No more mistakes with touch

The thorough and col- laborative open source approach to testing software and fixing software bugs increases the stability of Linux; it is not uncommon to find a Linux system that has been running contin- uously for months or even years without being turned off.Security, a vital concern for most …

more ...

Instance names should not be specified when using at

Indeed, in the case of Linux-based cash registers, it would in all likelihood be a security risk to release the code to a wide audience. he Linux terminal is superior to use over Window's command line for developers. The API user (generally, the higher-level software) has zero input into the …

more ...

How logname can help power your webapp

Slackware includes LILO and Loadlin for booting Slackware Linux. Instead, Linux aims toward compliance with two of the most important and prevalent standards: POSIX and the Single UNIX Specification (SUS). It is as old as computers themselves. When the systems running our voting is proprietary or closed, it means that …

more ...

My emacs and imapd workflow

There are three types of partition supported by fdisk, primary, extended and logical. The device driver maps the bytes over a seekable device, and user space is free to access any valid bytes in the array, in any order-it might read byte 12, then byte 7, and then byte 12 …

more ...

Getting C++ and Fuduntu to play nicely

The master disk on the primary controller is /dev/hda and the slave disk is /dev/hdb. It is being widely used in embedded devices such as mobile phones and PDAs (Personal Data Assistants). All the linux commands like grep, cat and ls can be pipelined easily. It sure isn't …

more ...

No more mistakes with dd

A vi-style line editing interface is also available. So that modules can use the kernel resources that they need, they must be able to find them. The GNU C library provides more than its name suggests. The operations performed may cause the processor to stop what it is doing and …

more ...

Interesting apps based on tailf

For new system timers, the entries in the linked list of timer_list data structures are checked. One of the main arguments used for Free Software is the advantage of not reinventing the wheel, yet in the case of nearly every hole in the software platform to fill, there are at …

more ...

Is Pantheon the best windows manager for Linux?

In either case, the kernel simply resolves the pathname to the correct inode. Users are expected to shell out cash and more cash for each "feature" Microsoft decided to throw their way. Compare this to a floppy disk which only spins at 360 RPM. It is a synthasisable core and …

more ...

Get rid of declare once and for all

The default action for the SIGFPE signal will core dump the process and then cause it to exit. Any of the bytes within a file may be read from or written to. Through virtual memory and paging, the kernel allows many processes to coexist on the system, each operating in …

more ...

Troubleshooting hardware problems in Gnoppix

Automation is also a game-changer using the terminal. Open source has become the de facto way to build software - not only in tech, but across diverse industries. In 1991, this final gap was filled by Linux, a kernel which was written independently of the GNU project by Linus Torvalds, then …

more ...

Getting started with the Linux modinfo command

What interesting system calls are provided in Linux compared to other Unix variants? Yet, it was relatively little used for computer software prior to the development of UNIX, and even today its great benefits fail to be fully exploited by other operating systems, most notably the Microsoft Windows systems. A …

more ...

Scripts vs Compiled Programs

When writing programs to automate – well, everything – always use shell scripts. Because shell scripts are stored in ASCII text format, they can be easily viewed and modified by humans just as easily as they can by computers. You can examine a shell program and see exactly what it does and …

more ...

Using the Linux Command Line

Working with the Linux operating system requires you to have knowledge about the terminal and the command line. It is essential to know what these things are, to be at least slightly familiar with their usage and the standard commands available. What is a Terminal? A terminal is described as …

more ...

How to set up the C environment on Ubuntu

From the inode number, the inode is found. To be safe, always put alias definitions on a separate line, and do not use alias in compound commands.and comments, except that the function name must be the first thing on the line. These extensions are collectively called GNU C, and …

more ...

Installing a web server under Network Security Toolkit

This bleeding edge distro's repository is always up-to-date. Each class of device driver, character, block and network, provides common interfaces that the kernel uses when requesting services from them. Extended partitions are not real partitions at all, they contain any number of logical parititions. (There are a few instance where …

more ...

Download via Bittorrent

It would not be enough to stop here, though. The world economy will not collapse if creators of software choose to share their work with the world. It may not be the best choice for word processing (or maybe it is -- read on), but many see it as an "ISP …

more ...

Getting the best out of atq when using Ubuntu

Therefore Linux adds a call to a tidy up routine which will restore the original blocked mask onto the call stack of the signalled process. If your computer came with a copy of Windows, then you paid for it, even if the store didn't tell you about that. This credit-card …

more ...

Answered - your most burning quotaon questions

You may have already noticed that in order to execute shell script the file needs to be made executable by use of chmod +x FILENAME command. The kernel calls the modules initialization routine and, if it is successful it carries on installing the module. The g++ C++ compiler is ISO …

more ...

A technical overview of passwd

Many times, it does this in order to avoid vice, but counterintuitively, only ends up creating more of it in the process. At kernel initialization time, the address families built into the kernel register themselves with the BSD socket interface. This subshell reinitializes itself, so that the effect is as …

more ...

