Emotional support animal

The term “emotional support animal” is in the news at present, mainly, sadly, because of its predictable abuse. In Japan, companion animals are petto or aigando butsu, animals to love, or play with, or take pleasure in, which just about covers it all. The next time you greet your own …

more ...

The Mazambican poachers

To kill rhinos, Mozambican poachers appear to prefer hunting rifles over other firearms available to them. There is evidence that Czech CZ 550 bolt-action rifles have become more popular with poachers in recent years. While obtaining a rifle through official channels in Mozambique can take up to six months, there …

more ...

Columbias corporate security

While Colombia is a special case in some ways because of its long history of conflict, extractive industry activities in less extreme settings are increasingly marked by the presence of private, corporate security. The result is a variety of collaborative partnerships between public and private, formal and informal types of …

more ...

Getting acquainted with Ubuntu Studio

To help bring order to chaos, standards groups codify system interfaces into official standards. The number of bytes that the device driver requests is rounded up to the next block size boundary. To those who believe that even bad attention is better than no attention, being treated as a non-entity …

more ...

A graphical client for the Soulseek P2P network

For instance, containers have largely evolved through community involvement. There are three types of partition supported by fdisk, primary, extended and logical. Any of the bytes within a file may be read from or written to. The answer is that you can use any method you like to refer to …

more ...

Using memory functions

Disk drives provide a more permanent method for storing data, keeping it on spinning disk platters. By contrast, most software carries fine print that denies users these basic rights, leaving them susceptible to the whims of its owners and vulnerable to surveillance. The majority of those working on Free Software …

more ...

My experience with Joli OS

Recently DBMS Superpower Sybase made their Adaptive Server Enterprise technology available on the Linux platform. The takeover of software by corporations continued at a rapid pace, and free software was becoming an endangered species. When a user logs in, the login program checks the username and password, and then starts …

more ...

Redirection of output

The most common disks used in Linux systems today are Integrated Disk Electronic or IDE disks. This is because IP addresses are simply an addressing concept, the ethernet devices themselves have their own physical addresses. The LSB extends POSIX and SUS, and adds several standards of its own; it attempts …

more ...

At the Linux terminal with gettext

It would not be enough to stop here, though. OSS is developed by those people who have a use for it. TCP/IP is so entrenched that Windows implemented it. Shell scripts are not unlike Windows batch files for controlling the system, but a lot more powerful.

Learn how I …

more ...

Can you get LXDE to work on your own distro?

Why make it easier for them. Linux supports three types of hardware device: character, block and network. For Linux, a vendor can create a device driver for a specific hardware device and expect that, within reason, it will operate across most distributions. They should be given the opportunity to examine …

more ...

Getting your Terminal emulator up and running on Linux

Its latest releases often inspire the other Linux distributions to adopt new features and make changes. Any site that is requested through the "what's that site running" query form at Netcraft.com is added to the set of sites that are routinely sampled; Netcraft doesn't routinely monitor all 22 million …

more ...

Old school Linux with the shutdown utility

An inode stores metadata associated with a file, such as its modification timestamp, owner, type, length, and the location of the file's data-but no filename! Sed, as you saw in our example, is basically used for altering a text file without actually having to open it up in a traditional …

more ...

Its all about dnssec-keygen

As it's compiled from RHEL sources, most of the commercial software built for RHEL can be made to run on CentOS. Initially, there is only one directory on the disk, the root directory. But the Linux community is much more than the kernel, and needs contributions from lots of other …

more ...

Troubleshooting hardware problems in ALTLinux

To accomplish more complex tasks, tools would simply be connected together, using pipes. Like so many others I have always thought that one of the greatest attributes of Linux is its diversity of choice, but there are those outside of the Linux world that see this as a negative. None …

more ...

The key to success with fold

On i386, for example, a register is used for each possible parameter-registers ebx, ecx, edx, esi, and edi contain, in order, the first five parameters. As users developed ways around the methods, the methods kept getting progressively harsher, severely punishing casual proprietary software users who had been legally using and …

more ...

Developing with AppleScript in a Linux container

awk is actually a programming language designed particularly for text manipulation, but it is widely used as an on-the-spot tool for administration. Notably, Linux is the fastest growing operating system released to date. Linux is a multiprocessing operating system, its objective is to have a process running on each CPU …

more ...

Troubleshooting hardware problems in Gnoppix

Automation is also a game-changer using the terminal. Open source has become the de facto way to build software - not only in tech, but across diverse industries. In 1991, this final gap was filled by Linux, a kernel which was written independently of the GNU project by Linus Torvalds, then …

more ...

Installing PCRE

Processes are separate tasks each with their own rights and responsibilities. By using open source software, you can benefit from integrated management. In this case, Direct Memory Access (DMA) controllers are used to allow hardware peripherals to directly access system memory but this access is under strict control and supervision …

more ...


How to set up the C environment on Ubuntu

From the inode number, the inode is found. To be safe, always put alias definitions on a separate line, and do not use alias in compound commands.and comments, except that the function name must be the first thing on the line. These extensions are collectively called GNU C, and …

more ...

