Never mess with mtr and here's the reason why

(See "Shell Built-in Commands.") Readline has variables that can be used to further customize its behavior. This led to the development of the free software movement by Richard Stallman. If a parent process terminates before its child, the kernel will reparent the child to the init process. The price for …

more ...

At the Linux terminal with systemtap

The text section contains executable code and read-only data, such as constant variables, and is typically marked read-only and executable. At the same time, many executives have a crude interpretation of its value to corporations?"It's free, and therefore it's cheap." Slowly, that mentality is changing, but it's still true …

more ...

Virtual filesystems in VectorLinux - how do they work?

Block devices are accessed via the buffer cache and may be randomly accessed, that is to say, any block can be read or written no matter where it is on the device. Among the easiest to try at first are the text editors, word processors, image viewers, calculators and games …

more ...

What is the subhierarchy of an application

Keep in mind that these are only conventions---not rules. You can easily see the exported kernel symbols and their values by looking at /proc/ksyms or by using the ksyms utility. Traditionally, Unix programs have been single-threaded, owing to Unix's historic simplicity, fast process creation times, and robust IPC mechanisms …

more ...

Job control under Freespire

For some small business leaders I've consulted, the human factor is either a notion to be rejected or ignored. For most users, LILO works best. Kerneld is just an agent of the kernel, scheduling work on its behalf. Not often are our basic rights thought of in the context of …

more ...

At the Linux terminal with less

Its latest releases often inspire the other Linux distributions to adopt new features and make changes. By then, much of the GNU operating system had been completed, with the notable exception of a kernel (i.e., the core of the operating system). The entire Linux kernel was written from scratch …

more ...

How much do you know about the Linux mmv command?

You can also press the C key at any time to enter an interactive shell mode, allowing you to submit commands on the fly. Businesses, with no faith in their ability to succeed with Open Source, would resort to writing proprietary software that can be sold on a shelf. The …

more ...

Getting acquainted with MeeGo

Time enough for a soapbox. It could be argued that its smaller number of vulnerabilities is because of its rarer deployment, but the simplest explanation is that OpenBSD has focused strongly on security - and achieved it better than the rest. The BSD socket layer calls the INET layer socket support …

more ...

Background information on vidmode

Installation can take a while, depending on the speed of the computer and the options selected. Apart from the ability of a loaded module to crash the operating system by being badly written, it presents another danger. Each approach has its advantages and disadvantages. If your memory is like mine …

more ...

The key to success with objdump

If it does not exist, it will allocate a physical page and create a page table entry for it. This means that, when the next module is loaded, it has access to the services of the already loaded modules. The shell executes the specified interpreter on operating systems that do …

more ...

Is Cinnamon the best windows manager for Linux?

You can do almost anything with it, including software installation, application and server configurations, file system management and much more. Think about other software you use everyday that is proprietary and apply the fact that you can't be sure what it is actually doing! Networking the critical aspects of a …

more ...

Here's what no-one tells you about objcopy

There are no set boundaries or any limitations. The visibility and easy access to the source code, which I mentioned earlier, can also be a double-edged sword as bad-intentioned people can find vulnerabilities and leave backdoors for future exploits. Processes begin life as executable object code, which is machine-runnable code …

more ...

How to automate git-series

Every process except the first has a parent. So, if the operation value is 2, then -2 is added to the adjustment entry for this semaphore. It is as old as computers themselves. What does this mean to you?

At the Linux terminal with Firejail

They should not be held …

more ...

Learn mesg to further your career

Each device driver tells the operating system how to use that specific device. The process tree is rooted at the first process, known as the init process, which is typically the init program. By and throughout the 1990s, you could find MINIX installations thriving in universities worldwide-and a young Linus …

more ...

Can you install BioKnoppix on the Rasberry Pi?

In commercial UNIX development houses, the entire system is developed with a rigorous policy of quality assurance, source and revision control systems, documentation, and bug reporting and resolution. This was the beginning of techniques such as license keys. This is true even if the device is a modem being used …

more ...

Turn on assembly listings

From the filename, the kernel obtains the inode number. The command cd may be run without a location as we saw in the shortcut above but usually will be run with a single command line argument which is the location we would like to change into. A block device cannot …

more ...

Getting started with the Linux uudecode command

But Unix has a much richer history beyond those bearded C programmers from the 1970s. By the time I was done, I had actually forgotten how to use my old piece of proprietary garbageware. But all of this would likely not be possible without the real-time functionality of the Linux …

more ...

Succeed with atrm on Linux

Whereas pwd is just run by itself with no arguments, ls is a little more powerful. If this execution fails because the file is not in executable format, and the file is not a directory, it is assumed to be a shell script, a file containing shell commands. They are …

more ...

How to install mknod on Suse

In this way, the Internet acts as the glue that binds together Linux developers in particular and OSS developers in general. Built in to the structure of the command-line environment are dozens of commands and several text-based help systems. Now, imagine that the execution of all the above commands is …

more ...

What's the purpose of the GPG-KEY file?

To make sure that even in a dual boot scenario office staff do not cling to their past desktop but acclimate quickly to the new desktop simply requires a "conversion plan." All of the employees know they will have a dual boot system that is fully functional for the first …

more ...

Creating a SPEAKUP_DOCS.TXT file for your distro

Interestingly, the ability of bash scripting is also one of the most compelling reasons why programmers prefer using Linux OS. Linux has two types of system timers, both queue routines to be called at some system time but they are slightly different in their implementations. Most open source Internet tools …

more ...

Getting acquainted with Fuduntu

Of course, most system calls have only a couple of parameters. So now you are probably starting to see that we can refer to a location in a variety of different ways. The saved uid stores the original effective uid; its value is used in deciding what effective uid values …

more ...

Running nfsd inside a docker image

Because Linux has such a large number of contributors from across multiple decades of development, contacting each individual author and getting them to agree to a new license is virtually impossible, so that Linux remaining licensed under the GPLv2 in perpetuity is all but assured. Linux tracks the usage of …

more ...

Are you making these mistakes with for

The issues with the Diebold [2] voting systems in the US is testament [3] to the need for transparent systems that are trustworthy. In the above example, the vfat and msdos modules are both dependent on the fat module and so it has a count of 2. For Linux, a …

more ...


Its all about openvt

Where does the bash fit in? The keyboard, mouse and serial ports are controlled by a SuperIO chip, the IDE disks by an IDE controller, SCSI disks by a SCSI controller and so on. Linux is believed to comply with POSIX.1 and SUSv3, but as no official POSIX or …

more ...

Programming with Smalltalk on Linux

In addition to the real uid, each process also has an effective uid, a saved uid, and a filesystem uid. The terminal in Linux is a wild card. Whereas sockets communicating over the Internet might use a hostname and port pair for identifying the target of communication, Unix domain sockets …

more ...