Quick and easy fixes using mail

Developing the core is pretty serious business, involving pretty serious computer science. But the existence and popularity of the Windows Subsystem for Linux (WSL), as well as more recently announced capabilities like the Windows port of Docker, including LCOW (Linux containers on Windows) support, are evidence of the impact that …

more ...

Installing a web server under Cub Linux

As the writing process writes to the pipe, bytes are copied into the shared data page and when the reading process reads from the pipe, bytes are copied from the shared data page. To make it easy to find, the current, running, process is pointed to by the current pointer …

more ...

Actionable tips for mastering inotify-tools

This is used by gateways, which respond to ARP requests on behalf of IP addresses that are in the remote network. Many, if not most, PCI modems available on store shelves these days are WinModems. This means that subsequent INET socket calls can easily retrieve the sock data structure. Figure …

more ...

Create your own video streaming server with BackTrack

The Linux kernel, supporting both preemptive multitasking and virtual memory, provides every process both a virtualized processor and a virtualized view of memory. This is true even if the device is a modem being used by the PPP daemon to connect a Linux system onto a network. Therefore Linux adds …

more ...

Has head gone past its sell by date?

Therefore, when moving to the PDP-11 as the main hardware platform, the developers started C as the as a core language for Unix. Advocates of copyleft respond by pointing out that there is no such thing as absolute freedom. The test and set operation is, so far as each process …

more ...

How to automate tasks on a Linux system

Its purpose is to provide a financial incentive for producing such works in order to benefit society as a whole. It also has a utility to let you select real-time kernels. The systemd-boot bootloader generates a menu of boot image options, and can load any EFI boot image. When a …

more ...

Focus on the outcome when using cdparanoia

It also helps to know how to access the Internet and be able to do basic web searches with a search engine such as Yahoo or Google. Of course, we knew that all along. This means that subsequent INET socket calls can easily retrieve the sock data structure. For example …

more ...

Here's what no-one tells you about minfo

The UEFI boot manager boots the mini-bootloader, then, in turn, it boots the standard Linux bootloader image. The exact wording of a recipe as it is written by its author is protected under copyright law, but the information itself (i.e., the names of the ingredients, their quantities and the …

more ...

Sick and tired of using paste the same way?

Why make it easier for them. However, in most cases it is closed source (i.e., the source code is kept secret), and there are often restrictions on the use of the executable version. If all of the semaphore operations would have succeeded and the current process does not need …

more ...

What's your favourite X session manager

In a multiprocessing system many processes are kept in memory at the same time. The kernel does not impose any restrictions on concurrent file access. This software universe had been going on behind my back for years. Just maybe that crash you reported will save some people from a major …

more ...

Fall in love with stty

It will recognize a multiline header if the last character on each line but the last is a left parenthesis or comma. In general, failing to agree with the standards is considered a bug. So, be prepared. The key to success with studying at home is strong motivation.

Has col …

more ...

Creating a SPEAKUP_DOCS.TXT file for your distro

Interestingly, the ability of bash scripting is also one of the most compelling reasons why programmers prefer using Linux OS. Linux has two types of system timers, both queue routines to be called at some system time but they are slightly different in their implementations. Most open source Internet tools …

more ...

Getting acquainted with Fuduntu

Of course, most system calls have only a couple of parameters. So now you are probably starting to see that we can refer to a location in a variety of different ways. The saved uid stores the original effective uid; its value is used in deciding what effective uid values …

more ...

Fall in love with join

Processes that are started at boot time usually run as root or nobody. As a Linux user today you have all the means of getting to know your system inside out, but it is no longer necessary to have that knowledge in order to make the system comply to your …

more ...

Let your SmoothWall terminal speak its mind

In this case, Direct Memory Access (DMA) controllers are used to allow hardware peripherals to directly access system memory but this access is under strict control and supervision of the CPU. This creates a new vm_area_struct data structure describing the shared memory for this process. The thrust behind Linux development …

more ...

Using the rev tool on Kali

Finally there is the main memory which relative to the external cache memory is very slow. Yes, it behaved slightly differently, but I found I could be much more efficient - while using Free Software! There are various other techniques how to define shell interpreter, but this is a solid start …

more ...

Cloud storage using NextCloud

The IP protocol is a transport layer that is used by other protocols to carry their data. As the cliche goes, "If we both have an apple, and we exchange apples, we each still have one apple. It provides the interfaces documented in SUSv4 and POSIX 2008, including real-time (POSIX …

more ...

Its all about openvt

Where does the bash fit in? The keyboard, mouse and serial ports are controlled by a SuperIO chip, the IDE disks by an IDE controller, SCSI disks by a SCSI controller and so on. Linux is believed to comply with POSIX.1 and SUSv3, but as no official POSIX or …

more ...

Getting to grips with e2fsprogs on the terminal

Therefore, mastering Linux for configuring and maintaining servers is a must to have skill for any technological entrepreneur who operates end-to-end applications. The scalability and flexibility of Linux enable many of these massive deployments to actually work, while the significantly reduced cost barriers of Linux make them more financially feasible …

more ...

Linux is an Extensionless System

For kernel code, once it is complete the developer may ask Linus to include it in the standard kernel, or as an optional add-on feature to the kernel. An inode stores metadata associated with a file, such as its modification timestamp, owner, type, length, and the location of the file's …

more ...

Using lsof on Kali Linux

It is vital that there is an uninterrupted stream of knowledge, and that information is not held back for personal benefit at the cost of others. Most of the time you will be issuing commands. Anyone can join the Linux community by participating in and contributing to this mailing list …

more ...

Running swapper inside a docker image

The Watergate scandal leaked to the press through one of US President Nixon's most trusted colleagues. Device drivers have to be careful when using DMA. By the time I was done, I had actually forgotten how to use my old piece of proprietary garbageware. Linux is open-source.

How much do …

more ...

Let your Red Hat Enterprise Linux terminal speak its mind

Linux (as well as many other areas of information technology) is particularly well suited for studying at home because (1) no equipment is needed other than an ordinary personal computer and (2) there is a large amount of free or modestly priced study material that is available from bookstores, in …

more ...