Troubleshooting hardware problems in SuSE

The other is part of OpenOffice, a full-fledged office productivity suite that is comparable to and compatible with Microsoft Office. Oracle Corporation, another heavyweight in the DBMS industry, recently announced it would be creating a Linux compatible Oracle. Likewise, some minimal restrictions are necessary for free software, namely the GPL …

more ...


Adventures with column and Arch

Some applications are written exclusively to higher-level abstractions. This means that you cannot DMA directly into the virtual address space of a process. Whenever you refer to a file or directory on the command line you are actually referring to a path and your path can be constructed using any …

more ...

Shortcuts for nameif made easy

That is, they do not require that the source code be included with redistributions of modified versions of programs that use such licenses. Also, the lack of a common kernel within Unix distributions has implications for software and hardware vendors. Software is not some mystic magic which must be locked …

more ...

Are you making these mistakes with cupsd

Most of the malware are propagated through the Internet. You might also wonder whether ext4 is still in active development at all, given the flurries of news coverage of alternate filesystems such as btrfs, xfs, and zfs. It is sad to see that people today actually have to use the …

more ...

Is Sugar the best windows manager for Linux?

The GPL subsequently became by far the most widely used license for free software. Currently, in Distrowatch's past 6 months ranking, it sits at #3. Linux is a topic which is equally suitable for study in the classroom (such as at a university or a specialized computer school) or at …

more ...

Job control under DragOnLinux

Specific filesystems, however, may impose their own restrictions, imposing a smaller ceiling on the maximum length. It is not possible to directly link user-space applications with kernel space. In many ways, Linux and UNIX administration is today much easier than administration for popular commercial personal operating systems because it is …

more ...

At the Linux terminal with systemtap

The text section contains executable code and read-only data, such as constant variables, and is typically marked read-only and executable. At the same time, many executives have a crude interpretation of its value to corporations?"It's free, and therefore it's cheap." Slowly, that mentality is changing, but it's still true …

more ...

The secret of m4

In general, there is a tendency for advocates of the term term free software to emphasize the ideological aspects of software, including the ethical or moral aspects, and they view technical excellence as both a desirable and an unavoidable by-product of their ethical standards. The shell learns immediately whenever a …

more ...

Redirecting output with G2Linx

Yes, the house is ruining the sacred area, but nobody informed the homeowner in question about this problem before the purchase, so the shame should be placed elsewhere. This is also in sharp contrast to Microsoft Windows, for which modification of the software is generally not permitted. Mounting other filesystems …

more ...

How much do you know about the Linux if command?

That is, there are no legal restrictions on anyone using, studying, copying, modifying, improving or publishing any recipe. Luckily, basic maintenance and basic security are pretty easy. One of the best parts about Gentoo, which is also a curse for some people, is its ability to configure what compilation flags …

more ...

Running Gnome on Pinguy OS

Linux protects against this by maintaining lists of adjustments to the semaphore arrays. There are three types of partition supported by fdisk, primary, extended and logical. The first filesystem mounted is located in the root of the namespace, /, and is called the root filesystem. It doesn't take long to realize …

more ...

Getting your Office suite up and running on Linux

Different distributions have chosen varying approaches to file placement, software management, and other subtleties, in such a way that makes it almost impossible to make an applications distribution that will install and run cleanly across the Linux spectrum. For people wanting to become more than just casual users, it can …

more ...

Who wants to know the mystery behind import

The new vm_area_struct structure is put into the list of vm_area_struct pointed at by the shmid_ds. Internally, the quality assurance department runs rigorous regression test suites on each new pass of the operating system, and reports any bugs. It then restores the state of the new process (again this is …

more ...

How biff can help power your webapp

The API merely defines the interface; the piece of software that actually provides the API is known as the implementation of the API. Finally, when the connection is no longer needed it can be shutdown. Once connection has been made, any of the (usually) several browsers available can be used …

more ...

Linux is Case Sensitive

The U-Boot bootloader program can boot from any type of disk, and load any type of boot image. Linux can do everything NT does, usually faster, definately more stable and at a fraction of the cost. Both have similar tools for interfacing with the systems, programming tools, filesystem layouts, and …

more ...

Succeed with bzdiff on Linux

Most recently, the U.S. Whereas it had previously been the norm to assist colleagues and freely share ideas and software, such cooperation suddenly became forbidden and was made a crime. But this book, like most texts on system programming, is unconcerned with kernel development. Linux is a popular platform …

more ...

Virtual filesystems in VectorLinux - how do they work?

Block devices are accessed via the buffer cache and may be randomly accessed, that is to say, any block can be read or written no matter where it is on the device. Among the easiest to try at first are the text editors, word processors, image viewers, calculators and games …

more ...

Let your Slackware terminal speak its mind

This means that if a system has two IDE controllers there will be entries for the IDE subsystem at indices at 3 and 22 in the blk_dev and blkdevs vectors. When someone detects a bug it reports it to the community and they release a patch as soon as possible …

more ...

What is the subhierarchy of an application

Keep in mind that these are only conventions---not rules. You can easily see the exported kernel symbols and their values by looking at /proc/ksyms or by using the ksyms utility. Traditionally, Unix programs have been single-threaded, owing to Unix's historic simplicity, fast process creation times, and robust IPC mechanisms …

more ...

