How much do you know about the Linux slabtop command?

If you know how to setup your Arch Linux system, you don't need Manjaro Linux. If you operate within a Windows ecosystem and want to play around with Linux, just download VirtualBox and install a Linux distribution. A CPU is a small but powerful semiconductor device that can be considered …

more ...

Using more to view text files at the Morphix command line

These categories determine what powers are available to a user. We can compare and contrast system programming with application programming, which differ in some important aspects but are quite similar in others. But wait, this is a filesystem article, right? They arise from differences in their histories, in the philosophies …

more ...

Docker and Debian

Files can be opened for reading, writing, or both. The Linux kernel also employs a cache, called the dentry cache, to store the results of directory resolutions, providing for speedier lookups in the future given temporal locality. Each command comes with a manual page which can be used to learn …

more ...

A lazy person's guide to which

Technologies that matter to our freedom are used in our voting systems, our leisure, our work, education, art and our communication. If you are used to developing for Windows or Mac OS, the biggest shock when developing for Linux is probably the wide variety of Linux environments. Users are expected …

more ...

How to get more from popd

The block is an abstraction of the filesystem, not of the physical media on which the filesystem resides. No distribution of Linux is completely bug-free, so you may be required to fix small problems by hand after installation. Figure 12.1 shows that the VFAT file system module is dependent …

more ...

Shortcuts for acpid made easy

A disk drive consists of one or more platters, each made of finely polished glass or ceramic composites and coated with a fine layer of iron oxide. Freedom to choose. A block device cannot transfer or access a unit of data smaller than a sector and all I/O must …

more ...

Succeed with sha1sum on Linux

If you need special compilation options on your executable files, you can give Gentoo a try as it does everything from source. To do this the IDE subsystem uses the minor device number from the device special identifier, this contains information that allows it to direct the request to the …

more ...

How screen can spruce up your system

Finally there is the main memory which relative to the external cache memory is very slow. Nothing, though, is for free and there is a slight performance and memory penalty associated with kernel modules. federal government. Yet throughout many school systems, the software in use on computers is closed and …

more ...

Compiling your own kernel on MythDora

Users, however, refer to themselves and other users through usernames, not numerical values. Most of the Linux kernel is written in the C programming language, with a little bit of assembly and other languages sprinkled in. t first, the Linux command line may seem daunting, complex and scary. Only systems …

more ...

Is the Linux OS suited to Home theater PC devices?

Once ready, make your new file executable using chmod command with an option +x. Modules that have other modules dependent on them must maintain a list of references at the end of their symbol table and pointed at by their module data structure. It has subdirectories, they have subdirectories and …

more ...

Which distro do you prefer to use KDE Plasma on?

One module requiring services or resources from another module is very similar to the situation where a module requires services and resources from the kernel itself. This means that subsequent INET socket calls can easily retrieve the sock data structure. You also need a decent understanding of the Linux-based kernel …

more ...

The secrets behind bison

A host wishing to know the hardware address associated with an IP address sends an ARP request packet containing the IP address that it wishes translating to all nodes on the network by sending it to a multicast address. A good introductory Linux book can also be useful, but it …

more ...

The secret of ypserv

By opening the code to widespread examination, more people take part in finding its bugs and security flaws, in testing for broad compatibility across platforms, and in providing new ideas. Perhaps the most confusing thing about installing Linux for new users is the large number of options that are available …

more ...

How to automate tasks on a Linux system

Linux is a monolithic kernel; that is, it is one, single, large program where all the functional components of the kernel have access to all of its internal data structures and routines. By opening the code to widespread examination, more people take part in finding its bugs and security flaws …

more ...

How much do you know about the Linux objcopy command?

From the kernel, of which a substantial part of it is written in C, to lots of everyday user-land applications, C is used massively on your Linux system. Voting, commerce, medical records, tax calculation and collection, entertainment, all are affected by computers. All bytes in a section are treated the …

more ...

How to install scp on Ubuntu

The Unix philosophy recommended utilizing small, purpose-built programs in combination to do complex overall tasks. An exit status of zero indicates success. Dynamic new technologies such as the Java technology and XML run swimmingly on Linux, as do any number of more esoteric programming languages, from Logo and Rebol to …

more ...


Principles of LTTng-Tools under Linux

Once a system call is implemented in a stable version of the Linux kernel, it is set in stone. The use of such closed software in education may be justified only where no suitable open source solution exists. The timer bottom half handler processes both types of system timer. The …

more ...

Configuring httpd in easy steps

Installation can take a while, depending on the speed of the computer and the options selected. If you told software developers a decade ago that the Windows operating system would "run Linux" in 2016, most of them would have laughed hysterically. (There are a few instance where a particular option …

more ...

Running sshd inside a docker image

In many cases, the software's creator may have made a Linux version of the same program you use on other systems. It's Linux, not a proprietary operating system, that provides this vast scalability while also offering the underlying capabilities to abstract the various computing layers to make managing such a …

more ...

Linux CLI goodness with strace

Linux keeps looking through the pending list from the start until there is a pass where no semaphore operations can be applied and so no more processes can be woken. For example 128 or 512 bytes, even if the device driver asks for less. For developers, opening one's mind to …

more ...

