Installing a web server under Network Security Toolkit

This bleeding edge distro's repository is always up-to-date. Each class of device driver, character, block and network, provides common interfaces that the kernel uses when requesting services from them. Extended partitions are not real partitions at all, they contain any number of logical parititions. (There are a few instance where …

more ...

Sysadmin and Devops using mkdosfs

The default action for the SIGFPE signal will core dump the process and then cause it to exit. Each IDE controller can support up to two disks, one the master disk and the other the slave disk. People will stand up and take notice and realize that Linux is not …

more ...

Getting the best out of tr when using Ubuntu

When a command terminates on a fatal signal, bash uses the value of 128+signal as the exit status. Institutions that rely solely on commercial-proprietary vendors - whether on-premises or cloud-based - effectively outsource their IT strategy and reduce their capability to deal with change with agility. Specific filesystems, however, may impose …

more ...

Is Gnome Flashback the best windows manager for Linux?

The Linux system call uses the write routine pointed at by the file data structure describing this pipe. If you have a /etc/cron.allow file, this supersedes cron.deny (ie, cron.deny is ignored) and allows only those listed in it to use cron. The only rule is that …

more ...

Can you pass the repquota test?

If you've always wanted to learn programming, whether you want to develop software professionally or just for fun, there's no better platform to cut your teeth on. Linux names IDE disks in the order in which it finds their controllers. Even if you plan to move on to more advanced …

more ...

Scan the results of parameter expansion

The new vm_area_struct structure is put into the list of vm_area_struct pointed at by the shmid_ds. Some such devices are partionable, which means that they can be divided up into multiple filesystems, all of which can be manipulated individually. Sustainable technologies are also important, and the best example of the …

more ...

Is experience with mpg123 an employable skill?

That is, there are no legal restrictions on anyone using, studying, copying, modifying, improving or publishing any recipe. An alternative to purchasing a Linux book is to borrow one (or many) from a library; it is likely that some of them will also contain CDROMs that can be used to …

more ...

Developing with slabtop

Finally, if you are contributing to an existing kernel module, you will need to learn about their procedures and development cycle. In Linux, the standard C compiler is provided by the GNU Compiler Collection (gcc). It would not matter to me which distro was being advocated as long as the …

more ...

Download via Bittorrent

It would not be enough to stop here, though. The world economy will not collapse if creators of software choose to share their work with the world. It may not be the best choice for word processing (or maybe it is -- read on), but many see it as an "ISP …

more ...

Troubleshooting hardware problems in Gnoppix

Over the years, Unix systems have supported a handful of different special files. Like so many others I have always thought that one of the greatest attributes of Linux is its diversity of choice, but there are those outside of the Linux world that see this as a negative. Quite …

more ...

Let your Devil-Linux terminal speak its mind

It's a must try Linux distribution for those are willing to test the working of server on Desktop. But all things come to an end eventually. Much of enterprise IT's excitement is focused on advancements at the application level (and rightly so), but it's Linux that powers these innovations and …

more ...

Principles of LTTng-Tools under Linux

However, such programs are typically also made available for free (usually as a free download from the Internet). For example, on your computer, as a normal user you may have permission to access other files on the system. This waiting happens within the system call, in system mode; the process …

more ...

Minimize speed when using your first character limit

Where Linux has shown a significant advantage over proprietary Unix is in its availability across a vast number of hardware platforms and devices. Another type of open source license is the artistic license, which ensures that the source code of the program is freely available yet allows the original author …

more ...

Getting a mail server up and running on Xubuntu

In addition to steadfast stalwarts like Fortran and C/C++, many scripting and other computer languages are at home on (or were even designed to work best with) Linux. The Linux kernel must be able to interact with them in standard ways. It is the scheduler that must select the …

more ...

Getting acquainted with Miracle Linux

The module data structure is marked as DELETED and it is unlinked from the list of kernel modules. Most licenses of the proprietary software systems are expensive and should be renewed every year. These range from simple memory protection schemes to complex page hierarchies. You don't need to spend tons …

more ...


Getting the best out of atq when using Ubuntu

Therefore Linux adds a call to a tidy up routine which will restore the original blocked mask onto the call stack of the signalled process. If your computer came with a copy of Windows, then you paid for it, even if the store didn't tell you about that. This credit-card …

more ...

Is Algol the best programming language for Linux?

The character % introduces a job name. At kernel initialization time, the address families built into the kernel register themselves with the BSD socket interface. Both are very different from proprietary software (also commonly called commercial software), which is software that is controlled by a company or an individual. Source code …

more ...

No more mistakes with dnssec-keygen

If the name doesn't give it away, Linux containers, a method of packaging and isolating an application with only its dependencies, are a technology built from key pieces of the Linux kernel. Still, this survey does compare Windows 2000, GNU/Linux (up to 497 days usually), FreeBSD, and several other …

more ...

Configuration via the terminal

Workspaces is a feature I would never trade for anything else. Not only you earn more capabilities as a developer, you also learn (sometimes the hard way) how to solve issues, monitor your machine for potential problems, configure different components and more. Putting morals before convenience and ease may be …

more ...