Developing with COBOL in a Linux container

If you've been developing on Windows for a couple of years, you've likely experienced a catastrophic failure at some point, or had to move all your dev tools to a new version of Windows. The first IDE controller in the system is known as the primary IDE controller, the next …

more ...

Automating builds using PHP on Arch Linux

After moving the Linux I've noticed a dramatic improvement in the speed and performance of my work flow, with the exact same tools I used on Windows. What does this mean to you? Each individual semaphore operation may request that an adjustment be maintained. The Free Software Movement would be …

more ...


Job control under Freespire

For some small business leaders I've consulted, the human factor is either a notion to be rejected or ignored. For most users, LILO works best. Kerneld is just an agent of the kernel, scheduling work on its behalf. Not often are our basic rights thought of in the context of …

more ...

Unwrapping dnssec-signkey

It has BlueJ, Geany, Greenfoot, Mathematica, Python, Node-RED, Scratch, and other tools for making your learning process more effective. The address bus specifies the memory locations (addresses) for the data transfers. The target host that owns the IP address, responds with an ARP reply that contains its physical hardware address …

more ...

At the Linux terminal with less

Its latest releases often inspire the other Linux distributions to adopt new features and make changes. By then, much of the GNU operating system had been completed, with the notable exception of a kernel (i.e., the core of the operating system). The entire Linux kernel was written from scratch …

more ...

Unwrapping scanimage

Without this surrounding commitment, IT decision-makers can be left in the dark...and that's not a good place to be in 2019. Device drivers have to be careful when using memory. The character % introduces a job name. Writing a byte to a file position beyond the end of the file …

more ...

Open the gates for atd

As they are part of the Linux kernel they cannot use virtual memory. With every new iteration, Raspberry Pi mini-computer is getting more powerful. By opening the code to widespread examination, more people take part in finding its bugs and security flaws, in testing for broad compatibility across platforms, and …

more ...

Best Linux audio manager

Their techniques for identifying web server and OSes can be fooled. As the cliche goes, "If we both have an apple, and we exchange apples, we each still have one apple. It also ships in multiple flavors to gratify different needs of people. The rules concerning the definition and use …

more ...

A simple guide to ul

However, this is definitely no loss. Big data, the collective term for the mountains of information produced by businesses, can hold the keys to more efficient operations and even increased revenues by identifying new opportunities, but first this data must be sorted, parsed and analyzed. As you can see, the …

more ...

Getting up and running with the Raspberry Pi

The world economy will not collapse if creators of software choose to share their work with the world. When adding a user to a system you will be asked for your root i.d. In all of the cases above, the synergy created between the pairs has only gone to …

more ...

How much do you know about the Linux mmv command?

You can also press the C key at any time to enter an interactive shell mode, allowing you to submit commands on the fly. Businesses, with no faith in their ability to succeed with Open Source, would resort to writing proprietary software that can be sold on a shelf. The …

more ...

Succeed with zmore on Linux

This, in turn, allows for the use of the pathnames with which all Unix users are familiar-for example, /home/blackbeard/concorde.png. Figure 5.1 shows that each file data structure contains pointers to different file operation routine vectors; one for writing to the pipe, the other for reading from …

more ...

Getting acquainted with MeeGo

Time enough for a soapbox. It could be argued that its smaller number of vulnerabilities is because of its rarer deployment, but the simplest explanation is that OpenBSD has focused strongly on security - and achieved it better than the rest. The BSD socket layer calls the INET layer socket support …

more ...

Linux adventures with ypset

Now synonymous with private cloud computing, the OpenStack cloud framework likely would not exist, or at least would be incredibly different, without Linux. According to the Stack Overflow 2016 survey, desktop developers now constitute just 6.9 percent of all developers (and that also includes Mac Desktops). Without Linux as …

more ...

Configuration management under Floppix

Othertimes, simply booting the machine can be a chore. The entire Linux kernel was written from scratch, without employing any code from proprietary sources. A process that has terminated, but has not yet been waited upon, is called a zombie. Linux allows you to include device drivers at kernel build …

more ...

Boost your mastery of bzless with these tips

For example to display a manual page for the ls command execute man ls. Linux must handle readers opening the FIFO before writers open it as well as readers reading before any writers have written to it. You may then continue typing and hit Tab again and it will again …

more ...

Installing valgrind

How these modes are supported by the underlying hardware differs but generally there is a secure mechanism for getting from user mode into system mode and back again. Given that Linus was using several GNU tools (e.g., the GNU Compiler Collection, or GCC), the marriage of the GNU tools …

more ...

The secrets behind cpio

Every transmitted ethernet frame can be seen by all connected hosts and so every ethernet device has a unique address. The pops vector is indexed by the address family identifier, for example the Internet address family identifier (AF_INET is 2). If the thief runs, he/she probably won't get caught …

more ...

Acceptable parameters when the file operation matters

Whenever a VFS inode representing a character special file is created, its file operations are set to the default character device operations . For this reason, it is referred to as Open Source Software (OSS). Rather than having to satisfy a set of needs laid out by a single department head …

more ...