Generating use cases for Objective-C

Note that HP-UX, GNU/Linux (usually), Solaris and recent releases of FreeBSD cycle back to zero after 497 days, exactly as if the machine had been rebooted at that precise point. Each hardware controller has its own control and status registers (CSRs) and these differ between devices. The reason is …

more ...

What's your favorite Linux terminal emulator?

This makes kernel memory deallocation easier as the smaller free blocks can be recombined into bigger blocks. This means that the process can continue to run. There are many ways to make money, so why choose a method that requires investing just as much time and effort into making software …

more ...

The key to success with lpstat

This is especially true for large contributions, new features, or standalone code, like a driver for a specific piece of hardware. Knowledge and information are the building blocks of change. A runnable process is one which is waiting only for a CPU to run on. In addition, in the open …

more ...

Which distro do you prefer to use KDE Plasma on?

Writing a byte to the middle of a file overwrites the byte previously located at that offset. Conceptually, nothing covered thus far would prevent multiple names resolving to the same inode. Without this surrounding commitment, IT decision-makers can be left in the dark...and that's not a good place to …

more ...

Interesting apps based on ssh-keygen

Where the timers go in the timer table is statically defined (rather like the bottom half handler table bh_base). In fact, Richard Stallman wouldn't have bothered writing the GNU system if he thought his project wouldn't mean anything. In addition, in the open source world, vulnerabilities are discussed publicly, so …

more ...

Download via SFTP

The new module also exports symbols to the kernel and insmod builds a table of these exported images. Notably, Linux is the fastest growing operating system released to date. More importantly, Linux strives to behave in accordance with POSIX and SUS requirements. WinModems lack some basic hardware on the modem …

more ...

A simple guide to ld

You can customize the terminal, try different text editors, and install desktop environment of your choice. The results of such concurrent accesses rely on the ordering of the individual operations, and are generally unpredictable. Writing a byte to the middle of a file overwrites the byte previously located at that …

more ...

Acceptable parameters when the library linker matters

The alternative is to have a micro-kernel structure where the functional pieces of the kernel are broken out into separate units with strict communication mechanisms between them. If one process crashes it will not cause another process in the system to crash. Unquoted text is assumed to be a function …

more ...

Fall in love with uptime

Thus they are also called built-in commands. This means that companies can run Linux on very large and expensive hardware for big tasks, such as graphics rendering or chemical molecular modeling, as well as on older hardware, such as an old Sun UltraSPARC computer, to extend its lifetime in a …

more ...


Running Gnome on Scientific Linux

Where system programs interface primarily with the kernel and system libraries, application programs also interface with high-level libraries. This is often a good idea, because it allows use of both operating systems (although not simultaneously), and it also allows Linux to access files on the other operating system. The instructions …

more ...

Let your ALTLinux terminal speak its mind

This allows the ethernet layer to correctly receive IP packets and to pass them onto the IP layer. The boot disks are located in the bootdisks/ directory in the distribution tree. Indeed, they even have associated inodes. It is vital that we keep a philosophical approach so that our beliefs …

more ...

Getting a mail server up and running on Caldera OpenLinux

Whereas MINIX is based on a microkernel that contains the bare minimum amount of code necessary to run an operating system, Linux has a monolithic kernel, which means that functions like the file system, virtual memory, and various system calls all take place in privileged kernel space. But the existence …

more ...

How zgrep can spruce up your system

So that Linux can manage the processes in the system, each process is represented by a task_struct data structure (task and process are terms that Linux uses interchangeably). Signals have no inherent relative priorities. If you tried to code up something similar in C from scratch, you'd be looking at …

more ...

Types of Hackers

In the most elemental definition, hacking can be described as the act of exploiting the weaknesses and shortfalls in a computer system, as well as the network of such a system. In the exploitation of these weaknesses, illegal acts might include stealing private information, accessing a network’s configuration and …

more ...

Starting the portmap/rpcbind daemon at boot time

Like interrupts, some devices have a fixed DMA channel. Most processes consist of only a single thread; they are called single-threaded. The data is read by a head, which can detect whether a particular minute particle is magnetized. On GNU/Linux systems a file command can be used to identify …

more ...

The ultimate guide to gs

These negative connotations include lack of quality, of robustness, of support and of long-term commitment. The shell program is what presents the prompt and accepts subsequent commands. This means that it's not enough for a Linux platform to support what an enterprise needs right now. Copyright does not protect facts …

more ...

Instance names should not be specified when using hwclock

For those companies, Linux supports most UNIX commands and standards, which makes transitioning to Linux very easy because the company likely would not need to pur- chase additional software or retrain staff. Critics of free software often voice fears that the freedoms and low cost of free software will lead …

more ...

Using more to view text files at the SLAX command line

There are three types of partition supported by fdisk, primary, extended and logical. The examples continue, but all hit the same chord: there is no use in preventing the spread of information. The source code for proprietary software is usually not made publicly available, or, if it is, there are …

more ...

Sysadmin and Devops using rpm

This means that when the next process that attempts to access this memory gets a page fault, the shared memory fault handling code will use this newly created physical page for that process too. Many Unix systems (such as Solaris) scale well to specific large platforms, but not as well …

more ...