Getting Gnome Flashback to work with a dual screen monitor

The kernel allocates a new module data structure and enough kernel memory to hold the new module and puts it at the end of the kernel modules list. By virtue of its open source licensing, Linux is freely available to anyone. People who develop OSS commonly use the Internet to …

more ...

How to automate dpkg

You can easily see the exported kernel symbols and their values by looking at /proc/ksyms or by using the ksyms utility. As the writing process writes to the pipe, bytes are copied into the shared data page and when the reading process reads from the pipe, bytes are copied …

more ...

Is C Sharp the best programming language for Linux?

This is one of those arguments that sounds good superficially but which is not borne out by the evidence. If the thief runs, he/she probably won't get caught, and it is a quick way to make some extra cash. If you've always wanted to learn programming, whether you want …

more ...

The ultimate guide to gs

These negative connotations include lack of quality, of robustness, of support and of long-term commitment. The shell program is what presents the prompt and accepts subsequent commands. This means that it's not enough for a Linux platform to support what an enterprise needs right now. Copyright does not protect facts …

more ...

How to install manpath on Suse

For example when user data is being written to the hard disk. ARP is not just restricted to ethernet devices, it can resolve IP addresses for other physical media, for example FDDI. One more thing, if you don't want your programming Linux distro to be devoid of systemd, there's an …

more ...

Understanding the fundamentals of xfsdump

The code is supplied on CDROMs or other media with the executable program and/or it is made available for downloading from the Internet. For example, software that can be freely modified but that does not have the same strict requirements for redistribution as the GPL is also considered open …

more ...

At the command line with lsof

The most common meaning for the term free software is programs whose source code is freely available to anyone to use for any purpose, including studying, copying, modifying, extending and giving away. This is an example of the meritocracy of Linux and open source being pulled into the mainstream, where …

more ...

Get the most out of Slackware

Written originally for the Digital Equipment Corporation (DEC) family of PDP microcomputers, this most popular of multi-user, general-purpose operating systems has taken over roles in all areas of computing -- even those once held by mainframes. Although, there's no rocket science in it. Because of the rarity of malware threats, there …

more ...

Boost your mastery of mt with these tips

Institutions that rely solely on commercial-proprietary vendors - whether on-premises or cloud-based - effectively outsource their IT strategy and reduce their capability to deal with change with agility. This greatly assists integration efforts - and facilitates movement between systems when necessary. But, due to some recent changes, Ubuntu has switched back to GNOME …

more ...

Can you install Yellow Dog Linux on the Rasberry Pi?

The numbers are different for an Alpha AXP Linux box. I am a composer, and one of the biggest hurdles for me in switching to exclusively Free Software was my sheet music typesetting software. The IDE subsystem registers IDE controllers and not disks with the Linux kernel. A common sector …

more ...

How logname can help power your webapp

When a user-space application requests that a given filename be opened, the kernel opens the directory containing the filename and searches for the given name. If the expiry time for an active timer has expired (expiry time is less than the current system jiffies), its timer routine is called and …

more ...


Linux adventures with ypset

However, they seem to be forgetting that, while some action we make won't directly influence everybody, every action we make affects somebody. It is vital that we keep a philosophical approach so that our beliefs stand behind our actions. This instruction causes a switch into kernel space, the protected realm …

more ...

Work in progress asynchronous email client

One obvious part of Linux is the kernel itself; but even that would be useless without libraries or shells. A lot of commands on the terminal will rely on you being in the right location. Another great quality of this dependable Linux distro for developers is its software delivery method …

more ...


Acceptable parameters when the widget resource matters

Closed source software can be distributed for free or for a cost; either way, the source code for the software is unavailable from the original developers. In Linux, no further organization or formatting is specified for a file. Until Linux came along it was either Windows or Macintosh - take it …

more ...

How to get more from logout

If you desire to use Linux as an Internet Web server, you can simply recompile the Linux kernel to include only the support needed to be an Internet Web server. There is also a view that, regardless of the extent to which each of these approaches proves to be best …

more ...

Really small Python script

The price for a Windows license amounts to an average of one fourth of each new computer's price. Many of the devices you own probably, such as Android phones, digital storage devices, personal video recorders, cameras, wearables, and more, also run Linux. Linux systems always have a root filesystem. Again …

more ...

What's the purpose of the SPEAKUP_DOCS.TXT file?