Job control under Devil-Linux

A partition is a large group of sectors allocated for a particular purpose. In 1991, this final gap was filled by Linux, a kernel which was written independently of the GNU project by Linus Torvalds, then a computer science student in Finland, but which made use of GNU development tools …

more ...

Getting started with ypbind on Arch Linux

Because of POSIX standards and compliance, software written on Unix could be compiled for a Linux operating system with a usually limited amount of porting effort. When the process resumes operation it appears as if the signal handling routine were called normally. They will be the "power users" and the …

more ...

Unwrapping rshd

Where does the bash fit in? Background processes that attempt to read from (write to) the terminal are sent a SIGTTIN (SIGTTOU) signal by the terminal driver, which, unless caught, suspends the process. Advances in mathematics cannot be copyrighted or patented, and they become immediately available for everyone to use …

more ...

What's your favourite CD burners

Many of the devices you own probably, such as Android phones, digital storage devices, personal video recorders, cameras, wearables, and more, also run Linux. There are many valid reasons why something might not be accepted, so don't take it personally if your code is rejected, and if possible, try to …

more ...

Running sendmail inside a docker image

Some cross-site-scripting attacks are possible when the attacker finds a weak spot in your source code and they can even leave the malicious code dormant for a long time before executing it. Also pulling more from a cultural level than a technical one are the concepts of crowdsourcing and crowdfunding …

more ...

Principles of prelink under Linux

The module data structure is marked as DELETED and it is unlinked from the list of kernel modules. They work because they want to help themselves, their user base, or their software project. To make sure that even in a dual boot scenario office staff do not cling to their …

more ...

The secret of lprintd

This subshell reinitializes itself, so that the effect is as if a new shell had been invoked to handle the script, with the exception that the locations of commands remembered by the parent are retained by the child. Linux can do everything NT does, usually faster, definately more stable and …

more ...

My emacs and metasend workflow

Typing the suspend character (typically ^Z, Control-Z) while a process is running causes that process to be stopped and returns you to bash. One more thing, if you don't want your programming Linux distro to be devoid of systemd, there's an OpenRC spin for that. We heartily recommend you get …

more ...

The ultimate guide to rusersd

Linux does not. In this book, when I talk of gcc, I typically mean the program gcc, unless context suggests otherwise. When a user logs in, the login program checks the username and password, and then starts another program called the shell. As such it is possible to have two …

more ...

Compiling your own kernel on Trustix

The command cd may be run without a location as we saw in the shortcut above but usually will be run with a single command line argument which is the location we would like to change into. Thus they are also called built-in commands. Programmers write Linux source code in …

more ...

At the Linux terminal with bash

For the purposes of the shell, a command which exits with a zero exit status has succeeded. The amount of malicious soft- ware for Linux systems remains incredibly low in comparison to other systems, and nearly all malicious Linux software available today is designed to breach unprotected Linux-based Android smartphones …

more ...

Work in progress asynchronous email client

Sometimes the DMA channel for a device can be set by jumpers; a number of ethernet devices use this technique. The control bus contains various lines used to route timing and control signals throughout the system. If one process crashes it will not cause another process in the system to …

more ...

A simple guide to pmap

Institutions that rely solely on commercial-proprietary vendors - whether on-premises or cloud-based - effectively outsource their IT strategy and reduce their capability to deal with change with agility. The exact wording of a recipe as it is written by its author is protected under copyright law, but the information itself (i.e …

more ...

Does it run under KDE on the Cub Linux distro?

Linux is made up of a number of functionally separate pieces that, together, comprise the operating system. What is the system-level interface, and how do I write system-level applications in Linux? Windows implementation is very high-level. Remember that the shell is a program providing you with an interface to the …

more ...

How less can help power your webapp

Not often are our basic rights thought of in the context of technology, but as more and more our lives are dependent on technology, it is a rapidly growing concern. What interesting system calls are provided in Linux compared to other Unix variants? To begin with, we have to understand …

more ...

A technical overview of mtr

Software running on the CPU must be able to read and write those controlling registers. Each process is in turn associated with exactly one uid, which identifies the user running the process, and is called the process's real uid. For many people, the next step will be to carefully read …

more ...

Compiling your own kernel on Asianux

Share your personal experiences (good and bad) with Linux. They represent a totally different way of producing software that opens up every aspect of development, debugging, testing, and study to anyone with enough interest in doing so. Purchasing your own digital signature key can be expensive, and somewhat cumbersome if …

more ...

Graphical tools for manipulating PDFs on the ClusterKnoppix desktop

If they will then it removes the sem_queue data structure from the operations pending list and applies the semaphore operations to the semaphore array. As obvious as it is, it can't be understated that hardware and the planning in relation to hardware plays a substantial role in smooth Linux conversion …

more ...

Adventures with column and Arch

Well some software gives you access to the source code, such as Free and Open Source Software (FOSS) which ensures that you can know (or get checked) what exactly a piece of software will do. Free Software isn't written by machines; it is written by countless individuals that give up …

more ...