freely modified but that does not have the same strict requirements for redistribution as the GPL is also considered open source. This means that it's not enough for a Linux platform to support what an enterprise needs right now. People who are completely new …

more ...

Running swapper inside a docker image

The Watergate scandal leaked to the press through one of US President Nixon's most trusted colleagues. Device drivers have to be careful when using DMA. By the time I was done, I had actually forgotten how to use my old piece of proprietary garbageware. Linux is open-source.

How much do …

more ...