In 1989 Stallman invented the concept of copyleft, which is aimed specifically at preventing any recurrence of the type of takeover of free software that had occurred earlier in that decade. You can also edit boot options on the fly from the GRUB menu. Time enough for a soapbox. Those …

more ...

Who wants to know the mystery behind import

The new vm_area_struct structure is put into the list of vm_area_struct pointed at by the shmid_ds. Internally, the quality assurance department runs rigorous regression test suites on each new pass of the operating system, and reports any bugs. It then restores the state of the new process (again this is …

more ...

Let your Slackware terminal speak its mind

This means that if a system has two IDE controllers there will be entries for the IDE subsystem at indices at 3 and 22 in the blk_dev and blkdevs vectors. When someone detects a bug it reports it to the community and they release a patch as soon as possible …

more ...

Open the gates for atd

As they are part of the Linux kernel they cannot use virtual memory. With every new iteration, Raspberry Pi mini-computer is getting more powerful. By opening the code to widespread examination, more people take part in finding its bugs and security flaws, in testing for broad compatibility across platforms, and …

more ...

The secrets behind cpio

Every transmitted ethernet frame can be seen by all connected hosts and so every ethernet device has a unique address. The pops vector is indexed by the address family identifier, for example the Internet address family identifier (AF_INET is 2). If the thief runs, he/she probably won't get caught …

more ...

The key to success with kbd_mode

Whenever a process has to wait the operating system takes the CPU away from that process and gives it to another, more deserving process. The container is when the image is running, such as loading an ISO file in Virtualbox and installing it. Writing a byte to a file position …

more ...

Is Cinnamon the best windows manager for Linux?

You can do almost anything with it, including software installation, application and server configurations, file system management and much more. Think about other software you use everyday that is proprietary and apply the fact that you can't be sure what it is actually doing! Networking the critical aspects of a …

more ...

Getting acquainted with Joli OS

But it starts at the top. In many ways, Linux and UNIX administration is today much easier than administration for popular commercial personal operating systems because it is much more transparent. It stands to affect the people of the world at least as profoundly as the Industrial Age. Multiprocessing is …

more ...

Here's what no-one tells you about objcopy

There are no set boundaries or any limitations. The visibility and easy access to the source code, which I mentioned earlier, can also be a double-edged sword as bad-intentioned people can find vulnerabilities and leave backdoors for future exploits. Processes begin life as executable object code, which is machine-runnable code …

more ...

Fundamentals of libpipeline

It is time for the opening of the tools that will be needed to build this new age. The physical on-disk form of this mapping-for example, a simple table or a hash-is implemented and managed by the kernel code that supports a given filesystem. The reality is that not only …

more ...

Succeed with atrm on Linux

Whereas pwd is just run by itself with no arguments, ls is a little more powerful. If this execution fails because the file is not in executable format, and the file is not a directory, it is assumed to be a shell script, a file containing shell commands. They are …

more ...

What's the purpose of the GPG-KEY file?

To make sure that even in a dual boot scenario office staff do not cling to their past desktop but acclimate quickly to the new desktop simply requires a "conversion plan." All of the employees know they will have a dual boot system that is fully functional for the first …

more ...

Never mess with e2fsck and here's the reason why

The job of cache coherency is done partially by the hardware and partially by the operating system. One side note is that the popularity of the macOS hardware and operating system as a platform for development that mainly targets Linux may be attributed to the BSD-like macOS operating system. There …

more ...

At the command line with sparse

The first data written into the pipe is the first data read from the pipe. Like the rest of the kernel, device drivers use data structures to keep track of the device that it is controlling. These controllers are connected to the CPU and to each other by a variety …

more ...

What's the purpose of the CHECKSUMS.md5.asc file?

As you can see, long hand command line options begin with two dashes ( -- ) and short hand options begin with a single dash ( - ). Use man command to display manual page of any desired command. There are several good reasons for becoming familiar with Linux. Where do you think Microsoft gets its …

more ...

Sick and tired of using showmount the same way?

Now Linux must check that any waiting, suspended, processes may now apply their semaphore operations. Much of enterprise IT's excitement is focused on advancements at the application level (and rightly so), but it's Linux that powers these innovations and helps to drive modern computing forward. If you're interested in writing …

more ...

Here's what no-one tells you about timeout

The device identifier for the first partition of that disk (/dev/hdb1) is (3,65). Shell scripting is really what separates novice Linux consumers from advanced Linux users. This is why our previous shell script works even without us defining bash as an interpreter. The inode contains metadata associated with …

more ...