Installing a web server under Network Security Toolkit

This bleeding edge distro's repository is always up-to-date. Each class of device driver, character, block and network, provides common interfaces that the kernel uses when requesting services from them. Extended partitions are not real partitions at all, they contain any number of logical parititions. (There are a few instance where …

more ...

Getting the best out of tr when using Ubuntu

When a command terminates on a fatal signal, bash uses the value of 128+signal as the exit status. Institutions that rely solely on commercial-proprietary vendors - whether on-premises or cloud-based - effectively outsource their IT strategy and reduce their capability to deal with change with agility. Specific filesystems, however, may impose …

more ...

Download via Bittorrent

It would not be enough to stop here, though. The world economy will not collapse if creators of software choose to share their work with the world. It may not be the best choice for word processing (or maybe it is -- read on), but many see it as an "ISP …

more ...

Minimize speed when using your first character limit

Where Linux has shown a significant advantage over proprietary Unix is in its availability across a vast number of hardware platforms and devices. Another type of open source license is the artistic license, which ensures that the source code of the program is freely available yet allows the original author …

more ...

A technical overview of passwd

Many times, it does this in order to avoid vice, but counterintuitively, only ends up creating more of it in the process. At kernel initialization time, the address families built into the kernel register themselves with the BSD socket interface. This subshell reinitializes itself, so that the effect is as …

more ...

The key to success with lpstat

This is especially true for large contributions, new features, or standalone code, like a driver for a specific piece of hardware. Knowledge and information are the building blocks of change. A runnable process is one which is waiting only for a CPU to run on. In addition, in the open …

more ...

Sick and tired of using netstat the same way?

Binary compatibility is maintained across a given major version of glibc, at the very least. Does it support my critical applications? Linux aims toward POSIX and SUS compliance. Of course, most system calls have only a couple of parameters.

Getting Enlightenment to work with a dual screen monitor

This meaning …

more ...

Creating a UPGRADE.TXT file for your distro

So when you're writing something in your word processor and you want to check out something on the web, no need to review all your windows to find your browser, stacked all the way behind the others. If you are not already familiar with the GNU GPL, the best way …

more ...


Answered - your most burning xargs questions

Dynamically loading code as it is needed is attractive as it keeps the kernel size to a minimum and makes the kernel very flexible. For DOS formatted disks, those formatted by fdisk, there are four primary disk partitions. Linux is that power. The originator of the request, the client, creates …

more ...

Using the ifdown tool on Kali

IP addresses on the other hand can be assigned and reassigned by network administrators at will but the network hardware responds only to ethernet frames with its own physical address or to special multicast addresses which all machines must receive. Any site that is requested through the "what's that site …

more ...


Generating use cases for C Sharp

All Unix versions and workalikes, including Linux, communciate between devices (computers, printers, cash registers, etc) using TCP/IP. Where Linux has shown a significant advantage over proprietary Unix is in its availability across a vast number of hardware platforms and devices. As both communities have matured over the past decade …

more ...

How to set up the Python environment on Ubuntu

A mechanism is needed whereby activities can be scheduled to run at some relatively precise time. The registered protocol operations are kept in the pops vector, a vector of pointers to proto_ops data structures. This showcased not only how the Linux community works together to handle critical software security threats …

more ...

How to set up the Zsh environment on Ubuntu

The device driver places bytes onto the queue, one by one, and user space reads the bytes in the order that they were placed on the queue. Although Linux was only created in 1991, the number of Linux users estimated by Red Hat in 1998 was 7.5 million, and …

more ...

Interesting apps based on ifconfig

Linux runs faster than both Windows 8.1 and Windows 10 thanks to its light-weight architecture. Common feedback would include questions about how something works or why you chose a particular approach along with suggestions for improvements or requests for changes. A block device cannot transfer or access a unit …

more ...

A simple guide to ld

The saved uid stores the original effective uid; its value is used in deciding what effective uid values the user may switch to. The installation and setup process of this Linux distro for programmers is almost just like Fedora. The address bus specifies the memory locations (addresses) for the data …

more ...

Getting up and running with Lumina

These common interfaces mean that the kernel can treat often very different devices and their device drivers absolutely the same. In order to be accessed, a file must first be opened. It has the same rights and responsibilities as any kernel code; in other words, Linux kernel modules can crash …

more ...

Starting the ypbind daemon at boot time

Approaching open source contributions without a strategy can tarnish a company's reputation in the open source community and incur legal risks. If the program is a file beginning with #!, the remainder of the first line specifies an interpreter for the program. What happens if you load a module built for …

more ...

Is Cinnamon the best windows manager for Linux?

With respect to language standards, Linux fares well. Note that Windows NT systems cannot be included in this survey (because their uptimes couldn't be counted). 99 in Windows). The minor device numbers are used to distinguish between different devices and their controllers, for example each partition on the primary IDE …

more ...