Editing with vi and esdcat

Copyleft advocates also point out that although code released under the GLP cannot be incorporated directly into proprietary software that does not make its full source code freely available, it is still possible to use it effectively with proprietary code. If the substring matches more than one job, bash reports …

more ...

Principles of kbd under Linux

The receiving IP layer uses that protocol identifier to decide which layer to pass the received data up to, in this case the TCP layer. Kernel modules, like the kernel itself, are usually written in C. When Linux fixes up that page fault it finds the vm_area_struct data structure describing …

more ...

At the command line with gdb

Windows implementation is very high-level. In the event of a total implosion, much of the software can be reinstalled with batch files made up of multiple sudo apt install statements. Ask ten people on the street what a "blue screen of death" is or if their Windows PC has ever …

more ...

Answered - your most burning quotaon questions

You may have already noticed that in order to execute shell script the file needs to be made executable by use of chmod +x FILENAME command. The kernel calls the modules initialization routine and, if it is successful it carries on installing the module. The g++ C++ compiler is ISO …

more ...

A technical overview of passwd

Many times, it does this in order to avoid vice, but counterintuitively, only ends up creating more of it in the process. At kernel initialization time, the address families built into the kernel register themselves with the BSD socket interface. This subshell reinitializes itself, so that the effect is as …

more ...

Generating use cases for Objective-C

Note that HP-UX, GNU/Linux (usually), Solaris and recent releases of FreeBSD cycle back to zero after 497 days, exactly as if the machine had been rebooted at that precise point. Each hardware controller has its own control and status registers (CSRs) and these differ between devices. The reason is …

more ...

What's your favorite Linux terminal emulator?

This makes kernel memory deallocation easier as the smaller free blocks can be recombined into bigger blocks. This means that the process can continue to run. There are many ways to make money, so why choose a method that requires investing just as much time and effort into making software …

more ...

Installing libevent

The umbrella of system programming often includes kernel development, or at least device driver writing. The Linux kernel is the core of the operating system. If user space were allowed to manipulate directories without the kernel's mediation, it would be too easy for a single simple error to corrupt the …

more ...

Principles of git-series under Linux

First of all the DMA controller knows nothing of virtual memory, it only has access to the physical memory in the system. If they will then it removes the sem_queue data structure from the operations pending list and applies the semaphore operations to the semaphore array. Institutions that rely solely …

more ...

The key to success with lpstat

This is especially true for large contributions, new features, or standalone code, like a driver for a specific piece of hardware. Knowledge and information are the building blocks of change. A runnable process is one which is waiting only for a CPU to run on. In addition, in the open …

more ...

Getting up and running with LXDE

When the kernel is asked to open a pathname like this, it walks each directory entry (called a dentry inside of the kernel) in the pathname to find the inode of the next entry. At the same time, many executives have a crude interpretation of its value to corporations?"It's …

more ...

Sick and tired of using suspend the same way?

If you're interested in writing code for the Linux kernel itself, a good place to get started is in the Kernel Newbies FAQ, which will explain some of the concepts and processes you'll want to be familiar with. This chapter describes how the Linux kernel manages the physical devices in …

more ...

Sick and tired of using netstat the same way?

Binary compatibility is maintained across a given major version of glibc, at the very least. Does it support my critical applications? Linux aims toward POSIX and SUS compliance. Of course, most system calls have only a couple of parameters.

Getting Enlightenment to work with a dual screen monitor

This meaning …

more ...

Which distro do you prefer to use KDE Plasma on?

Writing a byte to the middle of a file overwrites the byte previously located at that offset. Conceptually, nothing covered thus far would prevent multiple names resolving to the same inode. Without this surrounding commitment, IT decision-makers can be left in the dark...and that's not a good place to …

more ...

Interesting apps based on ssh-keygen

Where the timers go in the timer table is statically defined (rather like the bottom half handler table bh_base). In fact, Richard Stallman wouldn't have bothered writing the GNU system if he thought his project wouldn't mean anything. In addition, in the open source world, vulnerabilities are discussed publicly, so …

more ...

At the Linux terminal with gettext

When a command terminates on a fatal signal, bash uses the value of 128+signal as the exit status. Let's look at creating an image file so we can start a container which we created. Much of enterprise IT's excitement is focused on advancements at the application level (and rightly …

more ...

Instance names should not be specified when using timeout

Unlike the MINIX filesystem before it, ext could address up to 2GB of storage and handle 255-character filenames. The size of a file is measured in bytes and is called its length. In addition, as Richard Stallman famously put it, these programs are also "free as in speech, not as …

more ...

Listen to the radio at the Cucumber Linux command line

Open source software isn't free from cost, of course. Where in I/O space the common peripherals (IDE controller, serial port, floppy disk controller and so on) have their registers has been set by convention over the years as the PC architecture has developed. Also there is no mechanism for …

more ...

Redirecting output with PCLinuxOS

Very small company leadership, with less than ten personnel, often incorrectly assume that interpersonal issues and technical decisions are not correlated at all. The kernel does not impose any restrictions on concurrent file access. Each command comes with a manual page which can be used to learn about its function …

more ...

A technical overview of edquota

If you have spent a lot of time on Windows this may take a while to get used to. The source code for proprietary software is usually not made publicly available, or, if it is, there are generally severe restrictions on its use. This means that the maximum number of …

more ...