Identify provide font files

For block (disk) and character devices, these device special files are created by the mknod command and they describe the device using major and minor device numbers. The originator of the request, the client, creates a socket and makes a connection request on it, specifying the target address of the …

more ...

Installing a web server under Moblin

Free software, as the term is usually used, and public domain software resemble each other in that both are usually free both in a monetary sense and with regard to use. Assuming that a module can be unloaded, its cleanup routine is called to allow it to free up the …

more ...

Are you making these mistakes with esddsp

A security breach unnoticed by the vendor can easily be exploited by the wrong person. That aside, FIFOs are handled almost exactly the same way as pipes and they use the same data structures and operations. Although there are numerous distributions available, most of the older, well-known distributions are good …

more ...

Which is the best Widget engine for Ubuntu?

When one single governing body gains absolute control over something, it is only a matter of time before that governing body increases its power tremendously. The application can then trap into the kernel through this well-defined mechanism and execute only code that the kernel allows it to execute. When the …

more ...

Getting a mail server up and running on Sugar-on-a-Stick Linux

To accomplish more complex tasks, tools would simply be connected together, using pipes. As such it is possible to have two or more files and directories with the same name but letters of different case. The new vm_area_struct structure is put into the list of vm_area_struct pointed at by the …

more ...

How easy is it to run syncd on a Rasberry Pi?

The examples continue, but all hit the same chord: there is no use in preventing the spread of information. Well, you can't actually look at the four of them at the same time, but this doesn't matter since your eyes can't look in two directions at once, right? To help …

more ...

Using more to view text files at the SLAX command line

Some users have reported success configuring and installing drivers for the various winmodems, including Lucent, Conexant, and Rockwell chipsets. The application tells the kernel which system call to execute and with what parameters via machine registers. Each surface of the platter is divided into narrow, concentric circles called tracks. Another …

more ...

How easy is it to learn the lxc utility?

Every device in the system is represented by a device special file, for example the first IDE disk in the system is represented by /dev/hda. But there may have a possibility of spreading malware to the Linux based systems if they are connected with Windows based systems. This is …

more ...

Installing a web server under Network Security Toolkit

There are also numerous completely free resources available on the Internet, including (1) tutorials, (2) books and (3) newsgroups. This might seem a very unreliable method but every process in the system is making system calls, for example to write a character to the terminal, all of the time. In …

more ...

Sysadmin and Devops using RedHat

So when you're writing something in your word processor and you want to check out something on the web, no need to review all your windows to find your browser, stacked all the way behind the others. Thus, the computer will request replacement of the disks during the course of …

more ...

A simple mistake with rev could cause many problems

The vm_next_shared and vm_prev_shared pointers are used to link them together. A real-world example of an API is the interfaces defined by the C standard and implemented by the standard C library. In other words, a thread is the abstraction responsible for executing code and maintaining the process's running state …

more ...

Never mess with mtr and here's the reason why

(See "Shell Built-in Commands.") Readline has variables that can be used to further customize its behavior. This led to the development of the free software movement by Richard Stallman. If a parent process terminates before its child, the kernel will reparent the child to the init process. The price for …

more ...

The user interface and job control

The second, newer, mechanism uses a linked list of timer_list data structures held in ascending expiry time order. In most cases, good results can be obtained by just using the default options. Every distribution contains hundreds or thousands of programs that can be distributed along with it, and each of …

more ...

Quick and easy fixes using mount

The most interesting case recently was when Sony purposely added spyware [4] to their music CDs that silently and automatically installed itself onto Microsoft Windows systems to search for piracy breaches. Only the truly dedicated -- those who have no personal lives, or those who are being paid to do this …

more ...

Redirecting output with G2Linx

Yes, the house is ruining the sacred area, but nobody informed the homeowner in question about this problem before the purchase, so the shame should be placed elsewhere. This is also in sharp contrast to Microsoft Windows, for which modification of the software is generally not permitted. Mounting other filesystems …

more ...

Virtual filesystems in VectorLinux - how do they work?

Block devices are accessed via the buffer cache and may be randomly accessed, that is to say, any block can be read or written no matter where it is on the device. Among the easiest to try at first are the text editors, word processors, image viewers, calculators and games …

more ...

Unwrapping perl

This modest computer's official Raspbian OS comes loaded with tons of programming tools, connector pins, and other useful ports. We are not done with hardware vulnerabilities, and speculative-execution vulnerabilities in particular. Alternatively, the process may have specfied its own signal handler. But imagine that if you can delete this system …

more ...

Old school Linux with the telnet utility

In the Linux world, a large number of users will always prefer to compile applications from source, rather than using an installer package. Outsource open source software development to O2I and benefit from high-quality services at a cost-effective price. However, that can leave your Linux system vulnerable to attack, and …

more ...

Can you install BioKnoppix on the Rasberry Pi?

In commercial UNIX development houses, the entire system is developed with a rigorous policy of quality assurance, source and revision control systems, documentation, and bug reporting and resolution. This was the beginning of techniques such as license keys. This is true even if the device is a modem being used …

more ...

Getting started with the Linux mtype command

All of the read/write heads are attached together, they all move across the surfaces of the platters together. Some users have reported success configuring and installing drivers for the various winmodems, including Lucent, Conexant, and Rockwell chipsets. Yet throughout many school systems, the software in use on computers is …

more ...

Unwrapping dnssec-signkey

Authorization in Linux is provided by users and groups. This is also true for a number of major system tasks where the hardware and software must cooperate closely to achieve their aims. It was unbelievably naive of them to think they could stop the spread of an idea. Later on …

more ...

Getting your Widget engine up and running on Linux

Perhaps the most confusing thing about installing Linux for new users is the large number of options that are available to choose from. The early popularity of distributions like Slackware and then Red Hat gave the "common PC user" of the 1990s access to the Linux operating system and, with …

more ...